1,099 research outputs found
Surveillance, Privacy and Security
This volume examines the relationship between privacy, surveillance and security, and the alleged privacyâsecurity trade-off, focusing on the citizenâs perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is, however, contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties, or is it even necessary to do so, and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy, surveillance and security, comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizenâs perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented, and recommendations for security policies in line with ethics and fundamental rights are discussed. This book will be of much interest to students of surveillance studies, critical security studies, intelligence studies, EU politics and IR in general. A PDF version of this book is available for free in open access via www.tandfebooks.com. It has been made available under a Creative Commons Attribution-Non Commercial 3.0 license.
THE INVESTIGATION OF THE FACTORS ASSOCIATING CONSUMERSâ TRUST IN E-COMMERCE ADOPTION
The success of electronic commerce significantly depends on providing security and
privacy for its consumersâ sensitive personal information. Consumersâ lack of
acceptance in electronic commerce adoption today is not merely due to the concerns
on security and privacy of their personal information, but also lack of trust and
reliability of web vendors. Consumersâ trust in online transactions is crucial for the
continuous growth and development of electronic commerce. Since Business to
Consumer (B2C) e-commerce requires the consumers to engage the technologies, the
consumers face a variety of security risks. This study addressed the role of security,
privacy and risk perceptions of consumers to shop online in order to establish a
consensus among them. The findings provided reliability, factors analysis for the
research variables and for each of the studyâs research constructs, correlations as well
as regression analyses for both non-online purchasersâ and online purchasersâ
perspectives, and structural equation modeling (SEM) for overall model fit. The
overall model was tested by AMOS 18.0 and the hypothesis, assumptions for SEM
and descriptive statistics were analyzed by SPSS 12.0.
The empirical results of the first study indicated that there were poor correlations
existed between consumersâ perceived security and consumersâ trust as well as
between consumersâ perceived privacy and consumersâ trust regarding e-commerce
transactions. However, the construct of perceived privacy manifested itself primarily
through perceived security and trustworthiness of web vendors. While trustworthiness
of web vendors was a critical factor in explaining consumersâ trust to adopt ecommerce,
it was important to pay attention to the consumersâ risk concerns on ecommerce
transactions. It was found that economic incentives and institutional trust
had no impact on consumersâ perceived risk.
Findings from the second study indicated that perceived privacy was still to be the
slight concern for consumersâ trust in e-commerce transactions, though poor
vi i
relationships or associations existed between perceived security and consumersâ trust,
between trustworthiness of web vendors and consumersâ trust, and between perceived
risk and consumersâ trust. The findings also showed that the construct of perceived
privacy manifested itself primarily through perceived security and trustworthiness of
web vendors. It was found that though economic incentives influenced a consumersâ
perceived risk in online transactions, institutional trust had no impact on consumersâ
perceived risk.
Overall findings suggested that consumersâ perceived risk influenced their trust in
e-commerce transactions, while the construct of perceived privacy manifested itself
primarily through perceived security as well as trustworthiness of web vendors. In
addition, though economic incentives had no impact on consumersâ perceived risk,
institutional trust influenced a consumersâ perceived risk in online transactions. The
findings also suggested that economic incentives and institutional trust had
relationships or associations with consumersâ perceived privacy.
The findings from this research showed that consumersâ perceived security and
perceived privacy were not mainly concerned to their trust in e-commerce
transactions though consumersâ perceived security and perceived privacy might
slightly influence on the trustworthiness of web vendors in dealing with online store
sites abroad. Furthermore, consumersâ perceptions on the trustworthiness of web
vendors were also related to their perceived risks and the concern about privacy was
also addressed to perceived risks.
Index terms: Perceived security; perceived privacy; perceived risk; trust;
consumersâ behaviour; SE
Privacy, security, and trust issues in smart environments
Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning
ERP implementation methodologies and frameworks: a literature review
Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history
The Ethics of Cybersecurity
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies
Robots and Privacy in Japanese, Thai and Chinese Cultures. \ud Discussions on Robots and Privacy as Topics of Intercultural Information Ethics in âFar Eastâ
In this paper, I will analyze âcultural meanings and valuesâ associated with some of the important IIE(intercultural information ethics) topics in âFar East, âi.e. âhuman and robot interaction(HRI)â and âprivacy.â By focusing on these relatively newly emerging topics in âFar East,â I will attempt to make the cultural Ba (locus/place where different\ud
meanings of things, events, peopleâs experiences come together; or frameworks for understanding meanings of phenomena and events) visible through analysis of research data done in Japan, Thailand and China in the past several years. The research data shown in this paper suggest that we canât understand peopleâs attitudes toward robots and privacy in âFar Eastâ without taking into consideration peopleâs broader views on âwhat is a good life?â and âwhat is a virtuous life?
- âŠ