39 resultados para Personal information

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

 This research investigated the proliferation of malicious applications on smartphones and a framework that can efficiently detect and classify such applications based on behavioural patterns was proposed. Additionally the causes and impact of unauthorised disclosure of personal information by clean applications were examined and countermeasures to protect smartphone users’ privacy were proposed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Personal information and communication technologies (ICTs) have become commonplace. Today many people own, or have access to, a range of different computing and communication devices, information technologies, and services, which they incorporate into their everyday routines. Increasingly, these technologies impact the way that individuals work, socialize, and play. Workers are bringing their personal ICTs to the office, and organizations are tailoring their computing environments toward ubiquitous integration with personal ICTs. These developments are opening up new ways of working, but they also create new challenges for organizations in accommodating this “nonaffiliated” use as part of their information systems environments. In this article we propose a framework for analyzing the composition and impact of personal ICT ensembles. The framework is positioned as pre-theory that invites further development and empirical testing. We illustrate how the proposed framework could be applied to consider personal ICT use across the work/home context. Several implications stemming from the notion of a personal ICT ensemble are highlighted, including practical considerations for nonaffiliated use in organizations. We conclude with suggestions for further development of the proposed framework.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Evidence from social psychology confirms that strong relationships are founded on deep knowledge of others gained over long periods after sharing personal information. The existence, benefit, and management of relationships are also topics of increasing interest in Marketing. This paper reports on the results of a study of sales persons’ assessments of their personal acquaintance with friends and customers. The results indicate that personal acquaintance as a construct and measure can be successfully employed in a business context and used to distinguish among friends and good and bad customers. The findings open the way for the use of the construct in a commercial context as well as in the development of marketing theory. Limitations and avenues for future research are given.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The existence, benefit and management of customer–salesperson relationships in the marketing of financial services are topics of increasing interest. Much of the sales and marketing literature implies that because of time spent together, salespeople and some of their customers develop close relationships that are akin to friendships. Evidence from social psychology confirms that strong relationships are founded in deep knowledge of others gained over long periods after sharing personal information. This paper reports on the results of a study of salespeople's assessments of their personal acquaintance with customers and friends in a financial services setting. The results indicate that salespeople do not classify customers as friends on all the dimensions of personal acquaintance. Furthermore, the nature of personal acquaintance differs between ‘good’ customers (those salespeople enjoy serving), and ‘bad’ (those they do not), with the exception of the personal acquaintance dimensions of interaction frequency and personal disclosure. We discuss the implications for practice and make recommendations for future research.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

With the growing momentum of wireless revolution and mCommerce explosion, it is evident that mobile devices are becoming a critical component of the new digital economy. As mobile markets continue to mature, being able to pay using the mobile handset will be key to the development of next generation services. The current market penetration of mobile phones in conjunction with the expected growth of mCommerce, offers high potential for mPayment growth over the next few years. When mobile phones are equipped with a device to protect personal information, the security level of an entire service, including the network, improves considerably. However, the mobile payments market today is typical of an emergent one, encumbered with an abundance of approaches and concepts that may not interoperate. In this paper, we have explored the broad range of available mPayment methods, emerging issues in standardization, security and some proposed/ existing solutions.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The “self-engagement research method” is a set of research procedures, which aims to search latent (hidden) attitudes within a given group of individuals, such as disadvantaged women. This method also examines the research participants practises through an intensive involvement in the process of research. Research on self-regulation has also tended to emphasize having personal control over an event as the primary determinant of whether individuals can effectively monitor and alter their behaviour to attain a desired end state (W. Britt, 1999, 699).

The “self-engagement procedure” originated from fieldwork of social research, especially from the present author’s experiences as a researcher and practitioner on women’s empowerment under the micro-finance programme in Women’s Empowerment Foundation, Auckland and in Grameen Bank Micro-finance programme (Nobel prize winner Professor Mohammed Yunus on poverty reduction through micro-finance).

This technique is based on the oft-cited phenomenon of discrepancies between what research Participants say what they often believe (http://en.wikipedia.org/wiki/Participant_observation). This follows on Gabriel (1991:123-126) namely that participant observation is a useful technique for gaining insight into facts and is also useful for the rural poor or marginal groups, who are unable to communicate their problems. The problem is that since the 1980s, some anthropologists and the social scientists have questioned the degree to which participant observation can give truthful insight into the minds of other people (Geertz, Clifford,1984 & Rosaldo, Renato, 1986).

