689 research outputs found

    International perspectives on social media guidance for nurses: a content analysis

    Get PDF
    Aim: This article reports the results of an analysis of the content of national and international professional guidance on social media for the nursing profession. The aim was to consolidate good practice examples of social media guidelines, and inform the development of comprehensive guidance. Method: A scoping search of professional nursing bodies’ and organisations’ social media guidance documents was undertaken using google search. Results: 34 guidance documents were located, and a content analysis of these was conducted. Conclusion: The results, combined with a review of competency hearings and literature, indicate that guidance should cover the context of social media, and support nurses to navigate and negotiate the differences between the real and online domains to help them translate awareness into actions

    Network Neutrality: A Research Guide

    Get PDF
    The conclusion in a research handbook should emphasise the complexity of the problem than trying to claim a one-size-fits-all solution. I have categorised net neutrality into positive and negative (content discrimination) net neutrality indicating the latter as potentially harmful. Blocking content without informing customers appropriately is wrong: if it says ‘Internet service’, it should offer an open Internet (alongside walled gardens if that is expressly advertised as such). The issue of uncontrolled Internet flows versus engineered solutions is central to the question of a ‘free’ versus regulated Internet. A consumer- and citizen-orientated intervention depends on passing regulations to prevent unregulated nontransparent controls exerted over traffic via DPI equipment, whether imposed by ISPs for financial advantage or by governments eager to use this new technology to filter, censor and enforce copyright against their citizens. Unraveling the previous ISP limited liability regime risks removing the efficiency of that approach in permitting the free flow of information for economic and social advantage. These conclusions support a light-touch regulatory regime involving reporting requirements and co-regulation with, as far as is possible, market-based solutions. Solutions may be international as well as local, and international coordination of best practice and knowledge will enable national regulators to keep up with the technology ‘arms race’

    Understanding digital intelligence and the norms that might govern it

    Get PDF
    Abstract: This paper describes the nature of digital intelligence and provides context for the material published as a result of the actions of National Security Agency contractor Edward Snowden. It looks at the dynamic interaction between demands from government and law enforcement for digital intelligence, and at the new possibilities that digital technology has opened up for meeting such demands. The adequacy of previous regimes of legal powers and governance arrangements is seriously challenged just at a time when the objective need for intelligence on the serious threats facing civil society is apparent. This paper suggests areas where it might be possible to derive international norms, regarded as promoting standards of accepted behaviour that might gain widespread, if not universal, international acceptance, for the safe practice of digital intelligence

    Value focused assessment of cyber risks to gain benefits from security investments

    Get PDF
    Doutoramento em GestãoCom a multiplicação de dispositivos tecnológicos e com as suas complexas interacções, os ciber riscos não param de crescer. As entidades supervisoras estabelecem novos requisitos para forçar organizações a gerir os ciber riscos. Mesmo com estas crescentes ameaças e requisitos, decisões para a mitigação de ciber riscos continuam a não ser bem aceites pelas partes interessadas e os benefícios dos investimentos em segurança permanecem imperceptíveis para a gestão de topo. Esta investigação analisa o ciclo de vida da gestão de ciber risco identificando objectivos de mitigação de ciber risco, capturados de especialistas da área, prioritizando esses objectivos para criar um modelo de decisão para auxiliar gestores de risco tendo em conta vários cenários reais, desenvolvendo um conjunto de princípios de gestão de risco que possibilitam o estabelecimento de uma base para a estratégia de ciber risco aplicável e adaptável às organizações e finalmente a avaliação dos benefícios dos investimentos em segurança para mitigação dos ciber riscos seguindo uma abordagem de melhoria contínua. Duas frameworks teóricas são integradas para endereçar o ciclo de vida completo da gestão de ciber risco: o pensamento focado em valor guia o processo de decisão e a gestão de benefícios assegura que os benefícios para o negócio são realizados durante a implementação do projecto, depois de tomada a decisão para investir numa solução de segurança para mitigação do ciber risco.With the multiplication of technological devices and their multiple complex interactions, the cyber risks keep increasing. Supervision entities establish new compliance requirements to force organizations to manage cyber risks. Despite these growing threats and requirements, decisions in cyber risk minimization continue not to be accepted by stakeholders and the business benefits of security investments remain unnoticed to top management. This research analyzes the cyber risk management lifecycle by identifying cyber risk mitigation objectives captured from subject matter experts, prioritizing those objectives in a cyber risk management decision model to help risk managers in the decision process by taking into account multiple real scenarios, developing the baseline of cyber risk management principles to form a cyber risk strategy applicable and adaptable to current organizations and finally evaluating the business benefits of security investments to mitigate cyber risks in a continuous improvement approach. Two theoretical frameworks are combined to address the full cyber risk management lifecycle: value focused thinking guides the decision process and benefits management ensures that business benefits are realized during project implementation, after the decision is taken to invest in a security solution to mitigate cyber risk.info:eu-repo/semantics/publishedVersio

