1,099 research outputs found

    Surveillance, Privacy and Security

    Get PDF
    This volume examines the relationship between privacy, surveillance and security, and the alleged privacy–security trade-off, focusing on the citizen’s perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is, however, contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties, or is it even necessary to do so, and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy, surveillance and security, comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizen’s perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented, and recommendations for security policies in line with ethics and fundamental rights are discussed. This book will be of much interest to students of surveillance studies, critical security studies, intelligence studies, EU politics and IR in general. A PDF version of this book is available for free in open access via www.tandfebooks.com. It has been made available under a Creative Commons Attribution-Non Commercial 3.0 license.

    THE INVESTIGATION OF THE FACTORS ASSOCIATING CONSUMERS’ TRUST IN E-COMMERCE ADOPTION

    Get PDF
    The success of electronic commerce significantly depends on providing security and privacy for its consumers’ sensitive personal information. Consumers’ lack of acceptance in electronic commerce adoption today is not merely due to the concerns on security and privacy of their personal information, but also lack of trust and reliability of web vendors. Consumers’ trust in online transactions is crucial for the continuous growth and development of electronic commerce. Since Business to Consumer (B2C) e-commerce requires the consumers to engage the technologies, the consumers face a variety of security risks. This study addressed the role of security, privacy and risk perceptions of consumers to shop online in order to establish a consensus among them. The findings provided reliability, factors analysis for the research variables and for each of the study’s research constructs, correlations as well as regression analyses for both non-online purchasers’ and online purchasers’ perspectives, and structural equation modeling (SEM) for overall model fit. The overall model was tested by AMOS 18.0 and the hypothesis, assumptions for SEM and descriptive statistics were analyzed by SPSS 12.0. The empirical results of the first study indicated that there were poor correlations existed between consumers’ perceived security and consumers’ trust as well as between consumers’ perceived privacy and consumers’ trust regarding e-commerce transactions. However, the construct of perceived privacy manifested itself primarily through perceived security and trustworthiness of web vendors. While trustworthiness of web vendors was a critical factor in explaining consumers’ trust to adopt ecommerce, it was important to pay attention to the consumers’ risk concerns on ecommerce transactions. It was found that economic incentives and institutional trust had no impact on consumers’ perceived risk. Findings from the second study indicated that perceived privacy was still to be the slight concern for consumers’ trust in e-commerce transactions, though poor vi i relationships or associations existed between perceived security and consumers’ trust, between trustworthiness of web vendors and consumers’ trust, and between perceived risk and consumers’ trust. The findings also showed that the construct of perceived privacy manifested itself primarily through perceived security and trustworthiness of web vendors. It was found that though economic incentives influenced a consumers’ perceived risk in online transactions, institutional trust had no impact on consumers’ perceived risk. Overall findings suggested that consumers’ perceived risk influenced their trust in e-commerce transactions, while the construct of perceived privacy manifested itself primarily through perceived security as well as trustworthiness of web vendors. In addition, though economic incentives had no impact on consumers’ perceived risk, institutional trust influenced a consumers’ perceived risk in online transactions. The findings also suggested that economic incentives and institutional trust had relationships or associations with consumers’ perceived privacy. The findings from this research showed that consumers’ perceived security and perceived privacy were not mainly concerned to their trust in e-commerce transactions though consumers’ perceived security and perceived privacy might slightly influence on the trustworthiness of web vendors in dealing with online store sites abroad. Furthermore, consumers’ perceptions on the trustworthiness of web vendors were also related to their perceived risks and the concern about privacy was also addressed to perceived risks. Index terms: Perceived security; perceived privacy; perceived risk; trust; consumers’ behaviour; SE

    Privacy, security, and trust issues in smart environments

    Get PDF
    Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning

    Privacy Versus the First Amendment: A Skeptical Approach

    Get PDF

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    The Ethics of Cybersecurity

    Get PDF
    This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies

    Robots and Privacy in Japanese, Thai and Chinese Cultures. \ud Discussions on Robots and Privacy as Topics of Intercultural Information Ethics in ‘Far East’

    Get PDF
    In this paper, I will analyze ‘cultural meanings and values’ associated with some of the important IIE(intercultural information ethics) topics in ‘Far East, ’i.e. ‘human and robot interaction(HRI)’ and ‘privacy.’ By focusing on these relatively newly emerging topics in ‘Far East,’ I will attempt to make the cultural Ba (locus/place where different\ud meanings of things, events, people’s experiences come together; or frameworks for understanding meanings of phenomena and events) visible through analysis of research data done in Japan, Thailand and China in the past several years. The research data shown in this paper suggest that we can’t understand people’s attitudes toward robots and privacy in ‘Far East’ without taking into consideration people’s broader views on ‘what is a good life?’ and ‘what is a virtuous life?

    The Deidentification Dilemma: A Legislative and Contractual Proposal

    Get PDF
    • 

    corecore