2,410,816 research outputs found

    A World That Counts: Mobilising The Data Revolution For Sustainable Development

    Get PDF
    This report sets out the main opportunities and risks presented by the data revolution for sustainable development. Seizing these opportunities and mitigating these risks requires active choices, especially by governments and international institutions. Without immediate action, gaps between developed and developing countries, between information-rich and information-poor people, and between the private and public sectors will widen, and risks of harm and abuses of human rights will grow

    Reve\{a,i\}ling the risks: a phenomenology of information security

    Get PDF
    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we distinguish between revealed and reveiled security instead. Linking these notions with the concepts of confidence and trust, we are able to give a phenomenological explanation of the electronic voting controversy in the Netherlands

    Health Information and the Choice of Fish Species: An Experiment Measuring the Impact of Risk and Benefit Information, April 2006

    Get PDF
    An experiment was conducted in France to evaluate the impact of health information on consumers’ choice between two different types of fish. Successive messages revealing risks (methylmercury) and benefits (omega-3s) of consuming the fish, along with consumption recommendations, were delivered. Results show a significant difference of reaction according to the order and type of information. The information about risks had a larger marginal impact on change in willingness to pay (WTP) than did the information about benefits. While the results show that detailed messages on risks/benefits, including recommendations for nutrition behavior, matter in the modification of WTP, 40% of respondents did not change their initial choices after the revelation of health information

    Perceived information technology risks and attitudes

    Get PDF
    Risk has been a focal dimension in much of the debate about attitudes toward technology. In the present paper, the development of research on risk perception is reviewed, from its beginnings in the end of the 1960's. The received view on factors in risk perception is that of the psychometric model and social trust. It is pointed out that this approach gives only an incomplete understanding of risk and risk acceptance, and some missing elements are delineated, such as Tampering with Nature, which is an important factor in technology acceptance, and trust (or distrust) in science, and the embracing of alternative views on the nature of the world and knowledge (New Age). Several methodological points are also important. Risks should be studied with regard to one’s own personal (personal risk), and to others (general risk), because these dimensions often differ and they have different implications. It should also be observed that the most important risk aspect is severity of consequences of unwanted events or accidents, not their probability. When it comes to attitudes toward technology it is argued that the replaceability of a technology is an important factor. IT risks have been investigated in a major survey carried out with a representative sample of the Swedish population. The main finding was that IT risks were seen as pertinent mainly to others, implying that people (rightly or wrongly) perceived that they could protect themselves from IT risks. IT risks are finally regarded in the light of Stigma Theory, which has been devised to understand some social and political reactions to risks, and it is held that it is unlikely that IT will become a stigmatized technology, partly because it is seen as irreplaceable. Yet, many IT risks are very real and many people are aware of them. In particular, personal integrity is threatened and the very novelty of the technology involved is probably the cause why ethical and legal developments lag far behind. Initial one-sided positive statements about IT are likely to be followed by more sober assessments of this technology which brings many blessings but also an increasing number of serious risks.risk perception; information technology; attitudes toward technology

    Securing library information system: Vulnerabilities and threats

    Get PDF
    Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet. Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats

    A revised perspective on the evaluation of IT/IS investments using an evolutionary approach

    Get PDF
    On-going research into the evaluation of Information Technology (IT) / Information Systems (IS) projects has shown that aerospace and supply chain industries are needing to address the issue of effective project investment in order to gain technological and competitive advantage. The evaluative nature of the justification process requires a mapping of interrelated quantities to be optimised. Earlier work by the authors (Irani and Sharif 1997) has presented a theoretical functional model that describes these relationships in turn. By applying a fuzzy mapping to these variables, the optimisation of intangible relationships in the form of a Genetic Algorithm (GA) is proposed as a method for investment justification. This paper revises and reviews these key concepts and provides a recapitulation of this optimisation problem in terms of long-term strategy options and cost implications. Glossary of terms : DC = Direct Costs, FA = Financial Appraisal, FR = Financial Risks, FUR = Functional Risks, HC = Human Costs, IC = Indirect Costs, IR = Infrastructural Risks, OB = Operational Benefits, OC = Organisational Costs, PB = Project Benefits, PC = Project Costs, RF = Risk Factor, SB = Strategic Benefits, SM = Strategic medium-term benefit, SR = Systemic Risks, TB = Tangible Benefits, TC = Tangible Costs, TL = project lead time, TR = Technological Risks, V= Project Value
    corecore