Search results for "Internet privacy"
showing 10 items of 223 documents
Examining the side effects of organizational Internet monitoring on employees
2020
PurposeInternet monitoring in organizations can be used to monitor risks associated with Internet usage and information systems in organizations, such as employees' cyberloafing behavior and information security incidents. Extant research has mainly discussed the effect of Internet monitoring in achieving the targeted goals (e.g. mitigating cyberloafing behavior and information security incidents), but little attention has been paid to the possible side effects of Internet monitoring. Drawing on affective events theory, the authors attempt to reveal that Internet monitoring may cause side effects on employees' Internet usage policy satisfaction, intrinsic work motivation and affective organ…
Social Acceptance of a Teleoperated Android: Field Study on Elderly’s Engagement with an Embodied Communication Medium in Denmark
2012
We explored the potential of teleoperated android robots, which are embodied telecommunication media with humanlike appearances, and how they affect people in the real world when they are employed to express a telepresence and a sense of 'being there'. In Denmark, our exploratory study focused on the social aspects of Telenoid, a teleoperated android, which might facilitate communication between senior citizens and Telenoid's operator. After applying it to the elderly in their homes, we found that the elderly assumed positive attitudes toward Telenoid, and their positivity and strong attachment to its huggable minimalistic human design were cross-culturally shared in Denmark and Japan. Cont…
Use and acceptance of new technology by older people. Findings of the international MOBILATE survey: ‘Enhancing mobility in later life’
2005
Technology has become part of today’s life. It constitutes a fundamental aspect of the environment also for older people who are not familiar with most of the new technologies. Is their use of technology based on certain abilities and is this related with such factors as income, lack of alternatives, past performance, or availability of equipment? Methods The MOBILATE 2000 database of a survey conducted in 5 European countries was aimed at the enhancement of out-of-home mobility of older people. The project offers data describing the use and acceptance of new technologies. Insight can be gained into the characteristics of users and non-users of more or less common technologies like ATM, tic…
Hand-Held texting is less distracting than texting with the phone in a holder: anyway, don't do it
2015
We studied the effects of texting while driving and the effects of mobile phone position (hand-held, holder) on drivers' lane-keeping performance, experienced workload, and in-car glance durations in a motion-platform driving simulator with 24 participants. Overall, we found the known negative effects of texting on lane-keeping performance, workload, and visual attention on road, suggesting that texting on the road in any manner is not risk-free. As a novel finding, we found that hand-held texting led to fewer lane-keeping errors and shorter total glance times off road compared to texting with the phone in a holder. We suggest the explanation is that the drivers had considerably more experi…
Human Security versus Human Development - Behavioristic Approach
2016
Abstract Recent terrorist attacks in Brussels, Paris and Istanbul, are shaking a world bewildered of daily fear of violence, while the contemporary consumer has to deal with the “new wars” emerging in the context of the current socio-economic and political context. The issue is especially thorny since, most of the times, the “enemy” the citizens must face is unknown, not only when it comes to terrorist attacks, but also when dealing with the question of the “enemy” in foods purchased for consumption (food security) or the security of personal data when accessing and using the Internet (cyber security). Consequently, this paper attempts to highlight the way in which the safety and security n…
Eliciting Information on the Vulnerability Black Market from Interviews
2010
Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…
Evaluating the impact of friends in predicting user’s availability in online social networks
2017
In recent years, Online Social Networks (OSNs) have changed the way people connect and interact with each other. Indeed, most people have registered an account on some popular OSNs (such as Facebook, or Google+) which is used to access the system at different times of the days, depending on their life and habits. In this context, understanding how users connect to the OSNs is of paramount importance for both the protection of their privacy and the OSN’s provider (or third-party applications) that want to exploit this information. In this paper, we study the task of predicting the availability status (online/offline) of the OSNs’ users by exploiting the availability information of their frie…
A Study of a Social Behavior inside the Online Black Markets
2010
Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible damage on computer-based environments. Lately, online black market sites for trading stolen goods, credentials, malware and exploit kits have been intensively examined. The market players are identifiably a group of loosely tied individuals but posses shared interests. However, their social behavior has only been discussed in a limited manner. This paper examines the arrangement of the market insiders’ social behavior that enables such forums to continue or discontinue their operation and become a meaningful threat to security. The results reveal that particular formal and informal regulations and …
An exploratory study of COVID-19 misinformation on Twitter.
2020
During the COVID-19 pandemic, social media has become a home ground for misinformation. To tackle this infodemic, scientific oversight, as well as a better understanding by practitioners in crisis management, is needed. We have conducted an exploratory study into the propagation, authors and content of misinformation on Twitter around the topic of COVID-19 in order to gain early insights. We have collected all tweets mentioned in the verdicts of fact-checked claims related to COVID-19 by over 92 professional fact-checking organisations between January and mid-July 2020 and share this corpus with the community. This resulted in 1 500 tweets relating to 1 274 false and 276 partially false cla…
Facebook’s ad hoc groups: a potential source of communicative power of networked citizens
2017
Ad hoc groups (sporadically formed on social network sites for achieving particular common objectives) have been seen as a public space for citizen participation and debate. This study focuses on Facebook’s ad hoc groups in Finland. The aim is to detect the potential of these groups to enhance networked citizens’ communicative power for raising societally important issues to public agenda and initiate changes in society. We suggest a categorization of the groups according to their missions, and present their members’ specific motivations and objectives through an online survey. Despite the general entertainment-orientation and self-referential nature of social media, the results show that a…