首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Statistics show that the number of identity theft victims in the US increased by 12% in 2009, to 11.1 million adults, while the total annual fraud amount increased by 12.5%, to $54 billion. As the e-commerce volume is increasing and various online services are becoming more popular, the number of sites to which an average Internet user subscribes is increasing rapidly. Given the limited memory capacity of human beings, an Internet user's login credentials (in the form of a combination of a user ID and a password) are usually reused over multiple accounts, which can cause significant security problems. In this study, we address the vulnerability of login credentials. First, based on a unique Internet user data set, we analyze the behavioral characteristics of login credentials usage. We find that the same login credentials are used for many more accounts and reused much more often than previously expected. Furthermore, usage patterns are found to be quite skewed. Second, building on a network perspective of login credentials usage, we suggest a vulnerability measure of an individual's login credentials and analyze the vulnerability of current Internet users. The resulting information is valuable not only to the research community but also to managers and policy makers striving to reduce security vulnerability.  相似文献   

2.
Cyberchondria is conceptualized as excessive online searches for medical information, which is typically accompanied by feelings of emotional distress or anxiety. While previous studies in this nascent area have identified various psychological predictors of cyberchondria, a relative dearth of research has explored the role of different online information sources in its development. Informed by the stimulus-organism-response (SOR) model and the literature on cyberchondria, this study proposes a theoretical framework to explain why people develop cyberchondria when seeking medical information via different online sources. Based on a three-wave panel survey (N = 654), our findings suggest that health information seeking via online search engines increases online information overload (β = 0.11, p = .02), while health information seeking via social media platforms and health-specific websites increases online information trust (β = 0.13, p = .005; β = 0.25, p < .001). Additionally, online information overload is negatively related to online information trust (β = -0.39, p < .001). Subsequently, both online information overload and online information trust trigger cyberchondria (β = 0.73, p < .001; β = 0.15, p < .001). This study can contribute to the literature by expanding and deepening our understanding of cyberchondria developmental trajectory as well as emphasizing the pivotal role of online information sources in this complicated and dynamic process.  相似文献   

3.
1 March, 2009 witnesses the solemn, spectacular and somewhat sad ending of the lunar flight of Chang'e-1. After orbiting the Moon for 494 days,the first China-made lunar orbiter, named after a beautiful fairy in Chinese mythology, culminates her perfect journey with a last dance, a controlled crash to lunar surface at 1.50°S 52.36°E at 16:13 GMT+8.  相似文献   

4.
Social networks provide individuals with diverse or redundant information depending on the network structure. Both types of information offer advantages for generating new ideas. At the same time, network structure and network content are independent. As a result, two individuals with the same network position can access diverse or redundant content from their social peers. In this study, we investigate the function of social networks in innovative endeavors given individuals’ different kinds of information accessing behavior. In accordance with previous research, we argue that individuals with a broker status access more diverse information through non-redundant network structures and develop, on average, more novel ideas. We further propose that redundancy in content complements brokers’ structural non-redundancy by providing familiar knowledge elements and therefore interpretability, while non-redundancy in both content and structure leads to information overload. Thus, we hypothesize that brokers accessing more information depth, and independently, less information breadth generate newer ideas. To test our hypotheses, we collected data from a popular online maker community containing 18,146 ideas, 19,919 profiles, and 52,663 comments. We used topic modeling (Latent Dirichlet Allocation) to extract hidden knowledge elements and social network analysis to identify brokers. In line with our hypotheses, we find that information depth (breadth) strengthens (weakens) a favorable broker position. These findings have implications for the literature on idea generation in social networks and household sector innovation.  相似文献   

5.
6.
The information revolution has fostered the rise of new ways of waging war, generally by means of cyberspace-based attacks on the infrastructures upon which modern societies increasingly depend. This new way of war is primarily disruptive, rather than destructive; and its low barriers to entry make it possible for individuals and groups (not just nation-states) easily to acquire very serious war-making capabilities. The less lethal appearance of information warfare and the possibility of cloaking the attacker's true identity put serious pressure on traditional just war doctrines that call for adherence to the principles of right purpose, duly constituted authority, and last resort. Age-old strictures about noncombatant immunity are also attenuated by the varied means of attack enabled by advanced information technologies. Therefore, the nations and societies leading the information revolution have a primary ethical obligation to constrain the circumstances under which information warfare may be used -- principally by means of a pledge of no first use of such means against noncombatants.  相似文献   

