Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
239,225
result(s) for
"Information control"
Sort by:
Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts
by
Smith, Jeff H
,
Hart, Paul
,
Xu, Heng
in
Anonymity
,
Business and Management
,
Business Information Systems
2013
Privacy is one of the few concepts that has been studied across many disciplines, but is still difficult to grasp. The current understanding of privacy is largely fragmented and discipline-dependent. This study develops and tests a framework of information privacy and its correlates, the latter often being confused with or built into definitions of information privacy per se. Our framework development was based on the privacy theories of Westin and Altman, the economic view of the privacy calculus, and the identity management framework of Zwick and Dholakia. The dependent variable of the model is perceived information privacy. The particularly relevant correlates to information privacy are anonymity, secrecy, confidentiality, and control. We posit that the first three are tactics for information control; perceived information control and perceived risk are salient determinants of perceived information privacy; and perceived risk is a function of perceived benefits of information disclosure, information sensitivity, importance of information transparency, and regulatory expectations. The research model was empirically tested and validated in the Web 2.0 context, using a survey of Web 2.0 users. Our study enhances the theoretical understanding of information privacy and is useful for privacy advocates, and legal, management information systems, marketing, and social science scholars.
Journal Article
Functional Integration with Process Mining and Process Analyzing for Structural and Behavioral Properness Validation of Processes Discovered from Event Log Datasets
2020
In this paper, we propose an integrated approach for seamlessly and effectively providing the mining and the analyzing functionalities to redesigning work for very large-scale and massively parallel process models that are discovered from their enactment event logs. The integrated approach especially aims at analyzing not only their structural complexity and correctness but also their animation-based behavioral properness, and becomes concretized to a sophisticated analyzer. The core function of the analyzer is to discover a very large-scale and massively parallel process model from a process log dataset and to validate the structural complexity and the syntactical and behavioral properness of the discovered process model. Finally, this paper writes up the detailed description of the system architecture with its functional integration of process mining and process analyzing. More precisely, we excogitate a series of functional algorithms for extracting the structural constructs and for visualizing the behavioral properness of those discovered very large-scale and massively parallel process models. As experimental validation, we apply the proposed approach and analyzer to a couple of process enactment event log datasets available on the website of the 4TU.Centre for Research Data.
Journal Article
Data Privacy: Effects on Customer and Firm Performance
by
Palmatier, Robert W.
,
Martin, Kelly D.
,
Borah, Abhishek
in
Data integrity
,
Financial performance
,
Information control
2017
Although marketers increasingly rely on customer data, firms have little insight into the ramifications of such data use and do not know how to prevent negative effects. Data management efforts may heighten customers' vulnerability worries or create real vulnerability. Using a conceptual framework grounded in gossip theory, the authors link customer vulnerability to negative performance effects. Three studies show that transparency and control in firms' data management practices can suppress the negative effects of customer data vulnerability. Experimental manipulations reveal that mere access to personal data inflates feelings of violation and reduces trust. An event study of data security breaches affecting 414 public companies also confirms negative effects, as well as spillover vulnerabilities from rival firms' breaches, on firm performance. Severity of the breach hurts the focal firm but helps the rival firm, which provides some insight into mixed findings in prior research. Finally, a field study with actual customers of 15 companies across three industries demonstrates consistent effects across four types of customer data vulnerability and confirms that violation and trust mediate the effects of data vulnerabilities on outcomes.
Journal Article
Service level agreements : a legal and practical guide
by
Desai, Jimmy author
in
Service-level agreements
,
Information technology Quality control
,
Service industries Quality control
2010
Annotation Make your SLA work for you _ Read this essential guide to SLAs today!
A wide range of industry sectors will outsource service provision (for example, banking, pharmaceuticals, and insurance companies). This can happen where an organisation outsources its IT payroll needs, its helpdesk and IT maintenance requirements, its payment processing, or its whole IT function.
The key risk
The key risk for an organisation that enters into an outsourcing transaction, are that the services that it receives from the supplier will be worse than the services they were receiving before, or that the cost savings that were anticipated or promised, are not achieved.
The SLA
To try and avoid this scenario, the outsourcing contract should include a Service Level Agreement (SLA). The SLA must be drafted to govern the standard of service that you require, including the cost of those services and the consequences of not achieving pre-agreed standards.
The wider environment
While Service Level Agreements are a key method, within ITIL, for setting out how two parties have agreed that a specific service (usually, but not necessarily, IT-related) will be delivered by one to the other, and the standards or levels to which it will be delivered, the basic concept is now far more widely applied than just in ITIL® and ITSM environments.
This pocket guide provides information and guidance on SLAs to those in the wider environment, from a legal and practical view point.
The benefits and the pitfalls
Identifying some of the benefits and the pitfalls that an organisation can encounter when negotiating and drafting SLAs, this pocket guide provides an overview of SLAs, highlighting typical scenarios that can arise, and provides information on typical solutions that have been adopted by other organisations.
