11,088 research outputs found

    Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier

    Full text link
    As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual property. Two parallel developments in academic data collection are converging: (1) open access requirements, whereby researchers must provide access to their data as a condition of obtaining grant funding or publishing results in journals; and (2) the vast accumulation of 'grey data' about individuals in their daily activities of research, teaching, learning, services, and administration. The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection. Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII. Universities are exploiting these data for research, learning analytics, faculty evaluation, strategic decisions, and other sensitive matters. Commercial entities are besieging universities with requests for access to data or for partnerships to mine them. The privacy frontier facing research universities spans open access practices, uses and misuses of data, public records requests, cyber risk, and curating data for privacy protection. This paper explores the competing values inherent in data stewardship and makes recommendations for practice, drawing on the pioneering work of the University of California in privacy and information security, data governance, and cyber risk.Comment: Final published version, Sept 30, 201

    利用者の行動パターンの検知を通じた機密情報とコミュニケーションの内部統制に関する研究

    Get PDF
    国立大学法人長岡技術科学大

    Web Based Cyber Forensics Training For Law Enforcement

    Get PDF
    Training and education are two of the most important aspects within cyber forensics. These topics have been of concern since the inception of the field. Training law enforcement is particularly important to ensure proper execution of the digital forensics process. It is also important because the proliferation of technology in to society continues to grow at an exponential rate. Just as technology is used for good there are those that will choose to use it for criminal gains. It is critical that Law Enforcement have the tools and training in cyber forensics. This research looked to determine if web based training was a feasible platform for cyber forensics training. A group of Indiana State Police Troopers were asked to participate in an online study where they were presented cyber forensics training material. That study showed that there was statistical significance between the treatment groups and the control group. The results from the study showed that web based training is an effective means to train a large group of law enforcement officers

    Vortex of the Web. Potentials of the online environment

    Get PDF
    This volume compiles international contributions that explore the potential risks and chances coming along with the wide-scale migration of society into digital space. Suggesting a shift of paradigm from Spiral of Silence to Nexus of Noise, the opening chapter provides an overview on systematic approaches and mechanisms of manipulation – ranging from populist political players to Cambridge Analytica. After a discussion of the the juxtaposition effects of social media use on social environments, the efficient instrumentalization of Twitter by Turkish politicans in the course of the US-decision to recognize Jerusalem as Israel’s capital is being analyzed. Following a case study of Instagram, Black Lives Matter and racism is a research about the impact of online pornography on the academic performance of university students. Another chapter is pointing out the potential of online tools for the successful relaunch of shadow brands. The closing section of the book deals with the role of social media on the opinion formation about the Euromaidan movement during the Ukrainian revolution and offers a comparative study touching on Russian and Western depictions of political documentaries in the 2000s

    Recruiting the cyber leader: an evaluation of the human resource model used for recruiting the Army’s "Cyber Operations Officer"

    Get PDF
    Includes supplementary materialFor the first time since the creation of the Special Forces branch in 1987, the Army authorized the creation of a new branch, the Cyber branch. With this, the Army joined the ranks of other organizations in this rapidly expanding arena. The Army found itself in a situation where it needed to quickly fill the positions required of this new branch. To accomplish this goal the Army developed a recruitment strategy based on the Army human resource management model. The purpose of our research is to evaluate the effectiveness of that model to recruit Cyber Operations Officers and to examine the effects of its continued use. To perform this evaluation we conduct an operational assessment that included identifying and assessing measures of performance (MOPs) and measures of effectiveness (MOEs) based on data collected from: Army institutions; a survey of the Cyber Branch population; and the Person-Event Data Environment database. Our research also examined recruitment strategies and practices in other selected organizations to identify practical recommendations for improvements to current Army practices. The results of this research suggest that while the Army was generally successful in accomplishing the identified tasks of its recruitment strategy, there were inconsistencies in its application. Additionally, through analysis of the survey data we were able to identify attributes that had the most impact on achieving desired effects. Finally, we found that the Army did not recruit in accordance with best practices for the cyber workforce and that it did not use available tools to measure aptitude in its recruitment and the selection process. We identify some practical implications and provide recommendations for further research in this fast-paced operational environment.http://archive.org/details/recruitingcyberl1094556161Major, United States ArmyMajor, United States ArmyApproved for public release; distribution is unlimited

    Implementing Industry 4.0 technologies:Future roles in purchasing and supply management

    Get PDF
    Technological advancements associated with Industry 4.0 drive a paradigm shift with economic and social consequences where digitalization, robotization, and other emerging technologies reshape the interconnection between organizations. Critical areas that need to adapt to the change are inter-organizational buyer-supplier relationships managed by Purchasing and Supply Management (PSM) professionals. That is, their future responsibilities and skills are likely to change. Introducing the concept of specialized roles to summarize needed competencies, this research conducted a real-time Delphi study using an internet-based platform involving 47 procurement experts. As a result, the roles of the Data Analyst, Master Data Manager, Process Automation Manager, Supplier Onboarding Manager, System Innovation Scout, and Legislation Specialist were identified as essential Industry 4.0 PSM roles. For these roles, the probability of their occurrence, industry impact, desirability, and level of industry adoption are assessed. Based on emerging technologies in PSM and adopting a human-centered perspective, this research shows the need to focus on talent development to enable a technology-driven revolution. Thus, the contributions lay in the literature on Industry 4.0 and the PSM skills and capabilities domain, highlighting the required roles for Smart Working and effective Smart Supply Chains management as parts of the digital transformation journey.</p
    corecore