61,918 research outputs found

    E-Voting in an ubicomp world: trust, privacy, and social implications

    Get PDF
    The advances made in technology have unchained the user from the desktop into interactions where access is anywhere, anytime. In addition, the introduction of ubiquitous computing (ubicomp) will see further changes in how we interact with technology and also socially. Ubicomp evokes a near future in which humans will be surrounded by “always-on,” unobtrusive, interconnected intelligent objects where information is exchanged seamlessly. This seamless exchange of information has vast social implications, in particular the protection and management of personal information. This research project investigates the concepts of trust and privacy issues specifically related to the exchange of e-voting information when using a ubicomp type system

    BYOD adoption concerns in the South African financial institution sector

    Get PDF
    Bring Your Own Device (BYOD) is an emerging trend and practice that is growing in use in many organizations. There is however very limited literature on BYOD in the context of financial institutions from a developing country perspective. The dearth of such studies is problematic because financial institutions deal with a lot of sensitive and confidential information and therefore their adoption of BYOD could be detrimental to their practice. This study contributes to this gap in literature by providing empirical observation that show how technological and contextual factors affect financial institutions adoption of BYOD. Following a qualitative approach, and using semi structured interviews as a source of data collection; the findings show that cost, complexity, a culture of innovation, and top management support were factors that were perceived as enablers of BYOD. South African organizations in the financial services use BYOD to help add value to their work as opposed to it being a cost saving necessity. However, the continuous changes in government regulation regarding the use of data; and the lack of conducive ICT infrastructure were deemed as hindrances to BYOD. As a result of the changing regulations and the lack of knowhow on implementation of these regulations, most organizations failed to formalize their BYOD strategies

    M-health review: joining up healthcare in a wireless world

    Get PDF
    In recent years, there has been a huge increase in the use of information and communication technologies (ICT) to deliver health and social care. This trend is bound to continue as providers (whether public or private) strive to deliver better care to more people under conditions of severe budgetary constraint

    Cyber-Vulnerabilities & Public Health Emergency Response

    Get PDF

    Privacy Issues of the W3C Geolocation API

    Full text link
    The W3C's Geolocation API may rapidly standardize the transmission of location information on the Web, but, in dealing with such sensitive information, it also raises serious privacy concerns. We analyze the manner and extent to which the current W3C Geolocation API provides mechanisms to support privacy. We propose a privacy framework for the consideration of location information and use it to evaluate the W3C Geolocation API, both the specification and its use in the wild, and recommend some modifications to the API as a result of our analysis

    Future of Flexible Work in the Digital Age: Bring Your Own Device Challenges of Privacy Protection

    Get PDF
    The future of work is getting increasingly flexible due to the rising expectations of employees away from traditional 9-to-5 office work towards flexible work hours, which drives employees to use their mobile devices for work. This ever-growing phenomenon of Bring Your Own Device (BYOD) creates security risks for companies, which leads to an implementation of mobile device management (MDM) solutions to secure and monitor employees’ mobile devices. We present insights from two multinational case companies, where works councils have expressed their concerns for privacy intrusion into employees’ lives through BYOD. To examine whether employees share works councils’ concerns, we conducted a survey with 542 employees from three countries: United States, Germany, and South Korea. Results of a structural equation modeling show that American employees place greater emphasis on BYOD risks associated with privacy concerns compared to employees from Germany and South Korea

    The Future of the Internet III

    Get PDF
    Presents survey results on technology experts' predictions on the Internet's social, political, and economic impact as of 2020, including its effects on integrity and tolerance, intellectual property law, and the division between personal and work lives

    Role of Middle Managers in Mitigating Employee Cyberloafing in the Workplace

    Get PDF
    Companies in the United States are concerned about the indeterminate effectiveness of corporate cyberloafing mitigation efforts leading to the persistence of employee cyberloafing behavior. Although middle managers are the driving force behind the transformational influences that guide employee productivity and could proffer practical solutions, a lack of clarity surrounds the middle manager\u27s role in the overall cyberloafing mitigation efforts within organizations. The central research question for this transcendental phenomenological research study explored the lived experiences of middle managers regarding their roles in mitigating employee cyberloafing at higher education institutions in Florida. This study used a social constructivist-interpretive framework that draws from the multiple realities constructed through social interactions and lived experiences. Participants included 7 middle managers with experience mitigating cyberloafing at higher education institutions in Florida. Four major themes emerged from an inductive analysis of the data, including managing employee performance, proximity matters, cyberloafing interventions, and understanding employee online technology use. The results and recommendations of this study provide implications for social change. Business organizations may modify cyberloafing mitigation strategies and policies from a better understanding of manager/employee interactions, transformational managerial influences used to mitigate employee cyberloafing, and managerial knowledge of employee appropriation of online technology
    • 

    corecore