Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Business
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Associate Professor Katina Michael
With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Associate Professor Katina Michael
In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …
Money Buys Financial Security And Psychological Need Satisfaction: Testing Need Theory In Affluence, Ryan T. Howell, Mark Kurai, Wing Yin Leona Tam
Money Buys Financial Security And Psychological Need Satisfaction: Testing Need Theory In Affluence, Ryan T. Howell, Mark Kurai, Wing Yin Leona Tam
Faculty of Commerce - Papers (Archive)
The most prominent theory to explain the curvilinear relationship between income and subjective well-being (SWB) is need theory, which proposes that increased income and wealth can lead to increased well-being in poverty because money is used to satisfy basic physiological needs. The present study tests the tenets of need theory by proposing that money can buy happiness beyond poverty if the money satisfies higher-order needs. Findings indicate that in older adults (n = 1,284), as economic standing rises, so do individual perceptions of financial security (a safety need), which in turn increases overall life satisfaction. Further, a path model tested …
Dispossession, Human Security, And Undocumented Migration: Narrative Accounts Of Afghani And Sri Lankan Tamil Asylum Seekers, Ruchira Ganguly-Scrase, Lynnaire Sheridan
Dispossession, Human Security, And Undocumented Migration: Narrative Accounts Of Afghani And Sri Lankan Tamil Asylum Seekers, Ruchira Ganguly-Scrase, Lynnaire Sheridan
Faculty of Business - Papers (Archive)
In the globalised world of the twenty-first century, material and symbolic goods travel relatively freely across national borders. At the same time, movements of people, or at least particular categories of people, are becoming increasingly understood as a problem in need of control (Briskman and Cemlyn 2005; de Haas 2007; Turner 2010). Migration has become 'one of the most controversial areas of policy and practice facing virtually all countries' (Crawley 2006: 25). Perceptions of porous boundaries and unlimited opportunities coexist in the public imaginary with hardened attitudes towards desperate humans who seek to cross-national borders without authorisation by receiving states. …