[PDF] Why Security And Privacy Research Lies At The Centre Of The Information Systems Is Artefact - eBooks Review

Why Security And Privacy Research Lies At The Centre Of The Information Systems Is Artefact


Why Security And Privacy Research Lies At The Centre Of The Information Systems Is Artefact
DOWNLOAD

Download Why Security And Privacy Research Lies At The Centre Of The Information Systems Is Artefact PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Why Security And Privacy Research Lies At The Centre Of The Information Systems Is Artefact book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page



Why Security And Privacy Research Lies At The Centre Of The Information Systems Is Artefact


Why Security And Privacy Research Lies At The Centre Of The Information Systems Is Artefact
DOWNLOAD
Author : Paul Benjamin Lowry
language : en
Publisher:
Release Date : 2017

Why Security And Privacy Research Lies At The Centre Of The Information Systems Is Artefact written by Paul Benjamin Lowry and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2017 with categories.


In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of information technology (IT) and information system (IS) artefacts and to expand the range of the latter to include those artificial phenomena that are crucial to information security and privacy research. We then briefly discuss some prevalent limitations in theory, methodology, and contributions that generally weaken security/privacy studies and jeopardise their chances of publication in a top IS journal. More importantly, we suggest remedies for these weaknesses, identifying specific improvements that can be made and offering a couple of illustrations of such improvements. In particular, we address the notion of loose re-contextualisation, using deterrence theory (DT) research as an example. We also provide an illustration of how the focus on intentions may have resulted in an underuse of powerful theories in security and privacy research, because such theories explain more than just intentions. We then outline three promising opportunities for IS research that should be particularly compelling to security and privacy researchers: online platforms, the Internet of things (IoT), and big data. All of these carry innate information security and privacy risks and vulnerabilities that can be addressed only by researching each link of the systems chain, that is, technologies-policies-processes-people-society-economy-legislature. We conclude by suggesting several specific opportunities for new research in these areas.



The Concept Of Enterprise Architecture From Theory To Practice


The Concept Of Enterprise Architecture From Theory To Practice
DOWNLOAD
Author : Tiko Iyamu
language : en
Publisher: CRC Press
Release Date : 2023-12-06

The Concept Of Enterprise Architecture From Theory To Practice written by Tiko Iyamu and has been published by CRC Press this book supported file pdf, txt, epub, kindle and other format this book has been release on 2023-12-06 with Computers categories.


Even though the field of enterprise architecture (EA) has matured, many organisations still struggle with its development and implementation, particularly those organisations involved in continuous transformational cycles and subjected to different environmental trends. This book is intended to assist organisations in getting a grip on the factors influencing EA implementation and gaining a deeper understanding of why things happen the way they do in the practice of EA. It is a comprehensive and definitive resource that is useful to both business professionals and academics. The book presents an approach for the development, implementation, or institutionalisation of EA that is independent of any method or other architecture frameworks. It can be applied directly using a realistic selection of organizational variables. The approach has two distinctive features that support EA, even in complex environments: From both technical and non-technical perspectives, it identifies influencing factors and how they manifest in the practice of EA in an organization. It offers linear and practical mechanisms for developing and implementing EA to fortify the practice of the concept in an organisation. This approach represents a significant contribution to EA. Starting with descriptions for EA, the book offers deepened models and frameworks for the development and implementation of EA at the domain level. It also covers factors upon which a model is built for the institutionalisation of the concept. Additionally, the book discusses the implications of EA for sponsors, architects, and other stakeholders responsible for EA development, implementation, and institutionalisation.



Advancing Information Systems Theories


Advancing Information Systems Theories
DOWNLOAD
Author : Nik Rushdi Hassan
language : en
Publisher: Springer Nature
Release Date : 2021-03-21

Advancing Information Systems Theories written by Nik Rushdi Hassan and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2021-03-21 with Computers categories.


The information systems (IS) field represents a multidisciplinary area that links the rapidly changing technology of information (or communications and information technology, ICT) to the business and social environment. Despite the potential that the IS field has to develop its own native theories to address current issues involving ICT it has consistently borrowed theories from its “reference disciplines,” often uncritically, to legitimize its research. This volume is the first of a series intended to advance IS research beyond this form of borrowed legitimization and derivative research towards fresh and original research that naturally comes from its own theories. It is inconceivable for a field so relevant to the era of the hyper-connected society, disruptive technologies, big data, social media, "fake news" and the weaponization of information to not be brimming with its own theories. The first step in reaching the goal of developing native IS theories is to reach an agreement on the need for theory (its rationale) and its role as the most distinctive product of human intellectual activity. This volume addresses what theories are, why bother with theories and the process of theorizing itself because the process of developing theories cannot be divorced from the product of that process. It will lay out a research agenda for decades to come and will be invaluable reading for any academic in the IS field and related disciplines concerned with information, systems, technology and their management.