7.
8.
I describe the emergence of Floridi’s philosophy of information (PI) and information ethics (IE) against the larger backdrop of Information and Computer Ethics (ICE). Among their many strengths, PI and IE offer promising metaphysical and ethical frameworks for a global ICE that holds together globally shared norms with the irreducible differences that define local cultural and ethical traditions. I then review the major defenses and critiques of PI and IE offered by contributors to this special issue, and highlight Floridi’s responses to especially two central problems – the charge of relativism and the meaning of ?entropy’ in IE. These responses, conjoined with several elaborations of PI and IE offered here by diverse contributors, including important connections with the naturalistic philosophies of Spinoza and other major Western and Eastern figures, thus issue in an expanded and more refined version of PI and IE – one still facing important questions as well as possibilities for further development.  相似文献   

9.
Emotions are an integral component of all human activities, including human–computer interactions. This article reviews literature on the theories of emotions, methods for studying emotions, and their role in human information behaviour. It also examines current research on emotions in library and information science, information retrieval and human–computer interaction, and outlines some of the challenges and directions for future work.  相似文献   

10.
In spite of often compelling reasons for why people should seek information, they persistently engage in lower levels of it than might be expected, at times seeking no information at all. The idealized model reflecting dogged persistence, pursuing rational search strategies, until a high-quality answer is found is often assumed in the design of information systems. However, many people confronted with health problems engage in avoidance and denial, making a health care system dependent on proactivity problematic. This essay explores six conditions, the idealized model, avoidance, bewilderment, serendipity, ignorance is bliss, and indolence, that arise from low and high effort strategies when typed by good, contingent, and bad health outcomes. Since a substantial proportion of the population does not act in accordance with our assumptions, it may be time for policy makers, system designers and researchers to revisit their approaches to facilitating health-related information seeking.  相似文献   

11.
In this paper, a critique will be developed and an alternative proposed to Luciano Floridi’s approach to Information Ethics (IE). IE is a macroethical theory that is to both serve as a foundation for computer ethics and to guide our overall moral attitude towards the world. The central claims of IE are that everything that exists can be described as an information object, and that all information objects, qua information objects, have intrinsic value and are therefore deserving of moral respect. In my critique of IE, I will argue that Floridi has presented no convincing arguments that everything that exists has some minimal amount of intrinsic value. I will argue, however, that his theory could be salvaged in large part if it were modified from a value-based into a respect-based theory, according to which many (but not all) inanimate things in the world deserve moral respect, not because of intrinsic value, but because of their (potential) extrinsic, instrumental or emotional value for persons.  相似文献   

12.
The paper presents a critical appraisal of Floridi’s metaphysical foundation of information ecology. It highlights some of the issues raised by Floridi with regard to the axiological status of the objects in the “infosphere,” the moral status of artificial agents, and Floridi’s foundation of information ethics as information ecology. I further criticise the ontological conception of value as a first order category. I suggest that a weakening of Floridi’s demiurgic information ecology is needed in order not to forget the limitations of human actors and/or of their surrogates, digital agents. I plea for a rational theoretical and practical view of such agents beyond utopian reasoning with regard to their potential moral status.  相似文献   

13.
14.
There is a common problem in artificial intelligence (AI) and information security. In AI, an expert system needs to be able to justify and explain a decision to the user. In information security, experts need to be able to explain to the public why a system is secure. In both cases, an important goal of explanation is to acquire or maintain the users’ trust. In this paper, I investigate the relation between explanation and trust in the context of computing science. This analysis draws on literature study and concept analysis, using elements from system theory as well as actor-network theory. I apply the conceptual framework to both AI and information security, and show the benefit of the framework for both fields by means of examples. The main focus is on expert systems (AI) and electronic voting systems (security). Finally, I discuss consequences of the analysis for ethics in terms of (un)informed consent and dissent, and the associated division of responsibilities.  相似文献   