This paper discusses the difficulties found in using participant observation to discover discrepancies between what participants say and what they really believe. It also discusses self-engagement research procedures which the author has developed through the long-term research experiences with disadvantaged groups of women in Auckland. These procedures discover the discrepancies between what participants say and what is in their mind.

These self-engagement procedures were used from the beginning of the fieldwork to locate research areas and get access to the study settings. It was found there are gaps in this method. For example, there are no systematic processes in which researchers can gain access into the community or be welcomed by research participants. It was also difficult to discover the insight into the facts that cause disempowerment and how micro-finance impacts everyday life on research participants. McCracken (1988 cited in Mertens, 1998:321) argued that researchers collect data directly through observation, but it is not possible to imitate, repeat involvement in the experiences of research participants.

This research draws on and extends the long traditional of participant observation in social research. In field research practises, participant observation was used in different ways for gaining insight into different aspects. A good example is the use and mis-use of the “field journal” in this type of research. The journal typically explained and analysed experiences and understanding of participant observation, in-depth interviews and group discussions on the impact of micro-finance on women’s lives. However, researchers later realised that there were gaps in collected knowledge that needed to be filled. This led to “self-engagement procedures” which developed greater confidence that collected data could truly give insight into patterns of behaviour.

This paper addresses sensitive issues of women’s empowerment under the micro finance programmes and makes a contribution to the literature. The “self-engagement method” detects the “silent facts” of women’s lives. In research conducted amongst disadvantaged women in Auckland, New Zealand and Grameen Bank micro-finance programme in Bangladesh. The method of self-engagement led to better data when participants (both research and subjects) clearly perceived the purpose of the research, when participants have control over providing personal information, and when subjects can build trust with researchers. One overall lesson of this research is that research data and findings are more generalisaable and valid when the participants in the research process understand the relevancy to his/her disadvantaged position and the causes of this, and when participants perceive that it is an opportunity to voice his/her disadvantages and causes.

The “self-engagement research method” involves a variety of behavioural activities. This paper also attempts to discuss in detail, these activities. This paper attempts to discuss the process of the “self-engagement method” in a systematic way. This has been addressed in the research process, in which research participants and researchers become self-engaged to detect the reality of the impact of micro finance to empower the disadvantaged. The stages of self-engagement procedures were developed and followed throughout field research into entrepreneurial behaviour of disadvantaged women in Auckland.

Research on self-regulation has also tended to emphasize having personal control over an event as the primary determinant of whether individuals can effectively monitor and alter their behaviour to attain a desired end state (W. Britt, 1999, 699).

A suitable research method could identify the empowerment/disempowerment of a disadvantaged group of individuals. The self-engagement procedures create a process, in which research participants and researchers become ‘self-engaged’ and gain insight into facts.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

PIM systems help organise people’s lives by providing address book, schedule and task management facilities. Current PIM’s manage this information by collecting and storing it as textual data. With the advent of the wearable computer, using text only is no longer an efficient and convenient mechanism for managing personal information. A wearable computer should use data from various sensors (video, audio, location, environmental, user state) to organise personal information. In this paper we examine how audio can be used to enhance the facilities provided by text-only PIM’s and present an example implementation of an audio based wearable PIM (wPIM) that has the capability of storing and retrieving PIM information as audio recordings. The results of the user evaluation we conducted, which was carried out outside of the laboratory, suggests that users strongly accept audio as a way to manage their personal information and to augment their memory, supporting our hypothesis that audio enhances wearable personal information management.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Social networking systems (SNS’s) such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting with "strangers" through the advent of a large number of social applications. The attractiveness of such software has meant a dramatic increase in the number of frequent users of SNS’s and the threats which were once common to the Internet have now been magnified, intensified and altered as the potential for criminal behaviour on SNS’s increases. Social networking sites including Facebook contain a vast amount of personal information, that if obtained could be used for other purposes or to carry out other crimes such as identity theft. This paper will focus on the security threats posed to social networking sites and gain an understanding of these risks by using a security approach known as “attack trees”. This will allow for a greater understanding of the complexity associated with protecting Social Networking systems with a particular focus on Facebook.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Social media provides rich sources of personal information and community interaction which can be linked to aspect of mental health. In this paper we investigate manifest properties of textual messages, including latent topics, psycholinguistic features, and authors' mood, of a large corpus of blog posts, to analyze the aspect of social capital in social media communities. Using data collected from Live Journal, we find that bloggers with lower social capital have fewer positive moods and more negative moods than those with higher social capital. It is also found that people with low social capital have more random mood swings over time than the people with high social capital. Significant differences are found between low and high social capital groups when characterized by a set of latent topics and psycholinguistic features derived from blogposts, suggesting discriminative features, proved to be useful for classification tasks. Good prediction is achieved when classifying among social capital groups using topic and linguistic features, with linguistic features are found to have greater predictive power than latent topics. The significance of our work lies in the importance of online social capital to potential construction of automatic healthcare monitoring systems. We further establish the link between mood and social capital in online communities, suggesting the foundation of new systems to monitor online mental well-being.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

