277 research outputs found

    Cyber Citizens and Cyber Deviance: Exploring Social and Technical Factors as Antecedents to Cyber Deviance and the Implications for Cyber Citizenship

    Get PDF
    There is an alarming trend of individuals behaving inappropriately with information technology in both organizational and personal settings. For example, in a work context individuals are breaking repeatedly security protocols (Hovav et al. 2011) leading to the compromise of sensitive customer and important organizational data resources. Information systems (IS) researchers have studied the manners by which employees use, and misuse, information technology within organizations (Warkentin et al. 2009). Alternatively, in a non-work context, attention has been given to digital media piracy (Siponen et al. 2012) which continues to plague organizations. These examples illustrate some unacceptable behaviors exhibited by cyber citizens (Anderson et al. 2010) – both in the work and non-work settings. Typically, the boundaries of acceptable and unacceptable cyber behavior are defined by government authorities, who develop laws around specific illegal online behaviors, and businesses, who detail inappropriate actions in their terms of service agreements. Past research has shown that even with detailed guidelines, employees continue to cause breaches in security (Harris 2012) and these actions are greatly influenced by the behaviors of their coworkers (Gallivan et al. 2005). Alternatively, in a non-work environment, computer users operate within a precarious social and technological environment where the guidelines on appropriate behavior are vague (Nowak 2011). In such an ill-defined context, individuals tend to refer to accepted social norms as a guide, rather than try to understand the disparity between laws and policies (Morrison 1994). Research in criminology, sociology, and management, has focused on deviant behaviors with technology, termed cyber deviance. This term refers to inappropriate or criminal behavior in a digital context (Holt et al. 2010). Technical solutions are only marginally effective as deviant cyber behavior continues to proliferate (Rogers et al. 2006). Research has examined individual factors, such as self-control, in order to explain cyber deviant behaviors (Hinduja et al. 2008). Social factors have begun to be examined through the use of social learning theory and social cognitive theory to explain the ways in which attitudes and beliefs influence cyber deviance (Jacobs et al. 2012). Although studies that examine the individual, social, and technical factors have provided insight into cyber deviance behavior, they have not considered such behavior as part of cyber citizenship, where individuals behave in an ethical and productive manner in online environments. Additionally, recent IS research has begun to explore alternative ways to influence social norms and attitudes on individual behaviors in online environments in order to create more conscientious cyber citizens (Anderson et al. 2010). Therefore, this study aims to examine the individual, social, and technical factors that impact one’s intention to engage in cyber deviance. In this study, we focus on the illegal activities that occur in a digital environment. This highlights the unique actions that occur between humans and technology, suggesting this study is best served from such a perspective. Scialdone (2010) provides human computer interaction (HCI) researchers with a useful framework for examining phenomena that occur between humans and technology. Researchers must identify the human, the technology, the tasks, and the context to clearly situate their study in the HCI literature (Scialdone 2010). In this study we focus on average PC users and their interactions in computer-mediated social networks (CMSN). We examine individual factors, Perceived Utility of Cyber Deviance and Self-efficacy in Cyber Deviance; social factors, Cyber Citizen Social Norms on Cyber Deviance, and technical factors, CMSN Influencer and CMSN Intensity. The proposed research methodology is a quantitative approach using a quasi-experimental setup (Bhattacherjee 2012) through the use of scenarios which describe situations of cyber deviance. The use of scenarios allows us to provide a specific situation which serves as a reference point for our inquiry into the concepts of interest (Nagin and Paternoster 1993)

    Enhanced bioavailability of zeaxanthin in a milk-based formulation of wolfberry (Gou Qi Zi;Fructus barbarum L.)