15.
In information retrieval (IR), the improvement of the effectiveness often sacrifices the stability of an IR system. To evaluate the stability, many risk-sensitive metrics have been proposed. Since the theoretical limitations, the current works study the effectiveness and stability separately, and have not explored the effectiveness–stability tradeoff. In this paper, we propose a Bias–Variance Tradeoff Evaluation (BV-Test) framework, based on the bias–variance decomposition of the mean squared error, to measure the overall performance (considering both effectiveness and stability) and the tradeoff between effectiveness and stability of a system. In this framework, we define generalized bias–variance metrics, based on the Cranfield-style experiment set-up where the document collection is fixed (across topics) or the set-up where document collection is a sample (per-topic). Compared with risk-sensitive evaluation methods, our work not only measures the effectiveness–stability tradeoff of a system, but also effectively tracks the source of system instability. Experiments on TREC Ad-hoc track (1993–1999) and Web track (2010–2014) show a clear effectiveness–stability tradeoff across topics and per-topic, and topic grouping and max–min normalization can effectively reduce the bias–variance tradeoff. Experimental results on TREC Session track (2010–2012) also show that the query reformulation and increase of user data are beneficial to both effectiveness and stability simultaneously.  相似文献   

16.
17.
Drawing upon elaboration likelihood model (ELM) and espoused culture, this study predicts that eWOM reader's individualism–collectivism orientation (ICO) moderates eWOM antecedent factors’ effects on the perception of information credibility. 274 data were collected from two leading electronic word-of-mouth (eWOM) forums in China, the results confirm our prediction: eWOM reader's ICO positively moderates information sidedness’ effect on the perception of information credibility, it also negatively moderates the relationships between information consistency/information rating and information credibility. These findings validate the necessity and importance to consider readers’ espoused cultural differences in eWOM context.  相似文献   

18.
Forwarding negative information on microblogs, termed reposting negative information (RNI) in this study, refers to reposting negative, non-original information publicly on microblogs, causes large-scale bad news dissemination on microblogs, which in turn has detrimental consequences for organizations and the society. However, previous research concentrated on sharing of original content (such as knowledge sharing and word-of-mouth) or focused on general information forwarding on social media without distinguishing between positive and negative information. To address this issue, this study develops a model to investigate the predictors of RNI on microblogs (negative emotions and issue involvement in this study) and explores the contingency role of personality. A scenario-based online survey was conducted to test the proposed model and hypotheses. The empirical results confirmed (1) the direct and positive effects of negative emotions and issue involvement, (2) the negative moderation effect of extraversion on the relationship between negative emotions and RNI, and (3) the positive moderation effects of conscientiousness and agreeableness on the relationship between issue involvement and RNI. The study contributes to the literature by revealing the predictors of RNI on microblogs and by investigating the contingency role of personality.  相似文献   

19.
In producing news stories, journalists depend on information obtained from sources. This paper reviews the literature on journalists’ information seeking. The 90 studies included in the review cover how journalists identify sources, interact with sources, interpret information, and manage sources. In addition to quality and accessibility, balance in the group of sources selected is an important criterion in journalists’ identification of sources. However, the importance journalists assign to balance stands in contrast to the frequent finding of bias in their source selections. In interactions with sources, the sources frequently provide ideas for new stories in addition to information for current ones. This finding shows how multiple instances of information seeking coexist and combine into a mesh of intersecting information-seeking processes. In interpreting information, journalists are acutely aware that sources may have an agenda or be misinformed. While journalists praise information checking, they regularly bypass it or replace direct checks for information quality with indirect checks, such as whether the source appears trustworthy. In managing sources, journalists engage in boundary work to regulate their relationship with sources. They also cultivate long-term relationships with selected sources. The review findings are discussed with respect to how journalism shapes journalists’ information seeking and what implications the findings have for information-behavior research in other domains.  相似文献   

20.
Smart cities employ information and communication technologies to improve: the quality of life for its citizens, the local economy, transport, traffic management, environment, and interaction with government. Due to the relevance of smart cities (also referred using other related terms such as Digital City, Information City, Intelligent City, Knowledge-based City, Ubiquitous City, Wired City) to various stakeholders and the benefits and challenges associated with its implementation, the concept of smart cities has attracted significant attention from researchers within multiple fields, including information systems. This study provides a valuable synthesis of the relevant literature by analysing and discussing the key findings from existing research on issues related to smart cities from an Information Systems perspective. The research analysed and discussed in this study focuses on number of aspects of smart cities: smart mobility, smart living, smart environment, smart citizens, smart government, and smart architecture as well as related technologies and concepts. The discussion also focusses on the alignment of smart cities with the UN sustainable development goals. This comprehensive review offers critical insight to the key underlying research themes within smart cities, highlighting the limitations of current developments and potential future directions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号