25,049 research outputs found

    Listening to micro-business operators: what are their social and educational needs?

    Get PDF
    This paper discusses issues that had been revealed during 15 in-depth interviews and a subsequent questionnaire survey of 91 micro-business (five or fewer employees) operators in Hamilton, New Zealand. ‘How to support micro-business operators in their efforts to achieve successful, sustainable self-employment within this changing social world?’ has been the guiding research theme. The questionnaire was used to gauge opinions on and the extent of attitudes and feelings about being self-employed that had been revealed during the in-depth interviews and small business literature. This work gives voice to the perspectives of micro-business operators rather than that of experts or small business operators in general. Findings from this research suggest that micro-business operators need to be provided with opportunities for support and education to cope with psychological and social factors, particularly with fears, anxiety and isolation. Further, it appears that support is not available to micro-business operators in a way they can readily engage with. Lack of time appears as a reoccurring theme. Given the global trend towards self employment as a career option in the 21st Century, social policy makers need to be aware of the changing social and education needs and provide support to enhance micro-business start-up, survival and growth by encouraging initiatives that facilitate co-operative relationships and build social skills

    Security and Privacy Issues of Big Data

    Get PDF
    This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.Comment: In book Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, IGI Global, 201

    After Over-Privileged Permissions: Using Technology and Design to Create Legal Compliance

    Get PDF
    Consumers in the mobile ecosystem can putatively protect their privacy with the use of application permissions. However, this requires the mobile device owners to understand permissions and their privacy implications. Yet, few consumers appreciate the nature of permissions within the mobile ecosystem, often failing to appreciate the privacy permissions that are altered when updating an app. Even more concerning is the lack of understanding of the wide use of third-party libraries, most which are installed with automatic permissions, that is permissions that must be granted to allow the application to function appropriately. Unsurprisingly, many of these third-party permissions violate consumers’ privacy expectations and thereby, become “over-privileged” to the user. Consequently, an obscurity of privacy expectations between what is practiced by the private sector and what is deemed appropriate by the public sector is exhibited. Despite the growing attention given to privacy in the mobile ecosystem, legal literature has largely ignored the implications of mobile permissions. This article seeks to address this omission by analyzing the impacts of mobile permissions and the privacy harms experienced by consumers of mobile applications. The authors call for the review of industry self-regulation and the overreliance upon simple notice and consent. Instead, the authors set out a plan for greater attention to be paid to socio-technical solutions, focusing on better privacy protections and technology embedded within the automatic permission-based application ecosystem

    Literature Overview - Privacy in Online Social Networks

    Get PDF
    In recent years, Online Social Networks (OSNs) have become an important\ud part of daily life for many. Users build explicit networks to represent their\ud social relationships, either existing or new. Users also often upload and share a plethora of information related to their personal lives. The potential privacy risks of such behavior are often underestimated or ignored. For example, users often disclose personal information to a larger audience than intended. Users may even post information about others without their consent. A lack of experience and awareness in users, as well as proper tools and design of the OSNs, perpetuate the situation. This paper aims to provide insight into such privacy issues and looks at OSNs, their associated privacy risks, and existing research into solutions. The final goal is to help identify the research directions for the Kindred Spirits project

    The U.S. Postal Service War on Private Mailboxes and Privacy Rights

    Get PDF
    On March 25, 1999, neatly concealed in an obscure and seemingly minor "Procedure Revision," the U.S. Postal Service announced its intent to execute Postal Bulletin 21994. In an alleged attempt to combat mail fraud, the Postal Service required that by June 24, 1999, all commercial mail-receiving agencies (CMRAs) that offer rental of private mailboxes should have collected from their customers confidential information that the Postal Service itself is not allowed to collect. Furthermore, starting as early as October 24, 1999, the USPS will deliver mail only to the private boxes addressed in a particular format that will be unfamiliar to many senders. Those new requirements violate the privacy regulations that cover the Postal Service. The USPS plans to make available to the public confidential information about any private box holder who uses the box for business with the public. However, access to such information could actually facilitate criminal activity. Moreover, the Postal Service also plans to apply these new regulations to executive suites.In addition, because it is impossible for box holders to know everyone who might have their private box address on file, many otherwise deliverable pieces of mail will be returned to the sender, marked "address unknown." Finally, the new regulations will foist enormous costs on some 1.5 million to 2.5 million private mailbox holders, which include many of the country's smallest businesses. CMRAs will also incur expenses, not only of compliance with and notification to box holders of the new regulations but also of lost business. A conservative estimate of the direct costs alone of the new regulations could approach $1 billion

    Alter ego, state of the art on user profiling: an overview of the most relevant organisational and behavioural aspects regarding User Profiling.

    Get PDF
    This report gives an overview of the most relevant organisational and\ud behavioural aspects regarding user profiling. It discusses not only the\ud most important aims of user profiling from both an organisation’s as\ud well as a user’s perspective, it will also discuss organisational motives\ud and barriers for user profiling and the most important conditions for\ud the success of user profiling. Finally recommendations are made and\ud suggestions for further research are given

    SmartCities Public Final Report

    No full text

    A flexible architecture for privacy-aware trust management

    Get PDF
    In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors, in a flexible framework for Trust Management (TM) trust must be computed by combining different types of information. In this paper we describe the TAS3 TM framework which integrates independent TM systems into a single trust decision point. The TM framework supports intricate combinations whilst still remaining easily extensible. It also provides a unified trust evaluation interface to the (authorization framework of the) services. We demonstrate the flexibility of the approach by integrating three distinct TM paradigms: reputation-based TM, credential-based TM, and Key Performance Indicator TM. Finally, we discuss privacy concerns in TM systems and the directions to be taken for the definition of a privacy-friendly TM architecture.\u
    corecore