SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Padyab Ali) "

Search: WFRF:(Padyab Ali)

  • Result 1-27 of 27
Sort/group result
   
EnumerationReferenceCoverFind
1.
  •  
2.
  • Faizi, Ana, et al. (author)
  • From rationale to lessons learned in the cloud information security risk assessment : a study of organizations in Sweden
  • 2022
  • In: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 30:2, s. 190-205
  • Journal article (peer-reviewed)abstract
    • Purpose:This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.Design/methodology/approach:Four large organizations and five municipalities that use cloud services and conduct ISRA to adhere to their information security risk management practices were studied. Data were gathered qualitatively to answer the study’s research question: How is ISRA practiced on the cloud? The Coat Hanger model was used as a theoretical lens to study and theorize the practices.Findings:The results showed that the organizations aimed to follow the guidelines, in the form of frameworks or their own experience, to conduct ISRA; furthermore, the frameworks were altered to fit the organizations’ needs. The results further indicated that one of the main concerns with the cloud ISRA was the absence of a culture that integrates risk management. Finally, the findings also stressed the importance of a good understanding and a well-written legal contract between the cloud providers and the organizations using the cloud services.Originality/value:As opposed to the previous research, which was more inclined to try out and evaluate various cloud ISRA, the study provides insights into the practice of cloud ISRA experienced by the organizations. This study represents the first attempt to investigate cloud ISRA that organizations practice in managing their information security.
  •  
3.
  • Habibipour, Abdolrasoul, 1979-, et al. (author)
  • Exploring Factors Influencing Participant Drop-Out Behavior in a Living Lab Environment
  • 2017
  • In: Scandinavian Conference on Information Systems. - Cham : Springer. - 9783319646947 - 9783319646954 ; , s. 28-40
  • Conference paper (peer-reviewed)abstract
    • The concept of “living lab” is a rather new phenomenon that facilitates user involvement in open innovation activities. The users’ motivations to contribute to the living lab activities at the beginning of the project are usually higher than once the activities are underway. However, the literature still lacks an understanding of what actions are necessary to reduce the likelihood of user drop-out throughout the user engagement process. This study aims to explore key factors that are influential on user drop-out in a living lab setting by engaging users to test an innovation during the pilot phase of the application’s development. The stability of the prototype, ease of use, privacy protection, flexibility of the prototype, effects of reminders, and timing issues are the key influential factors on user drop-out behavior. This paper summarizes the key lessons learned from the case study and points to avenues for future research.
  •  
4.
  • Habibipour, Abdolrasoul, 1979-, et al. (author)
  • Social, Ethical and Ecological Issues in Wearable Technologies
  • 2019
  • In: AMCIS 2019 Proceedings. - : Association for Information Systems.
  • Conference paper (other academic/artistic)abstract
    • The rapid growth of Internet of Things (IoT) has given rise to a plethora of wearable devices integrated into daily life, however achieving end-user’s long-term adoption is still an issue. The purpose of this paper is to investigate social, ethical and ecological issues related to wearable technologies from end-users’ perspectives. We undertook a systematic literature review as well as two rounds of interviews with domain experts as well as end-users of IoT wearable devices to find relevant issues related to social, ethical and ecological. After synthesizing the results, eighteen issues found to be relevant to the wearable technologies. These issues have important implications for reducing the negative barriers that challenge the adoption of wearable technologies. The originality of this study lies with its non-technological focus that provides insights into issues that are rooted into individuals’ concerns.
  •  
5.
