62 research outputs found
End-user Empowerment in the Digital Age
End-user empowerment (or human empowerment) may be seen as an important aspect of a human-centric approach towards the digital economy. Despite the role of end-users has been recognized as a key element in information systems and end-user computing, empowering end-users may be seen as a next evolutionary step. This minitrack aims at advancing the understanding of what end-user empowerment really is, what the main challenges to develop end-user empowering systems are, and how end-user empowerment may be achieved in specific domains
Big Data Privacy Context: Literature Effects On Secure Informational Assets
This article's objective is the identification of research opportunities in
the current big data privacy domain, evaluating literature effects on secure
informational assets. Until now, no study has analyzed such relation. Its
results can foster science, technologies and businesses. To achieve these
objectives, a big data privacy Systematic Literature Review (SLR) is performed
on the main scientific peer reviewed journals in Scopus database. Bibliometrics
and text mining analysis complement the SLR. This study provides support to big
data privacy researchers on: most and least researched themes, research
novelty, most cited works and authors, themes evolution through time and many
others. In addition, TOPSIS and VIKOR ranks were developed to evaluate
literature effects versus informational assets indicators. Secure Internet
Servers (SIS) was chosen as decision criteria. Results show that big data
privacy literature is strongly focused on computational aspects. However,
individuals, societies, organizations and governments face a technological
change that has just started to be investigated, with growing concerns on law
and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions
and the only consistent country between literature and SIS adoption is the
United States. Countries in the lowest ranking positions represent future
research opportunities.Comment: 21 pages, 9 figure
Information Security Challenges in the Absence of ICT in Protecting Personal and Organisational Data in Nairobi County, Kenya
There have been several cases of lost documents and misplaced or inaccurate information belonging to individuals or organisations reported in recent times at global, national and regional levels. Nairobi county is one of the regions on the spot as many people travelling or working in the city have reported lost identification documents such as certificates and licenses, whether through criminality or negligence. Furthermore, most businesses and organisations dealing with huge volumes of data need help to protect and provide accurate information. Many still need help with the pre-digital data management systems, thus risking the loss of both personal and organisational data. This paper, therefore, sought to examine the information security challenges due to the inadequate application of ICT in managing personal and corporate data and their implications on individuals and organisations in Nairobi County. The target population included employees from Kenya Revenue Authority and Kenya Data Networks in Nairobi headquarters offices, police officers deployed at NPS offices headquarters and members of the public. The selected target groups were known to deal with enormous data for both personnel and businesses, and the police officers were part of this study because of their mandate to help in tracking lost personal and business documents. Lastly, the researcher engaged members of the public to share their experiences of losing business and personal records. The study employed purposive and simple random sampling techniques to select the required sample of 110 participants drawn from the four groups. A structured questionnaire was administered to the sampled police officers, employees of Kenya Data Network and Kenya Revenue Authority and members of the public. The researchers interviewed key informants from the three organisations, NPS, KRA and KDA, to complement the data collected using the questionnaires. The findings established that challenges were associated with the need for more ICT in managing personal information and organisational data.The paper revealed that the need for an integrated system is a challenge to tracking missing identities or verifying the validity of provided information, thus compromising the productivity and security of businesses and institutions. Results from this study provide a solution to tracking any missing documents and correcting inaccurate personal data by adopting an integrated ICT system
Consumer-Based Ranking for Strategic Selection of IoT Business Models
The digitization of business environments requires companies to be more consumer-centric than before. In the course of these adjustments, managers operate in the area of conflict between value creation for the firm, consumersâ limited willingness to pay for products and services, and the need to gain and maintain consumersâ trust. To support managers in the challenge to redefine their business models to fit the new digitized business environment, we suggest that managers should incorporate consumer\u27s attitudes towards Internet of Things (IoT) business models in their strategic business model choice. Based on a choice experiment with 301 individuals, we identified a set of business models ranked according to the probability that users are most likely to agree with, and thus accept. The results of the study provide direct indications about which IoT business models are from a consumer perspective desirable and which not so that managers can directly implement these insights in practice
Low Effort and Privacy â How Textual Priming Affects Privacy Concerns of Email Service Users
The integration of digital applications and systems into the everyday routines of users is inevitably progressing. Ubiquitous and invisible computing requires the perspective of a new user and the inclusion of insights from related disciplines such as behavioral economics or social psychology. This paper takes up the call for research by Dinev et al. (2015) and examines the influence of textual priming elements on the privacy concerns of users of email accounts. The paper provides an operationalization of a privacy concern as a dependent variable, incorporated in an online experiment with 276 participants. The results show highly significant differences between the groups investigated by the experiment. Specifically, the users of different email providers show interesting results. While users of Gmail show no significant reaction in the experiment, users of other email providers show significant differences in the experimental setting
LegitimID: A federative digital identity system for strong authentication
The growing use of online services advocated the emergence of digital identity as a mechanism of data security and personal information protection that can increase the trust among online users and applications. This paper introduces a new security system developed around the digital identity concept, implemented using a federative multifactor strong authentication framework and tested in an authentic online educational setting to accomplish the complete life cycle of business privacy. System performance evaluated on a sample of 108 students revealed an excellent acceptance and confidence among the users
Privacy as a Part of the Preference Structure of Users App Buying Decision
Information privacy and personal data in information systems are referred to as the ânew oilâ of the 21st century. The mass adoption of smart mobile devices, sensor-enabled smart IoT-devices, and mobile applications provide virtually endless possibilities of gathering usersâ personal information. Previous research suggests that users attribute very little monetary value to their information privacy. The current paper assumes that users are not able to monetize their value of privacy due to its abstract nature and non-transparent context. By defining privacy as a crucial product attribute of mobile applications the authors provide an approach to measure the importance of privacy as part of usersâ preference structure. The results of the conducted choice-based conjoint Analysis emphasize the high relevance of privacy in usersâ preference structure when downloading an app and provide an interesting contribution for theory and practice
Putting a Price Tag on Personal Information - A Literature Review
In the digital age, personal information is claimed to be the new commodity with a rising market demand and profitability for businesses. Simultaneously, people are becoming aware of the value of their personal information while being concerned about their privacy. This increases the demand of direct compensation or protection. In response to the commodification of privacy and the increased demand for compensation, a number of scholars have shed light on the value people assign to their personal information. However, these findings remain controversial as their results differ tremendously due to different research methods and contexts. To address this gap, we conducted a systematic literature review to gain insights into the current research state and to identify further research avenues. By synthesizing and analyzing 37 publications, we provide an integrative framework along with seven contextual factors affecting individualsâ valuation of privacy
- âŠ