1,133 research outputs found

    When Programs Collide: A Panel Report on the Competing Interests of Analytics and Security

    Get PDF
    The increasing demand for business analytics and cybersecurity professionals provides an exciting job outlook for graduates of information systems programs. However, the rapid proliferation of devices and systems that spurred this trend has created a challenging ethical dilemma for the individuals responsible for educating future generations of information technology professionals. Many firms collect and store as much data as possible in the hope that technology might uncover useful insights in the future. This behavior results in an ever-increasing challenge for those charged with protecting organizational assets and exerts pressure on executives seeking an analytical edge to remain profitable in a hyper-competitive marketplace. With this dilemma in mind, a recent panel discussion at the 14th Annual Midwest Association for Information Systems Conference explored the delicate balance between unleashing the power of analytics and securing the sensitive data it consumes while respecting consumer privacy. This paper reports on that discussion and its insights

    On the Complexity of Health Data Protection-in-Practice: Insights from a Longitudinal Qualitative Study

    Get PDF
    Digitalization of healthcare presents opportunities for improving the quality of healthcare services and promises economic benefits. However, the success of digital health and the benefits cannot be actualized without considering health data protection practices in the process of healthcare service delivery. Despite the criticality of protecting health data in the system use lifecycle (from recording to consuming and taking informed actions), there is a paucity of research to investigate this complex phenomenon. Using longitudinal qualitative data on a state-wide digital health transformation project, we contextually theorize the practices for protecting health data. Our study reveals five types of health data protectionin-practice, namely data minimization, informal encoding, accuracy, improving cyber-awareness, and appropriate access management. Our results provide new insights into information system use (especially, effective use), and highlight practices that can improve health data protection

    SMEs' Confidentiality Concerns for Security Information Sharing

    Full text link
    Small and medium-sized enterprises are considered an essential part of the EU economy, however, highly vulnerable to cyberattacks. SMEs have specific characteristics which separate them from large companies and influence their adoption of good cybersecurity practices. To mitigate the SMEs' cybersecurity adoption issues and raise their awareness of cyber threats, we have designed a self-paced security assessment and capability improvement method, CYSEC. CYSEC is a security awareness and training method that utilises self-reporting questionnaires to collect companies' information about cybersecurity awareness, practices, and vulnerabilities to generate automated recommendations for counselling. However, confidentiality concerns about cybersecurity information have an impact on companies' willingness to share their information. Security information sharing decreases the risk of incidents and increases users' self-efficacy in security awareness programs. This paper presents the results of semi-structured interviews with seven chief information security officers of SMEs to evaluate the impact of online consent communication on motivation for information sharing. The results were analysed in respect of the Self Determination Theory. The findings demonstrate that online consent with multiple options for indicating a suitable level of agreement improved motivation for information sharing. This allows many SMEs to participate in security information sharing activities and supports security experts to have a better overview of common vulnerabilities. The final publication is available at Springer via https://doi.org/10.1007/978-3-030-57404-8_22Comment: 10 pages, 2 figures, 14th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2020

    Language model AI and international commercial arbitration

    Get PDF
    This thesis dives deep into the world of a specific type of artificial intelligence (AI), Large Language Models (LLMs), and how they might impact international business disputes, or more specifically, international commercial arbitration. In an age where rapid advancement in technology is quickly reshaping our world, the legal field isn't immune to this transformation. Among the game-changers, language model AI could, due to its promising capacity of data-processing and outcome prediction, potentially make international arbitration quicker and less expensive, thereby providing easier access to justice for the commercial sector across the globe. However, it's not all smooth sailing. The study also identifies legal limitations regarding the use of LLMs in arbitration - issues related to bias, maintaining fair processes, keeping data private, and determining who is accountable when AI is involved. Overcoming these obstacles is crucial before AI can be confidently incorporated into arbitration. While LLMs hold exciting potential for international commercial arbitration, careful implementation is important. We need comprehensive rules and guidelines to ensure language model AI operates effectively and ethically in this arena. The use of AI should be a considered decision, keeping in mind the potential hurdles and working towards mitigating them.This thesis dives deep into the world of a specific type of artificial intelligence (AI), Large Language Models (LLMs), and how they might impact international business disputes, or more specifically, international commercial arbitration. In an age where rapid advancement in technology is quickly reshaping our world, the legal field isn't immune to this transformation. Among the game-changers, language model AI could, due to its promising capacity of data-processing and outcome prediction, potentially make international arbitration quicker and less expensive, thereby providing easier access to justice for the commercial sector across the globe. However, it's not all smooth sailing. The study also identifies legal limitations regarding the use of LLMs in arbitration - issues related to bias, maintaining fair processes, keeping data private, and determining who is accountable when AI is involved. Overcoming these obstacles is crucial before AI can be confidently incorporated into arbitration. While LLMs hold exciting potential for international commercial arbitration, careful implementation is important. We need comprehensive rules and guidelines to ensure language model AI operates effectively and ethically in this arena. The use of AI should be a considered decision, keeping in mind the potential hurdles and working towards mitigating them

    The Development of a Red Teaming Service-Learning Course

    Get PDF
    Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows students to perform security assessments for local businesses through red team engagements. This paper will allow academics to implement similar courses, improving security education for students and increasing opportunities for local businesses to receive affordable security assessments
    • …
    corecore