As mobile devices have become the personal information-processing interface of choice, many individuals seem to swiftly follow fashion. Yet, the literature is silent on how early adopters of mobile devices overcome uncertainties related to shifts in technology. Based on purposive sampling, this paper presents detailed insights into why and how five closely related individuals made the decision to adopt the iPhone before it was available through traditional supply chains. Focusing on the role played by social networks, we analyze how adoption threshold, opinion leaders, social contagion, and social learning shaped adoption behaviors and outcomes. The analyses confirm that network structures impact the early decision to accept the iPhone; they show that when facing uncertainty, adoption decisions emerged as a combined result of individual adoption reflections and major influences from the social network as well as behaviors observed within the network, and, they reveal interesting behaviors that differed from expectations. In conclusion, we discuss implications for both theory and practice.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

As mobile devices have become the personal information-processing interface of choice, many individuals seem to swiftly follow fashion. Yet, the literature is silent on how early adopters of mobile devices overcome uncertainties related to shifts in technology. Based on purposive sampling, this paper presents detailed insights into why and how five closely related individuals made the decision to adopt the iPhone before it was available through traditional supply chains. Focusing on the role played by social networks, we analyze how adoption threshold, opinion leaders, social contagion, and social learning shaped adoption behaviors and outcomes. The analyses confirm that network structures impacted the early decision to accept the iPhone; they show that when facing uncertainty, adoption decisions emerged as a combined result of individual adoption reflections and major influences from the social network as well as behaviors observed within the network; and, they reveal interesting behaviors that differed from expectations. In conclusion, we discuss implications for both theory and practice.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

 This article presents SOR, a vehicular social network to enable social communications and interactions among users on the road during their highway travels. Motivated by the limited connection to Internet contents and services, the essential goal of SOR is to encourage distributed users on the road to spontaneously contribute as the information producer, assembler, and distributer in order to provide timely and localized infotainments to each other through low-cost inter-vehicle communications. To be specific, SOR enables individual users to maintain a personal blog, similar to one on Facebook and Twitter, over which users can create and share personal content information to the public such as travel blogs with pictures and videos. By accessing each other's SOR blogs and commenting on interesting topics, passengers can exchange messages and initiate social interactions. In the specific highway environment, SOR addresses two challenges in the context of vehicular social communications. First, vehicular social communications tend to be frequently interrupted by diverse vehicle mobility and intermittent intervehicle connections, which is annoying to users. To address this issue, SOR adopts a proactive mechanism by estimating the connection time between peer vehicles, and recommending vehicles with relatively long-lasting and stable intervehicle connections for social communications. Second, as users on the road are typically strangers to each other, they are reluctant to disclose personal information to others. This makes it challenging to identify users of shared interests and accordingly restricts the scale of users' social interactions. To remedy that, SOR provides a secured solution to protect sensitive user information during social communications. Lastly, we use simulations to verify the performance of SOR. © 2015 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

 Security questions are often based on personal information that is limited in variety, available in the public record and very difficult to change if compromised. A personalized folktale shared only by the communicating parties provides memorizable basis for individualized security questions that can be readily replaced in the event of a security breach. We utilize the Propp theory of narrative to provide a basis of abstraction for story generation systems. We develop a proof-of-concept system based on placeholder replacement to demonstrate the generation of repudiate and memorizable questions and answers suitable for online security questions. A 3-component protocol is presented that demonstrates the use of this process to derive a shared secret key through privacy amplification. This combination of story generation and communication security provides the basis for improvements in current security question practice.