  • Islami, Lejla (author)
  • Envisioning Usable Privacy in Smart Environments : A Technical and Intercultural Perspective
  • 2024
  • Doctoral thesis (other academic/artistic)abstract
    • Smart environments provide users with a large number of new services that will improve their lives, such as smarter and more efficient transportation, advanced smart home services, and pervasive healthcare. Yet, they also have the potential for collecting staggering amounts of personal information, which, if misused, poses a multitude of privacy threats to users ranging from tracking, stalking to monitoring and profiling. Consequently, the users’ right to informational self-determination is at stake in smart environments. Therefore, there is a need for solutions that empower individuals with control over their data in smart environments. Privacy-Enhancing Technologies (PETs) and privacy by design and by default can help to protect users’ privacy. In particular, usable Privacy-Enhancing Identity Management (PE-IdM) can re-establish user control and, thus, informational self-determination by offering users a selection of meaningful preference-based privacy settings that they could choose from to lessen the configuration burden of privacy settings. However, different privacy trade-offs need to be considered and managed for the configuration of the identity management system, as well as various factors influencing users’ privacy preferences. Guidelines for the design of usable management of privacy settings that address varying end-user preferences for control, location sharing and privacy conflicting goals are needed. The objective of this thesis is to propose viable approaches for enforcing usable PE-IdM for smart environments, with a focus on vehicular ad hoc networks (VANETs). To that end, we unravel the technical state of the art regarding the problem space and solutions. We employ qualitative and quantitative empirical Human-Computer Interaction (HCI) research methods to investigate different users’ privacy preferences and factors affecting such preferences. Our results demonstrate a cultural and regional influence on willingness to share location data and preferences for trade-offs for location privacy. Based on our results, we elicit end-users and design requirements and propose high-level design guidelines for usable PE-IdM for VANETs. These guidelines aim to simplify privacy and identity management for users by offering selectable settings that will cater for their different privacy needs and preferences.
  •  
6.
  • Lindqvist, Gunnar, et al. (author)
  • How do Bitcoin Users Manage Their Private Keys?
  • 2021
  • In: Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021). ; , s. 11-21
  • Conference paper (peer-reviewed)abstract
    • Bitcoin has emerged as the most recognisable cryptocurrency due to its usages as a speculative asset,medium of exchange and store of value. The fundamental characteristics of trustless and secure soundmoney have made it appealing to people. As a result of the immutability of Bitcoin, monetary lossescaused by user security mistakes such as lose possession of private keys may hinder Bitcoin usage. Wesurveyed 339 Bitcoin users to explore the interaction between individuals and the technology of Bitcoinof how they safeguard their Bitcoin private keys. The results showed that users employed technologiesto enhance the protection of their Bitcoin private keys, such as encryption and multi-signature. However,a proportion of users employed less secure approaches. The study results suggest that users preferencrypting their private keys rather than multi-signature due to convenience and ease of use. Hardwarewallets were moreover the most used wallet by the participants. 
  •  
7.
  • Lundgren, Martin, et al. (author)
  • A Review of Cyber Threat (Artificial) Intelligence in Security Management
  • 2023. - 1
  • In: Artificial Intelligence and Cybersecurity. - Cham : Springer Nature Switzerland AG. - 9783031150296 - 9783031150326 - 9783031150302 ; , s. 29-45
  • Book chapter (peer-reviewed)abstract
    • Managing cybersecurity within organizations typically relies on careful consideration and management of its risks. By following an iterative—often sequential—risk management process, an organization’s exposure to risks can be assessed by weighing organizational digital asset values against the probability of being harmed by a threat [29]. However, this approach has been criticized for reflecting only a snapshot of the organization’s assets and threats. Furthermore, identifying threats and the ability to remain updated on current threats and vulnerabilities are often dependent on skilled and experienced experts, causing risks to be primarily determined based on subjective judgment [46]. Nevertheless, this also poses a challenge to organizations that cannot stay up-to-date with what assets are vulnerable or attain personnel with the necessary experience and know-how to obtain relevant information on cybersecurity threats towards those assets [8, 30, 37].
  •  
8.
  • Lundgren, Martin, et al. (author)
  • Security and Privacy of Smart Homes : Issues and Solutions
  • 2021
  • In: Security and Privacy in the Internet of Things. - : John Wiley & Sons. - 9781119607748 - 9781119607755 - 9781119607762 - 9781119607779 ; , s. 235-260
  • Book chapter (peer-reviewed)abstract
    • The current discussion and adoption of new technologies such as Internet of Things and smart technologies, like smart homes, have blossomed over the last decade. The user-centric aspect plays a vital role in the development of smart homes, since its spread and usage is fundamentally depending on people adopting new technologies into their normal everyday lives. This chapter contributes to raising our understanding of the security and privacy challenges and solutions that exist within smart homes. It first investigates various dimensions of information security and privacy in order to build a framework to analyze actual or perceived security and privacy issues that can arise from new technologies like smart homes. The chapter presents what security techniques and mechanisms are available to address these. Finally, it discusses what the future might hold in terms of security and privacy of smart homes, followed by a section highlighting the contributions of this chapter.
  •  
9.
