首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 79 毫秒
1.
The COVID-19 pandemic has forced many organisations to undergo significant transformation, rethinking key elements of their business processes and use of technology to maintain operations whilst adhering to a changing landscape of guidelines and new procedures. This study offers a collective insight to many of the key issues and underlying complexities affecting organisations and society from COVID-19, through an information systems and technological perspective. The views of 12 invited subject experts are collated and analysed where each articulate their individual perspectives relating to: online learning, digital strategy, artificial intelligence, information management, social interaction, cyber security, big data, blockchain, privacy, mobile technology and strategy through the lens of the current crisis and impact on these specific areas. The expert perspectives offer timely insight to the range of topics, identifying key issues and recommendations for theory and practice.  相似文献   

2.
This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information that is leaking, where these information leakages are, as well as showing what these leakages mean. This includes adding enforcement mechanisms ensuring that operation on sensitive information is transparent and auditable. The data controller or external quality assurance organisations can then verify or certify that the security operation operates in a privacy friendly manner. The roadmap furthermore outlines how privacy-enhanced intrusion detection systems should be implemented by initially providing privacy-enhanced alarm handling and then gradually extending support for privacy enhancing operation to other areas like digital forensics, exchange of threat information and big data analytics based attack detection.  相似文献   

3.
As social distancing and lockdown orders grew more pervasive, individuals increasingly turned to social media for support, entertainment, and connection to others. We posit that global health emergencies - specifically, the COVID-19 pandemic - change how and what individuals self-disclose on social media. We argue that IS research needs to consider how privacy (self-focused) and social (other-focused) calculus have moved some issues outside in (caused by a shift in what is considered socially appropriate) and others inside out (caused by a shift in what information should be shared for the public good). We identify a series of directions for future research that hold potential for furthering our understanding of online self-disclosure and its factors during health emergencies.  相似文献   

4.
Requesting personal information in frontline service encounters raises privacy concerns among customers. The proximity contact tracing that occurred during the COVID-19 pandemic provides an intriguing context of information requests. Hospitality venues required contact tracing details from customers, and customer cooperation varied with concerns about privacy. Drawing on gossip theory, we investigate the roles of businesses’ data privacy practices and government support in driving customers’ responses to contact tracing. Our findings show that perceived transparency of a business’s privacy practices has a positive effect on customers’ commitment to the business, while perceived control exerts a negative effect on commitment. These effects are mediated by customers’ information falsification rather than disclosure, because the former is a sensitive behavioral indicator of privacy concerns. The results also reveal the moderating roles of government support. This research contributes to the customer data privacy literature by demonstrating the distinct effects of perceived transparency and control on commitment and revealing the underlying mechanism. Moreover, the research extends the conceptual understanding of privacy practices from online contexts to face-to-face contexts of frontline service. The findings offer implications for the management of customer data privacy.  相似文献   

5.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response.  相似文献   

6.
In this opinion paper, I argue that the Covid-19 pandemic, as tragic and disastrous as it undoubtedly is, has also given us a rare opportunity to deeply examine the research and practice of information management in particular and information systems in general. To cope with the pandemic, we have retreated to the digital world and drastically changed the way we work. Yet these very practices can well shape the way we work in the post-pandemic world. Moreover, the pandemic is also a sharp lens through which we can study deep-rooted theoretical issues that otherwise would not have surfaced, or at least remained in the background. My call to the research community is to seize this rare opportunity.  相似文献   

7.
Various technology innovations and applications have been developed to fight the coronavirus pandemic. The pandemic also has implications for the design, development, and use of technologies. There is an urgent need for a greater understanding of what roles information systems and technology researchers can play in this global pandemic. This paper examines emerging technologies used to mitigate the threats of COVID-19 and relevant challenges related to technology design, development, and use. It also provides insights and suggestions into how information systems and technology scholars can help fight the COVID-19 pandemic. This paper helps promote future research and technology development to produce better solutions for tackling the COVID-19 pandemic and future pandemics.  相似文献   

8.
Recent research in information systems (IS) has focused on the application of social theory in general and Anthony Gidden's structuration theory in particular to help reveal how technical systems can support or hinder human interaction in societal, organizational, and personal contexts. This article examines the potential of structuration theory to facilitate an understanding of social and organizational issues that surround collaboration using new technologies.  相似文献   

