304 research outputs found

    Complying with BYOD Security Policies: A Moderation Model Based on Protection Motivation Theory

    Get PDF
    As security concerns have become critical to organizations’ Bring Your Own Device (BYOD) strategy, it is important for employees to comply with organization’s security measures and policies. Based on the protection motivation theory, this study develops a theoretical model to identify the key factors that affect an employee’s intention to comply with organization’s BYOD security policies. This model also enriches general Protection Motivation Theory (PMT) by investigating how unique BYOD features may play moderating roles on the relationships between employee’s security perceptions and compliance intention. A survey of organization employees who were using their own devices in their workplace was conducted. The research model was tested using the partial least squares (PLS) approach. The results suggest that employees’ threat appraisal and coping appraisal affect their intention to comply with BYOD security policies. Further, mixed usage of device and company surveillance visibility are verified moderators. This study contributes to both academics and management practice

    Comparison of raw and processed Radix Polygoni Multiflori (Heshouwu) by high performance liquid chromatography and mass spectrometry

    Get PDF
    <p>Abstract</p> <p>Background</p> <p><it>Radix Polygoni Multiflori </it>is the dried root tuber of <it>Polygonum multiflorum </it>Thunb. (Fam. Polygonaceae). According to Chinese medicine theory, raw (R-RPM) and processed (P-RPM) <it>Radix Polygoni Multiflori </it>possess different properties. The present study investigates the differences in chemistry between raw and processed <it>Radix Polygoni Multiflori</it>.</p> <p>Methods</p> <p>Five pairs of R-RPM and P-RPM as well as 15 commercial decoction pieces were analyzed with high performance liquid chromatography (HPLC) and mass spectrometry (MS).</p> <p>Results</p> <p>Two anthraquinones, namely emodin-8-<it>O</it>-(6'-<it>O</it>-malonyl)-glucoside and physcion-8-<it>O</it>-(6'-<it>O</it>-malonyl)-glucoside disappeared or decreased significantly and 2,3,5,4'-tetrahydroxystilbene-2-<it>O</it>-<it>β</it>-<it>D</it>-glucopyranoside, emodin-8-<it>O</it>-<it>β</it>-<it>D</it>-glucopyranoside and physcion-8-<it>O</it>-<it>β</it>-<it>D</it>-glucopyranoside decreased after the R-RPM samples being processed. On the other hand, the contents of emodin and physcion generally increased after processing.</p> <p>Conclusion</p> <p>The present study indicates that processing <it>Radix Polygoni Multiflori </it>may change the contents and types of chemicals in it. These changes are probably responsible for the various pharmacological effects of R-RPM and P-RPM as well as hepatotoxicity.</p

    A Review of Information Systems Security Management: An Integrated Framework

    Get PDF
    As information has been a basic commodity and strategic asset, information systems (IS) security has become increasingly important to organizations. This paper conducts a review on the prior literature that has studied non-technical factors of IS security issues from organizational perspective rather than individual level. Five key concepts are studied: IS security management, organizational factors, human factors, strategic planning, and IS security policies. By integrating the main concepts that are reflected in the literature, this paper proposes an integrated framework which provides a comprehensive look at effective IS security management. Four propositions are developed. This framework is intended to provide guidance for organizations and security practitioners that need to implement their IS security management effectively

    Complying with BYOD Security Policies: A Moderation Model

    Get PDF
    Based on the protection motivation theory, this study develops a theoretical model to identify the key factors that affect employee’s intention to comply with organization’s BYOD security policies. This model also enriches general PMT by investigating how unique BYOD features may play moderating roles on the relationships between employee’s security perceptions and compliance intention. A survey on organization employees who were applying BYOD in their workplace was conducted. The research model was tested using the partial least squares (PLS) approach. The results suggest that employees’ threat appraisal and coping appraisal affect their intention to comply with BYOD security policies. Further, mixed usage of device and company’s surveillance visibility are verified moderators. This study contributes to both academics and management practice

    Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications

    Get PDF
    Artificial Intelligence (AI) technologies such as machine learning (ML), natural language processing (NLP), and image recognition, are being incorporated into a wide variety of applications. These AI-enabled applications (AIapps) promise to reshape people's lives. However, despite the proliferation of AI-related research, very little research has focused on how AIapps' unique characteristics affect an individual's adoption behavior. This study examines factors influencing an individual's intention to use AIapps with a proposed research model based on the Task-Technology Fit (TTF) as the underlying theoretical framework. The research model is empirically evaluated using the survey data and SEM method. Theoretically, this study focuses on how the unique characteristics of AIapps influence the task-technology fit and drive the intention of use. The findings are expected to help AIapp developers to evaluate the relative importance of AIapp features which can provide insights into the technology characteristics and identify priorities for further research and development

    Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World

    Full text link
    The widespread use of face recognition technology has given rise to privacy concerns, as many individuals are worried about the collection and utilization of their facial data. To address these concerns, researchers are actively exploring the concept of ``unlearnable examples", by adding imperceptible perturbation to data in the model training stage, which aims to prevent the model from learning discriminate features of the target face. However, current methods are inefficient and cannot guarantee transferability and robustness at the same time, causing impracticality in the real world. To remedy it, we propose a novel method called Segue: Side-information guided generative unlearnable examples. Specifically, we leverage a once-trained multiple-used model to generate the desired perturbation rather than the time-consuming gradient-based method. To improve transferability, we introduce side information such as true labels and pseudo labels, which are inherently consistent across different scenarios. For robustness enhancement, a distortion layer is integrated into the training pipeline. Extensive experiments demonstrate that the proposed Segue is much faster than previous methods (1000×\times) and achieves transferable effectiveness across different datasets and model architectures. Furthermore, it can resist JPEG compression, adversarial training, and some standard data augmentations

    Isolation of anticancer constituents from flos genkwa (Daphne genkwa Sieb.et Zucc.) through bioassay-guided procedures

    Get PDF
    BACKGROUND: Flos Genkwa (yuanhua in Chinese), the dried flower buds of Daphne genkwa Sieb.et Zucc. (Thymelaeaceae), is a traditional Chinese medicinal herb mainly used for diuretic, antitussive, expectorant, and anticancer effects. However, systematic and comprehensive studies on Flos Genkwa and its bioactivity are limited. RESULTS: After confirmation of the anti-tumor activity, the 95% ethanolic extract was subjected to successive solvent partitioning to petroleum ether, dichloromethane, n-butanol, and water soluble fractions. Each fraction was tested using the same biological activity model, and the dichloromethane fraction had the highest activity. The dichloromethane fraction was subjected to further chromatographic separation for the isolation of compounds 1–13. Among the 13 compounds, the diterpene esters (compounds 10–13) showed anticancer activity, whereas the flavonoids, lignanoids, and peptides showed moderate activity. Compound 13 was a new daphnane diterpenoid, which was named genkwanin VIII. The preliminary antitumor mechanism of yuanhuacine was studied by protein expression and cell cycle analysis in MCF-7 cancer cells. CONCLUSION: The present investigation tends to support the traditional use of Flos Genkwa for treating cancer. Through bioassay-guided fractionation and isolation techniques, the CH(2)Cl(2) fraction was determined as the active fraction of the flower buds of D. genkwa, and the anti-tumor activity was ascribable to the compounds 10–13

    Comparison of the Immunoregulatory Function of Different Constituents in Radix Astragali and Radix Hedysari

    Get PDF
    Radix Astragali (RA), known as “Huangqi” in China, is one of the most popular herbal medicines known worldwide to reinforce “Qi”. RA is traditionally prepared from the dried roots of Astragalus membranaceus (MJHQ) and A. membranaceus var. mongholicus (MGHQ). Radix Hedysari is named “Hongqi” (HQ), which is similar to RA. We assessed and compared the chemical constituents and bioactivity of RA and HQ. Different constituents were extracted into five major parts and were analyzed using different methods. Comparison of the immunological effects of extracts was done by using two immunological models. Results showed that flavonoids and saponins present in RA and HQ were not only structurally significantly different but also different in their immunological effect. Amino acids extract (AE) in MGHQ shows immunological effect while AE in MJHQ and HQ did not. Polysaccharides comprised the major constituents in RA and HQ. All polysaccharides extract (PE) of the three herbs showed similar levels of immunological effect in both immunological assays
    corecore