121 resultados para Ethics of information


Relevância:

100.00% 100.00%

Publicador:

Resumo:

I show that the principal and the agent may each prefer that the principal or the agent has imperfect information about the principal's technology in a principal-agent environment with moral hazard. Principals expend considerable resources on data cumulation and analysis. However, such investments in information acquisition are benecial only if the agent will know that the principal is not ignorant or it allows the principal to implement a dierent action. When the principal is perfectly informed about her technology, the agent prefers to be ignorant. In addition, the value of perfect information for the agency is negative if the principal would implement the same action with either possible technology. I also investigate the dierences between ex ante and ex post contracting, and the ramications of the principal being ignorant or potentially ignorant about the technology. Finally, I determine if the principal's utility varies continuously with the degree of informativeness of the agent about the principal's technology. In this vein, I determine whether the agent's uncertainty may make the principal better o if she has the less informative technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The examination of a practical issue with a web site has led, in this paper, directly to the consideration of the need for, and an assessment of the impact of, an approach based on fundamental theories of ‘what is’, to examine what information systems research is and the relations of its component areas of endeavour. The paper presents an examination of the use of the philosophical field of ontologies, and specifically the use of the ontological approaches upon which to base categories of information systems research activities. This theoretical analysis is intended to be used as the basis from which to develop a methodology to undertake the development of the categorial scheme for the web site that initiated the research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In recent years, we have witnessed many information security developmental trends. As a consequence, the dimensions of information security - once single disciplinary area - have become multifaceted and convoluted. This paper aims to (1) recapitulate these key developments: (2) argue that the emergence of many complex information security dimensions are the result of 'constant change agents' (CCAs); (3) discuss the implications on Australia's society, i. e. government, companies and individuals; and (4) propose key consideration areas and possible solutions thereof. We hope that the discussion presented here will position Australia to make better aligned information security and strategic plans, such as choosing appropriate investments and adopting effective solutions to strengthen and secure Australia's national information security posture.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As small and medium enterprises develop their capacity to trade  electronically, they and their trading partners stand to gain considerable benefit from the resulting transaction efficiencies and business  relationships. However, this raises the question of how well small business manages its IT security and the threats that security lapses may pose to the wider trading network. It is in the interest of all members of an electronic trading network, as well as governments, to assist smaller companies to secure their business data. This paper considers the relationship between IT security management and IT policy implementation among small  businesses involved in business-to-business eCommerce. It reports the results of a survey of 240 Australian small and medium businesses  operating in a cross-industry environment. The survey found a low level of strategic integration of eCommerce along with inadequate IT security among the respondents, despite the fact that 81% were doing business online and 97% identified their business data as confidential. Businesses which implemented satisfactory levels of security technologies were more likely than others to have an information technology policy within the organisation. The paper proposes a model that outlines the development of security governance and policy implementation for small and medium businesses.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In settings such as electronic markets where trading partners have conflicting interests and a desire to cooperate, mobile agent mediated negotiation have become very popular. However, agent-based negotiation in electronic commerce involves the exchange of critical and sensitive data that must be highly safeguarded. Therefore, in order to give benefits of quick and safe trading to the trading partners, an approach that secures the information exchanged between the mobile agents during e-Commerce negotiations is needed. To this end, we discuss an approach that we refer to as Multi-Agent Security NEgotiation Protocol (MASNEP). To show that MASNEP protocol is free of attacks and thus the information exchanged throughout electronic negotiation is truly secured, we provide a formal proof on the correctness of the MASNEP.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: For successful prosecution of child sexual abuse, children are often required to provide reports about individual, alleged incidents. Although verbally or mentally rehearsing memory of an incident can strengthen memories, children’s report of individual incidents can also be contaminated when they experience other events related to the individual incidents (e.g., informal interviews, dreams of the incident) and/or when they have similar, repeated experiences of an incident, as in cases of multiple abuse.

Method: Research is reviewed on the positive and negative effects of these related experiences on the length, accuracy, and structure of children’s reports of a particular incident.

Results: Children’s memories of a particular incident can be strengthened when exposed to information that does not contradict what they have experienced, thus promoting accurate recall and resistance to false, suggestive influences. When the encountered information differs from children’s experiences of the target incident, however, children can become confused between their experiences—they may remember the content but not the source of their experiences.

Conclusions: We discuss the implications of this research for interviewing children in sexual abuse investigations and provide a set of research-based recommendations for investigative interviewers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the fundamental concepts needed to understand the broad spectrum of activities encompassed by the Information Warfare phenomenon. It provides a theoretical background to these activities, and examines the context in which these are most effective.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports on a study on the perceived effectiveness of educational resources within the context of a single course in a first-year biology program at the University of Sydney (Australia). The overall study examined the dynamic state of perceptions towards these resources by the major stakeholders involved with the course (students, teaching staff, and technical staff). A major focus of the research was the extent to which the students used the computer-based resources made available to them, and staff and students' perceptions of the usefulness of these resources in supporting their learning. Specifically, results are discussed related to student use of computers and the Internet, use of biology online materials in the virtual learning environment, use and perceptions of communication technologies, and use and perceptions of computer-based online resources. Data were collected from the students using surveys and focus groups and from staff using surveys and interviews within an action-research paradigm. While the majority of students found the resources to be of use in supporting learning, some did not find them useful, and some did not use them at all. In comparison, the staff had higher expectations of both usage and usefulness. The level of student use was not a function of access to computers or the Internet, so the findings suggest that the provision of online resources will not necessarily generate value-added learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Designing and maintaining websites can be costly for small business, therefore the decision to embark on a Web strategy should not be taken lightly. Critical to the success of a web site is its design. Most small business web sites focus on information provision yet for many it would appear there is a lack of understanding of how to design a web site that delivers information effectively to users. This paper presents research that examined the effectiveness of small business web sites from the perspective of users. Findings indicate that: users found many sites contained too much irrelevant information; users were critical of sites where not enough information was provided; how the text is organised is
important; and, the quality and quantity of information provided on the websites and the display and size of the text influenced the ability of users to complete the task and not be frustrated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this publication is to provide basic information about, and links to, either paper or electronic journal web sites, and more particularly, to provide links to their instructions to authors information.