scholarly journals On providing systematized access to consolidated principles, guidelines and patterns for usable security research and development†

2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Peter L Gorski ◽  
Emanuel von Zezschwitz ◽  
Luigi Lo Iacono ◽  
Matthew Smith

Abstract We present a systematization of usable security principles, guidelines and patterns to facilitate the transfer of existing knowledge to researchers and practitioners. Based on a literature review, we extracted 23 principles, 11 guidelines and 47 patterns for usable security and identified their interconnection. The results indicate that current research tends to focus on only a subset of important principles. The fact that some principles are not yet addressed by any design patterns suggests that further work on refining these patterns is needed. We developed an online repository, which stores the harmonized principles, guidelines and patterns. The tool enables users to search for relevant guidance and explore it in an interactive and programmatic manner. We argue that both the insights presented in this article and the web-based repository will be highly valuable for students to get a good overview, practitioners to implement usable security and researchers to identify areas of future research.

2021 ◽  
Vol 138-139 (1-2) ◽  
pp. 173-194
Author(s):  
Joanna Samul

The paper presents the main topics of research in the field of workplace spirituality in the context of human resource management (HRM). The study is based on a literature review and bibliometric analysis of publications in order to determine the main topics undertaken in this field and their importance for human resource management. In total, 123 publications from the Web of Science database from the years 1999–2020 were analyzed using cluster analysis applying the VOSviewer method. The paper provides definitions and dimensions of workplace spirituality, and considers the significance of spirituality in human resource management. The contribution of the research is to shed light on the concept of a spiritual workplace in HRM and to indicate directions for future research in this field.


Author(s):  
Ricardo Mendoza-González ◽  
Jaime Muñoz Arteaga ◽  
Francisco Álvarez Rodríguez

Currently, many powerful applications designed to combat social deviations are available, like the web-filtering systems, which measure the content of a website before submitting it to the user, notifying whether the content of the website presents (or not) information related to pornography, violence, racism, among others, and prompting the user to not accessing the site, or even blocking access to the website. Nevertheless, frequently the feedback of these systems is not well-designed, which may confuse users and lead to mistakes, disappointments, and misunderstandings. In order to reduce this concern, a method is provided to developers with guidance in designing usable security notifications to be incorporated in web-filtering systems. The method is structured through a library of user interface design patterns which integrates essential concepts of security and usability. The authors show the effectiveness of the patterns by using an illustrative example as a proof-of-concept together with a preliminary study.


Author(s):  
Rafael Moreno-Sanchez

The Semantic Web (SW) and Geospatial Semantic Web (GSW) are considered the next step in the evolution of the Web. For most non-Web specialists, geospatial information professionals, and non-computer-science students these concepts and their impacts on the way we use the Web are not clearly understood. The purpose of this chapter is to provide this broad audience of non-specialists with a basic understanding of: the needs and visions driving the evolution toward the SW and GSW; the principles and technologies involved in their implementation; the state of the art in the efforts to create the GSW; the impacts of the GSW on the way we use the Web to discover, evaluate, and integrate geospatial data and services; and the needs for future research and development to make the GSW a reality. A background on the SW is first presented to serve as a basis for more specific discussions on the GSW.


2019 ◽  
Vol 29 (1) ◽  
pp. 38-48 ◽  
Author(s):  
Xingjuan Luo ◽  
Lihong Gao ◽  
Jieyu Li ◽  
Yi Lin ◽  
Jie Zhao ◽  
...  

Author(s):  
Jeff Stanley ◽  
Ozgur Eris ◽  
Monika Lohani

Increasingly, researchers are creating machines with humanlike social behaviors to elicit desired human responses such as trust and engagement, but a systematic characterization and categorization of such behaviors and their demonstrated effects is missing. This paper proposes a taxonomy of machine behavior based on what has been experimented with and documented in the literature to date. We argue that self-presentation theory, a psychosocial model of human interaction, provides a principled framework to structure existing knowledge in this domain and guide future research and development. We leverage a foundational human self-presentation taxonomy (Jones and Pittman, 1982), which associates human verbal behaviors with strategies, to guide the literature review of human-machine interaction studies we present in this paper. In our review, we identified 36 studies that have examined human-machine interactions with behaviors corresponding to strategies from the taxonomy. We analyzed frequently and infrequently used strategies to identify patterns and gaps, which led to the adaptation of Jones and Pittman’s human self-presentation taxonomy to a machine self-presentation taxonomy. The adapted taxonomy identifies strategies and behaviors machines can employ when presenting themselves to humans in order to elicit desired human responses and attitudes. Drawing from models of human trust we discuss how to apply the taxonomy to affect perceived machine trustworthiness.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Laura Aibolovna Kuanova ◽  
Rimma Sagiyeva ◽  
Nasim Shah Shirazi

Purpose This paper aims to study the main trends of scientific research in Islamic finance’s social aspects to clarify place, role and functions, especially in the context of increasing social problems. To achieve this goal, this paper focuses on the social component of Islamic finance, analyzes publications on social Islamic finance in the Web of Science database, covering the period from 1979 to 2020, specify the geographical localization of research networks, determines the most cited authors and their scientific position. Design/methodology/approach The authors have applied several literature review techniques, a bibliometric citation and co-citation analysis, a co-authorship analysis and a review of the most cited papers. The analyzes’ results allow us to offer five future questions in Islamic social finance, zakat and waqf, which have not been investigated before and could influence Islamic social finance and Islamic finance research. Findings The authors also derive and summarize five leading future research questions. Research limitations/implications This is a limitation of using only the Web of Science Core Collection database as the premier resource and the most trusted citation index for the world’s scientific and scholarly research. Further study might expand the types of analyzed units, include more keywords and include other databases, such as Scopus. Originality/value This paper can be considered as an inspirational one to future researchers and policymakers in Islamic social finance.