9.
谢卫红  樊炳东  董策 《现代情报》2018,38(9):113-121
为了发现国内大数据产业存在的不足,本文从大数据发展顶层设计、要素供给、数据隐私与安全保护及大数据标准体系建设4个方面对国内外大数据产业政策进行比较,分析了国内外大数据产业政策的异同,最后针对性地从平衡政府数据开放和个人隐私保护政策完善、完善数据流通体系、加强人才培养、调整大数据关键技术投入重心4个方面提出建议,推动我国大数据产业有效、健康发展。  相似文献   

10.
In this study we present an autopoietic social systems model based on Collectively Prevalent Interpretants (CPIs). We adapt this model to represent and exemplify how Information and Communication Technologies (ICTs) may enable the emergence of severe moral communities. In particular, we argue that ICTs may help severe moral communities promote increasingly polarized, radicalized and even extremist viewpoints. We also discuss our propositions in the context of the current pandemic (caused by Covid19) and warn about the possible emergence of new and related severe moral communities. In an effort to help understand and manage the enabling role of ICTs, the study also presents recommendations for theory and practice, which may prove useful in advancing digital resiliency (by empowering individuals and communities to recognize when this may be occurring).  相似文献   

11.
Wearable devices introduce many new capabilities to the delivery of healthcare. But wearables also pose grave privacy risks. Furthermore, information overload gets in the way of informed consent by the patient. To better protect American patients in an increasingly digital world, the U.S. Congress passed the Health Insurance Portability and Accountability Act of 1996 (HIPAA). This article examines the adequacy of HIPAA vis-à-vis issues raised by wearable technologies in the Internet of Things environment and identifies policy gaps and factors that drive health data exposure. It presents a 2 × 2 Partnership-Identity Exposure Matrix, illustrates implications in four different contexts, and provides recommendations for improving privacy protection.  相似文献   

12.
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression towards one’s personal identity.  相似文献   

13.
黄丽佳  袁勤俭 《现代情报》2017,37(10):114-121
通过对相关文献的回顾,本文对国际网络隐私研究进行了计量分析,发现现有的研究主题集中在"基于移动位置服务的隐私问题研究"、"隐私保护算法研究"、"隐私保护技术研究"、"云计算的隐私安全研究"、"网络隐私权限控制研究"、"社交网站和电子商务中的用户隐私态度与行为研究"、"青少年敏感信息的隐私与安全保护研究"、"数据公开共享策略与国家治理研究"8个方面。研究发现当前研究中存在"利用数据纵向分析网络隐私主题随时间发展变化的研究较少"、"对于一些发展中国家的隐私问题关注度较低"、"国家的治理与业界的隐私政策相对独立缺乏联系"等问题,"大数据时代移动信息和社交信息挖掘过程中的隐私问题"、"在线医疗的隐私问题"等是未来研究值得关注的领域。  相似文献   

14.

Recent research in information systems (IS) has focused on the application of social theory in general and Anthony Gidden's structuration theory in particular to help reveal how technical systems can support or hinder human interaction in societal, organizational, and personal contexts. This article examines the potential of structuration theory to facilitate an understanding of social and organizational issues that surround collaboration using new technologies.  相似文献   

15.
数字经济背景下,人工智能(AI)技术的应用正在深入地影响着企业管理变革、业务边界的扩展和管理模式的改变。结合互补资产的观点和组织学习理论,本文提出了一个基于AI应用能力和AI管理能力的分析框架,强调人工智能与人类智慧结合的必要性,阐述了两种能力的功能和作用及其协同对企业效率和创新成本的影响。本文提出,企业必须具备管理AI的能力才能有效应对大数据、数字技术、AI的不断革新及技术带来的组织内部结构和外部环境变化以及风险;企业AI应用与管理能力的有效结合,有利于控制AI应用带来的成本和风险,增强企业在人工人力、协调沟通、和数据搜寻方面的效率,同时降低AI应用带来的数字基建、道德情感、数据安全、组织结构变革方面的成本,进而促进企业的组织学习、对内外部数字技术使能资源的获取和管理以及互补资产的形成,对企业创新绩效发挥正向作用。最后,本文为企业的数字化创新战略提供了新的发展思路。  相似文献   

