首页 > 最新文献

Library Trends最新文献

英文 中文
Gaming Tasks as a Method for Studying the Impact of Warning Messages on Information Behavior 游戏任务作为研究警告信息对信息行为影响的方法
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0012
Alexandria Haddad, J. Sauer, J. Prichard, Caroline Spiranovic, K. Gelb
Abstract:New and nontraditional approaches are required to effectively tackle the global problem of cybercrime. Online warning messages offer the unique potential to influence information behavior at the exact point of user decision-making. This research assessed the prevention effect of differing components of warning messages. Thirty-five male participants, aged 18–43, participated in a behavioral-compliance task comprising messages received when visiting websites likely to contain malware. Participants also rated messages on believability, severity, and effects on intention to comply. The components of messages tested were as follows: three "signal words" (warning, hazard, and stop), two levels of message explicitness (high, low), and two imagery conditions (eyes, no eyes). Contrary to expectations, explicitness was the only message component to yield a significant preventative effect on self-rated and behavioral responses. Participants not only perceived the explicit messages as more believable, severe, and likely to increase intention to comply but also demonstrated, through their behavioral-compliance data, a preventative effect from more explicit messages. The implications of these findings for designing messages to prevent cybercrimes are explored.
摘要:需要新的非传统方法来有效解决全球网络犯罪问题。在线警告消息提供了在用户决策的确切点影响信息行为的独特潜力。这项研究评估了警告信息不同组成部分的预防效果。35名年龄在18-43岁之间的男性参与者参与了一项行为合规任务,其中包括访问可能包含恶意软件的网站时收到的信息。参与者还对信息的可信度、严重性以及对遵守意愿的影响进行了评级。测试信息的组成部分如下:三个“信号词”(警告、危险和停止)、两个级别的信息明确性(高、低)和两种图像条件(有眼、无眼)。与预期相反,明确性是唯一对自我评价和行为反应产生显著预防作用的信息成分。参与者不仅认为明确的信息更可信、更严重,并且可能增加遵守的意愿,而且通过他们的行为遵守数据,证明了更明确的信息的预防作用。探讨了这些发现对设计信息以预防网络犯罪的影响。
{"title":"Gaming Tasks as a Method for Studying the Impact of Warning Messages on Information Behavior","authors":"Alexandria Haddad, J. Sauer, J. Prichard, Caroline Spiranovic, K. Gelb","doi":"10.1353/lib.2020.0012","DOIUrl":"https://doi.org/10.1353/lib.2020.0012","url":null,"abstract":"Abstract:New and nontraditional approaches are required to effectively tackle the global problem of cybercrime. Online warning messages offer the unique potential to influence information behavior at the exact point of user decision-making. This research assessed the prevention effect of differing components of warning messages. Thirty-five male participants, aged 18–43, participated in a behavioral-compliance task comprising messages received when visiting websites likely to contain malware. Participants also rated messages on believability, severity, and effects on intention to comply. The components of messages tested were as follows: three \"signal words\" (warning, hazard, and stop), two levels of message explicitness (high, low), and two imagery conditions (eyes, no eyes). Contrary to expectations, explicitness was the only message component to yield a significant preventative effect on self-rated and behavioral responses. Participants not only perceived the explicit messages as more believable, severe, and likely to increase intention to comply but also demonstrated, through their behavioral-compliance data, a preventative effect from more explicit messages. The implications of these findings for designing messages to prevent cybercrimes are explored.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"576 - 598"},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0012","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41538308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Introduction: The Role of Censorship in Late Modern Societies 导论:审查制度在近代晚期社会中的作用
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0010
P. Watters
{"title":"Introduction: The Role of Censorship in Late Modern Societies","authors":"P. Watters","doi":"10.1353/lib.2020.0010","DOIUrl":"https://doi.org/10.1353/lib.2020.0010","url":null,"abstract":"","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"557 - 560"},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45189835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gathering Intelligence on Student Information Behavior Using Data Mining 利用数据挖掘收集学生信息行为的情报
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0015
Lei Pan, N. Patterson, Sophie McKenzie, Surtharshan Rajasegarar, G. Wood-Bradley, J. Rough, Wei Luo, E. Lanham, Jo Coldwell-Neilson
