Search results for "Privacy"

showing 10 items of 402 documents

Examining the side effects of organizational Internet monitoring on employees

2020

PurposeInternet monitoring in organizations can be used to monitor risks associated with Internet usage and information systems in organizations, such as employees' cyberloafing behavior and information security incidents. Extant research has mainly discussed the effect of Internet monitoring in achieving the targeted goals (e.g. mitigating cyberloafing behavior and information security incidents), but little attention has been paid to the possible side effects of Internet monitoring. Drawing on affective events theory, the authors attempt to reveal that Internet monitoring may cause side effects on employees' Internet usage policy satisfaction, intrinsic work motivation and affective organ…

Economics and EconometricsSociology and Political ScienceInternet privacypolicy satisfactionAffective events theorykäyttöExtant taxontyöntekijätInformation systemseurantatietoturvakäyttötutkimusriskitWork motivationInternettyömotivaatiobusiness.industryCommunicationSoftware developmentInternet monitoringsitoutuminenInformation securityfield experimentaffective organizational commitmentThe InternetseurantatutkimusbusinessPsychologyInternet monitoringintrinsic work motivationInternet Research
researchProduct

Social Acceptance of a Teleoperated Android: Field Study on Elderly’s Engagement with an Embodied Communication Medium in Denmark

2012

We explored the potential of teleoperated android robots, which are embodied telecommunication media with humanlike appearances, and how they affect people in the real world when they are employed to express a telepresence and a sense of 'being there'. In Denmark, our exploratory study focused on the social aspects of Telenoid, a teleoperated android, which might facilitate communication between senior citizens and Telenoid's operator. After applying it to the elderly in their homes, we found that the elderly assumed positive attitudes toward Telenoid, and their positivity and strong attachment to its huggable minimalistic human design were cross-culturally shared in Denmark and Japan. Cont…

Embodied cognitionbusiness.industryUniversal designInternet privacyTeleoperationExploratory researchRobotAndroid (robot)Social acceptancePsychologybusinessSocial psychologyEmbodied communication
researchProduct

Control empresarial del uso de dispositivos digitales en el ámbito laboral desde la perspectiva del derecho a la protección de datos y a la intimidad

2020

Los avances tecnológicos no sólo han permitido una evolución en los procesos productivos o en la forma organizativa y de trabajar de las empresas, sino que también han posibilitado que éstas escojan nuevas formas y métodos de supervisión de la actividad laboral más invasivos, que, en ocasiones, entran en colisión con los derechos fundamentales de los trabajadores, entre ellos, el derecho a la protección de datos y el derecho a la intimidad. La vigente Ley de Protección de Datos destina algunos preceptos a regular el control y acceso por parte de la empresa a los dispositivos digitales facilitados al trabajador. El presente trabajo analiza estos preceptos y los rasgos más destacados de su ré…

Employer controlWork activityControl empresarialIntimidadPrivacyPolitical scienceProtección de datosHumanitiesData Protection
researchProduct

Paradoxical social representations of linky smart meters and privacy paradox

2021

Consumer participation to electricity consumption reduction (ECR) has become a major challenge in a context of Energy Transition. The Linky french Smart Meter, which use contributes to ECR, is confronted to many controversies reflecting the social legitimation at stake which underlies its evaluation. This article proposes to study privacy paradox regarding Linky Smart Meter use, mobilizing the conceptual background of consumer psychological empowerment. In that aim, a social representation analysis was conducted involving 271 respondents. Results highlight, on one hand, a privacy paradox involving 3 out of the 4 dimensions of psychological empowerment, and on another hand, the presence of m…

Empowerment psychologiqueEnergy consumption reductionPrivacy paradoxPsychological empowermentMaîtrise de la consommation électriqueReprésentations sociales[SHS.GESTION] Humanities and Social Sciences/Business administrationParadoxe de la vie privéeSocial representations
researchProduct

Scalable and Privacy-Preserving Admission Control for Smart Grids

2015

International audience; Energy demand and production need to be constantly matched in the power grid. The traditional paradigm to continuously adapt the production to the demand is challenged by the increasing penetration of more variable and less predictable energy sources, like solar photovoltaics and wind power. An alternative approach is the so called direct control of some inherently flexible electric loads to shape the demand. Direct control of deferrable loads presents analogies with flow admission control in telecommunication networks: a request for network resources (bandwidth or energy) can be delayed on the basis of the current network status in order to guarantee some performanc…

