8,681 research outputs found

    Design and Validation of the Bright Internet

    Get PDF
    Bright Internet research was launched as a core project of the AIS Bright ICT Initiative, which aims to build an ICT-enabled Bright Society. To facilitate research on the Bright Internet, we explicitly define the goals and principles of the Bright Internet, and review the evolution of its principles. The three goals of the Bright Internet are: the realization of preventive security, the provision of the freedom of anonymous expression for innocent netizens, and protection from the risk of privacy infringement that may be caused by preventive security schemes. We respecify design principles to fulfill these seemingly conflicting goals: origin responsibility, deliverer responsibility, identifiable anonymity, global collaboration, and privacy protection. Research for the Bright Internet is characterized by two perspectives: first, the Bright Internet adopts a preventive security paradigm in contrast to the current self-centric defensive protective security paradigm. Second, the target of research is the development and deployment of the Bright Internet on a global scale, which requires the design of technologies and protocols, policies and legislation, and international collaboration and global governance. This research contrasts with behavioral research on individuals and organizations in terms of the protective security paradigm. This paper proposes validation research concerning the principles of the Bright Internet using prevention motivation theory and analogical social norm theory, and demonstrates the need for a holistic and prescriptive design for a global scale information infrastructure, encompassing the constructs of technologies, policies and global collaborations. An important design issue concerns the business model design, which is capable of promoting the propagation of the Bright Internet platform through applications such as Bright Cloud Extended Networks and Bright E-mail platforms. Our research creates opportunities for prescriptive experimental research, and the various design and behavioral studies of the Bright Internet open new horizons toward our common goal of a bright future

    Multinational Web Uses and Gratifications: Measuring the Social Impact of Online Community Participation Across National Boundaries

    Get PDF
    This paper describes the rationale and findings from a multinational study of online uses and gratifications conducted in theUnited States,Korea, and theNetherlandsin spring 2003. Survey questions developed in three languages by native speaking researchers was presented to approximately 400 respondents in each country via the Web. Web uses and gratifications were analyzed cross-nationally in a comparative fashion focusing on involvement in different types of on-line communities. Findings indicate that demographic characteristics, cultural values, and Internet connection type emerged as critical factors that explain why the same technology is adopted differently

    Identifying Multiple Categories of Cybersecurity Skills that Affect User Acceptance of Protective Information Technologies.

    Get PDF
    Cybersecurity threat is one of the major national security challenges confronting the United States, making it imperative to achieve safe user security behavior on information systems. Safe user security behavior hinges on the attitude of a computer user to accept the usage of Protective information technologies (PIT), including security software. Past studies focused on user acceptance of PIT with antecedents such as usefulness, capabilities, and self-efficacy but rarely addressed specific cybersecurity skills needed to improve the user attitude and acceptance of security software use. The purpose of this study is to examine what category of cybersecurity skills can improve the user acceptance of PIT. We propose a theoretical model that examines the effect of cybersecurity computing skills, cybersecurity initiative skills and cybersecurity action skills on user attitude and acceptance of PIT. This research addresses the national cybersecurity threat and has both theoretical and practical implications

    Investigating inclusive risk communication in the context of influenza outbreaks

    Get PDF
    Outbreaks of novel influenza viruses are continually occurring on many places on our planet, with the ultimate and most extreme consequence being a full-scale pandemic. Modern communication technology is widely used for risk communication regarding recommended change in behavior patterns and other precautions in order to mitigate the transmission. However, the assumption and bias that modern communication technology constitutes the norm causes vulnerable groups to be at possible risk of systematic exclusion to correct and updated information. Through conducting a literature- and case analysis, the aim of this study is to identify insufficient or inadequate risk communication efforts in South Korea and Vietnam during influenza outbreaks, especially with concern of vulnerable groups. Further, to analyze how national influenza preparedness plans observe or ignore these insufficiencies. Results show that vulnerable groups are explicitly recognized in the preparedness plan of Vietnam. However, the South Korean preparedness plan show a more homogenous approach. Both South Korea and Vietnam showed a broad variety of channels used in their risk communication strategies which could be positive in terms of a broad outreach to a heterogenous population, including vulnerable groups. Four key factors that moderate the outcomes of risk communication were identified: Channels, Messages, Transparency and Trust

    Toward a Model of Intercultural Warrant: A Case of the Korean Decimal Classification\u27s Cross-cultural Adaptation of the Dewey Decimal Classification

