Search results

1 – 3 of 3
Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6197

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 10 October 2022

Emad Rahmanian

This paper aims to unify fragmented definitions of fake news and also present a comprehensive classification of the concept. Additionally, it provides an agenda for future…

3164

Abstract

Purpose

This paper aims to unify fragmented definitions of fake news and also present a comprehensive classification of the concept. Additionally, it provides an agenda for future marketing research based on the findings.

Design/methodology/approach

A review of 36 articles investigating fake news from 1990 to 2020 was done. In total, 615 papers were found, and the article pool was refined manually in two steps; first, articles were skimmed and scanned for nonrelated articles; second, the pool was refined based on the scope of the research.

Findings

The review resulted in a new definition and a collective classification of fake news. Also, the feature of each type of fake news, such as facticity, intention, harm and humor, is examined as well, and a definition for each type is presented.

Originality/value

This extensive study, to the best of the author’s knowledge, for the first time, reviews major definitions and classification on fake news.

Objetivo

Este artículo pretende unificar las definiciones fragmentadas de las noticias falsas y también presentar una clasificación exhaustiva del concepto. Además, ofrece una agenda para futuras investigaciones de marketing basada en los resultados.

Diseño

Se realizó una revisión de 36 artículos que investigaban las noticias falsas desde 1990 hasta 2020. Se encontraron 615 artículos, y el grupo de artículos se refinó manualmente en dos pasos, primero, se descremaron los artículos y se escanearon los artículos no relacionados, segundo, el grupo se refinó basado en el alcance de la investigación.

Resultados

La revisión dio como resultado una nueva definición y una clasificación colectiva de las noticias falsas. Además, se examinan las características de cada tipo de noticias falsas, como la facticidad, la intención, el daño y el humor, y se presenta una definición para cada tipo.

Originalidad

este amplio estudio revisa por primera vez las principales definiciones y la clasificación de las noticias falsas.

目的

本文旨在统一假新闻的零散定义, 并对假新闻的概念进行全面的分类。此外, 它还根据本文的研究结果为未来的营销研究提供了一个议程。

设计/方法/途径

对1990年至2020年期间调查假新闻的36篇文章进行了回顾。一共发现了615篇论文, 并分为两步对此文章库进行了人工提炼:首先, 对文章进行略读和扫描以找出非相关文章, 其次, 根据研究范围对文章库进行了提炼。

研究结果

此次审查导致了对假新闻的新定义和集体分类。此外, 还分析了假新闻的真实性、意图、危害性、幽默性等各种类型的特征, 并给出了各种类型的定义。

原创性

此项涉及广泛假新闻内容的研究首次回顾了关于假新闻的主要定义和分类。

Access

Only Open Access

Year

Content type

1 – 3 of 3