Search results
21 – 30 of over 17000Recently, with the rapid development of network, communications and computer technology, privacy preserving data mining (PPDM) has become an increasingly important research in the…
Abstract
Recently, with the rapid development of network, communications and computer technology, privacy preserving data mining (PPDM) has become an increasingly important research in the field of data mining. In distributed environment, how to protect data privacy while doing data mining jobs from a large number of distributed data is more far-researching. This paper describes current research of PPDM at home and abroad. Then it puts emphasis on classifying the typical uses and algorithms of PPDM in distributed environment, and summarizing their advantages and disadvantages. Furthermore, it points out the future research directions in the field.
Details
Keywords
Aims to investigate and analyse the extent to which individual privacy is being protected by recent legislation in the UK – in particular, the Data Protection Act (DPA) 1998 and…
Abstract
Aims to investigate and analyse the extent to which individual privacy is being protected by recent legislation in the UK – in particular, the Data Protection Act (DPA) 1998 and the Human Rights Act (HRA) 1998. Employees are monitored for compliance with the law, company policy and morality reasons. The HRA 1998 introduced a legal right to privacy. The DPA 1998 included manually processed data in addition to the computerised records covered by previous legislation. Such change poses considerable challenges to organisations. Information concerning employees can be excessive, inaccurate and kept for longer than necessary. It can also be insecure – for example, being held in unprotected directories. Investigates the legal challenge facing public organisations. Assesses the level of awareness and informed opinion of the recent information privacy legislation within such organisations. Refers to PhD fieldwork, and to the implications of the changes for libraries. Finally, draws conclusions about the advisability of good practice models.
Details
Keywords
As the set of people using computers becomes larger and less cohesive, it is becoming important to educate users about their ethical responsibilities. Design of an effective…
Abstract
As the set of people using computers becomes larger and less cohesive, it is becoming important to educate users about their ethical responsibilities. Design of an effective campus computer ethics policy requires awareness of numerous cultural, technical and legal issues. Especially important are the cultural splits between power users and utilitarian users, and between “old world” and “new world” philosophies of computer ethics. Discusses those issues and presents the University of Georgia’s ethics policy as a model to aid those developing similar policies at other institutions.
Details
Keywords
Reviews the findings of the Audit Commission′s fifth triennialreport on computer fraud and abuse, published in October 1994. Thisshows that, while computer fraud and abuse is a…
Abstract
Reviews the findings of the Audit Commission′s fifth triennial report on computer fraud and abuse, published in October 1994. This shows that, while computer fraud and abuse is a growth industry, many organizations do not seem to take computer security seriously. Also considers a survey conducted by an undergraduate of Leeds Metropolitan University. This reached broadly similar conclusions. Many organizations do not have basic computer security procedures in place. Simple matters such as proper management of passwords and virus checking are often neglected. Management should ensure basic procedures are in place. These low‐cost procedures can do much to reduce the incidence of computer fraud and thereby avoid the associated cost and inconvenience.
Details
Keywords
Hosea Ofe, Harm Minnema and Mark de Reuver
This paper aims to propose a framework for how privacy-preserving technologies (PETs) create business value for organizations. The framework was developed by examining the…
Abstract
Purpose
This paper aims to propose a framework for how privacy-preserving technologies (PETs) create business value for organizations. The framework was developed by examining the literature on privacy and information technology’s impact (symbolic and function). The authors evaluate the framework’s applicability using multiparty computation (MPC) as an instance of PETs, with expert interviews in the telecommunication industry.
Design/methodology/approach
In an illustrative case of four telecommunication companies, the authors conducted semi-structured interviews with experts and used MPC as an instance of PET.
Findings
The evaluation of the framework indicates that PETs create business value for organizations: enhancing customer interactions, sales, personalized services, predicting market trends and collaboration among organizations. The findings show that business value of PETs is mainly driven by consumers and organizations willing to share data and collaborate.
Research limitations/implications
This study was limited to the telecom sector and focused on MPC as an instance of PET. Further studies should be conducted to explore the benefits of other PETs and MPC. Future research could find out if this framework is also helpful for implementing other PETs or even other types of technology. The authors’ framework provides factors that future studies can use to quantify the impact of PETs. The authors hope that this framework provides an overarching reference for organizations considering the adoption of PETs.
Practical implications
The authors’ findings inform managers in exploring the business value of PETs for organizations. This study also provides insights into which costs and risks to consider when implementing PETs.
Originality/value
This study is one of the few to propose a framework on how PETs create business value for organizations. Future research can use factors in the framework (e.g. customer interactions, sales, personalized services and market trend prediction) to conduct a quantitative study on PETs’ business value. Managers adopting PETs can use the framework to identify areas where PETs impact their organization.
