Information Technology and Privacy

Author(s):  
Jeffrey M. Stanton

With the rising popularity of the Internet and some widely publicized occurrences of privacy loss due to information technology, many individuals have recently become more concerned with the privacy and security of sensitive information. These concerns have special relevance within work organizations because of the substantial amounts of data that organizations typically collect about the work and non-work activities of their employees. This chapter presents a new theoretical perspective called Information Boundary Theory, that describes whether, when, and why employees care about the privacy and security of sensitive information at work. Analysis of interview data from N=25 non-managerial U.S. workers provided preliminary support for four of the new theory’s research propositions. The chapter describes implications of the theory and the research findings for the design and deployment of information technology systems within organizations and maps a research agenda for future uses of the theory.

In this first edition book, editors Jolly and Jarvis have compiled a range of important, contemporary gifted education topics. Key areas of concern focus on evidence-based practices and research findings from Australia and New Zealand. Other contributors include 14 gifted education experts from leading Australian and New Zealand Universities and organisations. Exploring Gifted Education: Australian and New Zealand Perspectives, introduced by the editors, is well organised. Jolly and Jarvis’s central thesis in their introduction is to acknowledge the disparity between policy, funding and practice in Australia and New Zealand. Specifically, in relation to Australia, they note that a coordinated, national research agenda is absent, despite recommendations published by the Australian Senate Inquiry almost 20 years ago.


2003 ◽  
Vol 28 (2) ◽  
pp. 5-13 ◽  
Author(s):  
Judy Cashmore ◽  
Frank Ainsworth

This article presents the argument for the development of a national research agenda for out-of-home care and what is needed to make this agenda work. The need for a commitment to research, adequate funding and access to reliable data, plus the rapid transfer of research findings, into practice, is outlined. It also reports on the outcomes of a research agenda-building workshop sponsored by the National Child and Family Welfare Research Coalition and held in September 2002. This workshop provided an opportunity to generate a list of research question that researchers, service providers and practitioners saw as significant priorities in a national research agenda.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


Author(s):  
Rahmad Wahyudi ◽  
Djoko Poernomo ◽  
Zarah Puspitaningtyas

This study aims to determine the effect of information technology, satisfaction and motivation on teacher performance. Respondents are civil servant teachers of Public Elementary School in Kendit sub-district, Situbondo district, amounting to 104 teachers, which amounts to 104 teachers. The sample size is 83 people. Research using multiple linear regression analysis. The research findings show that there is no influence between information technology variables on teacher performance. While the variable of satisfaction and motivation have an effect on to teacher performance


2021 ◽  
Vol 19 (2) ◽  
pp. pp95-103
Author(s):  
Noel Pearse

Qualitative research has been criticised for not building a distinctive body of knowledge, leading to fewer publications and citations. In the light of this critique, this paper offers guidance on how qualitative researchers can contribute to developing a distinctive and cumulative body of knowledge, thereby attracting more attention to their research. In pursuit of this aim, there are four objectives addressed in this paper. The first objective is to explain the relevance and value of deductive qualitative approaches to theory building. Secondly, to illustrate how examining the maturation of a concept can help decide the appropriateness of a particular research approach. This paper explains how in their planning, researchers need to confirm their intention to contribute to theory development and to ensure that this is appropriate, given the stage of maturation of the concept to be investigated. The third objective is to offer guidance on the philosophical assumptions of the researcher and how to test research propositions. Therefore, it is advised that data collection and analysis should take place within a post-positivist paradigm, and that the field work should be designed and carried out with research propositions as a point of departure. The final research objective is to explain how the findings of a deductive qualitative study should be handled to demonstrate the contribution of the study to the body of knowledge. Here guidance is offered on the contextualisation and generalisation of research findings.


2021 ◽  
Vol 912 (1) ◽  
pp. 012014
Author(s):  
M Syafiq ◽  
Sirojuzilam ◽  
Badaruddin ◽  
A Purwoko

Abstract This research aims to examine the relationship between information technology and coastal development in Asahan Regency, North Sumatera Province, Indonesia. Through this research, coastal community opinions were collected using structured questionnaires. A structural equation modeling (SEM) approach was employed to test a hypothesized model constructed based on theories and previous studies. In addition, a new combination of existing indicators was used as a novelty of this research. The research result indicates that information technology has not significantly affected coastal development. Theoretical and practical implications of the research findings for policymakers are discussed.


2018 ◽  
pp. 1-27 ◽  
Author(s):  
Sukanya Panda ◽  
Santanu Kumar Rath

AbstractThis study precisely investigates the relationship of information technology (IT) and knowledge management (KM) capabilities with organizational agility along with the moderating influence of external environmental actors on this linkage. A matched-pair field survey was conducted and pretested structured questionnaires were administered to accumulate primary responses from 300 business and IT personnel working in various Indian financial groups. The research findings encompass first, IT and KM capabilities are enablers of organizational agility, while KM capability is more effective on agility. Second, a more diverse and less hostile environment is required for IT and KM capabilities to have more positive influence on agility, yet the moderating effects of environmental factors are found to be more on IT–agility linkage than on KM–agility relationship. These inferences provide several implications for the business and IT executives to concentrate on leveraging both IT and KM capabilities for generating augmented organizational agility.


2012 ◽  
pp. 1141-1166
Author(s):  
Milan Petkovic ◽  
Luan Ibraimi

The introduction of e-Health and extramural applications in the personal healthcare domain has raised serious concerns about security and privacy of health data. Novel digital technologies require other security approaches in addition to the traditional “purely physical” approach. Furthermore, privacy is becoming an increasing concern in domains that deal with sensitive information such as healthcare, which cannot absorb the costs of security abuses in the system. Once sensitive information about an individual’s health is uncovered and social damage is done, there is no way to revoke the information or to restitute the individual. Therefore, in addition to legal means, it is very important to provide and enforce privacy and security in healthcare by technological means. In this chapter, the authors analyze privacy and security requirements in healthcare, explain their importance and review both classical and novel security technologies that could fulfill these requirements.


Author(s):  
Mohanad Halaweh ◽  
Ahmed El Massry

The term BIG DATA has been increasingly used recently. Big data refers to the massive amount of data that are processed and analyzed using sophisticated technology to gain relevant insights that will help top executives with the decision-making process. This study is an attempt to investigate the big data implementation in organizations. The literature review reveals an initial model of indicators that might affect big data implementation. This model was examined and extended by primary data collected from key people (CEO and managers) from ten organizations. The extended model of indicators, which is the result from this research, includes the factors that would affect the success or failure of big data implementation in organizations. The research findings showed the following factors: top management support, organizational change, IT infrastructure, skilled professional, contents (i.e. data), data strategy, data privacy and security.


Sign in / Sign up

Export Citation Format

Share Document