Search results

1 – 10 of over 1000
Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Content available
Book part
Publication date: 10 May 2023

Abstract

Details

Contemporary Studies of Risks in Emerging Technology, Part A
Type: Book
ISBN: 978-1-80455-563-7

Content available
Book part
Publication date: 15 May 2023

Abstract

Details

Contemporary Studies of Risks in Emerging Technology, Part B
Type: Book
ISBN: 978-1-80455-567-5

Content available
Book part
Publication date: 25 October 2023

Abstract

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Content available
Book part
Publication date: 10 December 2018

Abstract

Details

International Business in the Information and Digital Age
Type: Book
ISBN: 978-1-78756-326-1

Content available
Book part
Publication date: 1 July 2017

Peter K. Ross, Susan Ressia and Elizabeth J. Sander

Abstract

Details

Work in the 21st Century
Type: Book
ISBN: 978-1-78714-578-8

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 8 January 2021

Abstract

Details

Examining the Impact of Industry 4.0 on Academic Libraries
Type: Book
ISBN: 978-1-80043-656-5

Abstract

Details

Mastering Digital Transformation
Type: Book
ISBN: 978-1-78560-465-2

Content available
Book part
Publication date: 19 July 2022

Abstract

Details

Big Data: A Game Changer for Insurance Industry
Type: Book
ISBN: 978-1-80262-606-3

Access

Only content I have access to

Year

Content type

Book part (1580)
1 – 10 of over 1000