8,869 research outputs found

    Mobile Identity Protection: The Moderation Role of Self-Efficacy

    Get PDF
    The rapid growth of mobile applications and the associated increased dependency on digital identity raises the growing risk of identity theft and related fraud. Hence, protecting identity in a mobile environment is a problem. This study develops a model that examines the role of identity protection self-efficacy in increasing users’ motivation intentions to achieve actual mobile identity protection. Our research found that self-efficacy significantly affects the relationship between users’ perceived threat appraisal and their motivational intentions for identity protection. The relation between mobile users’ protection, motivational intentions, and actual mobile identity protection actions was also found to be significant. Additionally, the findings revealed the considerable impact of awareness in fully mediating between self-efficacy and actual identity protection. The model and its hypotheses are empirically tested through a survey of 383 mobile users, and the findings are validated through a panel of experts, thus confirming the impact of self-efficacy on an individual’s identity protection in the mobile context

    Investigating Age-Related Factors in Phishing Susceptibility: A Focus on Decision-Making Processes in HCI Context

    Get PDF
    The widespread adoption of digital interfaces, amplified by the worldwide drive for digital inclusion, presents unique challenges, especially for older adults navigating the online realm. This research investigates aging populations\u27 pronounced susceptibility to phishing schemes—a sophisticated digital threat with significant financial and societal implications. This study seeks to explore human-computer interaction (HCI) security for older adults, examining the interplay of heuristic and deliberate decision-making processes while accounting for age-related cognitive changes, behavioural attributes, and experiential factors. A comprehensive 2x2x2 factorial experimental design is proposed, which integrates variances in message themes (health and finance), gain-loss framing, and age disparities. The research harnesses Neuro Information Systems (NeuroIS) techniques, including EEG and eye-tracking, combined with questionnaires, to capture users\u27 dynamic perceptions during phishing encounters. The anticipated findings aspire to shape HCI guidelines tailored for aging populations while contributing to developing user-centric security awareness programs and digital interfaces, mitigating cyber threat repercussions

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    Do Emotions Influence the Investment Decisions of Generation Z Surabaya Investors in the Covid-19 Pandemic Era? Does Financial Risk Tolerance Play a Moderating Role?

    Get PDF
    The purpose of this study was to investigate the influence of positive aand negative emotions on investment decisions during the Covid-19 pandemic, as well as to test risk tolerance as a intervening variable between basic emotions and investment decisions. This study uses endogenous variables, namely investment decisions and exogenous variables, namely positive and negative emotions including anger, sadness, hope, happiness, and fear. As well as the intervening variable, namely financial risk tolerance. Data collection was carried out by distributing questionnaires to 180 young investors in Surabaya, Indonesia. The questionnaire uses a 5-point Likert scale. Hypothesis testing uses a structural equation model. The results of the study indicate that there is a significant impact of positive emotions on investment decision-making. The association in question is mediated by financial risk tolerance. The regulation of the relationship between negative emotions and investment decisions by financial risk tolerance remains unclear. Furthermore, the impact of negative emotions on investment decisions appears to be insignificant. Practical implications of this research help young investors of generation z to manage their emotions, especially in the era of Covid-19. This is because emotions can affect their investment decision making. The originality of this research is a unique study of the positive and negative emotions associated with the investment decisions of young investors in the Covid-19 era. As well as risk tolerance which will strengthen the influence of emotions on investment decisions. The results of the research strengthen the theory of emotional intelligence and the dual process theory

    Ransomware: Victim Insights on Harms to Individuals, Organisations and Society

    Get PDF
    Ransomware incidents remain a scourge on UK society. Based on interviews with victims and incident responders, this paper outlines the harm ransomware causes to organisations, individuals, the UK economy, national security and wider society. The research reveals a wide range of harms caused by ransomware, including physical, financial, reputational, psychological and social harms. We set out a framework of: First-order harms: Harms to any organisation and their staff directly targeted by a ransomware operation. Second-order harms: Harms to any organisation or individuals that are indirectly affected by a ransomware incident. Third-order harms: The cumulative effect of ransomware incidents on wider society, the economy and national security. Building on an existing taxonomy of cyber harms, 1. this framework will enable policymakers, practitioners and researchers to categorise more case studies on ransomware incidents and to better explain new and existing types of harm to the UK and other countries. Ransomware is a risk for organisations of all sizes. The findings from this paper highlight that ransomware can create significant financial costs and losses for organisations, which in some cases can threaten their very existence. Ransomware can also create reputational harm for businesses that rely on continuous operations or hold very sensitive data – although customers and the general public can be more forgiving than some victims believe. The harms from ransomware go beyond financial and reputational costs for organisations. Interviews with victims and incident responders revealed that ransomware creates physical and psychological harms for individuals and groups, including members of staff, healthcare patients and schoolchildren. Ransomware can ruin lives. Incidents highlighted in this paper have caused individuals to lose their jobs, evoked feelings of shame and self-blame, extended to private and family life, and contributed to serious health issues. The harm and cumulative effects caused by ransomware attacks have implications for wider society and national security, including supply chain disruption, a loss of trust in law enforcement, reduced faith in public services, and the normalisation of cybercrime. Ransomware also creates a strategic advantage for the hostile states harbouring the cyber-criminals who conduct such operations. Downstream harm to individuals from ransomware is more severe when attacks encrypt IT infrastructure, rather than steal and leak data. There is no evidence from this research that the ransomware ecosystem is exploiting stolen or leaked personal data in a systemic way for fraud or other financially motivated cybercrimes. At present, exploiting stolen data for other activities is less profitable than extortion-based crime that takes away victims’ access to their systems and data. This finding may inform victim decision-making on when they should and should not consider paying a ransom demand

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp

    Multidisciplinary perspectives on Artificial Intelligence and the law

    Get PDF
    This open access book presents an interdisciplinary, multi-authored, edited collection of chapters on Artificial Intelligence (‘AI’) and the Law. AI technology has come to play a central role in the modern data economy. Through a combination of increased computing power, the growing availability of data and the advancement of algorithms, AI has now become an umbrella term for some of the most transformational technological breakthroughs of this age. The importance of AI stems from both the opportunities that it offers and the challenges that it entails. While AI applications hold the promise of economic growth and efficiency gains, they also create significant risks and uncertainty. The potential and perils of AI have thus come to dominate modern discussions of technology and ethics – and although AI was initially allowed to largely develop without guidelines or rules, few would deny that the law is set to play a fundamental role in shaping the future of AI. As the debate over AI is far from over, the need for rigorous analysis has never been greater. This book thus brings together contributors from different fields and backgrounds to explore how the law might provide answers to some of the most pressing questions raised by AI. An outcome of the Católica Research Centre for the Future of Law and its interdisciplinary working group on Law and Artificial Intelligence, it includes contributions by leading scholars in the fields of technology, ethics and the law.info:eu-repo/semantics/publishedVersio

    Illinois BIPA: A Litigation Nightmare for Employers

    Get PDF

    The viability of blockchain in corporate governance

    Get PDF
    • …
    corecore