    Governing information security within the context of "bring your own device" in small, medium and micro enterprises

    Get PDF
    Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof

    Governing information security within the context of "bring your own device" in small, medium and micro enterprises

    Get PDF
    Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof

    Essays on enterprise social media: moderation, shop floor integration and information system induced organizational change

    Get PDF
    The digital transformation increases the pressure on innovation capabilities and challenges organizations to adapt their business models. In order to cope with the increased competitiveness, organizations face two significant internal challenges: Enabling internal digital collaboration and knowledge sharing as well as information system-induced change. This dissertation will investigate seven related research questions divided in two main parts. The first part focuses on how an organization can foster digital knowledge exchanges and collaboration in global organizations. Enterprise social media has attracted the attention of organizations as a technology for social collaboration and knowledge sharing. The dissertation will investigate how organizations can moderate the employee discourse in such platforms from a novel organizational perspective and provide insights on how to increase the encouragement for employees to contribute and assure content quality. The developed framework will provide detailed moderation approaches. In addition, the risk of privacy concerns associated with organizational interference in the new digital collaboration technologies are evaluated. The second part of the dissertation shifts the focus to the shop floor environment, an area that has faced substantial digital advancements. Those advancements change the organizational role of the shop floor to a more knowledge work-oriented environment. Firstly, a state of research regarding technology acceptance and professional diversity is presented to create an enterprise social media job-characteristic framework. Further, a unique and longitudinal shop floor case study is investigated to derive organizational challenges for enterprise social media and potentials for empowerment. To validate the future shop floor environment needs use cases for the shop floor are derived and a user profile is established. The case study is extended by expert interviews to focus on conceptualizing organizational information systems-induced change. In this regard, the role of work practices, organizational and employee mindset and information system change are integrated into a holistic organizational change model that targets employee empowerment. This dissertation provides a comprehensive overview of enterprise social media from an organizational management and shop floor perspective. It contributes to understanding new digital needs at the shop floor and the information systems-induced change journey towards digital employee empowerment

    Moderation of Enterprise Social Networks – A Literature Review from a Corporate Perspective

    Get PDF
    The implementation of internal social collaboration technologies confronts corporations with new challenges. Former unidirectional information flows become multidirectional and user-content driven networks. Prior research describes the successful implementation as a challenging management task with employees’ usage at the center of attention. Consequently, corporations need to select a moderation style to encourage the usage. The degree of corporate engagement might have repercussions on the contribution behavior. We conduct a structured literature review to identify pre-existing IS contributions to the moderation phenomenon in social media tools, which help to explain on how to moderate these communication platforms in the enterprise context. We reviewed over 150 articles on the subject and assessed 31 articles in depth on the degree of corporate engagement and user content encouragement. We analyze the identified literature for gaps in understanding the phenomenon and provide a first assessment of three different moderation approaches and give implication for future research
    corecore