Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
110 result(s) for "UNAUTHORIZED USERS"
Sort by:
Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System
Cybersecurity information sharing (CIS) is important in different business processes to secure data transmission, because it comprises Internet of Things (IoT) connectivity, workflow automation, collaboration, and communication. The shared information is influenced by intermediate users and alters the originality of the information. Although risk factors such as confidentiality and privacy of the data are reduced when using a cyber defense system, existing techniques rely on a centralized system that may be damaged during an accident. In addition, private information sharing faces rights issues when accessing sensitive information. The research issues influence trust, privacy, and security in a third-party environment. Therefore, this work uses the Access Control Enabled Blockchain (ACE-BC) framework to enhance overall data security in CIS. The ACE-BC framework uses attribute encryption techniques to manage data security, while the access control mechanism limits unauthorized user access. The effective utilization of blockchain techniques ensures overall data privacy and security. The efficiency of the introduced framework was evaluated using experimental results, and the experimental outcome indicated that the recommended ACE-BC framework enhanced the data confidentiality ratio (98.9%), the throughput ratio (98.2%), the efficiency ratio (97.4%), and the latency rate (10.9%) when compared to other popular models.
Integrity in mobile phone financial services : measures for mitigating risks from money laundering and terrorist financing
Governments are challenged to make an innovation-friendly climate while simultaneously ensuring that business development remain sustainable. Criminal use of the technology—terrorist financing and money laundering—challenges long-run business viability via risk of massive investment flight and public distrust of new players entering the market. Sustainable business models are those that base regulation on a careful risk-based analysis. This study identifies the perceived risks and compares them with the actual level of risk for each category of mobile phone financial services. The comparison reveals that the perceptions do not weigh up to the reality. Based on fieldwork in seven locations where the technology has taken off, this paper finds that providers apply measures that are consistent with international standards to combat money laundering and terrorist financing. It identifies the sometimes non-traditional means the industry uses that both mitigate the risks and are in line with good business practices. Acknowledging that mobile phone financial services are no riskier than other channels, governments are called to treat them as an opportunity to expand access to finance.
Increasing Accountability Through User-Interface Design Artifacts
Access-policy violations are a growing problem with substantial costs for organizations. Although training programs and sanctions have been suggested as a means of reducing these violations, evidence shows the problem persists. It is thus imperative to identify additional ways to reduce access-policy violations, especially for systems providing broad access to data. We use accountability theory to develop four user-interface (UI) design artifacts that raise users’ accountability perceptions within systems and in turn decrease access-policy violations. To test our model, we uniquely applied the scenario-based factorial survey method to various graphical manipulations of a records system containing sensitive information at a large organization with over 300 end users who use the system daily. We show that the UI design artifacts corresponding to four submanipulations of accountability can raise accountability and reduce access policy violation intentions. Our findings have several theoretical and practical implications for increasing accountability using UI design. Moreover, we are the first to extend the scenario-based factorial survey method to test design artifacts. This method provides the ability to use more design manipulations and to test with fewer users than is required in traditional experimentation and research on human–computer interaction. We also provide bootstrapping tests of mediation and moderation and demonstrate how to analyze fixed and random effects within the factorial survey method optimally.
The Role of Morality in Digital Piracy: Understanding the Deterrent and Motivational Effects of Moral Reasoning in Different Piracy Contexts
Digital piracy has been a chronic issue in intellectual property protection. With the prevalence of online technologies, digital piracy has become even more rampant, as digital resources can now be accessed and disseminated easily through the Internet. While the antecedents of piracy behaviors have been studied for years, previous studies often focus on a specific type of behavior or pirated content and the findings are far from conclusive. They do not paint a coherent picture of the impacts of antecedents. In this study, we focus on the role of morality by revealing the different levels of moral reasoning that can both deter and motivate users' piracy intentions. Furthermore, we differentiate between two types of piracy behaviors (unauthorized copying/downloading vs. unauthorized sharing) and two categories of digital products (application software vs. music/movies), so that the differential impacts of the various antecedents can be assessed and articulated more clearly. We empirically evaluated the models in the four piracy contexts using a sample of 3,426 survey participants from a sizable IT-literate society. Our findings indicate the conflicting roles of morality in piracy intention and demonstrate its differential impacts across the two types of piracy behaviors, which can be generalized across the two categories of digital products. Our study sheds new light on end users' considerations in accessing and disseminating unauthorized digital content. It also informs the design of copyright protection policies and sanction measures with different levels of specificity.
Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach
Purpose Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs. Design/methodology/approach This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide. Findings The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE. Research limitations/implications Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study. Practical implications The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools. Social implications This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE. Originality/value This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.
