50,481 research outputs found

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    The relationship between different email management strategies and the perceived control of time

    Get PDF
    Time management research, and the psychological construct of perceived control of time, are drawn on to investigate populist claims of the virtues of regularly filing and organising ones electronic mail. Using a process model of time management, it would seem that filing of email may increase ones time control perceptions and thus their job satisfaction and wellbeing. One hundred and sixty five participants were involved in a questionnaire-based field study. Analyses of variance revealed that for some e-mail users, not having a filing system may result in a high perceived control of time. Furthermore, challenging assumptions regarding optimal e-mail organisation, those that tried to frequently file their incoming messages, but did so somewhat unsuccessfully, had significantly less perceived control of time. These results highlight individual differences in control of time perceptions, and recommendations are made regarding organisational e-mail behaviour and training

    Sharing, privacy and trust issues for photo collections

    Get PDF
    Digital libraries are quickly being adopted by the masses. Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible collections. However, users may not be fully aware of the potential privacy implications of submitting their documents to a digital library, and may hold misconceptions of the technological support for preserving their privacy. We present results from 18 autoethnographic investigations and 19 observations / interviews into privacy issues that arise when people make their personal photo collections available online. The Adams' privacy model is used to discuss the findings according to information receiver, information sensitivity, and information usage. Further issues of trust and ad hoc poorly supported protection strategies are presented. Ultimately while photographic data is potentially highly sensitive, the privacy risks are often hidden and the protection mechanisms are limited

    The Perceptions of Macao Undergraduates Regarding Help Websites for Problem Gambling

    Full text link
    This study conducted a web-surfing exercise and a questionnaire survey among a group of Macao undergraduate students regarding the websites that offered help with problem gambling. The results of this study found that most help websites in Macao and Hong Kong provided basic information-sharing service. The students indicated that they would choose their preferred help organization based on factors such as trust, familiarity, and the characteristics of the websites. They also gave comments/suggestions related to the publicity, design, contents, and focus of the websites. This study discussed the results and their implications for future research and practice

    Managing the outsourcing of information security processes: the 'cloud' solution

    Get PDF
    Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT). Cloud computing (i.e., externalization of one or more IT services) might be a solution for organizations keen to maintain a good level of security. In this paper we discuss whether cloud computing is a valid alternative to in-house security processes and systems drawing on four mini-case studies of higher education institutions in New England, US. Our findings show that the organization’s IT spending capacity affects the choice to move to the cloud; however, the perceived security of the cloud and the perceived in-house capacity to provide high quality IT (and security) services moderate this relationship. Moreover, other variables such as (low) quality of technical support, relatively incomplete contracts, poor defined Service License Agreements (SLA), and ambiguities over data ownership affect the choice to outsource IT (and security) using the cloud. We suggest that, while cloud computing could be a useful means of IT outsourcing, there needs to be a number of changes and improvements to how the service is currently delivered
    • 

    corecore