13,073 research outputs found

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Laying Claim to Authenticity: Five Anthropological Dilemmas

    Get PDF
    The introduction to this special collection examines five dilemmas about the use of the concept of authenticity in anthropological analysis. These relate to 1) the expectation of a singular authenticity “deep” in oneself or beyond the surface of social reality, 2) the contradictions emerging from the opposition of authenticity with inauthenticity, 3) the irony of the notion of invention of tradition (which deconstructs, but also offends), 4) the criteria involved in the authentication of the age of objects (with a consideration of their materiality), and 5) authenticity’s simultaneity, its contemporaneous multiple conceptualizations in context. I argue for a perspective on the study of authenticity that acknowledges the simultaneous co-existence of more than one parallel manifestation of authenticity in any given negotiation of the authentic

    The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information

    Get PDF
    Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity theft. Unfortunately, current solutions for handling these incidents are woefully inadequate. Private litigation like consumer class actions and shareholder lawsuits each face substantive legal and procedural barriers. States have their own data security and breach notification laws, but there is currently no unifying piece of legislation or strong enforcement mechanism. This Note argues that proactive solutions are required. First, a national data security law—setting minimum data security standards, regulating the use and storage of personal information, and expanding the enforcement role of the Federal Trade Commission—is imperative to protect consumers’ data. Second, a proactive solution requires reconsidering how to minimize the problem by going to its source: the collection of personally identifiable information in the first place. This Note suggests regulating companies’ collection of Social Security numbers, and, eventually, using a system based on distributed ledger technology to replace the ubiquity of Social Security numbers

    Freeing Mysticism: Epistemic standards in theory and practice

    Get PDF
    With the growth of epistemology, an important debate in philosophy of religion has arisen: can mystical encounters—purported feelings of intense unity with the divine—serve as epistemic warrants? In this paper, I examine two of the most prominent and promising standards by which to determine the veridicality of such encounters—those of William Alston and Richard Swinburne—and demonstrate their respective strengths and shortcomings. Considering these shortcomings, I compose and defend my own set of criteria to use in evaluating the veridicality of putative mystical experiences which draws upon the subject’s religious tradition, rationality, and affectivit
    corecore