Search results

1 – 10 of 288
Article
Publication date: 22 June 2021

Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das and L. Jean Camp

The purpose of this paper is to propose practical and usable interactions that will allow more informed, risk-aware comparisons for individuals during app selections. The authors…

Abstract

Purpose

The purpose of this paper is to propose practical and usable interactions that will allow more informed, risk-aware comparisons for individuals during app selections. The authors include an explicit argument for the role of human decision-making during app selection and close with a discussion of the strengths of a Bayesian approach to evaluating privacy and security interventions.

Design/methodology/approach

The authors focused on the risk communication in mobile marketplace’s realm, examining how risk indicators can help people choose more secure and privacy-preserving apps. Combining canonical findings in risk perception with previous work in usable security, the authors designed indicators for each app to enable decisions that prioritize risk avoidance. Specifically, the authors performed a natural experiment with N = 60 participants, where they asked them to select applications on Android tablets with accurate real-time marketplace data.

Findings

In the aggregate, the authors found that app selections changed to be more risk-averse in the presence of a user-centered multi-level warning system using visual indicators that enabled a click-thru to the more detailed risk and permissions information.

Originality/value

Privacy research in the laboratory is often in conflict with privacy decision-making in the marketplace, resulting in a privacy paradox. To better understand this, the authors implemented a research design based on clinical experimental approaches, testing the interaction in a noisy, confounded field environment.

Details

Information & Computer Security, vol. 29 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 June 2020

Karen Renaud

Abstract

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Open Access
Article
Publication date: 11 December 2023

Andy Nguyen, Joni Lämsä, Adinda Dwiarie and Sanna Järvelä

Self-regulated learning (SRL) is crucial for successful learning and lifelong learning in today’s rapidly changing world, yet research has shown that many learners need support…

1734

Abstract

Purpose

Self-regulated learning (SRL) is crucial for successful learning and lifelong learning in today’s rapidly changing world, yet research has shown that many learners need support for SRL. Recently, learning analytics has offered exciting opportunities for better understanding and supporting SRL. However, substantial endeavors are still needed not only to detect learners’ SRL processes but also to incorporate human values, individual needs and goals into the design and development of self-regulated learning analytics (SRLA). This paper aims to examine the challenges that lifelong learners faced in SRL, their needs and desirable features for SRLA.

Design/methodology/approach

This study triangulated data collected from three groups of educational stakeholders: focus group discussions with lifelong learners (n = 27); five teacher interviews and four expert evaluations. The groups of two or three learners discussed perceived challenges, support needs and willing-to-share data contextualized in each phase of SRL.

Findings

Lifelong learners in professional development programs face challenges in managing their learning time and motivation, and support for time management and motivation can improve their SRL. This paper proposed and evaluated a set of design principles for SRLA.

Originality/value

This paper presents a novel approach for theory-driven participatory design with multistakeholders that involves integrating learners, teachers and experts’ perspectives for designing SRLA. The results of the study will answer the questions of how learners’ voices can be integrated into the design process of SRLA and offer a set the design principles for the future development of SRLA.

Details

Information and Learning Sciences, vol. 125 no. 1/2
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 9 October 2017

Jeremiah D. Still, Ashley Cain and David Schuster

Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been…

Abstract

Purpose

Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been developed. This paper aims to present and explain a list of human-centered guidelines for developing usable authentication schemes.

Design/methodology/approach

The guidelines stem from research findings within the fields of psychology, human–computer interaction and information/computer science.

Findings

Instead of viewing users as the inevitable weak point in the authentication process, this study proposes that authentication interfaces be designed to take advantage of users’ natural abilities. This approach requires that one understands how interactions with authentication interfaces can be improved and what human capabilities can be exploited. A list of six guidelines that designers ought to consider when developing a new usable authentication scheme has been presented.

Research limitations/implications

This consolidated list of usable authentication guidelines provides system developers with immediate access to common design issues impacting usability. These guidelines ought to assist designers in producing more secure products in fewer costly development cycles.

Originality/value

Cybersecurity research and development has mainly focused on technical solutions to increase security. However, the greatest weakness of many systems is the user. It is argued that authentication schemes with poor usability are inherently insecure, as users will inadvertently weaken the security in their efforts to use the system. The study proposes that designers need to consider the human factors that impact end-user behavior. Development from this perspective will address the greatest weakness in most security systems by increasing end-user compliance.

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 9 October 2019

Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…

4247

Abstract

Purpose

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.

Design/methodology/approach

A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.

Findings

Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.

Practical implications

Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Originality/value

The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Article
Publication date: 10 February 2022

Junaid Qadir, Mohammad Qamar Islam and Ala Al-Fuqaha

Along with the various beneficial uses of artificial intelligence (AI), there are various unsavory concomitants including the inscrutability of AI tools (and the opaqueness of…

1566

Abstract

Purpose

Along with the various beneficial uses of artificial intelligence (AI), there are various unsavory concomitants including the inscrutability of AI tools (and the opaqueness of their mechanisms), the fragility of AI models under adversarial settings, the vulnerability of AI models to bias throughout their pipeline, the high planetary cost of running large AI models and the emergence of exploitative surveillance capitalism-based economic logic built on AI technology. This study aims to document these harms of AI technology and study how these technologies and their developers and users can be made more accountable.

