6,023 research outputs found

    Networked Privacy Beyond the Individual: Four Perspectives to ‘Sharing’

    Get PDF
    Synthesizing prior work, this paper provides conceptual grounding for understanding the dialectic of challenges and opportunities that social network sites present to social life. With the help of the framework of interpersonal boundary regulation, this paper casts privacy as something people do, together, instead of depicting it as a characteristic or a possession. I illustrate interpersonal aspects of networked privacy by outlining four perspectives to ‘sharing’. These perspectives call for a rethink of networked privacy beyond an individual’s online endeavors

    After Over-Privileged Permissions: Using Technology and Design to Create Legal Compliance

    Get PDF
    Consumers in the mobile ecosystem can putatively protect their privacy with the use of application permissions. However, this requires the mobile device owners to understand permissions and their privacy implications. Yet, few consumers appreciate the nature of permissions within the mobile ecosystem, often failing to appreciate the privacy permissions that are altered when updating an app. Even more concerning is the lack of understanding of the wide use of third-party libraries, most which are installed with automatic permissions, that is permissions that must be granted to allow the application to function appropriately. Unsurprisingly, many of these third-party permissions violate consumers’ privacy expectations and thereby, become “over-privileged” to the user. Consequently, an obscurity of privacy expectations between what is practiced by the private sector and what is deemed appropriate by the public sector is exhibited. Despite the growing attention given to privacy in the mobile ecosystem, legal literature has largely ignored the implications of mobile permissions. This article seeks to address this omission by analyzing the impacts of mobile permissions and the privacy harms experienced by consumers of mobile applications. The authors call for the review of industry self-regulation and the overreliance upon simple notice and consent. Instead, the authors set out a plan for greater attention to be paid to socio-technical solutions, focusing on better privacy protections and technology embedded within the automatic permission-based application ecosystem

    Internet of Things Strategic Research Roadmap

    Get PDF
    Internet of Things (IoT) is an integrated part of Future Internet including existing and evolving Internet and network developments and could be conceptually defined as a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual “things” have identities, physical attributes, and virtual personalities, use intelligent interfaces, and are seamlessly integrated into the information network

    Creating and modelling personal socio-economic networks in on-line banking

    Get PDF
    The banking industry is observing how new competitors threaten its millennial business model by targeting unbanked people, offering new financial services to their customer base, and even enabling new channels for existing services and customers. The knowledge on users, their behaviour, and expectations become a key asset in this new context. Well aware of this situation, the Center for Open Middleware, a joint technology center created by Santander Bank and Universidad Politécnica de Madrid, has launched a set of initiatives to allow the experimental analysis and management of socio-economic information. PosdataP2P service is one of them, which seeks to model the economic ties between the holders of university smart cards, leveraging on the social networks the holders are subscribed to. In this paper we describe the design principles guiding the development of the system, its architecture and some implementation details

    Human-Centered Design for Individual and Social Well-being: Editorial Preface

    Get PDF
    As digital technology use becomes widespread, its unintended consequences ranging from personal health to societal righteousness are under more scrutiny. Increasingly, digital designers are accused of not being considerate enough of the depth of their creations, and their impacts on our well-being. In this special issue, we explore an alternative, genuinely human-centered approach to technology design focusing on well-being and making our interactions with digital technology more meaningful, purposeful, and sustainable. To this end, the editorial starts with a brief review of the history of research that led to the growing field of digital well-being. We then introduce the Digital Well-being Design Framework, which goes beyond the ego-centric approach in human-centered design, and is multi-layered with self (intrapersonal), social (interpersonal), and transcendent (extra-personal) levels. Similar topics in related AIS journals are summarized, followed by the application of our framework to introduce and position the papers in this special issue. Our special issue aims to bring the topic of digital well-being to the forefront of the information systems research community and launch a new era of genuinely human-centered design

    Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies

    Get PDF
    In this paper, we explore the security and privacy issues of Internet of Things (IoT) healthcare applications for special needs users. IoT enables health-related organizations to lift important data from diverse sources in real-time and this helps in precise decision-making. The transformation of the health sector, required enhancement and efficiency of protective systems, thereby reducing data vulnerability and hence, providing opportunities for secure patient data, particularly, for special needs patients. A quantitative method for purposive sampling technique was adopted and eighty-eight respondents provided the process of how the IoT technology was utilised. Data findings indicated that IoT monitoring devices have the detective ability for a person with special needs living alone with problems related to vital signs of diseases or disabilities. Personal patient health records are integrated into the e-health Centre via IoT technologies. For data privacy, security, and confidentiality, patients' records are kept on Personal Health Record Systems (PHRS). The research revealed suspected breaches of information due to cyber-attacks on the probability of false data errors in the PHRS, leading to special needs personal data leakage

    Plastic Money and Electronic Banking Services Espousal vis-a-viz Financial Identity Theft Fraud Risk Awareness in a Developing Country

    Get PDF
    Exploitation of plastic money coupled with electronic banking services has come as expediency to financial establishment customers in Zimbabwe. This paper sought to analyze plastic money and electronic banking services espousal vis-a-viz financial identity theft fraud risk awareness in Zimbabwe banking sector via banksñ€ℱ websites. The theoretical underpinning for this study is Routine Activity Theory. The study used qualitative content analysis research technique for examination of the text content data through the consistent taxonomy process of coding and classifying themes or patterns to submit a painstaking considerate of financial identity theft fraud awareness by the banking sector in Zimbabwe. A sample size of 14 banks (including commercial, merchant and building societies) was used and the banks were arbitrarily chosen on the basis of website accessibility and ease of use of the data. The study findings suggest that there is very little financial identity theft awareness in Zimbabwe by the banking sector through their websites to the general public whilst there is amplified adoption of plastic money and electronic banking adoption. This study proposes a need to amplify the information and inform plastic card and electronic banking customers of the types of financial identity theft fraud. Plastic card and electronic banking is an urgent area to focus on for banking institutions and should inexorably capitalize in it. Financial identity theft information should be easily retrievable and conveyed in a manner that makes reasonableness to the varied customers.&nbsp

    Third places in transit: Public transport as a third place of mobility

    Get PDF
    • 

    corecore