62 research outputs found

    End-user Empowerment in the Digital Age

    Get PDF
    End-user empowerment (or human empowerment) may be seen as an important aspect of a human-centric approach towards the digital economy. Despite the role of end-users has been recognized as a key element in information systems and end-user computing, empowering end-users may be seen as a next evolutionary step. This minitrack aims at advancing the understanding of what end-user empowerment really is, what the main challenges to develop end-user empowering systems are, and how end-user empowerment may be achieved in specific domains

    Big Data Privacy Context: Literature Effects On Secure Informational Assets

    Get PDF
    This article's objective is the identification of research opportunities in the current big data privacy domain, evaluating literature effects on secure informational assets. Until now, no study has analyzed such relation. Its results can foster science, technologies and businesses. To achieve these objectives, a big data privacy Systematic Literature Review (SLR) is performed on the main scientific peer reviewed journals in Scopus database. Bibliometrics and text mining analysis complement the SLR. This study provides support to big data privacy researchers on: most and least researched themes, research novelty, most cited works and authors, themes evolution through time and many others. In addition, TOPSIS and VIKOR ranks were developed to evaluate literature effects versus informational assets indicators. Secure Internet Servers (SIS) was chosen as decision criteria. Results show that big data privacy literature is strongly focused on computational aspects. However, individuals, societies, organizations and governments face a technological change that has just started to be investigated, with growing concerns on law and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions and the only consistent country between literature and SIS adoption is the United States. Countries in the lowest ranking positions represent future research opportunities.Comment: 21 pages, 9 figure

    Information Security Challenges in the Absence of ICT in Protecting Personal and Organisational Data in Nairobi County, Kenya

    Get PDF
    There have been several cases of lost documents and misplaced or inaccurate information belonging to individuals or organisations reported in recent times at global, national and regional levels. Nairobi county is one of the regions on the spot as many people travelling or working in the city have reported lost identification documents such as certificates and licenses, whether through criminality or negligence. Furthermore, most businesses and organisations dealing with huge volumes of data need help to protect and provide accurate information. Many still need help with the pre-digital data management systems, thus risking the loss of both personal and organisational data. This paper, therefore, sought to examine the information security challenges due to the inadequate application of ICT in managing personal and corporate data and their implications on individuals and organisations in Nairobi County. The target population included employees from Kenya Revenue Authority and Kenya Data Networks in Nairobi headquarters offices, police officers deployed at NPS offices headquarters and members of the public. The selected target groups were known to deal with enormous data for both personnel and businesses, and the police officers were part of this study because of their mandate to help in tracking lost personal and business documents. Lastly, the researcher engaged members of the public to share their experiences of losing business and personal records. The study employed purposive and simple random sampling techniques to select the required sample of 110 participants drawn from the four groups. A structured questionnaire was administered to the sampled police officers, employees of Kenya Data Network and Kenya Revenue Authority and members of the public. The researchers interviewed key informants from the three organisations, NPS, KRA and KDA, to complement the data collected using the questionnaires. The findings established that challenges were associated with the need for more ICT in managing personal information and organisational data.The paper revealed that the need for an integrated system is a challenge to tracking missing identities or verifying the validity of provided information, thus compromising the productivity and security of businesses and institutions. Results from this study provide a solution to tracking any missing documents and correcting inaccurate personal data by adopting an integrated ICT system

    Consumer-Based Ranking for Strategic Selection of IoT Business Models

    Get PDF
    The digitization of business environments requires companies to be more consumer-centric than before. In the course of these adjustments, managers operate in the area of conflict between value creation for the firm, consumers’ limited willingness to pay for products and services, and the need to gain and maintain consumers’ trust. To support managers in the challenge to redefine their business models to fit the new digitized business environment, we suggest that managers should incorporate consumer\u27s attitudes towards Internet of Things (IoT) business models in their strategic business model choice. Based on a choice experiment with 301 individuals, we identified a set of business models ranked according to the probability that users are most likely to agree with, and thus accept. The results of the study provide direct indications about which IoT business models are from a consumer perspective desirable and which not so that managers can directly implement these insights in practice

    Low Effort and Privacy – How Textual Priming Affects Privacy Concerns of Email Service Users

    Get PDF
    The integration of digital applications and systems into the everyday routines of users is inevitably progressing. Ubiquitous and invisible computing requires the perspective of a new user and the inclusion of insights from related disciplines such as behavioral economics or social psychology. This paper takes up the call for research by Dinev et al. (2015) and examines the influence of textual priming elements on the privacy concerns of users of email accounts. The paper provides an operationalization of a privacy concern as a dependent variable, incorporated in an online experiment with 276 participants. The results show highly significant differences between the groups investigated by the experiment. Specifically, the users of different email providers show interesting results. While users of Gmail show no significant reaction in the experiment, users of other email providers show significant differences in the experimental setting

    LegitimID: A federative digital identity system for strong authentication

    Get PDF
    The growing use of online services advocated the emergence of digital identity as a mechanism of data security and personal information protection that can increase the trust among online users and applications. This paper introduces a new security system developed around the digital identity concept, implemented using a federative multifactor strong authentication framework and tested in an authentic online educational setting to accomplish the complete life cycle of business privacy. System performance evaluated on a sample of 108 students revealed an excellent acceptance and confidence among the users

    Privacy as a Part of the Preference Structure of Users App Buying Decision

    Get PDF
    Information privacy and personal data in information systems are referred to as the ‘new oil’ of the 21st century. The mass adoption of smart mobile devices, sensor-enabled smart IoT-devices, and mobile applications provide virtually endless possibilities of gathering users’ personal information. Previous research suggests that users attribute very little monetary value to their information privacy. The current paper assumes that users are not able to monetize their value of privacy due to its abstract nature and non-transparent context. By defining privacy as a crucial product attribute of mobile applications the authors provide an approach to measure the importance of privacy as part of users’ preference structure. The results of the conducted choice-based conjoint Analysis emphasize the high relevance of privacy in users’ preference structure when downloading an app and provide an interesting contribution for theory and practice

    Putting a Price Tag on Personal Information - A Literature Review

    Get PDF
    In the digital age, personal information is claimed to be the new commodity with a rising market demand and profitability for businesses. Simultaneously, people are becoming aware of the value of their personal information while being concerned about their privacy. This increases the demand of direct compensation or protection. In response to the commodification of privacy and the increased demand for compensation, a number of scholars have shed light on the value people assign to their personal information. However, these findings remain controversial as their results differ tremendously due to different research methods and contexts. To address this gap, we conducted a systematic literature review to gain insights into the current research state and to identify further research avenues. By synthesizing and analyzing 37 publications, we provide an integrative framework along with seven contextual factors affecting individuals’ valuation of privacy
    • 

    corecore