Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Business

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael Jan 2012

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …


Money Buys Financial Security And Psychological Need Satisfaction: Testing Need Theory In Affluence, Ryan T. Howell, Mark Kurai, Wing Yin Leona Tam Jan 2012

Money Buys Financial Security And Psychological Need Satisfaction: Testing Need Theory In Affluence, Ryan T. Howell, Mark Kurai, Wing Yin Leona Tam

Faculty of Commerce - Papers (Archive)

The most prominent theory to explain the curvilinear relationship between income and subjective well-being (SWB) is need theory, which proposes that increased income and wealth can lead to increased well-being in poverty because money is used to satisfy basic physiological needs. The present study tests the tenets of need theory by proposing that money can buy happiness beyond poverty if the money satisfies higher-order needs. Findings indicate that in older adults (n = 1,284), as economic standing rises, so do individual perceptions of financial security (a safety need), which in turn increases overall life satisfaction. Further, a path model tested …


Dispossession, Human Security, And Undocumented Migration: Narrative Accounts Of Afghani And Sri Lankan Tamil Asylum Seekers, Ruchira Ganguly-Scrase, Lynnaire Sheridan Jan 2012

Dispossession, Human Security, And Undocumented Migration: Narrative Accounts Of Afghani And Sri Lankan Tamil Asylum Seekers, Ruchira Ganguly-Scrase, Lynnaire Sheridan

Faculty of Business - Papers (Archive)

In the globalised world of the twenty-first century, material and symbolic goods travel relatively freely across national borders. At the same time, movements of people, or at least particular categories of people, are becoming increasingly understood as a problem in need of control (Briskman and Cemlyn 2005; de Haas 2007; Turner 2010). Migration has become 'one of the most controversial areas of policy and practice facing virtually all countries' (Crawley 2006: 25). Perceptions of porous boundaries and unlimited opportunities coexist in the public imaginary with hardened attitudes towards desperate humans who seek to cross-national borders without authorisation by receiving states. …