231,749 research outputs found

    Securing intellectual capital:an exploratory study in Australian universities

    Get PDF
    Purpose – To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-related foci and challenges.Design/methodology/approach – We gathered insights from existing IC-related research publications to delineate key foundational aspects of IC, identify and propose links to traditional information security that impact the protection of IC. We conducted interviews with key stakeholders in Australian universities in order to validate these links.Findings – Our investigation revealed two kinds of embeddedness characterizing the organizational fabric of universities: (1) vertical and (2) horizontal, with an emphasis on the connection between these and IC-related knowledge protection within these institutions.Research implications – There is a need to acknowledge the different roles played by actors within the university, and the relevance of information security to IC-related preservation.Practical implications – Framing information security as an IC-related issue can help IT security managers communicate the need for knowledge security with executives in higher education, and secure funding to preserve and secure such IC-related knowledge, once its value is recognized.Originality/value – This is one of the first studies to explore the connections between data and information security and the three core components of IC’s knowledge security in the university context

    Pervasive eHealth services a security and privacy risk awareness survey

    Get PDF
    The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations

    Ram Essential

    Get PDF
    The underlying causes of food insecurity are complex and often intertwined with related issues that affect a student’s ability to meet even basic needs, such as housing, employment and health care, forcing them to choose between their well-being and their education. The latest Hunger in America report finds that about 10 percent of Feed America’s 46.5 million adult clients are college students. That equates to 2 million full-time college students. “Of those surveyed by the emergency food services network, roughly 30.5 percent of students reported that they were forced to choose between food and educational expenses at some point over the last year.”1 In response, colleges and universities, including VCU, have sprung into action, and the number of campus food pantries at higher educational institutions has risen from a handful in 2009 to more than 500 in 2017.2 But changing food insecurity to food security goes beyond providing just food. It involves a comprehensive approach to providing resources that address the causes and results of being food insecure. Ram Essentials is a holistic approach to addressing basic needs insecurity among VCU students by asking the question, What is essential for our students to be successful? The project focuses on raising the awareness of all existing VCU resources and disseminating them widely through a single user-friendly portal to enhance students’ experience, academic achievement and physical and mental well-being

    Subject benchmark statement : criminology - draft for consultation 2013

    Get PDF

    A Survey of Attitudes and Actions on Dual Use Research in the Life Sciences

    Get PDF
    Presents results of a survey of American Association for the Advancement of Science members in the life sciences on their knowledge and perceptions of dual use issues, their role in reducing the risks of misuse, and the need for oversight mechanisms

    Subject benchmark statement. Criminology : draft for consultation 2013

    Get PDF

    Case study:exploring children’s password knowledge and practices

    Get PDF
    Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous password, and this might well be a suboptimal choice. Designing authentication for children requires acknowledgement of child-specific developmental challenges related to literacy, cognitive abilities and differing developmental stages. Understanding the current state of play is essential, to deliver insights that can inform the development of child-centred authentication mechanisms and processes. We carried out a systematic literature review of all research related to children and authentication since 2000. A distinct research gap emerged from the analysis. Thus, we designed and administered a survey to school children in the United States (US), so as to gain insights into their current password usage and behaviors. This paper reports preliminary results from a case study of 189 children (part of a much larger research effort). The findings highlight age-related differences in children’s password understanding and practices. We also discovered that children confuse concepts of safety and security. We conclude by suggesting directions for future research. This paper reports on work in progress.<br/
    • …
    corecore