105 research outputs found

    Non-Malicious Information Exposure Through Personal Device Usage

    Get PDF
    Information technology security policies are designed explicitly to protect IT systems. However, overly restrictive information security policies may be inadvertently creating an unforeseen information risk by encouraging users to bypass protected systems in favor of personal devices, where the potential loss of organizational intellectual property is greater. Organizations that implement overly restrictive web filtering, website blocking, and other security measures to protect the integrity of their information systems are likely introducing a risk that sensitive or protected information will be processed on personal devices, outside of the organizational framework, as users identify the most efficient and effective way to accomplish work-related tasks unimpeded. Current models regarding the acceptance and use of technology, primarily TAM3 and UTAUT2, address the use of technology in organizations and by consumers, but little research has been done to identify an appropriate model to begin to understand what factors would influence users that can choose between using their own personal device and using organizational IT assets, separate and distinct from ā€œbring your own deviceā€ constructs. This research aims to bridge that divide by identifying the factors that influence users to select their own device to overcome organizational restrictions in order to accomplish their work

    SELECTION OF PRIVACY ENHANCED COMMUNICATION: AN EXTENSION OF THE UTAUT2 THEORY

    Get PDF
    In 2013, the capacity and capability of the worldā€™s intelligence agencies to monitor communications was revealed, which has resulted in an increased awareness by consumers of the potential that private communications could be monitored on a grand scale. As a result of these disclosures, consumers are more sensitive to privacy related concerns, but there is limited extant literature and models focusing on the impact the perception of privacy has on consumerā€™s selection, acceptance, and use of technology. This paper proposes a theoretical extension of the unified theory of acceptance and use of technology 2 (UTAUT2) to incorporate privacy as an individual factor influencing consumer acceptance and use of technology. The proposed UTAUT2+P theory incorporates the perception of privacy as an individual difference, along with age, gender and experience, which is hypothesized to moderate the effects of extant UTAUT2 constructs on behavioral intention and technology acceptance by consumers

    Measurement of the Luminosity in the ZEUS Experiment at HERA II

    Full text link
    The luminosity in the ZEUS detector was measured using photons from electron bremsstrahlung. In 2001 the HERA collider was upgraded for operation at higher luminosity. At the same time the luminosity-measuring system of the ZEUS experiment was modified to tackle the expected higher photon rate and synchrotron radiation. The existing lead-scintillator calorimeter was equipped with radiation hard scintillator tiles and shielded against synchrotron radiation. In addition, a magnetic spectrometer was installed to measure the luminosity independently using photons converted in the beam-pipe exit window. The redundancy provided a reliable and robust luminosity determination with a systematic uncertainty of 1.7%. The experimental setup, the techniques used for luminosity determination and the estimate of the systematic uncertainty are reported.Comment: 25 pages, 11 figure

    The ATLAS SCT grounding and shielding concept and implementation

    Get PDF
    This paper presents a complete description of Virgo, the French-Italian gravitational wave detector. The detector, built at Cascina, near Pisa (Italy), is a very large Michelson interferometer, with 3 km-long arms. In this paper, following a presentation of the physics requirements, leading to the specifications for the construction of the detector, a detailed description of all its different elements is given. These include civil engineering infrastructures, a huge ultra-high vacuum (UHV) chamber (about 6000 cubic metres), all of the optical components, including high quality mirrors and their seismic isolating suspensions, all of the electronics required to control the interferometer and for signal detection. The expected performances of these different elements are given, leading to an overall sensitivity curve as a function of the incoming gravitational wave frequency. This description represents the detector as built and used in the first data-taking runs. Improvements in different parts have been and continue to be performed, leading to better sensitivities. These will be detailed in a forthcoming paper

    Cognitive Differences in Offensive and Defensive Cyber Work Tasks

    No full text
    Offensive cyber workers are a small fraction of the overall cyber worker work force. Because of this, they have been lumped in with defensive cyber workers in existing research. This research seeks to understand offensive and defensive cyber workers and their distinct job tasks. We propose an experiment using neuroIS research techniques to examine brain activity of offensive and defensive cyber workers performing both offensive and defensive job tasks to determine the differences in cognition that takes place while performing these two roles. Implications of the research are also discussed
    • ā€¦
    corecore