Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
110
result(s) for
"UNAUTHORIZED USERS"
Sort by:
Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System
2023
Cybersecurity information sharing (CIS) is important in different business processes to secure data transmission, because it comprises Internet of Things (IoT) connectivity, workflow automation, collaboration, and communication. The shared information is influenced by intermediate users and alters the originality of the information. Although risk factors such as confidentiality and privacy of the data are reduced when using a cyber defense system, existing techniques rely on a centralized system that may be damaged during an accident. In addition, private information sharing faces rights issues when accessing sensitive information. The research issues influence trust, privacy, and security in a third-party environment. Therefore, this work uses the Access Control Enabled Blockchain (ACE-BC) framework to enhance overall data security in CIS. The ACE-BC framework uses attribute encryption techniques to manage data security, while the access control mechanism limits unauthorized user access. The effective utilization of blockchain techniques ensures overall data privacy and security. The efficiency of the introduced framework was evaluated using experimental results, and the experimental outcome indicated that the recommended ACE-BC framework enhanced the data confidentiality ratio (98.9%), the throughput ratio (98.2%), the efficiency ratio (97.4%), and the latency rate (10.9%) when compared to other popular models.
Journal Article
Integrity in mobile phone financial services : measures for mitigating risks from money laundering and terrorist financing
2008
Governments are challenged to make an innovation-friendly climate while simultaneously ensuring that business development remain sustainable. Criminal use of the technologyterrorist financing and money launderingchallenges long-run business viability via risk of massive investment flight and public distrust of new players entering the market. Sustainable business models are those that base regulation on a careful risk-based analysis. This study identifies the perceived risks and compares them with the actual level of risk for each category of mobile phone financial services. The comparison reveals that the perceptions do not weigh up to the reality. Based on fieldwork in seven locations where the technology has taken off, this paper finds that providers apply measures that are consistent with international standards to combat money laundering and terrorist financing. It identifies the sometimes non-traditional means the industry uses that both mitigate the risks and are in line with good business practices. Acknowledging that mobile phone financial services are no riskier than other channels, governments are called to treat them as an opportunity to expand access to finance.
Increasing Accountability Through User-Interface Design Artifacts
by
Vance, Anthony
,
Lowry, Paul Benjamin
,
Eggett, Dennis
in
Access control
,
Accountability
,
Human-computer interaction
2015
Access-policy violations are a growing problem with substantial costs for organizations. Although training programs and sanctions have been suggested as a means of reducing these violations, evidence shows the problem persists. It is thus imperative to identify additional ways to reduce access-policy violations, especially for systems providing broad access to data. We use accountability theory to develop four user-interface (UI) design artifacts that raise users’ accountability perceptions within systems and in turn decrease access-policy violations. To test our model, we uniquely applied the scenario-based factorial survey method to various graphical manipulations of a records system containing sensitive information at a large organization with over 300 end users who use the system daily. We show that the UI design artifacts corresponding to four submanipulations of accountability can raise accountability and reduce access policy violation intentions. Our findings have several theoretical and practical implications for increasing accountability using UI design. Moreover, we are the first to extend the scenario-based factorial survey method to test design artifacts. This method provides the ability to use more design manipulations and to test with fewer users than is required in traditional experimentation and research on human–computer interaction. We also provide bootstrapping tests of mediation and moderation and demonstrate how to analyze fixed and random effects within the factorial survey method optimally.