Abstract:In this paper, we present a novel machine-learning approach that analyzes student assessment scores across a teaching period to predict their final exam performance. One challenge for many universities around the world is identifying the students who are at risk of failing a subject sufficiently early enough to provide proactive interventions that aim to minimize the risk of failure due to several reasons such as the volume of (big) data. We propose a data-driven strategy using machine learning, an application of artificial intelligence that has become popular for extracting knowledge from data by combining strategies and processes from statistics and computer science. By being able to predict what a student's exam performance is ahead of time, interventions can occur, and students can be provided with extra support from their teachers to aid them in achieving the best result possible. In this research, we collected data from a popular information-technology subject at an Australian university and applied a machine-learning algorithm to the data to predict a few hundred students' exam scores. We also developed a framework of learningsupport activities that would be of most benefit to at-risk students to achieve maximum impact before their exam would be conducted. We discovered through our approach that we can accurately predict the bottom 20–30 percent of students at risk, enabling a large cohort of students to be helped through our intervention framework, which we believe can have a positive impact on their future results.
摘要:在本文中,我们提出了一种新的机器学习方法,通过分析学生在教学期间的评估分数来预测他们的期末考试成绩。世界上许多大学面临的一个挑战是,尽早识别出有可能不及格的学生,以便提供积极的干预措施,以最大限度地降低由于(大)数据量等多种原因导致的不及格风险。我们提出了一种使用机器学习的数据驱动策略,机器学习是人工智能的一种应用,通过结合统计学和计算机科学的策略和过程,从数据中提取知识,这已经变得很流行。通过提前预测学生的考试成绩,可以进行干预,老师可以为学生提供额外的支持,帮助他们取得最好的成绩。在这项研究中,我们从澳大利亚一所大学的一门受欢迎的信息技术学科收集数据,并对数据应用机器学习算法来预测几百名学生的考试成绩。我们还制定了一个学习支持活动的框架,使有风险的学生在考试前获得最大的影响。我们发现,通过我们的方法,我们可以准确地预测20%到30%的学生处于危险之中,使一大群学生能够通过我们的干预框架得到帮助,我们相信这可以对他们未来的结果产生积极的影响。
{"title":"Gathering Intelligence on Student Information Behavior Using Data Mining","authors":"Lei Pan, N. Patterson, Sophie McKenzie, Surtharshan Rajasegarar, G. Wood-Bradley, J. Rough, Wei Luo, E. Lanham, Jo Coldwell-Neilson","doi":"10.1353/lib.2020.0015","DOIUrl":"https://doi.org/10.1353/lib.2020.0015","url":null,"abstract":"Abstract:In this paper, we present a novel machine-learning approach that analyzes student assessment scores across a teaching period to predict their final exam performance. One challenge for many universities around the world is identifying the students who are at risk of failing a subject sufficiently early enough to provide proactive interventions that aim to minimize the risk of failure due to several reasons such as the volume of (big) data. We propose a data-driven strategy using machine learning, an application of artificial intelligence that has become popular for extracting knowledge from data by combining strategies and processes from statistics and computer science. By being able to predict what a student's exam performance is ahead of time, interventions can occur, and students can be provided with extra support from their teachers to aid them in achieving the best result possible. In this research, we collected data from a popular information-technology subject at an Australian university and applied a machine-learning algorithm to the data to predict a few hundred students' exam scores. We also developed a framework of learningsupport activities that would be of most benefit to at-risk students to achieve maximum impact before their exam would be conducted. We discovered through our approach that we can accurately predict the bottom 20–30 percent of students at risk, enabling a large cohort of students to be helped through our intervention framework, which we believe can have a positive impact on their future results.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"636 - 658"},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0015","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44051155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Russian Gambit and the US Intelligence Community: Russia's Use of Kompromat and Implausible Deniability to Optimize its 2016 Information Campaign against the US Presidential Election 俄罗斯Gambit和美国情报界:俄罗斯利用Kompromat和不可否认性优化其2016年反对美国总统大选的信息活动
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-10-21 DOI: 10.1353/LIB.2020.0017
Allon J. Uhlmann, S. McCombie
