27,765 research outputs found

    Countering Social Engineering through Social Media: An Enterprise Security Perspective

    Full text link
    The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. Also included is an analysis of existing social media security policies and guidelines within the public and private sectors.Comment: Proceedings of The 7th International Conference on Computational Collective Intelligence Technologies and Applications (ICCCI 2015), LNAI, Springer, Vol. 9330, pp. 54-6

    Next Generation User Skills

    Get PDF
    The world is awash with statistics on the impact of the web on 21st century living, learning and working. They are accompanied by the pronouncements and predictions of experts from every camp, from those heralding a new brave new world of co-creation and choice, to warnings from the dark side in terms of ethics and educational standards, tempered by increasing recognition that ‘we’ may no longer be in control of such matters. Meanwhile, surveys report that around 80% of businesses have invested in IT and 60% have websites. Whilst the extent and value of adoption differs significantly across businesses and sectors, the foundations for new ways of working and doing business are broadly in place, with older and static businesses typifying the laggards. It would not be unsafe to project that, by 2013, even more people will be required to use ICT in the workplace and in their everyday lives, increasingly involving online communication and web-based applications. This represents a scenario to which those responsible for developing curricula and awards must respond – in the primary and secondary phases, vocational and applied learning, work based and adult community provision and higher education. To ensure the relevance of and to influence the ongoing enhancement of user ICT provision and the associated awards, Digital 2020 and the Scottish Qualifications Authority jointly commissioned Sero Consulting to develop a vision for ICT user skills in 2013 – ‘Next Generation User Skills’ – taking account of: • Skills that all employers will need, which they may not currently recognise. • Skills that people (especially young people) will already have, but which may not be accredited. • Essential skills for living and learning in a digital age. This paper is drawn from the resulting public report, ‘Next Generation User Skills – Working, Learning & Living Online in 2013’ (September 2008), which provides: • An overview of the current ICT user skills landscape. • A model representing digital activities and competencies that might constitute the ‘Next Generation User Skillscape’. • A mapping of that activity space onto tools and awards, with a gap analysis identifying weaknesses in provision. • An overview of the recommendations to the report sponsors

    Managing Corporate Reputation

    Get PDF
    {Excerpt} Newly minted approaches to corporate reputation are already obsolete. Beyond gaining control of issues, crises, and corporate social responsibility, organizations need to reconceptualize and manage reputation in knowledge-based economies. Reputation is not about likability: it is the aggregate estimation in which a person or entity is held by individuals and the public against a criterion, based on past actions and perceptual representation of future prospects, when compared to other persons or entities. Since we cannot develop a personal relationship with every entity in the world, the regard in which a party is held is a proxy indicator of predictability and the likelihood the party will meet expectations, a useful earmark that facilitates sense and decision making against alternatives. Every day, through what amounts to a distributed means of social control, we assess and judge with effect the competence of individuals and organizations to fulfill expectations based on such social evaluation

    Online Project Management for Dynamic e-Collaboration

    Get PDF
    Today’s collaborative projects demand efficient and productive software application tools for the workplace that will bring remote teams together to get the work done. Dynamic e-collaboration is a necessity for virtual relations and business agreements. It depends on two distinct factors: trust and need. This paper presents a way to manage remote teams using a web application developed with ColMap model of project management in an IT company. The information exposed and shared applications with partners in collaborative projects are based on RBAC. Group collaboration and management software has been proven to successfully manage and coordinate projects.Dynamic E-collaboration, Collaboration Model, Web Application

    Exercise as Labour: Quantified Self and the Transformation of Exercise into Labour

    Get PDF
    The recent increase in the use of digital self-tracking devices has given rise to a range of relations to the self often discussed as quantified self (QS). In popular and academic discourse, this development has been discussed variously as a form of narcissistic self-involvement, an advanced expression of panoptical self-surveillance and a potential new dawn for e-health. This article proposes a previously un-theorised consequence of this large-scale observation and analysis of human behaviour; that exercise activity is in the process of being reconfigured as labour. QS will be briefly introduced, and reflected on, subsequently considering some of its key aspects in relation to how these have so far been interpreted and analysed in academic literature. Secondly, the analysis of scholars of “digital labour” and “immaterial labour” will be considered, which will be discussed in relation to what its analysis of the transformations of work in contemporary advanced capitalism can offer to an interpretation of the promotion and management of the self-tracking of exercise activities. Building on this analysis, it will be proposed that a thermodynamic model of the exploitation of potential energy underlies the interest that corporations have shown in self-tracking and that “gamification” and the promotion of an entrepreneurial selfhood is the ideological frame that informs the strategy through which labour value is extracted without payment. Finally, the potential theoretical and political consequences of these insights will be considered

    An Agent-Based Spatially Explicit Epidemiological Model in MASON

    Get PDF
    This paper outlines the design and implementation of an agent-based epidemiological simulation system. The system was implemented in the MASON toolkit, a set of Java-based agent-simulation libraries. This epidemiological simulation system is robust and extensible for multiple applications, including classroom demonstrations of many types of epidemics and detailed numerical experimentation on a particular disease. The application has been made available as an applet on the MASON web site, and as source code on the author\'s web site.Epidemiology, Social Networks, Agent-Based Simulation, MASON Toolkit

    It's a family affair: the effect of union recognition and human resource management on the provision of equal opportunities in the UK

    Get PDF
    Equal opportunities policies and family-friendly practices are examined using data from the 1998 Workplace Employee Relations Survey in order to assess (i) their associations with union recognition and strategic human resource management and (ii) the outcomes of what has recently been described as ''tinkering around'' for women at work. We find that, controlling for various factors, equal opportunities policies and their monitoring, together with ''softer'' family-friendly policies are strongly associated with trade union recognition. On the other hand, we find that a number of both ''hard'' and ''soft'' Human Resource Management (HRM) policies are strongly associated with flexible working practices. Employees are least likely to have access to equal opportunities and family-friendly policies in workplaces which do not recognise a union or use HRM practices, and we present evidence to suggest that this is the worst option for the employer in terms of workplace performance, as well as for those with family responsibilities

    Self-tracking modes: reflexive self-monitoring and data practices

    Get PDF
    The concept of ‘self-tracking’ (also referred to as life-logging, the quantified self, personal analytics and personal informatics) has recently begun to emerge in discussions of ways in which people can voluntarily monitor and record specific features of their lives, often using digital technologies. There is evidence that the personal data that are derived from individuals engaging in such reflexive self-monitoring are now beginning to be used by actors, agencies and organisations beyond the personal and privatised realm. Self-tracking rationales and sites are proliferating as part of a ‘function creep’ of the technology and ethos of self-tracking. The detail offered by these data on individuals and the growing commodification and commercial value of digital data have led government, managerial and commercial enterprises to explore ways of appropriating self-tracking for their own purposes. In some contexts people are encouraged, ‘nudged’, obliged or coerced into using digital devices to produce personal data which are then used by others. This paper examines these issues, outlining five modes of self-tracking that have emerged: private, communal, pushed, imposed and exploited. The analysis draws upon theoretical perspectives on concepts of selfhood, citizenship, biopolitics and data practices and assemblages in discussing the wider sociocultural implications of the emergence and development of these modes of self-tracking
    corecore