17 research outputs found

    Wearable and mobile devices

    Get PDF
    Information and Communication Technologies, known as ICT, have undergone dramatic changes in the last 25 years. The 1980s was the decade of the Personal Computer (PC), which brought computing into the home and, in an educational setting, into the classroom. The 1990s gave us the World Wide Web (the Web), building on the infrastructure of the Internet, which has revolutionized the availability and delivery of information. In the midst of this information revolution, we are now confronted with a third wave of novel technologies (i.e., mobile and wearable computing), where computing devices already are becoming small enough so that we can carry them around at all times, and, in addition, they have the ability to interact with devices embedded in the environment. The development of wearable technology is perhaps a logical product of the convergence between the miniaturization of microchips (nanotechnology) and an increasing interest in pervasive computing, where mobility is the main objective. The miniaturization of computers is largely due to the decreasing size of semiconductors and switches; molecular manufacturing will allow for “not only molecular-scale switches but also nanoscale motors, pumps, pipes, machinery that could mimic skin” (Page, 2003, p. 2). This shift in the size of computers has obvious implications for the human-computer interaction introducing the next generation of interfaces. Neil Gershenfeld, the director of the Media Lab’s Physics and Media Group, argues, “The world is becoming the interface. Computers as distinguishable devices will disappear as the objects themselves become the means we use to interact with both the physical and the virtual worlds” (Page, 2003, p. 3). Ultimately, this will lead to a move away from desktop user interfaces and toward mobile interfaces and pervasive computing

    Current Research in Information Security and Privacy

    Get PDF
    This paper reviews a range of current MIS research literature to identify research topics in information security and privacy. Results of this study indicate IT security provides the basis of current research in the area of information security and privacy. The results of this study reveal limited research in this area, particularly at the organizational level. One conclusion is that this lack of research results from organizational unwillingness to share information and statistics on security. Another conclusion is that research is needed in the area of information privacy. One area of future research may be organizational privacy policies. Two particular areas of interest may be user perceptions of privacy policies and opt-in/opt-out policies and procedures. Additionally, research related to individuals’ concern for information privacy may be less problematic to study than organizational security issues. Research in this area is important because user concern for information privacy has the potential to affect the future of e-commerce

    Intelligent ethics.

    Get PDF
    This paper discusses the impact of envisaged intelligent applications on the lives of the individuals who may be using them, and investigates the ethical implications of autonomous decision-making that is beyond the control of the user. In an increasingly networked world we look beyond the individual to a social picture of distributed multi-agent interaction, and in particular at the concepts of rules and negotiation between these virtual social agents. We suggest that the use of such agents in a wider social context requires an element of ethical thinking to take place at the grass roots level – that is, with the designers and developers of such systems

    a qualitative research amongst ICT professionals

    Get PDF
    Ruivo, P., Santos, V., & Oliveira, T. (2014). Data protection in services and support roles: a qualitative research amongst ICT professionals. In CENTERIS 2014 - Conference On Enterprise Information Systems / Projman 2014 - International Conference On Project Management / Hcist 2014 - International Conference On Health And Social Care Information Systems And Technologies (Vol. 16, pp. 710-717). (Procedia Technology). DOI: 10.1016/j.protcy.2014.10.020Customers expect their data to be protected and not used in a manner inconsistent. The protection of their data is paramount to customers, and they evaluate ICTs in part on how well they handle and protect it from being stolen or used improperly. In many industries customers are specifically mandated to evaluate how ICTs firms protects their data. When customers create an account with ICTs firms, or use their services, they expect that a set of specific rules around how ICTs are used to manage their information. This qualitative research studied which recommendations service and support professionals should follow in their daily tasks to ensure customer data protection. It present 12 recommendations: Data classification (three categories: low, medium and high business impact), Encryption security tools, Password protection, Services tools for data collection and storage, Who access data, How many access data, Testing customer data, Geographic rules, Data retention, Data minimization, Escalating issues, and Readiness and training. This paper is intended to help ICTs how to apply key data protection principles on their daily work. Provides important data protection recommendations that ICTs are expected to apply when handle customer data. By handling customer data safely, ICTs firms build trust and loyalty.publishersversionpublishe

    combining traditional interviews with delphi method

    Get PDF
    Ruivo, P., Santos, V., & Oliveira, T. (2019). Success factors for data protection in services and support roles: combining traditional interviews with delphi method. In Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications (Vol. 2, pp. 814-829). IGI Global. DOI: 10.4018/978-1-5225-7113-1.ch042The transformation of today’s information and communications technology (ICT) firms requires the services and support organizations to think differently about customers data protection. Data protection represents one of the security and privacy areas considered to be the next “blue ocean” in leveraging the creation of business opportunities. Based in contemporary literature, the authors conducted a two phases’ qualitative methodology - the expert’s interviews and Delphi method to identify and rank 12 factors on which service and support professionals should follow in their daily tasks to ensure customer data protection: 1) Data classification, 2) Encryption, 3) Password protection, 4) Approved tools, 5) Access controls, 6) How many access data, 7) Testing data, 8) Geographic rules, 9) Data retention, 10) Data minimization, 11) Escalating issues, and 12) Readiness and training. This paper contribute to the growing body of knowledge of data protection filed. The authors provide directions for future work for practitioners and researchers.authorsversionpublishe

    Reduce Threats in Competitive Intelligence System: A Generic Information Fusion Access Control Model

    Full text link

    Reconciling the Personalization-Privacy Paradox: Exploring Privacy Boundaries in Online Personalized Advertising

    Get PDF
    To reconcile the personalization-privacy paradox, we adopt the privacy as a state view and define privacy as a state of information boundary rule-following. We further identify five types of boundaries underlying some of the important implicit rules of maintaining privacy: communication channel, platform, device, temporal, and purpose boundaries. Using an online vignette survey, we investigated how each of these boundary types affected users’ privacy perceptions when they were subjected to personalized advertisements. Using fixed- and random-effects models, we investigated how violating different boundary rules leads to changes in perceived privacy. Our results show that all five boundary types are significant predictors of perceived privacy within individuals. The communication channel, device, and business versus private purpose are significant predictors of perceived privacy across the whole sample. Temporal boundaries and platform boundaries failed to achieve statistical significance when evaluated simultaneously with the other factors across the whole sample. This means that for each individual, observing the rules of these five boundary types leads to higher perceived privacy than not observing these conditions. Taken as a whole, observing communication channel, device, and business versus private purpose boundaries also leads to higher averages of perceived privacy across the whole sample. Theoretical and practical implications are discussed based on the result

    Awareness of Cellular E911 and its Relationship to Perceptions of Privacy Among University Students, Faculty and Staff

    Get PDF
    This study describes a survey of the students, faculty, and staff of the University of North Carolina at Chapel Hill regarding awareness of E911 and LBS technologies on cellular phones and how this awareness relates to perceptions of privacy. Responses to the survey showed generally low awareness of E911 and LBS technologies, but also revealed unexpected privacy distinctions. Some respondents viewed their cellular phones as private, but not the conversations or text messages. Other respondents were just the opposite, viewing their conversations and text message as private, but not the phones. Though LBS can broadcast a cellular phone's location anytime the phone is powered on, even those users that appear to control their privacy the most tend to leave their phones on for long periods of time, indicating either a lack of awareness regarding location privacy, or a lack of concern
    corecore