Abstract:In the leadup to the 2016 US presidential election, Russia engaged in covert political action to disrupt the American political system and undermine candidate Clinton. Following Trump's shock victory, Moscow swiftly pivoted to leverage its pre-election intervention in order to degrade the coherence of the US strategic decision-making. Specifically, through seemingly feckless denial, the Kremlin sought to assert the depth and success of its meddling in the election, thereby driving a wedge between the White House on the one hand, and US intelligence community and political mainstream on the other, and keeping both sides at loggerheads. The fact that the main axis of Moscow's pre-election information campaign unfolded online helped it exploit anxieties over the unfettered circulation of information and enhance the effect of its postelection messaging.After describing the contours of this Russian gambit, we elaborate on three specific issues. We analyze the stratagem of implausible deniability—Russia's assertion of its role through seemingly feckless denial. We then ascribe the Russian intelligence community's agility to its chaotic structure and function. Finally, we account for the strategic oversight that allowed the US intelligence community to become an unwitting useful tool of Russian manipulation.
摘要:在2016年美国总统大选前夕,俄罗斯采取了秘密的政治行动,破坏了美国的政治制度,并破坏了候选人克林顿。在特朗普出人意料地获胜后,莫斯科迅速转向利用其选前干预来削弱美国战略决策的一致性。具体来说,通过看似无能的否认,克里姆林宫试图断言其干预选举的深度和成功,从而在白宫与美国情报界和政治主流之间制造隔阂,并使双方争执不休。莫斯科选举前信息宣传活动的主轴在网上展开,这有助于它利用人们对信息自由流通的担忧,增强其选举后信息传递的效果。在描述了俄罗斯这一策略的轮廓之后,我们将详细阐述三个具体问题。我们分析了令人难以置信的否认策略——俄罗斯通过看似不负责任的否认来维护自己的角色。然后,我们将俄罗斯情报界的敏捷性归因于其混乱的结构和功能。最后,我们要考虑到战略疏忽,这种疏忽使美国情报界在不知情的情况下成为俄罗斯操纵的有用工具。
{"title":"The Russian Gambit and the US Intelligence Community: Russia's Use of Kompromat and Implausible Deniability to Optimize its 2016 Information Campaign against the US Presidential Election","authors":"Allon J. Uhlmann, S. McCombie","doi":"10.1353/LIB.2020.0017","DOIUrl":"https://doi.org/10.1353/LIB.2020.0017","url":null,"abstract":"Abstract:In the leadup to the 2016 US presidential election, Russia engaged in covert political action to disrupt the American political system and undermine candidate Clinton. Following Trump's shock victory, Moscow swiftly pivoted to leverage its pre-election intervention in order to degrade the coherence of the US strategic decision-making. Specifically, through seemingly feckless denial, the Kremlin sought to assert the depth and success of its meddling in the election, thereby driving a wedge between the White House on the one hand, and US intelligence community and political mainstream on the other, and keeping both sides at loggerheads. The fact that the main axis of Moscow's pre-election information campaign unfolded online helped it exploit anxieties over the unfettered circulation of information and enhance the effect of its postelection messaging.After describing the contours of this Russian gambit, we elaborate on three specific issues. We analyze the stratagem of implausible deniability—Russia's assertion of its role through seemingly feckless denial. We then ascribe the Russian intelligence community's agility to its chaotic structure and function. Finally, we account for the strategic oversight that allowed the US intelligence community to become an unwitting useful tool of Russian manipulation.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"679 - 696"},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/LIB.2020.0017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47384960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Governmental Censorship of the Internet: Spanish vs. Catalans Case Study 政府对网路的审查:西班牙与加泰隆尼亚个案研究
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0011
M. Medina
Abstract:This article summarizes the actions taken by the Spanish government pretending to censor information published and applications developed by the Catalan government and some independent activists in order to organize an independence referendum. It describes the goals, the technical approaches, and some countermeasures, analyzing also the level of success achieved. There is also an introduction to the legislation being deployed in the European Union and Spain that could give support to some kind of Internet censorship, and the concerns about the compliance of those regulations with the civil rights of freedom and opinion, which should be guaranteed by governments to citizens. The conclusions suggest some ideas to prevent arbitrary application of censorship practices by national authorities using criteria not widely accepted by the Internet community.
