Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Data breaches have become a formidable challenge for business operations in the twenty-first century. The emergence of big data in the ever-growing digital economy has created the necessity to secure critical organizational information.... more
Data breaches have become a formidable challenge for business operations in the twenty-first century. The emergence of big data in the ever-growing digital economy has created the necessity to secure critical organizational information. The lack of cybersecurity awareness exposes organizations to potential cyber threats. Thus, this research aims to identify the various dimensions of cybersecurity awareness capabilities. Drawing on the dynamic capabilities framework, the findings of the study show personnel (knowledge, attitude and learning), management (training, culture and strategic orientation) and infrastructure capabilities (technology and data governance) as thematic dimensions to tackle cybersecurity awareness challenges.
Spontaneity makes life worth living. If we had all the answers to every question and could accurately predict the result of our actions and choices before embarking on a particular path into the future, human life would be substantially... more
Spontaneity makes life worth living. If we had all the answers to every question and could accurately predict the result of our actions and choices before embarking on a particular path into the future, human life would be substantially different—some might even say boring. The fact that we must strive through things ourselves, make mistakes, and learn from them, provides a certain level of freedom that none of us should take for granted. It was not that long ago that we would get into a car with a street directory on our laps, excited to explore a new route for the first time, instead of just delegating our route selection to the shortest path algorithm and relying on it to get us to our destination. While we are all grateful for the ease with which we can now navigate the world, there is an opportunity cost generated by an augmentation–automation paradox.
Smart infrastructure and systems are being rolled out without commensurate technology impact assessments and stakeholder consultations. Consequentially, the benefits of innovation are potentially being concentrated to only a privileged... more
Smart infrastructure and systems are being rolled out without commensurate technology impact assessments and stakeholder consultations. Consequentially, the benefits of innovation are potentially being concentrated to only a privileged parcel of the population and, whether unintended or not, this may create systems of oppression against minorities. The value of inclusive approaches to systems development is not new, and the benefits of user-centered, participatory, and co-design processes have been widely documented. However, the dominant model of systems design remains in support of processes that engineers and technologists largely lead. We have also witnessed a reverse engineering process taking place, a hacking of the populace as a living lab to fit the technology we conceive of in our social imaginaries informed by diverse experiences. At times it feels like one giant experiment in the hope of a better future by pursuing technologies and technological progression because the ca...
Research on AI has gained momentum in recent years. Many scholars and practitioners increasingly highlight the dark sides of AI, particularly related to algorithm bias. This study elucidates situations in which AI-enabled analytics... more
Research on AI has gained momentum in recent years. Many scholars and practitioners increasingly highlight the dark sides of AI, particularly related to algorithm bias. This study elucidates situations in which AI-enabled analytics systems make biased decisions against customers based on gender, race, religion, age, nationality or socioeconomic status. Based on a systematic literature review, this research proposes two approaches (i.e., a priori and post-hoc) to overcome such biases in customer management. As part of a priori approach, the findings suggest scientific, application, stakeholder and assurance consistencies. With regard to the post-hoc approach, the findings recommend six steps: bias identification, review of extant findings, selection of the right variables, responsible and ethical model development, data analysis and action on insights. Overall, this study contributes to the ethical and responsible use of AI applications.
Implants for humans are not new. The installation of pacemakers in humans and a great number of other medical innovations for prosthesis are now considered straightforward procedures. Today we have even realised the potential for... more
Implants for humans are not new. The installation of pacemakers in humans and a great number of other medical innovations for prosthesis are now considered straightforward procedures. Today we have even realised the potential for microchip implants to be embedded inside the human body for the purpose of acting as unique lifetime identifiers (ULIs). Tiny radiofrequency identification (RFID) devices with on-board sensors are now being used to identify people uniquely and to provide access to other data such as medical records. Some of the major problems pertaining to microchip implants are related to who or what is in control of the personal data stored and gathered from such devices. While each new implanted device might well be in accordance with governing regulations for commercial purposes, this does not necessarily mean that the risks associated with that particular application have been nullified. The popular perception is that compliance with common standards and regulations, a...
ABSTRACT
Research Interests:
Research Interests:
Katina Michael shares her views on the potential use of certain techniques that may be developed to assist memory, concentration, and mental energy. She states that such techniques can also be used in life extension therapies,... more
Katina Michael shares her views on the potential use of certain techniques that may be developed to assist memory, concentration, and mental energy. She states that such techniques can also be used in life extension therapies, reproductive choice technologies, cryonics procedures, and many other possible human modification, and enhancement technologies. Homo Electricus can be one such technology, involving a human using electro-magnetic techniques for ambient communication with networks. An Electrophorus is one who becomes a bearer of technology, inviting nano- and micro-scale devices into his or her body. An Electrophorus might also use brain-wave techniques, such as the electroencephalogram (EEG), which measures the electrical activity of the brain in order to perform actions by thinking about them. This can be the best approach to retaining inner thoughts for recollection though there are several vital issues related to security, access control, and privacy which need to be addressed first
The Apple Watch is a music player, fitness tracker, communications device, payment token, digital key, and last but not least, a watch that tells the time! We are surprised that no one has claimed that it will also help look after our... more
The Apple Watch is a music player, fitness tracker, communications device, payment token, digital key, and last but not least, a watch that tells the time! We are surprised that no one has claimed that it will also help look after our kids-well, actually they have, just visit the App Store. Who would have thought that the power of an Internet-enabled laptop computer, mobile phone, iPod, Fitbit, bank card, and set of keys could be neatly packaged and strapped around your wrist. This begs the vital question: How will we change our behaviors based on the fact that we are walking around with a full-fledged computer that sits in contact with our bodies and communicates wirelessly with machines around us without our knowledge? Apparently, we're all going to look more athletic and stylish, be smarter and more accessible, and have a lot more convenience at our fingertips. But in actuality, we'll be reaching for the mute button, longing to be disconnected, and fed up with all the notifications interrupting us. That's when the novelty effect wears off.
Radio frequency identification (RFID) in the form of tags or transponders is a means of auto-ID that can be used for tracking and monitoring objects, both living and non-living. One of the first applications of RFID was in the 1940s... more
Radio frequency identification (RFID) in the form of tags or transponders is a means of auto-ID that can be used for tracking and monitoring objects, both living and non-living. One of the first applications of RFID was in the 1940s within the US Defense Force (Hodges & McFarlane, 2004, p. 59). Transponders were used to differentiate between friendly and enemy aircraft (Ollivier, 1995, p. 234; Scharfeld (1998, p. 9). Since that time, transponders continued mainly to be used by the aerospace industry (or in other niche applications) until the late 1980s when the Dutch government voiced their requirement for a livestock tracking system. The commercial direction of RFID changed at this time and the uses for RFID grew manifold as manufacturers realized the enormous potential of the technology.
This paper examines the users' perspective on the security of Internet banking in Australia within the social context. It supplements the technological and industrial approaches to security by drawing on user-centered research on... more
This paper examines the users' perspective on the security of Internet banking in Australia within the social context. It supplements the technological and industrial approaches to security by drawing on user-centered research on banking in the Smart ...

And 524 more