Brainjacking in deep brain stimulation and autonomy
'Brainjacking’ refers to the exercise of unauthorized control of another’s electronic brain implant. Whilst the possibility of hacking a Brain–Computer Interface (BCI) has already been proven in both experimental and real-life settings, there is reason to believe that it will soon be possible to interfere with the software settings of the Implanted Pulse Generators (IPGs) that play a central role in Deep Brain Stimulation (DBS) systems. Whilst brainjacking raises ethical concerns pertaining to privacy and physical or psychological harm, we claim that the possibility of brainjacking DBS raises particularly profound concerns about individual autonomy, since the possibility of hacking such devices raises the prospect of third parties exerting influence over the neural circuits underpinning the subject’s cognitive, emotional and motivational states. However, although it seems natural to assume that brainjacking represents a profound threat to individual autonomy, we suggest that the implications of brainjacking for individual autonomy are complicated by the fact that technologies targeted by brainjacking often serve to enhance certain aspects of the user’s autonomy. The difficulty of ascertaining the implications of brainjacking DBS for individual autonomy is exacerbated by the varied understandings of autonomy in the neuroethical and philosophical literature. In this paper, we seek to bring some conceptual clarity to this area by mapping out some of the prominent views concerning the different dimension of autonomous agency, and the implications of brainjacking DBS for each dimension. Drawing on three hypothetical case studies, we show that there could plausibly be some circumstances in which brainjacking could potentially be carried out in ways that could serve to enhance certain dimensions of the target’s autonomy. Our analysis raises further questions about the power, scope, and necessity of obtaining prior consent in seeking to protect patient autonomy when directly interfering with their neural states, in particular in the context of self-regulating closed-loop stimulation devices.
Predictors of cyberloafing among high school students: unauthorized access to school network, metacognitive awareness and smartphone addiction
Cyberloafing is one of the phenomena that adversely affects the efficiency and productivity in learning and teaching activities in educational settings. Increased ICT (information and communication technology) access status in educational environments and personal mobile devices lead to a wide range of cyberloafing behaviors of learners. In this regard, the aim of this study was to investigate cyberloafing behaviors of high school students in terms of several variables, including gender, ICT usage, unauthorized access to school network, metacognitive awareness and smartphone addiction. In this study, the relational screening model from descriptive research methods was used. A total of 269 9th grade students, 123 of whom were male and 146 of whom were female, were recruited. Hierarchical linear multilevel regression analysis was employed in the data analysis. The findings indicate that four of the five models designed to investigate cyberloafing behaviors in educational settings were found to be statistically significant. In other words, four hypotheses were supported. It has been concluded that the unauthorized access to the school network of learners has a significant impact on the cyberloafing behaviors in educational contexts. Additionally, the smartphone addiction and metacognitive awareness levels of students, as well as daily social media usage time are fundamental predictors of the cyberloafing behaviors.
Influence of structural factors on employee cloud shadow IT usage during COVID-19 lockdown: a strain theory perspective
Cloud shadow information technology (SIT) usage is a deviant behavior among employees evidenced in the initiation and completion of official tasks using unauthorized cloud information technologies (IT), thereby leading to financial and non-financial losses such as data breaches and information system (IS) compromises. The increased dependence on cloud IS motivated by the coronavirus-19 lockdown has caused a surge in SIT usage. The need for remote work has increased the usage of cloud office-assisted tools, teleconferencing tools, cloud storage systems, and several cloud-based means of completing office tasks. Structural imbalances in official cloud IS structures have therefore, caused increased SIT usage. This study extended the strain theory by inculcating two structural factors (work pressure and work overload). Five hypotheses were postulated based on the model, which was empirically tested using quantitative research techniques. A survey method of data collection was employed, and questionnaires were distributed to employees in Nigeria. SPSS was used for demographic analysis, and structural equation modeling was completed using SmartPLS. Results showed that work overload and work pressure each directly influence employee cognitive strain. While work overload and cognitive strain significantly impact employee cloud SIT usage, work pressure is insignificant. This study will assist organizations in restructuring IT systems that will reduce exhaustion and discourage their usage of the authorized cloud IT system. This will assist organization IS in reducing losses such as high job turnover and loss of customer information.
Social Death
Winner of the 2013 John Hope Franklin Book Prize presented by the American Studies AssociationSocial Death tackles one of the core paradoxes of social justice struggles and scholarship - that the battle to end oppression shares the moral grammar that structures exploitation and sanctions state violence. Lisa Marie Cacho forcefully argues that the demands for personhood for those who, in the eyes of society, have little value, depend on capitalist and heteropatriarchal measures of worth.With poignant case studies, Cacho illustrates that our very understanding of personhood is premised upon the unchallenged devaluation of criminalized populations of color. Hence, the reliance of rights-based politics on notions of who is and is not a deserving member of society inadvertently replicates the logic that creates and normalizes states of social and literal death. Her understanding of inalienable rights and personhood provides us the much-needed comparative analytical and ethical tools to understand the racialized and nationalized tensions between racial groups. Driven by a radical, relentless critique, Social Death challenges us to imagine a heretofore unthinkable politics and ethics that do not rest on neoliberal arguments about worth, but rather emerge from the insurgent experiences of those negated persons who do not live by the norms that determine the productive, patriotic, law abiding, and family-oriented subject.
A Novel User Authentication Scheme Based on QR-Code
User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel. Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Especially, the purpose of the one-time password is to make it more difficult to gain unauthorized access to restricted resources. Instead of using the password file as conventional authentication systems, many researchers have devoted to implement various one-time password schemes using smart cards, time-synchronized token or short message service in order to reduce the risk of tampering and maintenance cost. However, these schemes are impractical because of the far from ubiquitous hardware devices or the infrastructure requirements. To remedy these weaknesses, the attraction of the QR-code technique can be introduced into our one-time password authentication protocol. Not the same as before, the proposed scheme based on QR code not only eliminates the usage of the password verification table, but also is a cost effective solution since most internet users already have mobile phones. For this reason, instead of carrying around a separate hardware token for each security domain, the superiority of handiness benefit from the mobile phone makes our approach more practical and convenient. Index Terms-one-time password; user authentication; QRcode; mobile phone