摘要:本文总结了西班牙政府为组织独立公投而采取的假装审查发布的信息和加泰罗尼亚政府和一些独立活动家开发的应用程序的行动。阐述了目标、技术途径和对策,分析了所取得的成功程度。欧盟和西班牙正在实施的立法也有介绍,这些立法可能会支持某种形式的互联网审查,以及对这些法规是否符合公民自由和意见权利的担忧,这些权利应该得到政府对公民的保障。结论提出了一些想法,以防止国家当局使用不被互联网社区广泛接受的标准任意应用审查实践。
{"title":"Governmental Censorship of the Internet: Spanish vs. Catalans Case Study","authors":"M. Medina","doi":"10.1353/lib.2020.0011","DOIUrl":"https://doi.org/10.1353/lib.2020.0011","url":null,"abstract":"Abstract:This article summarizes the actions taken by the Spanish government pretending to censor information published and applications developed by the Catalan government and some independent activists in order to organize an independence referendum. It describes the goals, the technical approaches, and some countermeasures, analyzing also the level of success achieved. There is also an introduction to the legislation being deployed in the European Union and Spain that could give support to some kind of Internet censorship, and the concerns about the compliance of those regulations with the civil rights of freedom and opinion, which should be guaranteed by governments to citizens. The conclusions suggest some ideas to prevent arbitrary application of censorship practices by national authorities using criteria not widely accepted by the Internet community.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"561 - 575"},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0011","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42364085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Ethics of Corporate Censorship of Information-Sharing Behavior: A Nonconsequentialist Perspective 信息共享行为的公司审查伦理:一个非结果主义的视角
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0018
H. Zhong, P. Watters
Abstract:Recent research on information-seeking behavior (Watters and Ziegler 2016) has suggested a role for managing access to ensure consistency with local regulatory or policy requirements. However, sharing of self-generated, personal data—as facilitated by socialmedia companies—should be relatively free of information-sharing controls. While many studies have examined government censorship, the extent to which the private sector is complicit is often unclear. In this study, we examine whether censorship appears to occur on a number of social-media and related sites, including the transmission of sensitive keywords and URLs. The results indicate that some level of private-sector censorship is prevalent, often in breach of the technology companies' own terms and conditions. In some cases, apparently harmless information is overblocked. These companies need to be more transparent about their censorship mechanisms and subject their actual policies and procedures to scrutiny and public debate. Removing controls on information-sharing behavior is consistent with a nonconsequentialist perspective on privacy.