    Get PDF
    I examined the Korean Decimal Classification (KDC)\u27s adaptation of the Dewey Decimal Classification (DDC) by comparing the two systems. This case manifests the sociocultural influences on KOSs in a cross-cultural context. I focused my analysis on the changes resulting from the meeting of the two cultures, answering the main research question: “How does KDC adapt DDC in terms of underlying sociocultural perspectives in a classificatory form?” I took a comparative approach and address the main research question in two phases. In Phase 1, quantities of class numbers were analyzed by edition and discipline. The main class with the most consistently high number of class numbers in DDC was the social sciences, while the main class with the most consistently high number of class numbers in KDC was technology. The two main classes are expected to differ in semantic contents or specificities. In Phase 2, patterns of adaptations were analyzed by examining the class numbers, captions, and hierarchical relations within the developed adaptation taxonomy. Implementing the taxonomy as a coding scheme brings two comparative features of classifications: 1) semantic contents determined by captions and quantity of subordinate numbers; and 2) structural arrangement determined by ranks, the broader category, presence and the order of subordinate numbers. Surveying proper forms of adaptation resulted in the development of an adaptation taxonomy that will serve as a framework to account for the conflicts between and harmonization of multiple social and cultural influences in knowledge structures. This study has ramifications in theoretical and empirical foundations for the development of “intercultural warrant” in KOSs

    Designing experiences with wearables: A case study exploring the blurring boundaries of art, design, technology, culture and distance

    Get PDF
    This paper details a workshop aimed at exploring opportunities for experience design through wearable art and design concepts. Specifically it explores the structure of the workshop with respect to facilitating learning through technology in the development of experiential wearable art and design. A case study titled Cloud Workshop: Wearables and Wellbeing; Enriching connections between citizens in the Asia-Pacific region was initiated through a cooperative partnership between Hong Kong Baptist University (HKBU), Queensland University of Technology (QUT) and Griffith University (GU). Digital technologies facilitated collaboration through an inter-disciplinary, inter-national and inter- cultural approach (Facer & Sandford, 2010) between Australia and Hong Kong. Students cooperated throughout a two-week period to develop innovative wearable concepts blending art, design and technology. An unpacking of the approach, pedagogical underpinning and final outcomes revealed distinct educational benefits as well as certain learning and technological challenges of the program. Qualitative feedback uncovered additional successes with respect to student engagement and enthusiasm, while uncovering shortcomings in the delivery and management of information and difficulties with cultural interactions. Potential future versions of the program aim to take advantage of the positives and overcome the limitations of the current pedagogical approach. It is hoped the case study will become a catalyst for future workshops that blur the boundaries of art, design and technology to uncover further benefits and potentials for new outcomes in experience design

    Is the Repeal of Net Neutrality a Necessary Evil? An Empirical Analysis of Net Neutrality and Cybercrime

    Get PDF
    While net neutrality guarantees equal access to the Internet and online content, it serves as a limiting factor in identifying and tracking criminal activities in cyberspace by ensuring that data packet is transmitted with equal priority, irrespective of its source and content. Exploiting a natural experiment in which net neutrality policies were officially repealed in 2018 in the United States, this study examines the impact of net neutrality on the occurrence of cybercrime. Our findings suggest that the repeal of net neutrality is negatively associated with the occurrence of malicious code and content in an attempt to compromise computer systems (e.g., malware and ransomware). In contrast, we do not find any significant relationship with cybercrime victimization, and cybercrime that may subsequently occur in compromised systems (e.g., data breaches and denial-of-service attacks). This study provides novel insights into the role of net neutrality and open Internet toward the preventive cybersecurity paradigm

    Addressing the cross-country applicability of the theory of planned behaviour (TPB):A structured review of multi-country TPB studies

    Get PDF
    The theories of reasoned action and planned behaviour (TRA/TPB) have received substantial research interest from consumer behaviourists. One important area of interest which has not been adequately researched concerns the impact of national culture on the TRA/TPB components and interrelationships. To date, no systematic assessment of the impact of culture on the TRA/TPB model relationships has been undertaken. In order to understand the potential impact of culture on the TRA/TPB model relationships a structured review of TRA/TPB studies is undertaken. Studies that have quantitatively applied the TRA/TPB across at least two countries within a consumption domain since 2000 are reviewed. The authors propose that two of Hofstede�s cultural dimensions, individualism and power distance, may moderate the TRA/TPB relationships. The review highlights that the impact of subjective norm on intention varies most across countries, with the relationship between intention and both attitude and perceived behavioural control operating more similarly across country samples. Further, a systematic assessment of variation in the TRA/TPB model relationships via multilevel modelling shows that only the subjective norm-intention relationship varies across the countries studied. The relationship between subjective norm and intention is found to be influenced by power distance, with a stronger relationship evident in high power distance cultures. This review is the first of its kind and is of significance in addressing the emic versus etic nature of the TRA/TPB. Importantly, the article outlines relevant avenues and recommendations for future cross-national research utilizing the TRA/TPB

    Human experience in the natural and built environment : implications for research policy and practice

    Get PDF
    22nd IAPS conference. Edited book of abstracts. 427 pp. University of Strathclyde, Sheffield and West of Scotland Publication. ISBN: 978-0-94-764988-3
    corecore