Read this pocket guide to _
* Understand what an SLA is and why you need one
When negotiating any type of service-related deal (including any IT outsourcing deal), it is essential that sufficient time is devoted to ensuring that the service is of sufficient quality and that this is recorded in an SLA.
* Understand where SLAs go wrong.
SLAs can go wrong for a number of reasons. For example, the SLA may not reflect reality, your service requirements may not be defined properly, or there may be too many service levels and service level targets which can then become difficult to manage.
* Learn how to build foundations for the SLA.
There are elements that you should be considering well before even engaging with potential suppliers. This pocket guide details what your organisation should consider, in order to find the proposal which most closely matches its needs.
* Understand the issues to consider when drafting the SLA.
This pocket guide covers the issues to consider when drafting an SLA, as there are certain provisions in SLAs which either should, or should not, appear.
By reading this a short, legal and practical guide to SLAs, you should be able to quickly come up to speed with some of the legal and practical issues that might arise. Negotiating the SLA and putting the SLA into action are also discussed in the pocket guide. Whilst short and easy to digest, case references and weblinks have been provided in the text so readers can find out more information about SLAs.
A wide range of industry sectors will outsource service provision (for example, banking, pharmaceuticals, and insurance companies). This can happen where an organisation outsources its IT payroll needs, its helpdesk and IT maintenance requirements, its payment processing, or its whole IT function.
The key risk
The key risk for an organisation that enters into an outsourcing transaction, are that the services that it receives from the supplier will be worse than the services they were receiving before, or that the cost savings that were anticipated or promised, are not achieved.
The SLA
To try and avoid this scenario, the outsourcing contract should include a Service Level Agreement (SLA). The SLA must be drafted to govern the standard of service that you require, including the cost of those services and the consequences of not achieving pre-agreed standards.
The wider environment
While Service Level Agreements are a key method, within ITIL, for setting out how two parties have agreed that a specific service (usually, but not necessarily, IT-related) will be delivered by one to the other, and the standards or levels to which it will be delivered, the basic concept is now far more widely applied than just in ITIL® and ITSM environments.
This pocket guide provides information and guidance on SLAs to those in the wider environment, from a legal and practical view point.
The benefits and the pitfalls
Identifying some of the benefits and the pitfalls that an organisation can encounter when negotiating and drafting SLAs, this pocket guide provides an overview of SLAs, highlighting typical scenarios that can arise, and provides information on typical solutions that have been adopted by other organisations.
Read this pocket guide to _
* Understand what an SLA is and why you need one
When negotiating any type of service-related deal (including any IT outsourcing deal), it is essential that sufficient time is devoted to ensuring that the service is of sufficient quality and that this is recorded in an SLA.
* Understand where SLAs go wrong.
SLAs can go wrong for a number of reasons. For example, the SLA may not reflect reality, your service requirements may not be defined properly, or there may be too many service levels and service level targets which can then become difficult to manage.
* Learn how to build foundations for the SLA.
There are elements that you should be considering well before even engaging with potential suppliers. This pocket guide details what your organisation should consider, in order to find the proposal which most closely matches its needs.
* Understand the issues to consider when drafting the SLA.
This pocket guide covers the issues to consider when drafting an SLA, as there are certain provisions in SLAs which either should, or should not, appear.
By reading this a short, legal and practical guide to SLAs, you should be able to quickly come up to speed with some of the legal and practical issues that might arise. Negotiating the SLA and putting the SLA into action are also discussed in the pocket guide. Whilst short and easy to digest, case references and weblinks have been provided in the text so readers can find out more information about SLAs.
How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument
by
ROBERTS, MARGARET E.
,
PAN, JENNIFER
,
KING, GARY
in
Academic staff
,
Activism
,
Archives & records
2017
The Chinese government has long been suspected of hiring as many as 2 million people to surreptitiously insert huge numbers of pseudonymous and other deceptive writings into the stream of real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called 50c party posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of most posts openly accused on social media of being 50c. Yet almost no systematic empirical evidence exists for this claim or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large-scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the posts written by them, and their content. We estimate that the government fabricates and posts about 448 million social media comments a year. In contrast to prior claims, we show that the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We show that the goal of this massive secretive operation is instead to distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime. We discuss how these results fit with what is known about the Chinese censorship program and suggest how they may change our broader theoretical understanding of “common knowledge” and information control in authoritarian regimes.
Journal Article
Best Practices in Government Information
by
Wu, Jane (Jane M.)
,
Lynden, Irina
,
International Federation of Library Associations
in
Access control
,
Electronic government information
,
Government information
2008,2007
A rare opportunity to discover international trends and developments in access to government information is presented to you in selected papers from Africa, the Americas, Asia, Europe, the Middle East , Oceania and Russia.