83,060 research outputs found

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c

    Ignore These At Your Peril: Ten principles for trust design

    Get PDF
    Online trust has been discussed for more than 10 years, yet little practical guidance has emerged that has proven to be applicable across contexts or useful in the long run. 'Trustworthy UI design guidelines' created in the late 90ies to address the then big question of online trust: how to get shoppers online, are now happily employed by people preparing phishing scams. In this paper we summarize, in practical terms, a conceptual framework for online trust we've established in 2005. Because of its abstract nature it is still useful as a lens through which to view the current big questions of the online trust debate - large focused on usable security and phishing attacks. We then deduct practical 10 rules for providing effective trust support to help practitioners and researchers of usable security

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment

    A Survey on Communication Networks in Emergency Warning Systems

    Get PDF

    Disasters and Disclosures

    Get PDF
    Many securities fraud lawsuits follow corporate disasters of some sort or another, claiming that known risks were concealed prior to the crisis. Yet for a host of doctrinal, pragmatic and political reasons, there is no clear-cut duty to disclose these risks. The SEC has imposed a set of requirements that sometimes forces risk disclosure, but does so neither consistently nor adequately. Courts in 10b-5 fraud-on-the-market cases, in turn, have made duty mainly a matter of active rather than passive concealment and thus, literally, wordplay: there is no fraud-based duty to disclose risks unless and until the issuer has said enough to put the particular kind of risk “in play.” But when that is, and why, flummoxes them. This incoherence could be rationalized by a more thoughtful assessment of how words matter to investors and better appreciation of the variable role that managerial credibility plays in the process of disclosure and interpretation, which is the main focus of this article. Disasters are an ideal, if disturbing, setting for thinking through the micro-structure of corporate discourse—the implicit rules of interpretation for how marketplace actors interpret what issuers say and don’t say, whether in formal SEC disclosures, conference calls, press conferences and even executive tweets. But even if there is more thoughtfulness to the endeavor, it is fair to ask why wordplay should make so much of a difference as to duty in the first place, or whether instead our impoverished conception of duty and its links to scienter, reliance and causation deserve a more thorough makeover. The study of disasters and disclosures also offers a distinctive reference point for thinking about contemporary controversies associated with bringing matters of social responsibility (e.g., law abidingness) and sustainability (environmental compliance, cybersecurity, product safety, etc.) into the realm of securities law

    The ISCIP Analyst, Volume XII, Issue 1

    Full text link
    This repository item contains a single issue of The ISCIP Analyst, an analytical review journal published from 1996 to 2010 by the Boston University Institute for the Study of Conflict, Ideology, and Policy
    • …
    corecore