Modern Socio Technical Perspectives On Privacy


Modern Socio Technical Perspectives On Privacy
DOWNLOAD
Author : Xinru Page
language : en
Publisher: Springer Nature
Release Date : 2022

Modern Socio Technical Perspectives On Privacy written by Xinru Page and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2022 with Application software categories.


This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.



Data Privacy And Trust In Cloud Computing


Data Privacy And Trust In Cloud Computing
DOWNLOAD
Author : Theo Lynn
language : en
Publisher: Springer Nature
Release Date : 2020-10-13

Data Privacy And Trust In Cloud Computing written by Theo Lynn and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2020-10-13 with Business & Economics categories.


This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing.



The Cloud To Thing Continuum


The Cloud To Thing Continuum
DOWNLOAD
Author : Theo Lynn
language : en
Publisher: Springer Nature
Release Date : 2020-07-07

The Cloud To Thing Continuum written by Theo Lynn and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2020-07-07 with Business & Economics categories.


The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support the Internet of Things. Much of this book focuses on technical aspects of the Internet of Things, however, clear methodologies for mapping the business value of the Internet of Things are still missing. We provide a value mapping framework for the Internet of Things to address this gap. While there is much hype about theInternet of Things, we have yet to reach the tipping point. As such, this book provides a timely entrée for higher education educators, researchers and students, industry and policy makers on the technologies that promise to reshape how society interacts and operates.



Research Handbook On Digital Strategy


Research Handbook On Digital Strategy
DOWNLOAD
Author : Carmelo Cennamo
language : en
Publisher: Edward Elgar Publishing
Release Date : 2023-05-09

Research Handbook On Digital Strategy written by Carmelo Cennamo and has been published by Edward Elgar Publishing this book supported file pdf, txt, epub, kindle and other format this book has been release on 2023-05-09 with Business & Economics categories.


This state-of-the-art Research Handbook presents a comprehensive overview of the key strategic challenges that firms face when dealing with digital markets, platforms, and products and services, from old strategy questions in need of different solutions to entirely novel issues posed by the new competitive digital context. This title contains one or more Open Access chapters.



Proceedings Of Eighth International Congress On Information And Communication Technology


Proceedings Of Eighth International Congress On Information And Communication Technology
DOWNLOAD
Author : Xin-She Yang
language : en
Publisher: Springer Nature
Release Date : 2023-08-31

Proceedings Of Eighth International Congress On Information And Communication Technology written by Xin-She Yang and has been published by Springer Nature this book supported file pdf, txt, epub, kindle and other format this book has been release on 2023-08-31 with Technology & Engineering categories.


This book gathers selected high-quality research papers presented at the Eighth International Congress on Information and Communication Technology, held at Brunel University, London, on 20–23 February 2023. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT) and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies. The work is presented in four volumes.



The Ethics Of Information


The Ethics Of Information
DOWNLOAD
Author : Luciano Floridi
language : en
Publisher: Oxford University Press, USA
Release Date : 2013-10

The Ethics Of Information written by Luciano Floridi and has been published by Oxford University Press, USA this book supported file pdf, txt, epub, kindle and other format this book has been release on 2013-10 with Computers categories.


Luciano Floridi develops the first ethical framework for dealing with the new challenges posed by Information and Communication Technologies (ICTs). He establishes the conceptual foundations of Information Ethics by exploring important metatheoretical and introductory issues, and answering key theoretical questions of great philosophical interest.



Information Systems Theory


Information Systems Theory
DOWNLOAD
Author : Yogesh K. Dwivedi
language : en
Publisher: Springer Science & Business Media
Release Date : 2011-09-21

Information Systems Theory written by Yogesh K. Dwivedi and has been published by Springer Science & Business Media this book supported file pdf, txt, epub, kindle and other format this book has been release on 2011-09-21 with Business & Economics categories.


The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model. To discuss how a theory can be used to better understand how information systems can be effectively deployed in today’s digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.