Search results

21 – 30 of over 17000
Article
Publication date: 3 June 2014

Binli Wang and Yanguang Shen

Recently, with the rapid development of network, communications and computer technology, privacy preserving data mining (PPDM) has become an increasingly important research in the…

299

Abstract

Recently, with the rapid development of network, communications and computer technology, privacy preserving data mining (PPDM) has become an increasingly important research in the field of data mining. In distributed environment, how to protect data privacy while doing data mining jobs from a large number of distributed data is more far-researching. This paper describes current research of PPDM at home and abroad. Then it puts emphasis on classifying the typical uses and algorithms of PPDM in distributed environment, and summarizing their advantages and disadvantages. Furthermore, it points out the future research directions in the field.

Details

World Journal of Engineering, vol. 11 no. 2
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 1 December 2002

Adam Warren

Aims to investigate and analyse the extent to which individual privacy is being protected by recent legislation in the UK – in particular, the Data Protection Act (DPA) 1998 and…

5418

Abstract

Aims to investigate and analyse the extent to which individual privacy is being protected by recent legislation in the UK – in particular, the Data Protection Act (DPA) 1998 and the Human Rights Act (HRA) 1998. Employees are monitored for compliance with the law, company policy and morality reasons. The HRA 1998 introduced a legal right to privacy. The DPA 1998 included manually processed data in addition to the computerised records covered by previous legislation. Such change poses considerable challenges to organisations. Information concerning employees can be excessive, inaccurate and kept for longer than necessary. It can also be insecure – for example, being held in unprotected directories. Investigates the legal challenge facing public organisations. Assesses the level of awareness and informed opinion of the recent information privacy legislation within such organisations. Refers to PhD fieldwork, and to the implications of the changes for libraries. Finally, draws conclusions about the advisability of good practice models.

Details

New Library World, vol. 103 no. 11/12
Type: Research Article
ISSN: 0307-4803

Keywords

Article
Publication date: 1 December 1995

Michael A. Covington

As the set of people using computers becomes larger and less cohesive, it is becoming important to educate users about their ethical responsibilities. Design of an effective…

1934

Abstract

As the set of people using computers becomes larger and less cohesive, it is becoming important to educate users about their ethical responsibilities. Design of an effective campus computer ethics policy requires awareness of numerous cultural, technical and legal issues. Especially important are the cultural splits between power users and utilitarian users, and between “old world” and “new world” philosophies of computer ethics. Discusses those issues and presents the University of Georgia’s ethics policy as a model to aid those developing similar policies at other institutions.

Details

Internet Research, vol. 5 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 March 1995

Alan Mills

Reviews the findings of the Audit Commission′s fifth triennialreport on computer fraud and abuse, published in October 1994. Thisshows that, while computer fraud and abuse is a…

832

Abstract

Reviews the findings of the Audit Commission′s fifth triennial report on computer fraud and abuse, published in October 1994. This shows that, while computer fraud and abuse is a growth industry, many organizations do not seem to take computer security seriously. Also considers a survey conducted by an undergraduate of Leeds Metropolitan University. This reached broadly similar conclusions. Many organizations do not have basic computer security procedures in place. Simple matters such as proper management of passwords and virus checking are often neglected. Management should ensure basic procedures are in place. These low‐cost procedures can do much to reduce the incidence of computer fraud and thereby avoid the associated cost and inconvenience.

Details

Industrial Management & Data Systems, vol. 95 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 14 October 2022

Hosea Ofe, Harm Minnema and Mark de Reuver

This paper aims to propose a framework for how privacy-preserving technologies (PETs) create business value for organizations. The framework was developed by examining the…

Abstract

Purpose

This paper aims to propose a framework for how privacy-preserving technologies (PETs) create business value for organizations. The framework was developed by examining the literature on privacy and information technology’s impact (symbolic and function). The authors evaluate the framework’s applicability using multiparty computation (MPC) as an instance of PETs, with expert interviews in the telecommunication industry.

Design/methodology/approach

In an illustrative case of four telecommunication companies, the authors conducted semi-structured interviews with experts and used MPC as an instance of PET.

Findings

The evaluation of the framework indicates that PETs create business value for organizations: enhancing customer interactions, sales, personalized services, predicting market trends and collaboration among organizations. The findings show that business value of PETs is mainly driven by consumers and organizations willing to share data and collaborate.

Research limitations/implications

This study was limited to the telecom sector and focused on MPC as an instance of PET. Further studies should be conducted to explore the benefits of other PETs and MPC. Future research could find out if this framework is also helpful for implementing other PETs or even other types of technology. The authors’ framework provides factors that future studies can use to quantify the impact of PETs. The authors hope that this framework provides an overarching reference for organizations considering the adoption of PETs.

Practical implications

The authors’ findings inform managers in exploring the business value of PETs for organizations. This study also provides insights into which costs and risks to consider when implementing PETs.

