Posted on July 9, 2015.
Mobile technologies have facilitated a radical shift in work and private life. In this article, we seek to better understand how individual mobile technology users have made sense of these changes and adapted to them. We have used narrative enquiry and sensemaking to collect and analyze the data. The findings show that mobile technology use blurs the boundaries between work and private life, making traditional time and place distinctions less relevant. Furthermore, work and private life can be integrated in ways that may be either competitive or complementary. We also observed an effect rarely discussed in the literature—the way personal and professional aspirations affect how work and private life are integrated. Implications include the need for researchers and organizations to understand the wider consequences that arise from the integration of work and private life roles.
Full Text: Making Sense of Mobile Technology | SAGE Open
Posted in NewTech4FedLib
Posted on April 7, 2015.
Cyberwarfare and Cyberterrorism: In Brief (PDF)
Source: Congressional Research Service (via Federation of American Scientists)
Recent incidents have highlighted the lack of consensus internationally on what defines a cyberattack, an act of war in cyberspace, or cyberterrorism. Cyberwar is typically conceptualized as state-on-state action equivalent to an armed attack or use of force in cyberspace that may trigger a military response with a proportional kinetic use of force. Cyberterrorism can be considered “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” Cybercrime includes unauthorized network breaches and theft of intellectual property and other data; it can be financially motivated, and response is typically the jurisdiction of law enforcement agencies. Within each of these categories, different motivations as well as overlapping intent and methods of various actors can complicate response options.
Posted in Links
Posted on October 28, 2014.
Identity Theft: Who’s At Risk?
Source: AARP Research
This AARP Fraud Watch Network study aimed to assess Americans’ habits around protecting their personal and financial information. Overall, the study finds that many are not taking precautions necessary to reduce their risk of identity theft.
Posted in Links, Web/Tech