16.
ABSTRACT

Higher education institutions have started using big data analytics tools. By gathering information about students as they navigate information systems, learning analytics employs techniques to understand student behaviors and to improve instructional, curricular, and support resources and learning environments. However, learning analytics presents important moral and policy issues surrounding student privacy. We argue that there are five crucial questions about student privacy that we must address in order to ensure that whatever the laudable goals and gains of learning analytics, they are commensurate with respecting students' privacy and associated rights, including (but not limited to) autonomy interests. We address information access concerns, the intrusive nature of information-gathering practices, whether or not learning analytics is justified given the potential distribution of consequences and benefits, and issues related to student autonomy. Finally, we question whether learning analytics advances the aims of higher education or runs counter to those goals.  相似文献   

17.
This article reviews the qualitative changes that big data technology introduced to society, particularly changes that affect how individuals control the access, use and retention of their personal data. In particular interest is whether the practice of privacy self-management in this new context could still ensure the informed consent of individuals to the privacy terms of big data companies. It is concluded that that accepting big data companies’ privacy policies falls short of the disclosure and understanding requirements for informed consent. The article argues that the practice of privacy self-management could remain viable if the review, understanding and acceptance of privacy agreements is streamlined, standardized and automated. Technology should be employed to counter the privacy problems created by big data technology. The creation of the privacy exchange authorities (PEA) is proposed as a solution to the failures of privacy self-management. The PEA are intermediaries that empower individuals to define their own privacy terms and express informed consent in their dealings with data companies. They will create the technological infrastructure for individuals to select their own privacy terms from a list of standard choices, potentially only once. The PEA will further mediate the delivery and authentication of the individual users’ privacy terms to data companies. A logical proof of concept is offered, illustrating the potential steps involved in the creation of the PEA.  相似文献   

18.
[目的/意义]健康信息风险和用户隐私保护是健康大数据和移动健康时代的重要议题,从信息隐私和隐私计算视角,探究移动健康管理服务使用意愿的影响因素具有重要意义。[方法/过程]本文在分析移动健康管理服务特殊性和回顾相关研究的基础上,从信息隐私和隐私计算的视角,通过模型构建、问卷调查和假设验证等实证分析过程,重点探究信息隐私等相关因素对移动健康管理服务用户行为意向的影响。[结果/结论]研究表明:显著影响移动健康管理服务使用意愿的因素有感知收益和信任;隐私顾虑对使用意愿的影响并不显著,但并不意味着用户隐私保护不重要;此外,感知隐私控制是重要的心理要素,正向影响感知收益,负向影响隐私顾虑。对移动健康管理服务商来说,应该从信息隐私保护、感知收益提升、个人隐私控制强化以及用户信任建设等方面着手,从而促进移动健康管理服务的用户使用。  相似文献   

19.
大数据、人工智能等新一代信息技术正不断渗透和改变着创业行为和结果,为新创企业发展带来机遇与挑战。目前,企业的信息技术能力对创业活动的影响研究仍处于探索阶段。本文基于创业机会理论与资源依赖理论,考察IT能力对创业绩效的影响机制,探讨创业机会识别与开发的中介作用以及数字化业务强度的调节作用。实证分析发现:IT设施运用能力、IT业务跨越能力和IT前瞻性立场等三种IT能力均有助于提升创业绩效;创业机会识别与开发在3种IT能力与创业绩效间扮演中介角色;数字化业务强度在IT能力和创业机会识别与开发间发挥正向调节作用,并进一步调节创业机会识别与开发在3种IT能力与创业绩效间的中介作用,即:数字化业务强度越高,创业机会识别与开发的中介效应越显著。本研究丰富了信息技术赋能创业的研究内容,有助于推进信息技术在创业理论与实践中的运用。  相似文献   

20.
The increased availability of social media big data has created a unique challenge for marketing decision-makers; turning this data into useful information. One of the significant areas of opportunity in digital marketing is influencer marketing, but identifying these influencers from big data sets is a continual challenge. This research illustrates how one type of influencer, the market maven, can be identified using big data. Using a mixed-method combination of both self-report survey data and publicly accessible big data, we gathered 556,150 tweets from 370 active Twitter users. We then proposed and tested a range of social-media-based metrics to identify market mavens. Findings show that market mavens (when compared to non-mavens) have more followers, post more often, have less readable posts, use more uppercase letters, use less distinct words, and use hashtags more often. These metrics are openly available from public Twitter accounts and could integrate into a broad-scale decision support system for marketing and information systems managers. These findings have the potential to improve influencer identification effectiveness and efficiency, and thus improve influencer marketing.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号