Originality/value

This study is one of the few to propose a framework on how PETs create business value for organizations. Future research can use factors in the framework (e.g. customer interactions, sales, personalized services and market trend prediction) to conduct a quantitative study on PETs’ business value. Managers adopting PETs can use the framework to identify areas where PETs impact their organization.

Details

Digital Policy, Regulation and Governance, vol. 24 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 8 October 2018

Simon N. Foley and Vivien Rooney

In this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person’s feelings and needs provides a means to elicit…

Abstract

Purpose

In this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person’s feelings and needs provides a means to elicit their security needs.

Design/methodology/approach

Recognizing that the codes uncovered during a grounded theory analysis of semi-structured interview data can be interpreted as policy attributes, the paper develops a grounded theory-based methodology that can be extended to elicit attribute-based access control style policies. In this methodology, user-participants are interviewed and machine learning is used to build a Bayesian network-based policy from the subsequent (grounded theory) analysis of the interview data.

Findings

Using a running example – based on a social psychology research study centered around photograph sharing – the paper demonstrates that in principle, qualitative research techniques can be used in a systematic manner to elicit security policy requirements.

Originality/value

While in principle qualitative research techniques can be used to elicit user requirements, the originality of this paper is a systematic methodology and its mapping into what is actionable, that is, providing a means to generate a machine-interpretable security policy at the end of the elicitation process.

Details

Information & Computer Security, vol. 26 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 May 2001

Gen‐Yih Liao and Jing‐Jang Hwang

Describes a novel Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Distrust in remote auctioneers…

Abstract

Describes a novel Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Distrust in remote auctioneers prevents bidders from participating in Internet auctioning. According to proposed survey reports, this study presents four characteristics that render the Internet untrustworthy for bidders. These intrinsic properties suggest that auction sites not only follow auction policies, but provide customers with evidence validating that the policies are applied fairly. Evidence of verifiable fairness provides bidders with a basis for confidence in Internet auctions. Cryptographic techniques are also applied herein to establish a novel auction model with evidence to manifest and verify every step of the auctioneer. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed.

Details

Internet Research, vol. 11 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 January 1990

Peter Tarrant

Managers responsible for personal data held on computer need to beaware of and comply with the terms of the Data Protection Act 1984.Registration and compliance with the eight…

Abstract

Managers responsible for personal data held on computer need to be aware of and comply with the terms of the Data Protection Act 1984. Registration and compliance with the eight data protection principles are essential requirements. The role of the Registrar in ensuring enforcement of the Act is described and examples of the kinds of cases brought to the Registrar′s attention are given. The changes which could be made to the Data Protection Act to improve it for the future are also discussed.

Details

Industrial Management & Data Systems, vol. 90 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 30 May 2008

Yousef Elsheikh, Andrea Cullen and Dave Hobbs

The purpose of this paper is to examine the challenges encountered in e‐government implementation, as well as the potential opportunities available in the context of Jordanian…

2797

Abstract

Purpose

The purpose of this paper is to examine the challenges encountered in e‐government implementation, as well as the potential opportunities available in the context of Jordanian society.

Design/methodology/approach

A detailed examination and analysis of Jordan's published e‐government vision and strategy is presented, together with a review of other relevant literature.

Findings

The findings and implications of this study reveal Jordan is still lagging behind in utilising information and communication technologies for delivering government services online.

Practical implications

An understanding of the current status of e‐government in Jordan can help policy makers in the country pursue development of the public sector organisations on the one hand, and would be of importance for Jordan's economic future success on the other.

Originality/value

This is believed to be the most up‐to‐date and comprehensive analysis of Jordan's plans and assessment of its level of readiness for delivery of e‐government services.

Details

Transforming Government: People, Process and Policy, vol. 2 no. 2
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 16 February 2010

Mohamed Alsudairi and Yogesh K. Dwivedi

In recent years a large number of studies have appeared on information systems (IS)/information technology (IT) outsourcing related issues but scattered in a number of distantly…

3367

Abstract

Purpose

In recent years a large number of studies have appeared on information systems (IS)/information technology (IT) outsourcing related issues but scattered in a number of distantly related publishing outlets which may hamper the use of such published resources and repetition of research conducted by various researchers. The purpose of this paper is to conduct a systematic survey of the literature pertaining to research on IS/IT outsourcing.

Design/methodology/approach

The research aim was accomplished by extracting information on a number of relevant variables by conducting a review of 315 articles on IS/IT outsourcing published between 1992 and 2008.

Findings

The analysis is presented by listing and illustrating subject category, journals, year of publications and country, frequently published authors, productive institutions, the trend of collaborative nature (co‐author analysis) of research, the impact/influence of published research; topics/research issues and utilised methods, and the challenges and limitations of existing research.

Practical implications

Results of this research may have implications for both private and public sector organizations interested in outsourcing IS/IT services and applications, and various stakeholders of academic publishing (namely, researchers, journal editors, reviewers and universities) research on IS/IT outsourcing.

Originality/value

The primary value of this paper lies in extending the understanding of evolution and patterns of outsourcing research.

Details

Journal of Enterprise Information Management, vol. 23 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

21 – 30 of over 17000