  • Mannebäck, Emelie, et al. (author)
  • Challenges of Managing Information Security during the Pandemic
  • 2021
  • In: Challenges. - : MDPI. - 2078-1547. ; 12:2
  • Journal article (peer-reviewed)abstract
    • The COVID-19 pandemic of 2019 surprised information security practitioners in the organizations due to the change imposed on employees’ work routines. Employees were asked to work from home, and therefore changes were necessary to reduce information security risks actively. The abrupt change of work environments brought many challenges to the practitioners, which caused them to make decisions regarding organizational information security. This article aims to uncover those challenges through an ethnography study within an organization during the fourteen months of teleworking. On an overarching level, we found four challenges to be of concern: technical security, regulations and policies, employee awareness of security issues, and, finally, preparedness for the new work environment of teleworking. We believe that the challenges brought by the analysis will inspire discussions about the future of research and practice regarding information security management in case of disasters.
  •  
10.
  • Padyab, Ali (author)
  • Exploring Impacts of Secondary Information Use on Individual Privacy
  • 2018
  • Doctoral thesis (other academic/artistic)abstract
    • Information collected from individuals via online social networks and Internet of things devices can be used by institutions and service providers for different business purposes to tailor and customize their services, which is defined as secondary use of information. Although the literature on secondary use is well developed, prior studies have largely focused on direct use of information such as those instances of information use that do not stem from data mining. Advances in data mining and information-processing techniques facilitate discovery of customers’ and users’ behaviors and needs. Research shows that individuals’ behavior can be inferred with high accuracy from their shared information, which may in turn jeopardize privacy. A recent scandal of Cambridge Analytica using about 87 million Facebook profiles to target those users with customized micro-targeted political ads has created public outrage and raised criticisms of secondary use. Given this background, the purpose of this thesis is to explore impacts of organizations’ and service providers’ secondary use of personal information in order to draw conclusions related to how individuals’ attitudes are formed and what role secondary use plays in managing privacy.This research investigates user awareness and attitudes towards potential secondary uses of information. To pursue this, a multi-method qualitative approach using a descriptive questionnaire with 1000 European citizens and a total of 10 focus groups with 43 participants was employed. A qualitative content analysis using both inductive and deductive approaches was conducted to analyze the results. The conceptual framework employed in this thesis was genres of disclosure.The research results suggest that user awareness of the potential for indirect personal information disclosure was relatively low. It was consequently found that participant attitudes toward privacy and disclosure shifted from affective to cognitive when they experienced firsthand the potential inferences that could be made from their own data. Generally, the participant users only considered their direct disclosure of information; through observing potential indirect inferences about their own shared contents and information, however, the participants became more aware of potential infringements on their privacy.The study contributes to information privacy and information systems literature by raising understanding of the impacts of secondary use, in particular its effects on individual privacy management. In addition, this thesis suggests that information privacy is affected differently by direct and indirect uses. Its contribution to information privacy research is to complement previous methodological approaches by suggesting that if users are made aware of indirect inferences that can be made from their content, negative affective responses decrease while cognitive reactions increase through the processing of information related to their disclosure genres. The reason is that indirect use of information inhibits the negotiation of information privacy boundaries and creating unresolved tensions within those boundaries. Cognitive awareness of inferences made to individual information significantly affects the privacy decision-making process. The implication is that there is a need for more dynamic privacy awareness mechanisms that can empower users by providing them with increased awareness of the indirect information they are sharing.
  •  
11.
  • Padyab, Ali, et al. (author)
  • Exploring the dimensions of individual privacy concerns in relation to the Internet of Things use situations
  • 2018
  • In: Digital Policy, Regulation and Governance. - : Emerald Group Publishing Limited. - 2398-5038. ; 20:6, s. 528-544
  • Journal article (peer-reviewed)abstract
    • Purpose: The integration of internet of things (IoT) devices into daily life introduces challenges for the privacy of their users and those who are affected by these devices. This paper explores the factors that affect individual concerns regarding IoT use and how those factors affect the dynamics of privacy management with the presence of an IoT device. Design/methodology/approach: Four focus groups of individuals and IoT experts were studied to understand the groups? privacy concerns. The authors adopted a qualitative research method based on grounded theory to find relevant dimensions of situational privacy concerns in IoT use situations. Findings: The results revealed that fourteen dimensions of individuals? privacy concerns regarding the IoT are relevant and can be categorized under four key influential factors: collection, IoT device, collected data storage and use of collected data. The authors also analyzed the focus groups using genres of disclosure theory and explored how privacy concerns affect individual privacy management regulations. Research limitations/implications: This paper contributes to how future research can employ genres of disclosure as a theoretical framework to identify situations where privacy violations occur. Practical implications: This study can assist service providers and IoT manufacturers in deriving design principles and decreasing concerns by addressing the information that must be communicated to their users. Originality/value: As opposed to the previous research, which was more inclined to dispositional privacy concerns, this study provides insights into situational privacy concerns when individuals are confronted with the IoT. This study represents the first attempt to investigate the process individuals experience in managing their privacy.
