47 research outputs found

    The Interaction of Virtual Reality, Blockchain, and 5G New Radio: Disrupting Business and Society

    Get PDF
    The three cutting-edge technologies virtual reality, blockchain, and 5G have increasingly attracted public attention. While virtual reality became a popular concept in the 1990s, recent technological advances and decreased costs have created a resurgence in the technology. With significant funding and early adoption, blockchain and 5G have begun to make their mark on the world. Each technology alone may disrupt business and society, but, together, they provide multiple opportunities. In this paper, we summarize a 2018 Association for Information Systems Americas Conference on Information Systems (AMCIS) panel session with IS researchers and industry practitioners that tackled important topics related to these technologies. In particular, the panel made the case for IS research that focuses on topics that emerge when these technologies intersect. Each panelist presented their perspectives based on their experience and knowledge along with current issues and future directions. This topic has significant business implications as practitioners continue to note their advancements and develop strategies to adapt in a rapidly changing environment. The topic also has implications for future research as these technologies continue to become more prevalent

    Exacerbating Mindless Compliance: The Danger of Justifications during Privacy Decision Making in the Context of Facebook Applications

    Get PDF
    Online companies exploit mindless compliance during users’ privacy decision making to avoid liability while not impairing users’ willingness to use their services. These manipulations can play against users since they subversively influence their decisions by nudging them to mindlessly comply with disclosure requests rather than enabling them to make deliberate choices. In this paper, we demonstrate the compliance-inducing effects of defaults and framing in the context of a Facebook application that nudges people to be automatically publicly tagged in their friends’ photos and/or to tag their friends in their own photos. By studying these effects in a Facebook application, we overcome a common criticism of privacy research, which often relies on hypothetical scenarios. Our results concur with previous findings on framing and default effects. Specifically, we found a reduction in privacy-preserving behaviors (i.e., a higher tagging rate in our case) in positively framed and accept-by-default decision scenarios. Moreover, we tested the effect that two types of justifications—information that implies what other people do (normative) or what the user ought to do (rationale based)— have on framing- and default-induced compliance. Existing work suggests that justifications may increase compliance in a positive (agree-by-) default scenario even when the justification does not relate to the decision. In this study, we expand this finding and show that even a justification that is opposite to the default action (e.g., a justification suggesting that one should not use the application) can increase mindless compliance with the default. Thus, when companies abide by policy makers’ requirements to obtain informed user consent through explaining the privacy settings, they will paradoxically induce mindless compliance and further threaten user privacy

    Reducing Default and Framing Effects in Privacy Decision-Making

    Get PDF
    Framing and default effects have been studied for more than a decade in different disciplines. A common criticism of these studies is that they use hypothetical scenarios. In this study, we developed a real decision environment: a Facebook application in which users had to decide whether or not they wanted to be automatically publicly tagged in their friends’ pictures and/or tag their friends in their own pictures. To ensure ecological validity, participants had to log in to their Facebook account. Our results confirmed previous studies indicating a higher tagging rate in positively framed and accept-by-default conditions. Furthermore, we introduced a manipulation that we assumed would overshadow and thereby reduce the effects of default and framing: a justification highlighting a positive or negative descriptive social norm or giving a rationale for or against tagging. We found that such justifications may at times increase tagging rates

    Turbulence-induced cloud voids: observation and interpretation

    Get PDF
    The phenomenon of “cloud voids”, i.e., elongated volumes inside a cloud that are devoid of droplets, was observed with laser sheet photography in clouds at a mountain-top station. Two experimental cases, similar in turbulence conditions yet with diverse droplet size distributions and cloud void prevalence, are reported. A theoretical explanation is proposed based on the study of heavy inertial sedimenting particles inside a Burgers vortex. A general conclusion regarding void appearance is drawn from theoretical analysis. Numerical simulations of polydisperse droplet motion with realistic vortex parameters and Mie scattering visual effects accounted for can explain the presence of voids with sizes similar to that of the observed ones. Clustering and segregation effects in a vortex tube are discussed for reasonable cloud conditions

    Turbulence induced cloud voids: Observation and interpretation

    Get PDF
    The phenomenon of cloud voids, i.e., elongated volumes inside a cloud that are devoid of droplets, was observed with laser sheet photography in clouds at a mountain-top station. Two experimental cases, similar in turbulence conditions yet with diverse droplet size distributions and cloud void prevalence, are reported. A theoretical explanation is proposed based on the study of heavy inertial sedimenting particles inside a Burgers vortex. A general conclusion regarding void appearance is drawn from theoretical analysis. Numerical simulations of polydisperse droplet motion with realistic vortex parameters and Mie scattering visual effects accounted for can explain the presence of voids with sizes similar to that of the observed ones. Preferential concentration and sorting effects in a vortex tube are discussed for reasonable cloud conditions

    Turbulence-induced cloud voids: observation and interpretation

    Get PDF
    The phenomenon of cloud voids, i.e., elongated volumes inside a cloud that are devoid of droplets, was observed with laser sheet photography in clouds at a mountain-top station. Two experimental cases, similar in turbulence conditions yet with diverse droplet size distributions and cloud void prevalence, are reported. A theoretical explanation is proposed based on the study of heavy inertial sedimenting particles inside a Burgers vortex. A general conclusion regarding void appearance is drawn from theoretical analysis. Numerical simulations of polydisperse droplet motion with realistic vortex parameters and Mie scattering visual effects accounted for can explain the presence of voids with sizes similar to that of the observed ones. Clustering and segregation effects in a vortex tube are discussed for reasonable cloud conditions.</p

    Preparing construction supply chains for blockchain technology:An investigation of its potential and future directions

    Get PDF
    Blockchain, a peer-to-peer, controlled, distributed database structure, has the potential to profoundly affect current business transactions in the construction industry through smart contracts, cryptocurrencies, and reliable asset tracking. The construction industry is often criticized for being slow in embracing emerging technologies and not effectively diffusing them through its supply chains. Often, the extensive fragmentation, traditional procurement structures, destructive competition, lack of collaboration and transparency, low-profit margins, and human resources are shown as the main culprits for this. As blockchain technology makes its presence felt strongly in many other industries like finance and banking, this study investigates the preparation of construction supply chains for blockchain technology through an explorative analysis. Empirical data for the study were collected through semistructured interviews with 17 subject experts. Alongside presenting a strengths, weaknesses, opportunities, and threats analysis (SWOT), the study exhibits the requirements for and steps toward a construction supply structure facilitated by blockchain technology
    corecore