Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Data privacy

Discipline
Institution
Publication Year
Publication
File Type

Articles 1 - 7 of 7

Full-Text Articles in Business

Insights Into Privacy Protection Research In Ai, Shasha Yu Mar 2024

Insights Into Privacy Protection Research In Ai, Shasha Yu

School of Professional Studies

This paper presents a systematic bibliometric analysis of the artificial intelligence (AI) domain to explore privacy protection research as AI technologies integrate and data privacy concerns rise. Understanding evolutionary patterns and current trends in this research is crucial. Leveraging bibliometric techniques, the authors analyze 8,322 papers from the Web of Science (WoS) database, spanning 1990 to 2023. The analysis highlights IEEE Transactions on Knowledge and Data Engineering and IEEE Access journals as highly influential, the former being an early contributor and the latter emerging as a pivotal source. The study demonstrates substantial disparities in scientific productivity across countries. Specifically, the …


Contractual Stakeholderism, Kishanthi Parella Jan 2022

Contractual Stakeholderism, Kishanthi Parella

Scholarly Articles

In 2019, the Business Roundtable announced its commitment to all corporate stakeholders—consumers, employees, suppliers, and communities—and not just shareholders. This announcement has reawakened an old debate over corporate social responsibility. Stakeholderism advocates argue that corporate leaders must consider the interests of the various stakeholders impacted by corporate decision-making. Stakeholderism critics challenge this view, expressing concerns that stakeholderism will magnify managerial agency costs, chill regulation, risk inauthenticity, and lead to impractical solutions.

This Article proposes “contractual stakeholderism” to operationalize stakeholderism in accordance with the views of its advocates but in a way that is attentive to the concerns of its critics. …


Developing A Measure Of Social, Ethical, And Legal Content For Intelligent Cognitive Assistants, Clovia Hamilton, William Swart, Gerald M. Stokes Jan 2021

Developing A Measure Of Social, Ethical, And Legal Content For Intelligent Cognitive Assistants, Clovia Hamilton, William Swart, Gerald M. Stokes

Technology & Society Faculty Publications

We address the issue of consumer privacy against the backdrop of the national priority of maintaining global leadership in artificial intelligence, the ongoing research in Artificial Cognitive Assistants, and the explosive growth in the development and application of Voice Activated Personal Assistants (VAPAs) such as Alexa and Siri, spurred on by the needs and opportunities arising out of the COVID-19 global pandemic. We first review the growth and associated legal issues of the of VAPAs in private homes, banks, healthcare, and education. We then summarize the policy guidelines for the development of VAPAs. Then, we classify these into five major …


A Review On Covid-19 Related Research In Leading Information Systems Journals, Yuming He, Wenzhuo Li, Xin Tian, Yunfei Xing Jan 2021

A Review On Covid-19 Related Research In Leading Information Systems Journals, Yuming He, Wenzhuo Li, Xin Tian, Yunfei Xing

Information Technology & Decision Sciences Faculty Publications

To identify the key challenges, issues and opportunities affecting individuals, organizations, and society on coping with COVID-19, we reviewed extant research related to the COVID-19 pandemic in the leading information systems journals. Six major research themes and representative literature for each theme are identified by content analysis. The six major research themes include digital transformation, data visualization and artificial intelligence, infodemic and cybersecurity, IT governance, digital divide, and IS research direction in the post-pandemic period. Moreover, we discussed the challenges, current research, and opportunities related to each of the themes. The review provides a snapshot of IS literature on the …


Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun Nov 2020

Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun

Research Collection School Of Computing and Information Systems

Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin's core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, …


Public Policy Origins Of U.S. Data, Bert Chapman Oct 2020

Public Policy Origins Of U.S. Data, Bert Chapman

Libraries Faculty and Staff Presentations

Provides detailed introduction and overview of public policy origins of U.S. data. Shows how congressional legislation and Office of Management and Budget documents influence compilation and dissemination of U.S. Government data. Stresses how Indiana General Assembly requirements influence compilation of Indiana state agency data and Indiana local government agency data. Places emphasis on roles played in data compilation and dissemination by public policy research institutions/think tanks. Concludes by stressing limitations of data collection by governmental and non-governmental entities.


Cambridge Analytica: The Scandal On Data Privacy, Carissa Boerboom Jan 2020

Cambridge Analytica: The Scandal On Data Privacy, Carissa Boerboom

Augustana Center for the Study of Ethics Essay Contest

Consumers need to understand the risks and consequences of sharing their lives with the world. For data analysts, even if you can create and implement a model, should you? This research paper discusses Cambridge Analytica’s methods using predictive analytics and Facebook to influence the 2016 US Presidential Election. Through examining the firm as a whole, key people involved in the scandal, methods of data collection, and Facebook’s role, the ethical boundaries of big data, predictive analytics, and data privacy are analyzed. Three perspectives were discussed in regards to ethical disparity: Cambridge Analytica, Facebook, and the consumers. Overall, this research exposes …