摘要:最近关于信息寻求行为的研究(Watters和Ziegler,2016)提出了管理访问的作用,以确保与当地监管或政策要求的一致性。然而,在社交媒体公司的推动下,共享自己生成的个人数据应该相对不受信息共享控制。尽管许多研究对政府审查制度进行了审查,但私营部门在多大程度上串通一气往往不清楚。在这项研究中,我们检查了一些社交媒体和相关网站是否出现审查,包括敏感关键词和URL的传输。研究结果表明,某种程度的私营部门审查制度普遍存在,往往违反了科技公司自己的条款和条件。在某些情况下,看似无害的信息被过度锁定。这些公司需要对其审查机制更加透明,并对其实际政策和程序进行审查和公开辩论。取消对信息共享行为的控制与对隐私的非顺序主义观点是一致的。
{"title":"The Ethics of Corporate Censorship of Information-Sharing Behavior: A Nonconsequentialist Perspective","authors":"H. Zhong, P. Watters","doi":"10.1353/lib.2020.0018","DOIUrl":"https://doi.org/10.1353/lib.2020.0018","url":null,"abstract":"Abstract:Recent research on information-seeking behavior (Watters and Ziegler 2016) has suggested a role for managing access to ensure consistency with local regulatory or policy requirements. However, sharing of self-generated, personal data—as facilitated by socialmedia companies—should be relatively free of information-sharing controls. While many studies have examined government censorship, the extent to which the private sector is complicit is often unclear. In this study, we examine whether censorship appears to occur on a number of social-media and related sites, including the transmission of sensitive keywords and URLs. The results indicate that some level of private-sector censorship is prevalent, often in breach of the technology companies' own terms and conditions. In some cases, apparently harmless information is overblocked. These companies need to be more transparent about their censorship mechanisms and subject their actual policies and procedures to scrutiny and public debate. Removing controls on information-sharing behavior is consistent with a nonconsequentialist perspective on privacy.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"697 - 711"},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44346900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Consumer Information-Security Awareness and Preparedness of Data-Breach Events 探讨消费者信息安全意识和数据泄露事件的防范
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0014
Jonathan Nield, J. Scanlan, E. Roehrer
Abstract:The continuous increase of digital connectivity has improved the capability that businesses have for the collection, manipulation, and distribution of data. Due to shortfalls in security, this capability has resulted in data-breach events being a weekly occurrence globally. Notification of these events is becoming commonplace, in part fueled by notification legislation in many jurisdictions. As of February 2018, mandatory reporting of data breaches came into force in Australia (Australian Notifiable Data Breaches scheme [NDB]), and this was followed by European legislation (GDPR) coming into force in May of the same year. This study aims to establish current levels of information-security awareness within typical consumers in Australia, their awareness of these legislative changes, and their ability to respond to such a notification of their personal information being leaked from a service or system. The research results suggest that consumers had a high level of information-security awareness, yet low awareness of notification legislation. The discussion revealed that expected outcomes primarily drove stakeholder behavior in relation to data-breach and legislation preparedness.
摘要:数字连接的不断增加提高了企业收集、操作和分发数据的能力。由于安全性不足,这种能力导致全球每周都会发生数据泄露事件。这些事件的通报正变得司空见惯,部分原因是由于许多司法管辖区的通报立法。截至2018年2月,澳大利亚开始强制报告数据泄露(澳大利亚应通报数据泄露计划[NDB]),随后欧洲立法(GDPR)于同年5月生效。本研究旨在确定澳大利亚典型消费者的当前信息安全意识水平,他们对这些立法变化的认识,以及他们对此类个人信息从服务或系统泄露的通知作出反应的能力。研究结果表明,消费者的信息安全意识较高,但通报立法意识较低。讨论显示,预期结果主要驱动利益相关者在数据泄露和立法准备方面的行为。
{"title":"Exploring Consumer Information-Security Awareness and Preparedness of Data-Breach Events","authors":"Jonathan Nield, J. Scanlan, E. Roehrer","doi":"10.1353/lib.2020.0014","DOIUrl":"https://doi.org/10.1353/lib.2020.0014","url":null,"abstract":"Abstract:The continuous increase of digital connectivity has improved the capability that businesses have for the collection, manipulation, and distribution of data. Due to shortfalls in security, this capability has resulted in data-breach events being a weekly occurrence globally. Notification of these events is becoming commonplace, in part fueled by notification legislation in many jurisdictions. As of February 2018, mandatory reporting of data breaches came into force in Australia (Australian Notifiable Data Breaches scheme [NDB]), and this was followed by European legislation (GDPR) coming into force in May of the same year. This study aims to establish current levels of information-security awareness within typical consumers in Australia, their awareness of these legislative changes, and their ability to respond to such a notification of their personal information being leaked from a service or system. The research results suggest that consumers had a high level of information-security awareness, yet low awareness of notification legislation. The discussion revealed that expected outcomes primarily drove stakeholder behavior in relation to data-breach and legislation preparedness.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"611 - 635"},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49003920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Stuffing, Sniffing, Squatting, and Stalking: Sham Activities in Affiliate Marketing 填充、嗅探、蹲下和跟踪:联盟营销中的虚假活动
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-10-21 DOI: 10.1353/lib.2020.0016
B. Amarasekara, A. Mathrani, C. Scogings
Abstract:Businesses engage in technology partnerships to leverage web-based competencies and create competitive advantage. Affiliate marketing (AM) is a business model that enables technological cooperation between small and medium enterprises (SMEs) and affiliates (influential partners who have reach of the intended consumer market). SMEs capitalize on affiliates' consumer reach to achieve global visibility and conduct online trading activities. Based upon mutually agreed commissions, SMEs advertise their goods to consumer communities provided by affiliates. However, AM can be subjected to sham activities that could skew commissions resulting from online sales transactions to bring financial gain to undeserving rogue parties. Using a cross-domain simulation platform of a complete AM network, this study reveals four fraudulent information-seeking behaviors—stuffing, sniffing, squatting, and stalking—that could affect SMEs. These findings will support enterprises in making informed decisions when implementing new AM strategies or in reinvestigating the robustness of existing AM strategies. We further propose some managerial and technical avenues to assist enterprises in safeguarding themselves from activities that could incur considerable losses to their profit margins. The study has further implications for practitioners in establishing a foundation for technology partnerships and sharing of online competencies with partnering firms.
摘要:企业通过技术合作来利用基于网络的能力并创造竞争优势。关联营销(AM)是一种商业模式,能够实现中小型企业(SME)和关联公司(具有潜在消费市场影响力的合作伙伴)之间的技术合作。中小企业利用附属公司的消费者影响力实现全球知名度并开展在线交易活动。根据双方商定的佣金,中小企业向附属公司提供的消费者社区宣传其商品。然而,AM可能会受到虚假活动的影响,这些活动可能会扭曲在线销售交易产生的佣金,为不值得的流氓方带来经济利益。利用一个完整AM网络的跨域模拟平台,本研究揭示了四种可能影响中小企业的欺诈信息寻求行为——填充、嗅探、蹲下和跟踪。这些发现将支持企业在实施新的AM战略或重新调查现有AM战略的稳健性时做出明智的决策。我们还提出了一些管理和技术途径,以帮助企业保护自己免受可能对其利润率造成重大损失的活动的影响。这项研究对从业者建立技术合作伙伴关系的基础以及与合作公司共享在线能力具有进一步的意义。
{"title":"Stuffing, Sniffing, Squatting, and Stalking: Sham Activities in Affiliate Marketing","authors":"B. Amarasekara, A. Mathrani, C. Scogings","doi":"10.1353/lib.2020.0016","DOIUrl":"https://doi.org/10.1353/lib.2020.0016","url":null,"abstract":"Abstract:Businesses engage in technology partnerships to leverage web-based competencies and create competitive advantage. Affiliate marketing (AM) is a business model that enables technological cooperation between small and medium enterprises (SMEs) and affiliates (influential partners who have reach of the intended consumer market). SMEs capitalize on affiliates' consumer reach to achieve global visibility and conduct online trading activities. Based upon mutually agreed commissions, SMEs advertise their goods to consumer communities provided by affiliates. However, AM can be subjected to sham activities that could skew commissions resulting from online sales transactions to bring financial gain to undeserving rogue parties. Using a cross-domain simulation platform of a complete AM network, this study reveals four fraudulent information-seeking behaviors—stuffing, sniffing, squatting, and stalking—that could affect SMEs. These findings will support enterprises in making informed decisions when implementing new AM strategies or in reinvestigating the robustness of existing AM strategies. We further propose some managerial and technical avenues to assist enterprises in safeguarding themselves from activities that could incur considerable losses to their profit margins. The study has further implications for practitioners in establishing a foundation for technology partnerships and sharing of online competencies with partnering firms.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"659 - 678"},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47538719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introduction 介绍