  •  
12.
  • Padyab, Ali, et al. (author)
  • Facebook Users Attitudes towards Secondary Use of Personal Information
  • 2016
  • In: Proceedings of the Thirty Seventh International Conference on Information Systems. - 9780996683135 ; , s. 1-15
  • Conference paper (peer-reviewed)abstract
    • This paper reports on a study of how user attitudes to institutional privacy change after exposing users to potential inferences that can be made from information disclosed on Facebook. Two sets of focus group sessions with Facebook users were conducted. Three sessions were conducted by demonstrating to the users, on a general level, what can be inferred from posts using prototypical software called DataBait. Another set of three sessions let the users experience the potential inferences from their own actual Facebook profiles by using the DataBait tool. Findings suggest that the participants’ attitudes to secondary use of information changed from affective to cognitive when they were exposed to potential third-party inferences using their own actual personal information. This observation calls for more research into online tools that allow users to manage and educate themselves dynamically about their own disclosure practices.
  •  
13.
  • Padyab, Ali, et al. (author)
  • Issues and Adoption Barriers in Wearable Technologies
  • 2021
  • In: International Journal of Technology Diffusion (IJTD). - : IGI Global. - 1947-9301 .- 1947-931X. ; 12:1
  • Journal article (peer-reviewed)abstract
    • The rapid growth of the Internet of Things (IoT) has given rise to many wearable devices integrated into daily life. However, achieving end-users' long-term adoption is still an issue. While wearables' technological implementation is advancing rapidly, their consequences need to be scrutinized to alleviate the concerns that threaten a strong civil and sustainable society. The purpose of this article is to investigate issues (social, ethical, and ecological) and adoption barriers related to wearable technologies from end-users' perspectives. The authors undertook a systematic literature review combined with two rounds of interviews with domain experts as well as end-users of IoT wearable devices to find relevant issues and adoption barriers. This article summarizes social, ethical, and ecological issues as well as adoption barriers of wearable technologies. These issues and adoption barriers have important implications that need to be addressed to increase the adoption and diffusion of wearable technologies.
  •  
14.
  • Padyab, Ali Mohammad, et al. (author)
  • Adoption Barriers of IoT in Large Scale Pilots
  • 2020
  • In: Information. - : MDPI. - 2078-2489. ; 11:23, s. 1-23
  • Journal article (peer-reviewed)abstract
    • The pervasive connectivity of devices enabled by Internet of Things (IoT) technologies is leading the way in various innovative services and applications. This increasing connectivity comes with its own complexity. Thus, large scale pilots (LSPs) are designed to develop, test and use IoT innovations in various domains in conditions very similar to their operational scalable setting. One of the key challenges facing the diffusion of such innovations within the course of an LSP is understanding the conditions in which their respective users decide to adopt them (or not). Accordingly, in this study we explore IoT adoption barriers in four LSPs in Europe from the following domains: smart cities, autonomous driving, wearables and smart agriculture and farming. By applying Roger’s Diffusion of Innovation as a theoretical lens and using empirical data from workshops and expert interviews, we identify a set of common and domain specific adoption barriers. Our results reveal that trust, cost, perceived value, privacy and security are common concerns, yet shape differently across domains. In order to overcome various barriers, the relative advantage or value of using the innovation needs to be clearly communicated and related to the users’ situational use; while this value can be economic in some domains, it is more hedonic in others. LSPs were particularly challenged in applying established strategies to overcome some of those barriers (e.g., co-creation with end-users) due to the immaturity of the technology as well as the scale of pilots. Accordingly, we reflect on the theoretical choice in the discussion as well as the implications of this study on research and practice. We conclude with providing practical recommendations to LSPs and avenues for future research
  •  
15.
