20,884 research outputs found

    The Impacts of Privacy Rules on Users' Perception on Internet of Things (IoT) Applications: Focusing on Smart Home Security Service

    Get PDF
    Department of Management EngineeringAs communication and information technologies advance, the Internet of Things (IoT) has changed the way people live. In particular, as smart home security services have been widely commercialized, it is necessary to examine consumer perception. However, there is little research that explains the general perception of IoT and smart home services. This article will utilize communication privacy management theory and privacy calculus theory to investigate how options to protect privacy affect how users perceive benefits and costs and how those perceptions affect individuals??? intentions to use of smart home service. Scenario-based experiments were conducted, and perceived benefits and costs were treated as formative second-order constructs. The results of PLS analysis in the study showed that smart home options to protect privacy decreased perceived benefits and increased perceived costs. In addition, the perceived benefits and perceived costs significantly affected the intention to use smart home security services. This research contributes to the field of IoT and smart home research and gives practitioners notable guidelines.ope

    Urban and rural green infrastructure.Two projects for the metropolitan city of Rome

    Get PDF
    Create synergies between green infrastructure, urban and rural areas

    Complementary network-based approaches for exploring genetic structure and functional connectivity in two vulnerable, endemic ground squirrels

    Get PDF
    The persistence of small populations is influenced by genetic structure and functional connectivity. We used two network-based approaches to understand the persistence of the northern Idaho ground squirrel (Urocitellus brunneus) and the southern Idaho ground squirrel (U. endemicus), two congeners of conservation concern. These graph theoretic approaches are conventionally applied to social or transportation networks, but here are used to study population persistence and connectivity. Population graph analyses revealed that local extinction rapidly reduced connectivity for the southern species, while connectivity for the northern species could be maintained following local extinction. Results from gravity models complemented those of population graph analyses, and indicated that potential vegetation productivity and topography drove connectivity in the northern species. For the southern species, development (roads) and small-scale topography reduced connectivity, while greater potential vegetation productivity increased connectivity. Taken together, the results of the two network-based methods (population graph analyses and gravity models) suggest the need for increased conservation action for the southern species, and that management efforts have been effective at maintaining habitat quality throughout the current range of the northern species. To prevent further declines, we encourage the continuation of management efforts for the northern species, whereas conservation of the southern species requires active management and additional measures to curtail habitat fragmentation. Our combination of population graph analyses and gravity models can inform conservation strategies of other species exhibiting patchy distributions

    La prevención del delito mediante el diseño ambiental (Crime Prevention through Environmental Design)

    Get PDF
    Crime Prevention through Environmental Design (CPTED) is a method of reducing crime through the design and manipulation of the built environment. Based upon the New Opportunity Theories of crime, CPTED focuses upon blocking opportunities for criminal behaviour through subtle techniques to maximise informal surveillance, territoriality and guardianship, to minimise through movement and to set standards of physical security that are proportionate to crime risk. This chapter will discuss the principles of CPTED and the theories from which it evolved, before exploring how CPTED is applied internationally in terms of policy, guidance and practice. Examples include Chile, Mexico, and Brazil, as well as countries with more established processes of implementing CPTED within the planning process (England and Wales, Netherlands and Australia). Evidence regarding effectiveness will be presented and consideration will be given to the extent to which principles, practice and procedure can be transferred to different countries and cultures

    The embeddedness of global production networks: The impact of crisis on Fiji's garment export sector

    Get PDF
    In this paper the author explores how changing geopolitical conditions reconfigure network embeddedness and theorises the conditions of network disconnection and transformation. Through a case study of the changes in interfirm relationships within the Fiji – Australia garment-production network after Fiji’s 2000 political coup d’état, the author develops a relational and dynamic view of embeddedness, highlighting its multifaceted and multiscalar character and emphasising the interrelationships between embeddedness, trust, and power

    Integrating the landscape epidemiology and genetics of RNA viruses: rabies in domestic dogs as a model

    Get PDF
    Landscape epidemiology and landscape genetics combine advances in molecular techniques, spatial analyses and epidemiological models to generate a more real-world understanding of infectious disease dynamics and provide powerful new tools for the study of RNA viruses. Using dog rabies as a model we have identified how key questions regarding viral spread and persistence can be addressed using a combination of these techniques. In contrast to wildlife rabies, investigations into the landscape epidemiology of domestic dog rabies requires more detailed assessment of the role of humans in disease spread, including the incorporation of anthropogenic landscape features, human movements and socio-cultural factors into spatial models. In particular, identifying and quantifying the influence of anthropogenic features on pathogen spread and measuring the permeability of dispersal barriers are important considerations for planning control strategies, and may differ according to cultural, social and geographical variation across countries or continents. Challenges for dog rabies research include the development of metapopulation models and transmission networks using genetic information to uncover potential source/sink dynamics and identify the main routes of viral dissemination. Information generated from a landscape genetics approach will facilitate spatially strategic control programmes that accommodate for heterogeneities in the landscape and therefore utilise resources in the most cost-effective way. This can include the efficient placement of vaccine barriers, surveillance points and adaptive management for large-scale control programmes

    Mapping the open education landscape: citation network analysis of historical open and distance education research

    Get PDF
    The term open education has recently been used to refer to topics such as Open Educational Resources (OERs) and Massive Open Online Courses (MOOCs). Historically its roots lie in civil approaches to education and open universities, but this research is rarely referenced or acknowledged in current interpretations. In this article the antecedents of the modern open educational movement are examined, as the basis for connecting the various strands of research. Using a citation analysis method the key references are extracted and their relationships mapped. This work reveals eight distinct sub-topics within the broad open education area, with relatively little overlap. The implications for this are discussed and methods of improving inter-topic research are proposed

    Group privacy management strategies and challenges in Facebook : a focus group study among Flemish youth organizations

    Get PDF
    A large body of research has studied young people’s privacy practices and needs in Facebook. Less is known about group privacy. In this study 12 focus groups were organized with a total of 78 adolescents and young adults of local Flemish youth organizations to discuss their privacy practices. Findings describe how different strategies are used to coordinate the group information flow. The study also shows how online group privacy management can be challenging because ‘implicit’ privacy rules need to be made ‘explicit’, personal boundaries may conflict with those of the group one belongs to and privacy turbulence is difficult to define
    corecore