EngineeringControl and Optimizationlarge deviationRandom variableDistributed computingReal-time computingprivacyModeling and simulation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]PhotovoltaicsAdmission control; Home appliances; Logic gates; Power demand; Privacy; Random variables; Shape; Control and Systems Engineering; Modeling and Simulation; Control and OptimizationWind poweradmission controlSettore ING-INF/03 - Telecomunicazionibusiness.industryBandwidth (signal processing)[SPI.NRJ]Engineering Sciences [physics]/Electric powerdirect load controlShapeLogic gateSmart gridsAdmission controlHome applianceSmart gridControl and Systems EngineeringModeling and SimulationScalabilityPower demand[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC]businessEnergy source
researchProduct

Use and acceptance of new technology by older people. Findings of the international MOBILATE survey: ‘Enhancing mobility in later life’

2005

Technology has become part of today’s life. It constitutes a fundamental aspect of the environment also for older people who are not familiar with most of the new technologies. Is their use of technology based on certain abilities and is this related with such factors as income, lack of alternatives, past performance, or availability of equipment? Methods The MOBILATE 2000 database of a survey conducted in 5 European countries was aimed at the enhancement of out-of-home mobility of older people. The project offers data describing the use and acceptance of new technologies. Insight can be gained into the characteristics of users and non-users of more or less common technologies like ATM, tic…

Engineeringbusiness.industryEmerging technologiesmedia_common.quotation_subjectInternet privacyBiomedical EngineeringAdvertisingPaymentPublic transportTicketElderly peopleThe InternetGeriatrics and GerontologyComputer-mediated communicationbusinessOlder peopleGerontologymedia_commonGerontechnology
researchProduct

Hand-Held texting is less distracting than texting with the phone in a holder: anyway, don't do it

2015

We studied the effects of texting while driving and the effects of mobile phone position (hand-held, holder) on drivers' lane-keeping performance, experienced workload, and in-car glance durations in a motion-platform driving simulator with 24 participants. Overall, we found the known negative effects of texting on lane-keeping performance, workload, and visual attention on road, suggesting that texting on the road in any manner is not risk-free. As a novel finding, we found that hand-held texting led to fewer lane-keeping errors and shorter total glance times off road compared to texting with the phone in a holder. We suggest the explanation is that the drivers had considerably more experi…

Engineeringdriver distractionlane-keepingInternet privacytyömääräText messageworkloadPhoneetäisyystext messageVisual attentionin-car glance durationsdistanceInverse correlationphone positiontouch screenta113kosketusnäyttöbusiness.industryhand-heldHand heldDriving simulatorAdvertisingWorkloadholderMobile phoneComputerSystemsOrganization_MISCELLANEOUSbusiness
researchProduct

Human Security versus Human Development - Behavioristic Approach

2016

Abstract Recent terrorist attacks in Brussels, Paris and Istanbul, are shaking a world bewildered of daily fear of violence, while the contemporary consumer has to deal with the “new wars” emerging in the context of the current socio-economic and political context. The issue is especially thorny since, most of the times, the “enemy” the citizens must face is unknown, not only when it comes to terrorist attacks, but also when dealing with the question of the “enemy” in foods purchased for consumption (food security) or the security of personal data when accessing and using the Internet (cyber security). Consequently, this paper attempts to highlight the way in which the safety and security n…

EntrepreneurshipFood securityHF5001-6182Social Psychologybusiness.industryEconomics Econometrics and Finance (miscellaneous)Internet privacyAdvertisingAdversaryperceived riskhuman developmenthuman securityTerrorismSecurity through obscurityEconomicsBusiness Management and Accounting (miscellaneous)New warsBusinessThe InternetbusinessHuman securityStudies in Business and Economics
researchProduct

Eliciting Information on the Vulnerability Black Market from Interviews

2010

Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…

ExploitComputer sciencebusiness.industryInternet privacycomputer.software_genreComputer securitySoftware qualityElectronic mailComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSMalwareBlack marketbusinesscomputerZero-day attackVulnerability (computing)2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
researchProduct

Evaluating the impact of friends in predicting user’s availability in online social networks

2017

In recent years, Online Social Networks (OSNs) have changed the way people connect and interact with each other. Indeed, most people have registered an account on some popular OSNs (such as Facebook, or Google+) which is used to access the system at different times of the days, depending on their life and habits. In this context, understanding how users connect to the OSNs is of paramount importance for both the protection of their privacy and the OSN’s provider (or third-party applications) that want to exploit this information. In this paper, we study the task of predicting the availability status (online/offline) of the OSNs’ users by exploiting the availability information of their frie…

ExploitOnline Social NetworkSettore INF/01 - Informaticabusiness.industryComputer sciencePersonal behaviorInternet privacyContext (language use)Availability predictionTask (project management)Theoretical Computer ScienceWorld Wide WebComputer Sciencebusiness
researchProduct