265 resultados para Social systems


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While organizations strive to leverage the vast information generated daily from social media platforms and both decision makers and consultants are keen to identify and exploit this information’s value, there has been little research into social media in the business context. Social media are diverse, varying in scope and functionality, this diversity entailing a complex of attributes and characteristics, resulting in confusion for both researchers and organizations. Taxonomies are important precursors in emerging fields and are foundational for rigorous theory building. Though aspects of social media have been studied from various discipline perspectives, this work has been largely descriptive. Thus, while the need for a rigorous taxonomy of social media is strong, previous efforts to classify social media suffer limitations – e.g. lack of a systematic taxonomic method, overreliance on intuition, disregard for the users’ perspective, and inadequate consideration of purpose. Thus, this study was mainly initiated by the overarching question “How can social media in the business context be usefully classified?” In order to address this gap, the current paper proposes a systematic method for developing a taxonomy appropriate to study social media in organizations context, combining Nickerson et al,’s (2012) IS taxonomy building guidelines and a Repertory grid (RepGrid) approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Healthcare professionals’ use of social media platforms, such as blogs, wikis, and social networking web sites has grown considerably in recent years. However, few studies have explored the perspectives and experiences of physicians in adopting social media in healthcare. This article aims to identify the potential benefits and challenges of adopting social media by physicians and demonstrates this by presenting findings from a survey conducted with physicians. A qualitative survey design was employed to achieve the research goal. Semi-structured interviews were conducted with 24 physicians from around the world who were active users of social media. The data were analyzed using the thematic analysis approach. The study revealed six main reasons and six major challenges for physicians adopting social media. The main reasons to join social media were as follows: staying connected with colleagues, reaching out and networking with the wider community, sharing knowledge, engaging in continued medical education, benchmarking, and branding. The main challenges of adopting social media by physicians were also as follows: maintaining confidentiality, lack of active participation, finding time, lack of trust, workplace acceptance and support, and information anarchy. By revealing the main benefits as well as the challenges of adopting social media by physicians, the study provides an opportunity for healthcare professionals to better understand the scope and impact of social media in healthcare, and assists them to adopt and harness social media effectively, and maximize the benefits for the specific needs of the clinical community.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Social Networks (SN) users have various privacy requirements to protect their information; to address this issue, a six-stage thematic analysis of scholarly articles related to SN user privacy concerns were synthesized. Then this research combines mixed methods research employing the strengths of quantitative and qualitative research to investigate general SN users, and thus construct a new set of ?ve primary and Twenty-?ve secondary SN user privacy requirements. Such an approach has been rarely used to examine the privacy requirements. Factor analysis results show superior agreement with theoretical predictions and signi?cant improvement over previous alternative models of SN user privacy requirements. This research presented here has the potential to provide for the development of more sophisticated privacy controls which will increase the ability of SN users to: specify their rights in SNs and to determine the protection of their own SN data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Safety at railway level crossings (RLX) is one part of a wider picture of safety within the whole transport system. Governments, the rail industry and road organisations have used a variety of countermeasures for many years to improve RLX safety. New types of interventions are required in order to reduce the number of crashes and associated social costs at railway crossings. This paper presents the results of a large research program which aimed to assess the effectiveness of emerging Intelligent Transport Systems (ITS) interventions, both on-road and in-vehicle based, to improve the safety of car drivers at RLXs in Australia. The three most promising technologies selected from the literature review and focus groups were tested in an advanced driving simulator to provide a detailed assessment of their effects on driver behaviour. The three interventions were: (i) in-vehicle visual warning using a GPS/smartphone navigation-like system, (ii) in-vehicle audio warning and; (iii) on-road intervention known as valet system (warning lights on the road surface activated as a train approaches). The effects of these technologies on 57 participants were assessed in a systematic approach focusing on the safety of the intervention, effects on the road traffic around the crossings and driver’s acceptance of the technology. Given that the ITS interventions were likely to provide a benefit by improving the driver’s awareness of the crossing status in low visibility conditions, such conditions were investigated through curves in the track before arriving at the crossing. ITS interventions were also expected to improve driver behaviour at crossings with high traffic (blocking back issue), which were also investigated at active crossings. The key findings are: (i) interventions at passive crossings are likely to provide safety benefits; (ii) the benefits of ITS interventions on driver behaviour at active crossings are limited; (iii) the trialled ITS interventions did not show any issues in terms of driver distraction, driver acceptance or traffic delays; (iv) these interventions are easy to use, do not increase driver workload substantially; (v) participants’ intention to use the technology is high and; (vi) participants saw most value in succinct messages about approaching trains as opposed to knowing the RLX locations or the imminence of a collision with a train.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The social media statistics of South Africa reveal an exponential increase in the use of social media. Libraries, as part of a community, cannot ignore this! Social media provide libraries instant and direct connection with their members regardless their geographical location. This paper explores social media use in libraries. The establishment of social media for the SABC Media Libraries is discussed to demonstrate a practical implementation of social media in libraries and archives. Tips and resources, with specific mention to Twitter and Facebook, as well as social media etiquette and social media policy guidelines are supplied. The literature of published articles and Infographic show the changing role of librarians in the social media era and the need for librarians to keep learning and update their skills to accommodate users’ needs. The focus should now be on how well we do social media for the library, not on whether we should do it or not! Keywords: Social Media, Libraries, Web 2.0, Librarians, Archives, SABC, South Africa.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The social media statistics of South Africa reveal an exponential increase in the use of social media. Libraries, as part of a community, cannot ignore this! Social media provide libraries instant and direct connection with their members regardless their geographical location. This paper explores social media use in libraries. The establishment of social media for the SABC Media Libraries is discussed to demonstrate a practical implementation of social media in libraries and archives. Tips and resources, with specific mention to Twitter and Facebook, as well as social media etiquette and social media policy guidelines are supplied. The literature of published articles and Infographic show the changing role of librarians in the social media era and the need for librarians to keep learning and update their skills to accommodate users’ needs. The focus should now be on how well we do social media for the library, not on whether we should do it or not!