Author(s):  
Stanley R.M. Oliveira ◽  
Osmar R. Zaïane

Privacy-preserving data mining (PPDM) is one of the newest trends in privacy and security research. It is driven by one of the major policy issues of the information era—the right to privacy. This chapter describes the foundations for further research in PPDM on the Web. In particular, we describe the problems we face in defining what information is private in data mining. We then describe the basis of PPDM including the historical roots, a discussion on how privacy can be violated in data mining, and the definition of privacy preservation in data mining based on users’ personal information and information concerning their collective activities. Subsequently, we introduce a taxonomy of the existing PPDM techniques and a discussion on how these techniques are applicable to Web-based applications. Finally, we suggest some privacy requirements that are related to industrial initiatives and point to some technical challenges as future research trends in PPDM on the Web.


2016 ◽  
Vol 24 (5) ◽  
pp. 418-451 ◽  
Author(s):  
Fredrik Karlsson ◽  
Ella Kolkowska ◽  
Frans Prenkert

Purpose The purpose of this paper is to survey existing inter-organisational information security research to scrutinise the kind of knowledge that is currently available and the way in which this knowledge has been brought about. Design/methodology/approach The results are based on a literature review of inter-organisational information security research published between 1990 and 2014. Findings The authors conclude that existing research has focused on a limited set of research topics. A majority of the research has focused management issues, while employees’/non-staffs’ actual information security work in inter-organisational settings is an understudied area. In addition, the majority of the studies have used a subjective/argumentative method, and few studies combine theoretical work and empirical data. Research limitations/implications The findings suggest that future research should address a broader set of research topics, focusing especially on employees/non-staff and their use of processes and technology in inter-organisational settings, as well as on cultural aspects, which are lacking currently; focus more on theory generation or theory testing to increase the maturity of this sub-field; and use a broader set of research methods. Practical implications The authors conclude that existing research is to a large extent descriptive, philosophical or theoretical. Thus, it is difficult for practitioners to adopt existing research results, such as governance frameworks, which have not been empirically validated. Originality/value Few systematic reviews have assessed the maturity of existing inter-organisational information security research. Findings of authors on research topics, maturity and research methods extend beyond the existing knowledge base, which allow for a critical discussion about existing research in this sub-field of information security.


2017 ◽  
Vol 41 (6) ◽  
pp. 478-481 ◽  
Author(s):  
Sung Chul Choi ◽  
Yeonmi Yang ◽  
Seunghoon Yoo ◽  
Jiyeon Kim ◽  
Taesung Jeong ◽  
...  

Objective: Finding a balance between sedation efficacy and safety remains an ongoing challenge. In children, the risk of sedation-related complications is relatively high. It is of utmost importance to determine the factors related to improved overall sedation outcomes. However, most previous reports have been based on small samples at single institutions. The Korean Academy of Pediatric Dentistry (KAPD) developed a Korean Pediatric Dental Sedation Registry using a web-based platform. Study design: Specialists in pediatric dental sedation selected the itemized list included within the registry through an extensive literature review. The web-based registry was built into the KAPD homepage to facilitate easy access to the sedation data. All teaching and university hospitals agreed to participate in the Korean Pediatric Dental Sedation Registry. Conclusion: This is the first attempt to collect sedation data on a nationwide scale in the field of pediatric dentistry. The sedation database established with the registry may facilitate standardizing and improving pediatric dental sedation clinical practices.


2021 ◽  
Vol 29 (3) ◽  
pp. 151-161
Author(s):  
Elina Mikelsone ◽  
Aivars Spilbergs ◽  
Jean-Pierre Segers

Purpose: Research web-based idea management system (IMS) application benefits and their relations with different IMS types and how it is all related to the IMS results – idea quality, idea quantity and involvement. Design/Method/Approach: On the basis of a commercially available web-based IMS study and the analysis of cases of the IMS use, the main benefits of IMS were identified. The survey verified the most typical benefits for the IMS use. On the basis of a thematic analysis of the benefits, they were grouped together in advance in the thematic groups that were addressed. Data collection: the survey of 400 enterprises with web-based IMS experience was carried out. Data analysis: descriptive statistics and MANOVA analysis were utilized. Findings: The potential benefits of IMS in 4 main groups: the benefits of an idea management (IM) process, the benefits of innovation management, the benefits of cooperation, and the benefits of general management were determined.  According to MANOVA, all groups of benefits have strong connections with all types of a web-based IMS. Originality/Value: This study fills the previously identified need to clarify the types of IMS and their impact on the results and benefits of IMS application. Academic contribution to the study is (1) it is the broadest survey-based study of the web-based IMS benefits; (2) it applies two classifications of IMS; (3) it explores relations among the results, benefits and IMS types. Practical contribution is the outcomes of the study will help companies to understand what results can be achieved using different types of IMS. Research Limitations/Future Research: This research opens avenues for the future research on the web-based IMS application in organizations exploring each of the benefit relations with the web-based IMS types.   Paper type: Empirical.


Sign in / Sign up

Export Citation Format

Share Document