You are a SPECIAL Librarian! You are a Military Librarian!

Tag Archive | "privacy and security"

Making Sense of Mobile Technology | SAGE Open

Mobile technologies have facilitated a radical shift in work and private life. In this article, we seek to better understand how individual mobile technology users have made sense of these changes and adapted to them. We have used narrative enquiry and sensemaking to collect and analyze the data. The findings show that mobile technology use blurs the boundaries between work and private life, making traditional time and place distinctions less relevant. Furthermore, work and private life can be integrated in ways that may be either competitive or complementary. We also observed an effect rarely discussed in the literature—the way personal and professional aspirations affect how work and private life are integrated. Implications include the need for researchers and organizations to understand the wider consequences that arise from the integration of work and private life roles.

Full Text: Making Sense of Mobile Technology | SAGE Open

Posted in NewTech4FedLibComments Off on Making Sense of Mobile Technology | SAGE Open

CRS — Cyberwarfare and Cyberterrorism: In Brief (March 27, 2015)

Cyberwarfare and Cyberterrorism: In Brief (PDF)
Source: Congressional Research Service (via Federation of American Scientists)

Recent incidents have highlighted the lack of consensus internationally on what defines a cyberattack, an act of war in cyberspace, or cyberterrorism. Cyberwar is typically conceptualized as state-on-state action equivalent to an armed attack or use of force in cyberspace that may trigger a military response with a proportional kinetic use of force. Cyberterrorism can be considered “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” Cybercrime includes unauthorized network breaches and theft of intellectual property and other data; it can be financially motivated, and response is typically the jurisdiction of law enforcement agencies. Within each of these categories, different motivations as well as overlapping intent and methods of various actors can complicate response options.

Posted in LinksComments Off on CRS — Cyberwarfare and Cyberterrorism: In Brief (March 27, 2015)

From AARP: Identity Theft: Who’s At Risk?

Identity Theft: Who’s At Risk?
Source: AARP Research

This AARP Fraud Watch Network study aimed to assess Americans’ habits around protecting their personal and financial information. Overall, the study finds that many are not taking precautions necessary to reduce their risk of identity theft.

Posted in Links, Web/TechComments Off on From AARP: Identity Theft: Who’s At Risk?

Follow Us On:

Categories

Blog Archives