320,681 research outputs found

    Social Media, Online Shopping Activities and Perceived Risks in Malaysia

    Get PDF
    The Internet shopping experience offers dissimilar ways of off-online communications with communication differences tools that need a better decision of their effect on customer communications. Social networking sites is also fast becoming the platform for interaction, attracting new potential customers and has become the trend for companies to engage with their consumers online. The main objective of this research is to examine Malaysia customer’s risk perception toward online shopping via social media website. Findings suggest that respondents from all age groups have generally accepted the Internet to be used for social networking, while older groups use the Internet for information search and online shopping. The key areas of risk for not using Internet shopping is related to product quality, scamming, and poor customer service; in which the female groups appeared to be more concerned about the risk involved. Higher income groups are more concerned with the risks on product quality suggesting they expect value for their money for the products. Findings further shows that older consumer groups require some form of education in technology, which is preventing them from fully exploring the Internet and shopping potentials. The area of concern for both genders, is information security, such as protecting private information, security of the website, comfort level with the site, information completeness and trust of the vendor. Female groups were found to have higher tendency of fear of the risk of breaching information, suggesting that they highly value their privacy and secrecy

    Case study:exploring children’s password knowledge and practices

    Get PDF
    Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous password, and this might well be a suboptimal choice. Designing authentication for children requires acknowledgement of child-specific developmental challenges related to literacy, cognitive abilities and differing developmental stages. Understanding the current state of play is essential, to deliver insights that can inform the development of child-centred authentication mechanisms and processes. We carried out a systematic literature review of all research related to children and authentication since 2000. A distinct research gap emerged from the analysis. Thus, we designed and administered a survey to school children in the United States (US), so as to gain insights into their current password usage and behaviors. This paper reports preliminary results from a case study of 189 children (part of a much larger research effort). The findings highlight age-related differences in children’s password understanding and practices. We also discovered that children confuse concepts of safety and security. We conclude by suggesting directions for future research. This paper reports on work in progress.<br/

    Is students' qualitative feedback changing, now it is online?

    Get PDF
    The current state of ecological safety evaluation problem in design stage is analysed. Procedure of ecological safety estimation on the basis of index of objects danger and ecological risk is offered.Проанализирован современное состояние проблемы оценки экологической безопасности на этапе проектирования. Предлагаемая процедура оценки экологической безопасности на основе индекса опасности объектов и экологического риска.Проаналізований сучасний стан проблеми оцінки екологічної безпеки на етапі проектування. Запропонована процедура оцінки екологічної безпеки на основі індексу небезпечності об’єктів та екологічного ризику

    Is students' qualitative feedback changing, now it is online?

    Get PDF

    De los Derechos Humanos: Reimagining Civics in Bilingual & Bicultural Settings

    Get PDF
    Dominant approaches to teaching social studies often marginalize bilingual and bicultural students. This is particularly troubling because the explicit goal of the social studies is to cultivate civic participation. Educational inequalities are thus tied to political inequalities. In light of this, this article shares a narrative case study of the author\u27s own bilingual and bicultural approach to teaching middle school civics at a dual-language American school in Mexico. Through the illustration of a comparative civics curriculum that incorporates translanguaging practices, the author argues that embracing bilingualism and biculturalism in the social studies can lead to more expansive possibilities for justice-oriented civic education

    Digital Media & Learning

    Get PDF
    Highlights findings from MacArthur's digital media and learning initiative about changes in how youth learn, play, socialize, and engage in civic life; in learning environments and institutions; and in the guidance needed from parents and teachers

    Assessing the impact of affective feedback on end-user security awareness

    Get PDF
    A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users’ awareness of security behaviour. An ongoing research project is described, which provides a combined monitoring solution and affective feedback system, designed to provide affective feedback on automatic detection of risky security behaviour within a web browser. Results gained from the research conclude an affective feedback mechanism in a browser-based environment, can promote general awareness of online security

    Refining the PoinTER “human firewall” pentesting framework

    Get PDF
    PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the importance of the human in the organisation, and the need to ensure that humans are resistant to cyber-attacks. To achieve this, some organisations “pentest” their employees, testing their resilience and ability to detect and repel human-targeted attacks. In a previous paper we reported on PoinTER (Prepare TEst Remediate), a human pentesting framework, tailored to the needs of SMEs. In this paper, we propose improvements to refine our framework. The improvements are based on a derived set of ethical principles that have been subjected to ethical scrutiny.MethodologyWe conducted a systematic literature review of academic research, a review of actual hacker techniques, industry recommendations and official body advice related to social engineering techniques. To meet our requirements to have an ethical human pentesting framework, we compiled a list of ethical principles from the research literature which we used to filter out techniques deemed unethical.FindingsDrawing on social engineering techniques from academic research, reported by the hacker community, industry recommendations and official body advice and subjecting each technique to ethical inspection, using a comprehensive list of ethical principles, we propose the refined GDPR compliant and privacy respecting PoinTER Framework. The list of ethical principles, we suggest, could also inform ethical technical pentests.OriginalityPrevious work has considered penetration testing humans, but few have produced a comprehensive framework such as PoinTER. PoinTER has been rigorously derived from multiple sources and ethically scrutinised through inspection, using a comprehensive list of ethical principles derived from the research literature

    Academics and Social Networking Sites: Benefits, Problems and Tensions in Professional Engagement with Online Networking

    Get PDF
    The web has had a profound effect on the ways people interact, with online social networks arguably playing an important role in changing or augmenting how we connect with others. However, uptake of online social networking by the academic community varies, and needs to be understood. This paper presents an independent, novel analysis of a large-scale dataset published by Nature Publishing Group detailing the results of a survey about academics use of online social networking services. An open coding approach was used to analyse 480 previously unused text responses. The analysis revealed a wide range of benefits and also problems associated with engaging with online networking, and tensions within this. The analysis provides further insight into the nuances of uptake, by exploring clusters of co-reported benefits and problems within the qualitative analysis. The findings will help move forward current debates surrounding social media use by academics from being viewed in solely beneficial terms, towards an understanding of the problems and tensions that arise through academic work online
    corecore