  • Padyab, Ali Mohammad, et al. (author)
  • Awareness of Indirect Information Disclosure on Social Network Sites
  • 2019
  • In: Social Media + Society. - : Sage Publications. - 2056-3051. ; 5:2
  • Journal article (peer-reviewed)abstract
    • This research investigates user awareness and attitudes toward potential inferences of information posted on social network sites (SNSs). The study reports how user attitudes change after exposure to inferences made based upon information they have disclosed on an SNS, namely, on Facebook. To demonstrate this, two sub-studies involving three focus group sessions were conducted with Facebook users. In the first sub-study, the users received a general introduction to information that can be inferred from posts by using a prototypical privacy-enhancement tool called DataBait. Then, the second sub-study allowed the users to witness the potential inferences of their own Facebook photos and posts by using the DataBait tool. Next, qualitative content analysis was conducted to analyze the results, and these showed that the participants’ attitudes toward privacy on SNSs changed from affective to cognitive when they became aware of potential inferences from actual information posted on their own Facebook accounts. The results imply that end users require more cognitive awareness regarding their genres of disclosure and the effect of their disclosures on their privacy. Moreover, as privacy awareness is contextual, there is a need for more research and development of online tools that will allow users to manage and educate themselves.
  •  
16.
  • Padyab, Ali Mohammad, et al. (author)
  • Genre-Based Approach to Assessing Information and Knowledge Security Risks
  • 2015
  • In: Transportation Systems and Engineering. - Hershey, PA : IGI Global. - 9781466684737 - 9781466684744 ; , s. 1237-1253
  • Book chapter (peer-reviewed)abstract
    • Contemporary methods for assessing information security risks have adopted mainly technical views on information and technology assets. Organizational dynamics of information management and knowledge sharing have gained less attention. This article outlines a new, genre-based, approach to information security risk assessment in order to orientate toward organization- and knowledge-centric identification and analysis of security risks. In order to operationalize the genre-based approach, we suggest the use of a genre-based analytical method for identifying organizational communication patterns through which organizational knowledge is shared. The genre-based method is then complemented with tasks and techniques from a textbook risk assessment method (OCTAVE Allegro). We discuss the initial experiences of three experienced information security professionals who tested the method. The article concludes with implications of the genre-based approach to analyzing information and knowledge security risks for future research and practice.
  •  
17.
  • Padyab, Ali Mohammad, et al. (author)
  • Genre-Based Approach to Assessing Information and Knowledge Security Risks
  • 2014
  • In: International Journal of Knowledge Management. - : IGI Global. - 1548-0666 .- 1548-0658. ; 10:2, s. 13-27
  • Journal article (peer-reviewed)abstract
    • Contemporary methods for assessing information security risks have adopted mainly technical views on information and technology assets. Organizational dynamics of information management and knowledge sharing have gained less attention. This article outlines a new, genre-based, approach to information security risk assessment in order to orientate toward organization- and knowledge-centric identification and analysis of security risks. In order to operationalize the genre-based approach, we suggest the use of a genre-based analytical method for identifying organizational communication patterns through which organizational knowledge is shared. The genre-based method is then complemented with tasks and techniques from a textbook risk assessment method (OCTAVE Allegro). We discuss the initial experiences of three experienced information security professionals who tested the method. The article concludes with implications of the genre-based approach to analyzing information and knowledge security risks for future research and practice.
  •  
18.
  • Padyab, Ali Mohammad, et al. (author)
  • Genre-based assessment of information and knowledge security risks
  • 2014
  • In: Proceedings of the Annual Hawaii International Conference on System Sciences. - 1530-1605. ; , s. 3442-3451
  • Journal article (peer-reviewed)abstract
    • Contemporary methods for assessing information security risks have adopted mainly technical views on the information and technology assets. Organizational dynamics of information management and knowledge sharing have gained less attention. This article outlines how an information security risk assessment method can be elaborated using knowledge-centric analysis of information assets. For this purpose, we suggest the use of a genre-based analysis method for identifying organizational communication patterns, through which organizational knowledge is shared. Initial experiences of the method try-outs by three experienced information security professionals are discussed. The article concludes with a look at the implications of a genre-based analysis of knowledge assets for future research and practice.
  •  
19.
  • Padyab, Ali Mohammad (author)
  • Getting More Explicit on Genres of Disclosure : Towards Better Understanding of Privacy in Digital Age (Research in Progress)
  • 2014
  • In: NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi. - 1892-0748 .- 1894-7719. ; 22:1
  • Journal article (peer-reviewed)abstract
    • Disclosure is all about communication and Genres are about analyzing communicative action. “Genres of Disclosure” as repetitive patterns of disclosing has given less attention. Drawing on Palen and Dourish’s work, this paper expand its defined scope from a social approach into a more socio-technical approach. Evolutionized by the affordances of a new digital medium, new genres have emerged. We called these new subgenres, secondary genres of disclosure. We provide a taxonomy for these type of genres and some real examples to illuminate the concept. Implications of use for designing privacy and venues for further research are discussed. It is concluded that “Genres of Disclosure” can serve as a common language between users, system providers and legislators to preserve privacy within any system that has consequences for personal privacy.
