Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication
Articles 1 - 2 of 2
Full-Text Articles in Social and Behavioral Sciences
Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael
Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael
Professor Katina Michael
As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …
Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway
Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway
Alexander Hayes Mr.
Identity awareness of research data has been introduced as a requirement for open research, transparency and reusability of research data in the context of eScience. This requirement includes the capability of linking research data to researchers, research projects and publications, and identifying the license for the data. This connectivity between research data and other elements in research ecosystems is required in order to make the data available and reusable beyond the initial research. In this paper, we examine these capabilities in the domains of veillance and social computing. The dataset cases presented in this paper articulate the challenges that researchers …