16 research outputs found
Law and Policy for the Quantum Age
Law and Policy for the Quantum Age is for readers interested in the political and business strategies underlying quantum sensing, computing, and communication. This work explains how these quantum technologies work, future national defense and legal landscapes for nations interested in strategic advantage, and paths to profit for companies
Emerging Informatics
The book on emerging informatics brings together the new concepts and applications that will help define and outline problem solving methods and features in designing business and human systems. It covers international aspects of information systems design in which many relevant technologies are introduced for the welfare of human and business systems. This initiative can be viewed as an emergent area of informatics that helps better conceptualise and design new world-class solutions. The book provides four flexible sections that accommodate total of fourteen chapters. The section specifies learning contexts in emerging fields. Each chapter presents a clear basis through the problem conception and its applicable technological solutions. I hope this will help further exploration of knowledge in the informatics discipline
Disruption to Destruction: Exploring the Effects of Digital Disruption on the Value Creation Processes within the Field of Fashion through the lens of Service Dominant Logic
Digital platforms have democratised the fashion industry; once notoriously shielded by gatekeepers. Today, fashionâs end consumers rely less on such gatekeepers who hold industry specific knowledge, but instead, âfollowâ social media influencers who have shifted control from the sender (e.g. fashion brand) to the receiver (e.g. consumer). Together with a growing dependence on other boundary breaking technologies, the relevance of traditional gatekeepers is questioned, as is the holistic process of value creation within this ecosystem. Building upon contemporary service dominant logic (SDL) literature on service ecosystems, as well as the composition of value codestruction, this thesis zooms into the empirical context of the global fashion industry. To capture the complexity of individual and group behaviours within micro, meso and macro network contexts, an ethnographic research strategy was conducted, spanning over 18 months and including participant observations and self-reflexivity, a focus group, and 17 semi-structured interviews with influential fashion intermediaries. Through thematic analysis, results were presented in a series of narrative stories, which ultimately, help shine a new light on how we view SDL in regard to operant resources, the complexities of diverse ecosystem actors, and value extraction. Our theoretical contribution is to add to SDL literature with what we call the co-abduction of value and the democratisation of primary value creation. The importance of this finding is to highlight how the micro and macro level processes of a field can lead industry actors to manipulate value creation in what was previously a highly territorial industry. Our contribution highlights the mechanisms through which value creation can be appropriated, destroyed and reconfigured
Best Practices and Recommendations for Cybersecurity Service Providers
This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers
Ethical and Unethical Hacking
The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. âEthical hackersâ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the âall things consideredâ sense, while society may agree more easily on the determination of who is one in the âbusiness-friendlyâ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackersâ individual ethics in morally debatable, grey zones
Contested Majority: The Representation Of The White Working Class In Us Politics From The 1930s To The 1990s
This dissertation examines the representation of the white working class in US politics from the 1930s to the 1990s: how politicians, journalists, pollsters, pundits, political commentators, social movement groups, and others have studied, written about, and claimed to speak for white working class people and how this work has shaped American politics. Most existing literature on the role of the white working class in American politics has examined political opinion and political identity formation among white working class people, too often treating the âwhite working classâ as a homogenous group with uniform political views. This project takes a different approach, focused on elite engagement with the white working class as a social and political category. It traces how prominent elite-level understandings of white working class identity, politics, and cultureâfrom progressive workers combating economic elites to culturally conservative âMiddle Americansâ opposed to liberalismâemerged and impacted political contestation. In doing so, it stresses the importance of the white working class as a political symbol, one that has consistently been at the center of conflict around fundamental issues in US politics, including the nature of privilege and disadvantage, challenges to racial, gender, and class inequality, the stateâs sphere of responsibility, and the contours of national identity
Rethinking the risk matrix
So far risk has been mostly defined as the expected value of a loss, mathematically PL (being P the probability of an adverse event and L the loss incurred as a consequence of the adverse event). The so called risk matrix follows from such definition.
This definition of risk is justified in a long term âmanagerialâ perspective, in which it is conceivable to distribute the effects of an adverse event on a large number of subjects or a large number of recurrences. In other words, this definition is mostly justified on frequentist terms. Moreover, according to this definition, in two extreme situations (high-probability/low-consequence and low-probability/high-consequence), the estimated risk is low. This logic is against the principles of sustainability and continuous improvement, which should impose instead both a continuous search for lower probabilities of adverse events (higher and higher reliability) and a continuous search for lower impact of adverse events (in accordance with the fail-safe principle).
In this work a different definition of risk is proposed, which stems from the idea of safeguard: (1Risk)=(1P)(1L). According to this definition, the risk levels can be considered low only when both the probability of the adverse event and the loss are small.
Such perspective, in which the calculation of safeguard is privileged to the calculation of risk, would possibly avoid exposing the Society to catastrophic consequences, sometimes due to wrong or oversimplified use of probabilistic models. Therefore, it can be seen as the citizenâs perspective to the definition of risk