Design/methodology/approach

Due to the nature of the problem, a holistic, multi-pronged approach is required to understand and counter these potential harms. This paper identifies the rationale for urgently focusing on human-centered AI and provide an outlook of promising directions including technical proposals.

Findings

AI has the potential to benefit the entire society, but there remains an increased risk for vulnerable segments of society. This paper provides a general survey of the various approaches proposed in the literature to make AI technology more accountable. This paper reports that the development of ethical accountable AI design requires the confluence and collaboration of many fields (ethical, philosophical, legal, political and technical) and that lack of diversity is a problem plaguing the state of the art in AI.

Originality/value

This paper provides a timely synthesis of the various technosocial proposals in the literature spanning technical areas such as interpretable and explainable AI; algorithmic auditability; as well as policy-making challenges and efforts that can operationalize ethical AI and help in making AI accountable. This paper also identifies and shares promising future directions of research.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 24 April 2020

Lia Patrício, Daniela Sangiorgi, Dominik Mahr, Martina Čaić, Saleh Kalantari and Sue Sundar

This paper explores how service design can contribute to the evolution of health service systems, moving them toward people-centered, integrated and technology-enabled care; the…

5835

Abstract

Purpose

This paper explores how service design can contribute to the evolution of health service systems, moving them toward people-centered, integrated and technology-enabled care; the paper develops a research agenda to leverage service design research for healthcare transformation.

Design/methodology/approach

This conceptual study starts by analyzing healthcare challenges in terms of demographic trends and economic constraints, along with the problems of lack of people-centricity, dispersion of care and slowness in incorporating emerging technologies. Then, it examines the theoretical underpinnings of service design to develop a framework for exploring how a human-centered, transformative and service systems approach can contribute to addressing healthcare challenges, with illustrative cases of service design research in healthcare being given.

Findings

The proposed framework explores how a human-centered service design approach can leverage the potential of technology and advance healthcare systems toward people-centered care; how a transformative service design approach can go beyond explanatory research of healthcare phenomena to develop innovative solutions for healthcare change and wellbeing; and how a service systems perspective can address the complexity of healthcare systems, hence moving toward integrated care.

Originality/value

This paper systematizes and develops a framework for how service design can contribute to healthcare transformation. It identifies key healthcare application areas for future service design research and pathways for advancing service design in healthcare by using new interdisciplinary bridges, methodological developments and theoretical foundations.

Details

Journal of Service Management, vol. 31 no. 5
Type: Research Article
ISSN: 1757-5818

Keywords

Article
Publication date: 21 October 2020

Raquel Martinez-Buján, Elvira Santiago-Gómez, Carlos Diz, Jose A. Cortes-Vazquez and Montserrat Golías

This paper aims to show how the Green Campus Program has been implemented at the Faculty of Sociology of the University of A Coruña (Spain). It describes the criteria used to…

333

Abstract

Purpose

This paper aims to show how the Green Campus Program has been implemented at the Faculty of Sociology of the University of A Coruña (Spain). It describes the criteria used to create teaching sustainability actions related to community engagement to introduce education for sustainable development into college curricula.

Design/methodology/approach

Drawing on a human-centered design model approach, as well as on transformative teaching theories, this study explores the criteria used to build the Free Classroom based on a participatory model.

Findings

The authors argue that the success of this activity depends on how it relates to the theme-based specialization of the different academic degrees through which they are managed. Equally important is the creation of permanent spaces that enable the collaboration of other organizations, such as non-governmental associations and local public administrations.

Originality/value

The findings provide valuable insights into how the social dimension of sustainability in higher education institutions can be emphasized. A model of implementation of the activities is offered under which academic, political, student and community agents are coordinated to favor the change of attitudes and behaviors to strengthen SD.

Details

International Journal of Sustainability in Higher Education, vol. 21 no. 7
Type: Research Article
ISSN: 1467-6370

Keywords

Article
Publication date: 22 March 2021

Julie M. Haney and Wayne G. Lutters

Cybersecurity advocates safeguard their organizations by promoting security best practices. This paper aims to describe the skills and characteristics of successful advocates.

Abstract

Purpose

Cybersecurity advocates safeguard their organizations by promoting security best practices. This paper aims to describe the skills and characteristics of successful advocates.

Design/methodology/approach

This study involved 28 in-depth interviews of cybersecurity advocates.

Findings

Effective advocates possess not only technical acumen but also interpersonal skills, communication skills context awareness and a customer service orientation.

Practical implications

Non-technical skills are deemphasized in cybersecurity training, limiting career progression into the cybersecurity advocate role for existing security professionals and those from other disciplines. This paper suggests improvements for professional development that encourage greater security workforce diversity.

Originality/value

To the best of the authors’ knowledge, this study is the first to define and enumerate competencies for the role of cybersecurity advocate.

Details

Information & Computer Security, vol. 29 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 288