  •  
20.
  • Padyab, Ali, et al. (author)
  • Perceived Privacy Problems Within Digital Contact Tracing : A Study Among Swedish Citizens
  • 2021
  • In: ICT Systems Security and Privacy Protection. - Cham : Springer. - 9783030781224 - 9783030781200 - 9783030781194 ; , s. 270-283
  • Conference paper (peer-reviewed)abstract
    • Several governments employed digital contact tracing using smartphone apps to combat the COVID-19 pandemic in 2020. Research shows that privacy concerns hinder the adoption of such apps, while privacy problems which emerged by using them are empirically unknown. This study aims to uncover the dimensions of privacy problems available in digital contact tracing through a survey from 453 citizens in Sweden. Our results show that respondents found privacy problems regarding surveillance, identification, aggregation, secondary use, disclosure, and stigma highly relevant in contact tracing apps. Among demographic factors, younger respondents were generally more concerned about privacy risks than older respondents. This study extends previous literature by revealing privacy problems arising from contact tracing apps.
  •  
21.
  • Padyab, Ali, et al. (author)
  • Privacy Enhancing Tools: A Literature Review on End-User Role and Evaluation
  • 2017
  • In: Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017). - Plymouth : University of Plymouth Press. - 9781841024288
  • Conference paper (peer-reviewed)abstract
    • Trends show that privacy concerns are rising, but end users are not armed with enoughmechanisms to protect themselves. Privacy enhancing technologies (PETs) or morespecifically, tools (PET-tools) are one of the mechanisms that could help users in this sense.These tools, however, reportedly have low adoption rates, and users tend to be reluctant tointegrate them into their daily use of the Internet. Detailed scrutiny of current research onPET-tools, however, can guide future research to help overcome low adoption of these tools.We conducted a literature review on PET-tools to enumerate the types of tools available andhow they are being evaluated, in order to shed more light on the missing elements in theirevaluations. We reviewed and coded 72 articles in the PET-tool literature. Our resultshighlight two important issues: 1. Evaluation of most tools is performed using only artificial,summative and ex-post strategies; 2. While usability evaluation is quite common, evaluationof enhanced privacy is lacking. This research hopes to contribute to better PET-tooldevelopment, and encourage the inclusion of users in the evaluation and design process.
  •  
22.
  • Padyab, Ali, et al. (author)
  • Stress in doctoral supervision : A perspective on supervisors
  • 2023
  • In: Journal of Praxis in Higher Education. - : University of Borås. - 2003-3605. ; 5:2, s. 91-117
  • Journal article (peer-reviewed)abstract
    • This paper shares findings from an interview study designed to open up critical conversations on complexity in advising. Using a narrative inquiry approach to centre storytelling and personal experience as valuable knowledge, I interview advisors (both academic and unofficial) who were central to my own doctoral research journey, as well as former doctoral students of mine. The interview results are put in relation with my own critical reflection on my advising practices as an ethos, as opposed to a set of tasks or functions, and put into context with larger social concepts such as positionality.This new perspective is suggested as a supplement to complexify and expand earlier research on advising styles. Advisingis characterised as deeply entangled with mentoring as well as teaching at large, and the paper concludes with identification of larger ethea, reflecting howadvising practices are co-constituted in relation with a range of other factors,such as positionality, institutional and disciplinary context, the larger student lifeworld, and perspectives on teaching and learning.
  •  
23.
  • Popescu, A., et al. (author)
  • Increasing transparency and privacy for online social network users – USEMP value model, scoring framework and legal
  • 2016
  • In: Privacy Technologies and Policy. - Cham : Encyclopedia of Global Archaeology/Springer Verlag. - 9783319314556 - 9783319314563 ; , s. 38-59
  • Conference paper (peer-reviewed)abstract
    • In this paper we present research results from the multi-disciplinary EU research project USEMP (USEMP is a project funded from EU research framework, additional information about project scope and deliverables are available at project’s public website at: http://​www.​usemp-project.​eu/​). In particular, we look at the legal aspects of personal data licensing and profile transparency, the development of a personal data value model in Online Social Networks (OSNs) and the development of disclosure scoring and personal data value frameworks. In the first part of the paper we show how personal data usage licensing and profile transparency for OSN activities provides for Data Protection by Design (DPbD). We also present an overview of the existing personal data monetization ecosystem in OSNs and its possible evolutions for increasing privacy and transparency for consumers about their OSN presence. In the last part of the paper, we describe the USEMP scoring framework for personal information disclosure and data value that can assist users to better perceive how their privacy is affected by their OSN presence and what the value of their OSN activities is.
