Search results for "privacy"
showing 10 items of 402 documents
2020
Current debates on online privacy are rooted in liberal theory. Accordingly, privacy is often regarded as a form of freedom from social, economic, and institutional influences. Such a negative perspective on privacy, however, focuses too much on how individuals can be protected or can protect themselves, instead of challenging the necessity of protection itself. In this article, I argue that increasing online privacy literacy not only empowers individuals to achieve (a necessarily limited) form of negative privacy, but has the potential to facilitate a privacy deliberation process in which individuals become agents of social change that could lead to conditions of positive privacy and infor…
e-Shop Visitors’ Burstiness as a Predictor of Performance - The Case of eBay
2017
Towards Risk-aware Access Control Framework for Healthcare Information Sharing
2018
Security, Reliability and Usability of mHealth Environments
2015
Mobile technologies confer mobility and autonomy on patients with the advantage of access to home care and health care services on demand. However, these benefits impose challenges to the future health care services. For instance, computation capacity of a conventional smartphone provides applications and services with sufficient power of calculation and automation to assist in daily life activities and medical purposes. Combined with a user-friendly interface, mobile technologies can be an easy and efficient manner to help people who are in a condition of cognitive deterioration or have a chronic disease which demands a close connection to near family members and/or to health care services.
Consumer Information Systems as Services
2015
Consumer Information Systems (CIS) are a new type of Information System that provides services to consumers, such as Internet-based television, instead of addressing users in traditional organizational settings. Services typically involve a trade-off between achieving high service productivity and quality. The use of service mass customization to successfully address these issues of both productivity and quality in a service context is proposed. The authors suggest that the development of Consumer Information Systems as Services (CISaS) may achieve such service mass customization. This chapter presents a conceptual framework and investigates how it applies to an emerging field of Internet P…
Accesible co-creation tools for people with intellectual disabilities: working for and with end-users
2019
In a world defined by rapid change, the search for solutions to societal challenges has become more complex calling for new paradigms of innovation focused on collaborations with the community and users. Co-creation approaches in the design and production of a service or product can bring low-cost innovation and unique and personalized customer experiences leading to user acceptance of a product or service. Under a co-creation perspective, the participatory approach developed in the MINDInclusion project aims to improve the inclusion of people with intellectual disabilities into public places and society by using a co-created online tool based on people with disabilities’ personal experienc…
The new world of human genetic technologies: The policy environment and impacts of genetic screening tests
1995
Today it is possible to screen for mutated DNA sequences which do not induce any diseases but predispose to develop diseases under certain environmental condition. These latter disorders are called “multifactorial” since they result from the interplay of genetic and environmental factors. Among multifactorial disorders there are job-related diseases whose genetic component can be identified by genetic screening tests. The use of these tests to predict occupational disorders, to cut down on them, and to save costs—in particular for absenteeism, health care, and lawsuits—is of interest to employers and insurers. As for employees, it could entail an extremely deep invasion of privacy, economic…
Processing privacy information and decision-making for smartphone apps among young German smartphone users
2018
While privacy behaviour is generally equated with self-disclosure, other forms of behaviour that potentially infringe an individual’s privacy, such as downloading an app, are being neglected by research. We seek to fill this gap by modelling app decision-making within a dual-process model of the attitude–behaviour relationship and the role of privacy attitudes in two kinds of information processing: (1) spontaneous, heuristic processes that rely on automated attitude activation and (2) elaborate, cognitive processes that rely on behavioural intentions to guide behaviour. We used a quasi-experimental design to investigate app decision-making processes for N = 89 participants in N = 254 decis…
What Is a ‘Digital Family’?
2019
This chapter introduces the concept of the digital family. Digital families are one form of distributed extended families, consisting of related individuals living in one or more households who utilize at least basic level information and communication technologies and social media applications to stay connected and maintain a sense of unity. The strengths and limitations of the notion are discussed, assessing its usefulness vis-a-vis neighbouring concepts. The chapter ends with the discussion of the perception of family in the three countries studied, Finland, Italy and Slovenia, and of the differences found between them.
Dynamic Modeling of the Cyber Security Threat Problem
2009
This chapter discusses the possible growth of black markets (BMs) for software vulnerabilities and factors affecting their spread. It is difficult to collect statistics about BMs for vulnerabilities and their associated transactions, as they are hidden from general view. We conduct a disguised observation of online BM trading sites to identify causal models of the ongoing viability of BMs. Our observation results are expressed as a system dynamic model. We implement simulations to observe the effects of possible actions to disrupt BMs. The results suggest that without interventions the number and size of BMs is likely to increase. A simulation scenario with a policy to halt BM operations re…