    Get PDF
    The carotenoid zeaxanthin is concentrated within the macula. Increased macular zeaxanthin is suggested to lower the risk of age-related macular degeneration. The small red berry, wolfberry (Fructus barbarum L.; Gou Qi Zi and Kei Tze), is one of the richest natural sources of zeaxanthin. However, carotenoid bioavailability is low, and food-based products with enhanced bioavailability are of interest. The present study investigated zeaxanthin bioavailability from three wolfberry formulations. Berries were homogenised in hot (80°C) water, warm (40°C) skimmed milk and hot (80°C) skimmed milk, with freeze drying of each preparation into a powdered form. A zeaxanthin-standardised dose (15mg) of each was consumed, in randomised order, together with a standardised breakfast by twelve healthy, consenting subjects in a cross-over trial, with a 3-5-week washout period between treatments. Blood samples were taken via a venous cannula immediately before (fasting) and 2, 4, 6, 7, 8 and 10h post-ingestion. Zeaxanthin concentration in the triacylglycerol-rich lipoprotein fraction of plasma was measured by HPLC. Results showed that triacylglycerol-rich lipoprotein zeaxanthin peaked at 6h post-ingestion for all formulations. Zeaxanthin bioavailability from the hot milk formulation was significantly higher (p<0·001) than from the others. Mean area under the curve (n 12) results were 9·73 (sem 2·45), 3·24 (sem 0·72) and 3·14 (sem 1·09) nmol×h/l for the hot milk, warm milk and hot water formulations, respectively. Results showed clearly that homogenisation of wolfberry in hot skimmed milk results in a formulation that has a 3-fold enhanced bioavailability of zeaxanthin compared with both the ‘classical' hot water and warm skimmed milk treatment of the berrie

    The Predictive Value of Amplitude-Integrated Electroencephalography in Preterm Infants for IQ and Other Neuropsychological Outcomes at Early School Age

    Get PDF
    Background: Amplitude-integrated electroencephalography (aEEG) is used increasingly in neonatal intensive care and seems helpful in predicting outcomes at the age of 2 years, Objectives:To determine whether early aEEG patterns in preternn infants are equally useful in predicting outcomes at early school age. Methods: We recorded aEEG in 41 pre-terms (gestational age 26.0-32.9 weeks) at a median postnatal age of 9.7 h (IQR 7.0-25.3) and in 43 preternns on median day 8 (IQR 7-9). We assessed aEEG by pattern recognition and calculated the means of the aEEG amplitude centiles. At a median of 739 years, i.e., early school age, we assessed their motor, cognitive, and behavioral outcomes. Results: Depressed aEEG patterns were not associated with poorer outcomes. Cyclicity directly after birth was associated with a higher total IQ (mean 104 vs. 97, p = 0.05) and higher scores on visual perception (mean percentile 57.1 vs. 40.1, p 0,049) and visual memory (mean percentile 34.5 vs. 19.1, p = 0090). We found some associations between the aEEG amplitude centiles and cognitive outcomes, but none for motor or behavioral outcomes. There was an increased risk of abnormal scores on long-term verbal memory in cases of the lower 5th and 50th aEEG amplitude centiles directly after birth. The odds ratios were 0.65 (95% CI 0,42-0.99, p = 0.040) and 0.71 (95% CI 0.52-0.96, p = 0.025), respectively. Conclusions: In relatively healthy preternn infants the value of aEEG in predicting neuropsychological outcomes at early school age is limited. The presence of cyclicity directly after birth tends to be associated with better cognition. (C) 2018 The Author(s) Published by S. Karger AG, Base

    A GPU Simulation for Evolution-Communication P Systems with Energy Having no Antiport Rules

    Get PDF
    Evolution-Communication P system with energy (ECPe systems) is a cell- like variant P system which establishes a dependence between evolution and communi- cation through special objects, called `energy,' produced during evolution and utilized during communication. This paper presents our initial progress and e orts on the im- plementation and simulation of ECPe systems using Graphics Processing Units (GPUs). Our implementation uses matrix representation and operations presented in a previous work. Speci cally, an implementation of computations on ECPe systems without antiport rules is discussed.Junta de Andalucía P08-TIC-04200Ministerio de Ciencia e Innovación TIN2012-3743
    corecore