166,805 research outputs found

    Internet Media in Technological Risk Amplification: Plutonium on Board the Cassini-Huygens Spacecraft

    Get PDF
    The author discusses how the Cassini controversy demonstrates the power of the Internet, particularly listservs and Usenet groups, and how this resource offers political activists an opportunity to affect the agendas of risk management policy decision-makers

    Online mental health treatment: Concerns and considerations

    Get PDF
    Concerns and considerations have emerged as mental health professionals contemplate the provision of mental health treatment over the Internet. This paper identifies perceptions of online mental health treatment among a national sample of 2,098 social workers, psychologists, and other professionals. These professionals were unlikely to provide online mental health treatment, although some used the Internet as an adjunct to clinical practice. They noted specific concerns related to the provision of mental health treatment online, including confidentiality of client information and liability issues. We explore these issues and discuss implications for professionals who provide mental health treatment

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    Perceived risk and sensitive data on mobile devices

    Get PDF
    This paper reports on a survey to investigate the behaviour and assumptions of smartphone users, with reference to the security practices adopted by such users. The primary objective was to shed light on the level of information security awareness in smartphone users and determine the extent of sensitive information such users typically hold on these mobile devices

    Community Ecology and Capacity: Advancing Environmental Communication Strategies among Diverse Stakeholders

    Get PDF
    1. Introduction Many socioeconomically and geographically diverse communities in the United States have been challenged by occurrences of environmental contamination and the related complex public health issues. The investigations associated with such concerns have traditionally been the responsibility of governmental agencies. Communities facing potential environmental exposures often believe that government-based environmental agencies are not adequately addressing their concerns regarding risk, thus resulting in their misunderstanding and distrust of the regulatory process. A schism develops whereby the community perceives that government is either not doing enough to address their concerns and/or are being influenced by the relevant industry. The governmental agencies involved perceive that the community possesses an inaccurate or irrational perception of the potential risks. As a result, a stressful relationship often arises. Recommendations for effective risk communication have been developed and published (Covello & Sandman, 2001; Hance et al., 1989; Sandman, 1989). Research has also demonstrated the importance of developing relationships among stakeholders and its impact on information delivery and reception (ATSDR, 2004). Given that stakeholder groups perceive risk differently, it is imperative for each group to appreciate the viewpoints of all involved to engage in effective dialog (Park et al., 2001; Tinker et al., 2001). Cox (2006) defines environmental communication as “…the pragmatic and constitutive vehicle for our understanding of the environment as well as our relationships to the natural world; it is the symbolic medium that we use in constructing environmental problems and negotiating society’s different responses to them.” Although opportunities for public participation in environmental assessments have greatly increased, the environmental communication process among key stakeholders needs further evaluation (Charnley & Engelbert, 2005; McKinney & Harmon, 2002). The purpose of this chapter is to describe an evaluative process to develop and propose recommendations that could improve the environmental communication that occurs among diverse stakeholders, such as an environmental regulation and protection agency, waste disposal and energy producing facilities, community activists and the general public. Two case studies will be presented; the first describes the management of environmental permitting decisions in several disparate communities; and the second describes the management and perception of health risks from a single-owner waste-to-energy facility in two distinct communities. To accomplish this goal, this chapter will: 1.) examine how a state environmental agency and waste disposal and energy producing facilities describe their environmental communication experiences regarding various permitting operations and the risk perceptions of the impacted communities; 2.) identify effective communication methods; 3.) discuss the strengths and limitations of these activities; and 4.) propose recommendations for practitioners to advance environmental communication strategies among these key stakeholders

    Digital and Mobile Security for Mexican Journalists and Bloggers

    Get PDF
    A new survey of 102 journalists and bloggers in 20 Mexican states shows nearly 70 percent have been threatened or have suffered attacks because of their work. In addition, 96 percent say they know of colleagues who have been attacked. Respondents to the survey also say they view cyber-espionage and email-account cracking as the most serious digital risks they face. And while nearly all have access to and rely on the Internet, social networks, mobile phones and blogging platforms for their work, they also admit that they have little or no command of digital security tools such as encryption, use of virtual private networks (VPNs), anonymous Internet navigation and secure file removal. The results of this survey show the urgent need to introduce Mexican journalists and bloggers to new technologies and protocols and help newsrooms develop a culture of digital-security awareness to counter increasingly sophisticated threats and attacks from both governmental agencies and criminal organizations

    Stop the Abuse of Gmail!

    Get PDF
    Gmail, a highly anticipated webmail application made by Google, has been criticized by privacy advocates for breaching wiretapping laws, even before its release from beta testing. Gmail\u27s large storage space and automated processes developed to scan the content of incoming messages and create advertisements based on the scanned terms have enraged privacy groups on an international level. This iBrief will compare Gmail\u27s practices with its peers and conclude that its practices and procedures are consistent with the standards of the webmail industry. The iBrief will then propose additional measures Gmail could institute to further protect webmail users\u27 and alleviate the concerns of privacy advocates
    • …
    corecore