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-04-02 DOI: 10.1353/lib.2020.0006
K. Adler, Lisa Sloniowski
{"title":"Introduction","authors":"K. Adler, Lisa Sloniowski","doi":"10.1353/lib.2020.0006","DOIUrl":"https://doi.org/10.1353/lib.2020.0006","url":null,"abstract":"","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"369 - 378"},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49205237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vocational Melancholy 职业的忧郁
IF 0.8 4区 管理学 Q4 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2020-04-02 DOI: 10.1353/lib.2020.0001
Dolsy Smith
Abstract:This essay explores the affects that circulate in and around libraries from a perspective informed by feminist cultural studies and Black feminist theory. I situate the library as an institution devoted to the cultivation of sentiment and the creation of virtual publics. Though flush with the promises of freedom and equality, this legacy remains fraught with contradiction: for those promises are implicated in the oppressive structures of capitalism and patriarchal white supremacy. And new rationalizations of old forms of state-sanctioned violence and neglect, though targeted specifically at the most vulnerable, constitute an existential threat to us all. Yet the proper subject of such promises—the liberal subject of racialized and gendered privilege—has failed, again and again, to imagine how the world might turn out otherwise than this. In the hopes of practicing forms of accountability to the wisdom of others, I situate myself, as a beneficiary of structural oppression, vis-a-vis the melancholy that troubles the profession of liberal (or library) sentiments with what haunts the present and threatens the future.
摘要:本文从女性主义文化研究和黑人女性主义理论的角度探讨了图书馆内外的影响。我把图书馆定位为一个致力于培养情感和创造虚拟公共的机构。尽管充满了自由和平等的承诺,但这一遗产仍然充满了矛盾:因为这些承诺与资本主义的压迫结构和父权制白人至上主义有关。国家批准的旧形式的暴力和忽视的新合理化,虽然专门针对最弱势群体,但对我们所有人构成了生存威胁。然而,这类承诺的恰当主体——种族化和性别化特权的自由主义主体——一次又一次地失败了,无法想象世界会变成什么样子。抱着实践对他人智慧负责的希望,我把自己定位为结构性压迫的受益者,面对困扰自由主义(或图书馆)职业的忧郁情绪,这种情绪困扰着现在,威胁着未来。
{"title":"Vocational Melancholy","authors":"Dolsy Smith","doi":"10.1353/lib.2020.0001","DOIUrl":"https://doi.org/10.1353/lib.2020.0001","url":null,"abstract":"Abstract:This essay explores the affects that circulate in and around libraries from a perspective informed by feminist cultural studies and Black feminist theory. I situate the library as an institution devoted to the cultivation of sentiment and the creation of virtual publics. Though flush with the promises of freedom and equality, this legacy remains fraught with contradiction: for those promises are implicated in the oppressive structures of capitalism and patriarchal white supremacy. And new rationalizations of old forms of state-sanctioned violence and neglect, though targeted specifically at the most vulnerable, constitute an existential threat to us all. Yet the proper subject of such promises—the liberal subject of racialized and gendered privilege—has failed, again and again, to imagine how the world might turn out otherwise than this. In the hopes of practicing forms of accountability to the wisdom of others, I situate myself, as a beneficiary of structural oppression, vis-a-vis the melancholy that troubles the profession of liberal (or library) sentiments with what haunts the present and threatens the future.","PeriodicalId":47175,"journal":{"name":"Library Trends","volume":"68 1","pages":"450 - 481"},"PeriodicalIF":0.8,"publicationDate":"2020-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1353/lib.2020.0001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48849952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Library Trends
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1