  •  
24.
  • Sharifi, Homman, et al. (author)
  • Public Awareness about Framework Convention on Tobacco Control (FCTC) in Tehran
  • 2009
  • In: Tanaffos. - : National Research Institute of Tuberculosis and Lung Disease, Iran. - 1735-0344. ; 8:4, s. 26-32
  • Journal article (peer-reviewed)abstract
    • Background: The global tobacco epidemic is currently responsible for 5.2 million morbidity and mortality per year seventy percent of which occur in developing countries. Framework Convention on Tobacco Control (FCTC) is the first international public health treaty ratified by all countries in order to encounter the ever-growing tobacco epidemic. This study was designed to evaluate the public awareness of Tehran residents about FCTC.Materials and Methods: This was a cross-sectional study and sampling was performed in main city centers during the years 2007-2008 by using non-probability sampling method. The questionnaires were designed according to the World Health Organization (WHO) and IUATLD standard questionnaires and a total of 2053 individuals were questioned.Results: Of the participants, 47.2% had experienced smoking (55.5% of men and 28.8% of women). The frequency of daily cigarette consumption was 22/7% (29/7% of men and 7% of women) (P<0.001). Forty-six percent of the participants had experienced hookah (50% of men and 36/8% of women) (P=0.0000). A total of 184 individuals (9%) were aware of FCTC among which, 35 individuals (19%) who comprised 1/7% of the total understudy population claimed to have a complete knowledge regarding some details. Awareness about FCTC was 5.1% among those with an educational level equal or below high school diploma. This rate was 14.9% in those with a bachelor’s degree and 33.3% (more than twice the rate) in those with higher educational levels (P<0.001).Conclusion: Prevalence of smoking was found to be higher in our study compared to similar studies. Higher level of education was significantly associated with greater awareness regarding FCTC. The overall public awareness was low and implementation of public awareness programs regarding FCTC is necessary.
  •  
25.
  • Spears, Janine L., et al. (author)
  • Privacy risk in contact tracing systems
  • 2023
  • In: Behavior and Information Technology. - : Taylor & Francis Group. - 0144-929X .- 1362-3001. ; 42:2, s. 174-195
  • Journal article (peer-reviewed)abstract
    • For over a century, contact tracing has been an integral public health strategy for infectious disease control when there is no pharmaceutical treatment. Contact tracing for the coronavirus disease COVID-19 introduced a variety of automated methods deployed across several countries. The present paper examines privacy risk to infected persons and their physical contacts in contact tracing systems. Automated contact tracing systems implemented during the early months of COVID-19 are compared to conventional manual methods. Solove's taxonomy of privacy is applied to examine privacy risks in both conventional and automated contact tracing systems. As a method of epidemiological surveillance, all contact tracing systems inherently incur privacy risk. However, compared to conventional methods, automated contact tracing systems amplify privacy risk with pre-emptive data collection on all app users, regardless of exposure to an infectious disease; continuous, granular data collection on all users' location and proximity contacts; insecurities in proximity app technologies and interconnectivity; and in many cases, the use of centralised systems. Reducing these risk factors can reduce privacy harms, such as identification, distortion, secondary use, stigma, and social control.
  •  
26.