Details
Keywords
Simon N. Foley and Vivien Rooney
In this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person’s feelings and needs provides a means to elicit…
Abstract
Purpose
In this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person’s feelings and needs provides a means to elicit their security needs.
Design/methodology/approach
Recognizing that the codes uncovered during a grounded theory analysis of semi-structured interview data can be interpreted as policy attributes, the paper develops a grounded theory-based methodology that can be extended to elicit attribute-based access control style policies. In this methodology, user-participants are interviewed and machine learning is used to build a Bayesian network-based policy from the subsequent (grounded theory) analysis of the interview data.
Findings
Using a running example – based on a social psychology research study centered around photograph sharing – the paper demonstrates that in principle, qualitative research techniques can be used in a systematic manner to elicit security policy requirements.
Originality/value
While in principle qualitative research techniques can be used to elicit user requirements, the originality of this paper is a systematic methodology and its mapping into what is actionable, that is, providing a means to generate a machine-interpretable security policy at the end of the elicitation process.
Details
Keywords
Gen‐Yih Liao and Jing‐Jang Hwang
Describes a novel Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Distrust in remote auctioneers…
Abstract
Describes a novel Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Distrust in remote auctioneers prevents bidders from participating in Internet auctioning. According to proposed survey reports, this study presents four characteristics that render the Internet untrustworthy for bidders. These intrinsic properties suggest that auction sites not only follow auction policies, but provide customers with evidence validating that the policies are applied fairly. Evidence of verifiable fairness provides bidders with a basis for confidence in Internet auctions. Cryptographic techniques are also applied herein to establish a novel auction model with evidence to manifest and verify every step of the auctioneer. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed.
Details
Keywords
Managers responsible for personal data held on computer need to beaware of and comply with the terms of the Data Protection Act 1984.Registration and compliance with the eight…
Abstract
Managers responsible for personal data held on computer need to be aware of and comply with the terms of the Data Protection Act 1984. Registration and compliance with the eight data protection principles are essential requirements. The role of the Registrar in ensuring enforcement of the Act is described and examples of the kinds of cases brought to the Registrar′s attention are given. The changes which could be made to the Data Protection Act to improve it for the future are also discussed.
Details
Keywords
Yousef Elsheikh, Andrea Cullen and Dave Hobbs
The purpose of this paper is to examine the challenges encountered in e‐government implementation, as well as the potential opportunities available in the context of Jordanian…
Abstract
Purpose
The purpose of this paper is to examine the challenges encountered in e‐government implementation, as well as the potential opportunities available in the context of Jordanian society.
Design/methodology/approach
A detailed examination and analysis of Jordan's published e‐government vision and strategy is presented, together with a review of other relevant literature.
Findings
The findings and implications of this study reveal Jordan is still lagging behind in utilising information and communication technologies for delivering government services online.
Practical implications
An understanding of the current status of e‐government in Jordan can help policy makers in the country pursue development of the public sector organisations on the one hand, and would be of importance for Jordan's economic future success on the other.
Originality/value
This is believed to be the most up‐to‐date and comprehensive analysis of Jordan's plans and assessment of its level of readiness for delivery of e‐government services.
Details
Keywords
Mohamed Alsudairi and Yogesh K. Dwivedi
In recent years a large number of studies have appeared on information systems (IS)/information technology (IT) outsourcing related issues but scattered in a number of distantly…
Abstract
Purpose
In recent years a large number of studies have appeared on information systems (IS)/information technology (IT) outsourcing related issues but scattered in a number of distantly related publishing outlets which may hamper the use of such published resources and repetition of research conducted by various researchers. The purpose of this paper is to conduct a systematic survey of the literature pertaining to research on IS/IT outsourcing.
Design/methodology/approach
The research aim was accomplished by extracting information on a number of relevant variables by conducting a review of 315 articles on IS/IT outsourcing published between 1992 and 2008.
Findings
The analysis is presented by listing and illustrating subject category, journals, year of publications and country, frequently published authors, productive institutions, the trend of collaborative nature (co‐author analysis) of research, the impact/influence of published research; topics/research issues and utilised methods, and the challenges and limitations of existing research.
Practical implications
Results of this research may have implications for both private and public sector organizations interested in outsourcing IS/IT services and applications, and various stakeholders of academic publishing (namely, researchers, journal editors, reviewers and universities) research on IS/IT outsourcing.
Originality/value
The primary value of this paper lies in extending the understanding of evolution and patterns of outsourcing research.
Details