Relevância:

30.00% 30.00%

Publicador:

Resumo:

People with mild or borderline intellectual disabilities are a group of people who usually do not meet the eligibility criteria for specialist disability services, yet are high users of many generalist services, such as mental health, child protection, and criminal justice systems. They may traverse many services, often entering, exiting, and returning to the same service providers with few positive results. This article explores the practice approach of the Meryton Association, a medium-sized nongovernment agency located in Brisbane, Australia. The Meryton Association provides social work support to people with mild to borderline intellectual disabilities, actively assisting this group to build relationships, resources, knowledge, and autonomy in their everyday lives. Using qualitative in-depth interviews with Meryton Association staff and secondary analysis of Meryton Association policy and practice documents, the challenges and opportunities of using this practice approach have been documented. The article proposes that specialist services are needed that use a developmental approach, stress the importance of relationship, and the need to practice gentleness and hope in social worker-client interaction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Given the global escalation of gaps between rich and poor, contemporary work in critical literacy needs to overtly question the politics of poverty. How and where is poverty produced, by what means, by whom and for whom and how are educational systems stratified to provide different kinds of education to the rich and the poor? Yet rather than critical literacy, international educational reform movements stress performative standards on basic literacy. In this context literacy researchers need to ask policy-makers hard questions about taken-for-granted rhetoric that surrounds poverty, literacy and education. At school, regional and state levels, educational leaders need to argue for fair resourcing and decision-making for their communities and students. In classrooms teachers need to weave critical questioning and inclusive learning interactions into the fabric of everyday life.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A matched case-control study of mortality to children under age five was conducted to consider associations with parents' socio-economic status and social support in the Farafenni Demographic Surveillance Site (DSS). Cases and controls were selected from Farafenni DSS, matched on date of birth, and parents were interviewed about personal resources and social networks. Parents with the lowest personal socio-economic status and social support were identified. Multivariate multinomial regression was used to consider whether the children of these parents were at increased risk of either infant or 1-4 mortality, in separate models using either parents' characteristics. There was no benefit found for higher SES or better social support with respect to child mortality. Children of fathers who had the poorest social support had lower 1-4 mortality risk (OR=0.52, p=0.037). Given that socio-economic status was not associated with child mortality, it seems unlikely that the explanation for the link between father's social support and mortality is linked to resource availability. Explanations for the risk effect of father's social ties may lie in decision-making around health maintenance and health care for children.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The current political context necessitates discussions of social justice within education, and here we bring together early childhood professionals from a variety of perspectives to become part of the important debates that must be had. This special issue of Contemporary Issues in Early Childhood was first conceived at a meeting of academics interested in social justice in early childhood education in Albury, NSW, Australia. All of the editors are members of the Social Justice strand of the ARC Funded Excellence in Research in Early Years Education Collaborative Research Network (CRN), which is led by Charles Sturt University in partnership with Queensland University of Technology and Monash University. Some of the authors in this issue are also members of this research network, but their work is presented here with that of others from a variety of contexts. We believe that the combination of perspectives taken challenges old thinking about social justice in early years education in innovative ways.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract Within the field of Information Systems, a good proportion of research is concerned with the work organisation and this has, to some extent, restricted the kind of application areas given consideration. Yet, it is clear that information and communication technology deployments beyond the work organisation are acquiring increased importance in our lives. With this in mind, we offer a field study of the appropriation of an online play space known as Habbo Hotel. Habbo Hotel, as a site of media convergence, incorporates social networking and digital gaming functionality. Our research highlights the ethical problems such a dual classification of technology may bring. We focus upon a particular set of activities undertaken within and facilitated by the space – scamming. Scammers dupe members with respect to their ‘Furni’, virtual objects that have online and offline economic value. Through our analysis we show that sometimes, online activities are bracketed off from those defined as offline and that this can be related to how the technology is classified by members – as a social networking site and/or a digital game. In turn, this may affect members’ beliefs about rights and wrongs. We conclude that given increasing media convergence, the way forward is to continue the project of educating people regarding the difficulties of determining rights and wrongs, and how rights and wrongs may be acted out with respect to new technologies of play online and offline.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As organisations increasingly engage in the selection, purchase, and adoption of packaged software products, how these activities are carried out in practice becomes increasingly relevant for researchers and practitioners. Our focus in this paper is to propose a framework for understanding the packaged software selection process. The functionalist literature on this area of study suggests a number of generic recommendations, which are based on rational assumptions about the process and view the decision making that takes place as producing the “best technology solution.’” To explore this, we conducted a longitudinal, in-depth study of packaged software selection in a small organisation. For interpretation of the case, we draw upon the Social Construction of Technology, a theoretical framework arguing that technology is socially constituted and regarding the process of development as contradictory and uncertain. We offer a number of contributions. First, we further our understanding of packaged software selection with the critique that we offer of the functionalist literature, drawing insights from the emerging critical/constructivist literature and expanding our domain of interest to encompass the wider environment. Second, we weave this together with our experiences in the field, drawing on social constructivism for theoretical support, to develop a framework of packaged software selection that shows how various actors shape the process.