6,971 research outputs found

    Stakeholders’ forum general report

    Get PDF

    Technical report and user guide: the 2010 EU kids online survey

    Get PDF
    This technical report describes the design and implementation of the EU Kids Online survey of 9-16 year old internet using children and their parents in 25 countries European countries

    Adoption of Internet Services in the Enlarged European Union: Lessons from the Internet Banking Case.

    Get PDF
    Abstract not availableJRC.J-Institute for Prospective Technological Studies (Seville

    Big Data Privacy Context: Literature Effects On Secure Informational Assets

    Get PDF
    This article's objective is the identification of research opportunities in the current big data privacy domain, evaluating literature effects on secure informational assets. Until now, no study has analyzed such relation. Its results can foster science, technologies and businesses. To achieve these objectives, a big data privacy Systematic Literature Review (SLR) is performed on the main scientific peer reviewed journals in Scopus database. Bibliometrics and text mining analysis complement the SLR. This study provides support to big data privacy researchers on: most and least researched themes, research novelty, most cited works and authors, themes evolution through time and many others. In addition, TOPSIS and VIKOR ranks were developed to evaluate literature effects versus informational assets indicators. Secure Internet Servers (SIS) was chosen as decision criteria. Results show that big data privacy literature is strongly focused on computational aspects. However, individuals, societies, organizations and governments face a technological change that has just started to be investigated, with growing concerns on law and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions and the only consistent country between literature and SIS adoption is the United States. Countries in the lowest ranking positions represent future research opportunities.Comment: 21 pages, 9 figure

    Exploring the value conflicts and supports of information security compliance in nursing practices : A case-study in the Hospital of Southern Norway (SSHF) Kristiansand

    Get PDF
    Master's thesis in Information systems (IS501)Background: Information and information systems are a vital resource for an organiza-tion. Data breaches cannot be prevented by technical measures alone, that is why this thesis looks at the human elementin the search for understanding compliancewith se-curity policies. Thecontext is the hospital sectorwith the aim ofunderstanding theac-tual behavior of employees and the divergence of convergence withprescribed policies. Theoretical lens:The study adopts the lens of Value-Based Compliancetheory,which has its roots in the health caresector. This theory describes information security actions as 1) prescribed(the written policies), and2) actual(the actual behavior of employees) and looks for goals and values associated withprescribed and actual information secu-rity actionsto identify potentialconflicts. Method:This thesisfollows aqualitative approachthrough a case study of SSHF Kris-tiansand with interviews and documentsas the data sources. The interview data are col-lected from fifteen interviewees: nurses, unit leaders, and information security workers. The data analysis is performed following thevalue-basedcompliance method. This method is a development of the value-based compliance theory

    “Sven and the Media Portal” : A Nomadic Use Case for the Extended Home

    Get PDF
    The Networked and Electronic Media Technology Platform (NEM) [5] states that users will consume an “innovative mix of various media forms, delivered seamlessly over technologically transparent networks, to improve the quality, enjoyment and value of life. [6] visualizes a future use case and some of the challenges that need to be addressed before the NEM vision becomes reality
    corecore