6,971 research outputs found
Technical report and user guide: the 2010 EU kids online survey
This technical report describes the design and implementation of the EU Kids Online survey of 9-16 year old internet using children and their parents in 25 countries European countries
Adoption of Internet Services in the Enlarged European Union: Lessons from the Internet Banking Case.
Abstract not availableJRC.J-Institute for Prospective Technological Studies (Seville
Big Data Privacy Context: Literature Effects On Secure Informational Assets
This article's objective is the identification of research opportunities in
the current big data privacy domain, evaluating literature effects on secure
informational assets. Until now, no study has analyzed such relation. Its
results can foster science, technologies and businesses. To achieve these
objectives, a big data privacy Systematic Literature Review (SLR) is performed
on the main scientific peer reviewed journals in Scopus database. Bibliometrics
and text mining analysis complement the SLR. This study provides support to big
data privacy researchers on: most and least researched themes, research
novelty, most cited works and authors, themes evolution through time and many
others. In addition, TOPSIS and VIKOR ranks were developed to evaluate
literature effects versus informational assets indicators. Secure Internet
Servers (SIS) was chosen as decision criteria. Results show that big data
privacy literature is strongly focused on computational aspects. However,
individuals, societies, organizations and governments face a technological
change that has just started to be investigated, with growing concerns on law
and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions
and the only consistent country between literature and SIS adoption is the
United States. Countries in the lowest ranking positions represent future
research opportunities.Comment: 21 pages, 9 figure
Exploring the value conflicts and supports of information security compliance in nursing practices : A case-study in the Hospital of Southern Norway (SSHF) Kristiansand
Master's thesis in Information systems (IS501)Background: Information and information systems are a vital resource for an organiza-tion. Data breaches cannot be prevented by technical measures alone, that is why this thesis looks at the human elementin the search for understanding compliancewith se-curity policies. Thecontext is the hospital sectorwith the aim ofunderstanding theac-tual behavior of employees and the divergence of convergence withprescribed policies. Theoretical lens:The study adopts the lens of Value-Based Compliancetheory,which has its roots in the health caresector. This theory describes information security actions as 1) prescribed(the written policies), and2) actual(the actual behavior of employees) and looks for goals and values associated withprescribed and actual information secu-rity actionsto identify potentialconflicts. Method:This thesisfollows aqualitative approachthrough a case study of SSHF Kris-tiansand with interviews and documentsas the data sources. The interview data are col-lected from fifteen interviewees: nurses, unit leaders, and information security workers. The data analysis is performed following thevalue-basedcompliance method. This method is a development of the value-based compliance theory
“Sven and the Media Portal” : A Nomadic Use Case for the Extended Home
The Networked and Electronic Media
Technology Platform (NEM) [5] states that users will consume
an “innovative mix of various media forms, delivered
seamlessly over technologically transparent networks, to
improve the quality, enjoyment and value of life. [6] visualizes
a future use case and some of the challenges that need to be
addressed before the NEM vision becomes reality
- …