Journal Article
The Role of Morality in Digital Piracy: Understanding the Deterrent and Motivational Effects of Moral Reasoning in Different Piracy Contexts
2019
Digital piracy has been a chronic issue in intellectual property protection. With the prevalence of online technologies, digital piracy has become even more rampant, as digital resources can now be accessed and disseminated easily through the Internet. While the antecedents of piracy behaviors have been studied for years, previous studies often focus on a specific type of behavior or pirated content and the findings are far from conclusive. They do not paint a coherent picture of the impacts of antecedents. In this study, we focus on the role of morality by revealing the different levels of moral reasoning that can both deter and motivate users' piracy intentions. Furthermore, we differentiate between two types of piracy behaviors (unauthorized copying/downloading vs. unauthorized sharing) and two categories of digital products (application software vs. music/movies), so that the differential impacts of the various antecedents can be assessed and articulated more clearly. We empirically evaluated the models in the four piracy contexts using a sample of 3,426 survey participants from a sizable IT-literate society. Our findings indicate the conflicting roles of morality in piracy intention and demonstrate its differential impacts across the two types of piracy behaviors, which can be generalized across the two categories of digital products. Our study sheds new light on end users' considerations in accessing and disseminating unauthorized digital content. It also informs the design of copyright protection policies and sanction measures with different levels of specificity.
Journal Article
Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach
by
Kokolakis, Spyros
,
Skalkos, Andreas
,
Tsohou, Aggeliki
in
Adoption of innovations
,
Advertisements
,
Attitudes
2024
Purpose
Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs.
Design/methodology/approach
This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide.
Findings
The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE.
Research limitations/implications
Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study.
Practical implications
The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools.
Social implications
This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE.
Originality/value
This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.
Journal Article
Brainjacking in deep brain stimulation and autonomy
by
Sandberg, Anders
,
Pycroft, Laurie
,
Savulescu, Julian
in
Autonomic nervous system
,
Autonomy
,
Brain
2018
'Brainjacking’ refers to the exercise of unauthorized control of another’s electronic brain implant. Whilst the possibility of hacking a Brain–Computer Interface (BCI) has already been proven in both experimental and real-life settings, there is reason to believe that it will soon be possible to interfere with the software settings of the Implanted Pulse Generators (IPGs) that play a central role in Deep Brain Stimulation (DBS) systems. Whilst brainjacking raises ethical concerns pertaining to privacy and physical or psychological harm, we claim that the possibility of brainjacking DBS raises particularly profound concerns about individual autonomy, since the possibility of hacking such devices raises the prospect of third parties exerting influence over the neural circuits underpinning the subject’s cognitive, emotional and motivational states. However, although it seems natural to assume that brainjacking represents a profound threat to individual autonomy, we suggest that the implications of brainjacking for individual autonomy are complicated by the fact that technologies targeted by brainjacking often serve to enhance certain aspects of the user’s autonomy. The difficulty of ascertaining the implications of brainjacking DBS for individual autonomy is exacerbated by the varied understandings of autonomy in the neuroethical and philosophical literature. In this paper, we seek to bring some conceptual clarity to this area by mapping out some of the prominent views concerning the different dimension of autonomous agency, and the implications of brainjacking DBS for each dimension. Drawing on three hypothetical case studies, we show that there could plausibly be some circumstances in which brainjacking could potentially be carried out in ways that could serve to enhance certain dimensions of the target’s autonomy. Our analysis raises further questions about the power, scope, and necessity of obtaining prior consent in seeking to protect patient autonomy when directly interfering with their neural states, in particular in the context of self-regulating closed-loop stimulation devices.
Journal Article
Predictors of cyberloafing among high school students: unauthorized access to school network, metacognitive awareness and smartphone addiction
2020
Cyberloafing is one of the phenomena that adversely affects the efficiency and productivity in learning and teaching activities in educational settings. Increased ICT (information and communication technology) access status in educational environments and personal mobile devices lead to a wide range of cyberloafing behaviors of learners. In this regard, the aim of this study was to investigate cyberloafing behaviors of high school students in terms of several variables, including gender, ICT usage, unauthorized access to school network, metacognitive awareness and smartphone addiction. In this study, the relational screening model from descriptive research methods was used. A total of 269 9th grade students, 123 of whom were male and 146 of whom were female, were recruited. Hierarchical linear multilevel regression analysis was employed in the data analysis. The findings indicate that four of the five models designed to investigate cyberloafing behaviors in educational settings were found to be statistically significant. In other words, four hypotheses were supported. It has been concluded that the unauthorized access to the school network of learners has a significant impact on the cyberloafing behaviors in educational contexts. Additionally, the smartphone addiction and metacognitive awareness levels of students, as well as daily social media usage time are fundamental predictors of the cyberloafing behaviors.