  • Ståhlbröst, Anna, et al. (author)
  • Design of Smart City Systems from a Privacy Perspective
  • 2015
  • In: IADIS International Journal on WWW/Internet. - 1645-7641. ; 13:1, s. 1-16
  • Journal article (peer-reviewed)abstract
    • All around the globe the concept of smart cities is growing at fast pace meaning that an increasingly amount of people are moving to cities, which causes problems for cities with energy supply, waste management, transportation, environmental issues and security to mention a few. To answer to these challenges, the concept of smart cities emerges referring to cities that invest in human and social capital, and traditional (transport) and modern (ICT) communication infrastructure that will fuel sustainable economic growth and a high quality of life, with a wise management of natural resources, through participatory governance. Hence, for cities to be smart they cannot only install technologies, but they also need to invest in human capital and sustain a high quality of life. It is therefore important that solutions being implemented in smart cities answer to the needs and expectations citizens have as well as protect them from being exposed or forced into unwanted situations. In earlier studies it has become clear that people often are worried about their privacy due to our life being so easy to track and technologies becoming increasingly ubiquitous and pervasive. In this paper we will report on a study carried out with focus on understanding citizens view on information privacy concerns related to an intelligent acoustic smart city solution for audio monitoring. By means of this technology it was possible to detect events such as sirens, recognise speech commands and detects presence in public buildings. Audio monitoring is a relatively new and under research phenomena. Hence, in this paper an analysis of a survey on information privacy concerns, carried out with 1000 respondents around Europe, is presented and discussed. The basic findings from this study indicate that people have information privacy concerns related to this type of solution on a general level. However, when being more thoroughly introduced to the solution and its usage area, the citizens also became more positive towards the solution. The study also identified design principles that aims to support the design and implementation of smart city solutions that take not only users, but also affectees perspectives into consideration.
  •  
27.
  • Thapa, Devinder, et al. (author)
  • Make way for the new wave : Living Labs as a DSR Approach
  • 2014
  • Conference paper (peer-reviewed)abstract
    • Living Lab (LL) has been used as a milieu as well as methodology for open innovation. However, the impression of living lab as a research methodology among academia is still blurring. The living lab carries many elements of design science re-search paradigm such as innovation, artifact, evaluation, design principles, etc. how-ever it still needs conceptual underpinning to proclaim it as a valid DSR methodology. The peculiarity of the living lab approach compare to existing DSR methodologies is its openness, co-creation, and evaluation of IT artifacts beyond organizational context. With the continual growth of open innovation platforms, the living lab as a DSR methodologies can play a supplementary role along with its other companion such as DS, AR, and ADR. In this regard, this paper will provide a conceptual clarity in estab-lishing the living lab as a DSR methodology in the context of open innovation and co-creation of IT artifact that goes beyond organizational setup.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-27 of 27
Type of publication
journal article (14)
conference paper (8)
book chapter (3)
doctoral thesis (2)
Type of content
peer-reviewed (24)
other academic/artistic (3)
Author/Editor
Padyab, Ali (15)
Padyab, Ali Mohammad (9)
Ståhlbröst, Anna, 19 ... (5)
Ståhlbröst, Anna (5)
Habibipour, Abdolras ... (4)
Harnesk, Dan (4)
show more...
Päivärinta, Tero (3)
Bergvall-Kåreborn, B ... (3)
Lundgren, Martin (3)
Kävrestad, Joakim, 1 ... (2)
Päivärinta, Tero, 19 ... (2)
Hildebrandt, M. (1)
Devries, K. (1)
Kitkowska, Agnieszka (1)
Islami, Lejla (1)
Fischer-Hübner, Simo ... (1)
Amiri, Parisa (1)
Hosseinpanah, Farhad (1)
Padyab, Mojgan (1)
Rambod, Mehdi (1)
Montazeri, Ali (1)
Mehrabi, Yadollah (1)
Azizi, Fereidoun (1)
Thapa, Devinder (1)
Kousaridas, A. (1)
Sällström, Annika (1)
Rizk, Aya, 1988- (1)
Papadopoulos, S (1)
Heyman, R (1)
Bergquist, Magnus, P ... (1)
Breuer, J. (1)
Faizi, Ana (1)
Naess, Andreas (1)
Popescu, A (1)
Padyab, Ali, Associa ... (1)
Modig, Dennis (1)
Lindqvist, Gunnar (1)
Mannebäck, Emelie (1)
Claeys, L. (1)
Petkos, G. (1)
Michalareas, T. (1)
Lund, D. (1)
van der Graaf, S. (1)
Gadetski, E. (1)
Le Borgne, H. (1)
Kastrinogiannis, T. (1)
Sharifi, Homman (1)
Ramezankhani, Ali (1)
Fallah Tafti, Saeed (1)
Sharif Kashani, Baba ... (1)
show less...
University
Luleå University of Technology (19)
University of Skövde (10)
Umeå University (2)
Jönköping University (2)
Karlstad University (1)
Language
English (27)
Research subject (UKÄ/SCB)
Social Sciences (18)
Natural sciences (11)
Medical and Health Sciences (1)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view