Journal Article
Influence of structural factors on employee cloud shadow IT usage during COVID-19 lockdown: a strain theory perspective
by
Abdul Talib, Yurita Yakimin
,
Ogedengbe, Fowokemi Alaba
,
Rusly, Fariza Hanim
in
Cognition
,
Coronaviruses
,
COVID-19
2024
Cloud shadow information technology (SIT) usage is a deviant behavior among employees evidenced in the initiation and completion of official tasks using unauthorized cloud information technologies (IT), thereby leading to financial and non-financial losses such as data breaches and information system (IS) compromises. The increased dependence on cloud IS motivated by the coronavirus-19 lockdown has caused a surge in SIT usage. The need for remote work has increased the usage of cloud office-assisted tools, teleconferencing tools, cloud storage systems, and several cloud-based means of completing office tasks. Structural imbalances in official cloud IS structures have therefore, caused increased SIT usage. This study extended the strain theory by inculcating two structural factors (work pressure and work overload). Five hypotheses were postulated based on the model, which was empirically tested using quantitative research techniques. A survey method of data collection was employed, and questionnaires were distributed to employees in Nigeria. SPSS was used for demographic analysis, and structural equation modeling was completed using SmartPLS. Results showed that work overload and work pressure each directly influence employee cognitive strain. While work overload and cognitive strain significantly impact employee cloud SIT usage, work pressure is insignificant. This study will assist organizations in restructuring IT systems that will reduce exhaustion and discourage their usage of the authorized cloud IT system. This will assist organization IS in reducing losses such as high job turnover and loss of customer information.
Journal Article
Social Death
2012
Winner of the 2013 John Hope Franklin Book Prize presented by the American Studies AssociationSocial Death tackles one of the core paradoxes of social justice struggles and scholarship - that the battle to end oppression shares the moral grammar that structures exploitation and sanctions state violence. Lisa Marie Cacho forcefully argues that the demands for personhood for those who, in the eyes of society, have little value, depend on capitalist and heteropatriarchal measures of worth.With poignant case studies, Cacho illustrates that our very understanding of personhood is premised upon the unchallenged devaluation of criminalized populations of color. Hence, the reliance of rights-based politics on notions of who is and is not a deserving member of society inadvertently replicates the logic that creates and normalizes states of social and literal death. Her understanding of inalienable rights and personhood provides us the much-needed comparative analytical and ethical tools to understand the racialized and nationalized tensions between racial groups. Driven by a radical, relentless critique, Social Death challenges us to imagine a heretofore unthinkable politics and ethics that do not rest on neoliberal arguments about worth, but rather emerge from the insurgent experiences of those negated persons who do not live by the norms that determine the productive, patriotic, law abiding, and family-oriented subject.
A Novel User Authentication Scheme Based on QR-Code
2010
User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel. Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Especially, the purpose of the one-time password is to make it more difficult to gain unauthorized access to restricted resources. Instead of using the password file as conventional authentication systems, many researchers have devoted to implement various one-time password schemes using smart cards, time-synchronized token or short message service in order to reduce the risk of tampering and maintenance cost. However, these schemes are impractical because of the far from ubiquitous hardware devices or the infrastructure requirements. To remedy these weaknesses, the attraction of the QR-code technique can be introduced into our one-time password authentication protocol. Not the same as before, the proposed scheme based on QR code not only eliminates the usage of the password verification table, but also is a cost effective solution since most internet users already have mobile phones. For this reason, instead of carrying around a separate hardware token for each security domain, the superiority of handiness benefit from the mobile phone makes our approach more practical and convenient. Index Terms-one-time password; user authentication; QRcode; mobile phone
Journal Article