![]() ![]() Washington, D.C.: Benton Foundation and National Urban League. ![]() Losing ground bit by bit: Low-income communities in the Information Age. European Journal of Information Systems, 20, 251–254.īenton Foundation. Individual information systems as a research arena. Oxford: Oxford University Press.īaskerville, R. Always on: Language in an online and mobile world. Three scenarios for the future of technology and strong democracy. Vertragliche Absicherung von Bring Your Own Device. Best practices for exploiting the consumerization of information technologies. KeywordsĪerospace Industries Association. Therefore, this chapter also pays attention to the manifold legal issues which have been unsolved so far and urges for legal measures to fill the existing gaps and loopholes pointed to. This is illustrated by the trend of Bring-Your-Own-Device, where issues at stake also concern legal questions as well as psychological ones (awareness, negligence, and willingness to face existing challenges). At the same time, it underlines how freedom of expression and Cyber-Crime interact by using the example of hacktivism and the hacker movement Anonymous.Įven if technological (device management) methods and strategies may help cope with these challenges, they are not an entirely technical issue. It illustrates that cyber-democratic action and participation are wide concepts that extend beyond classical definitions of democratic participation and emphasizes the importance of bottom-up mobilization and agenda-setting. Therefore, this chapter assesses potential advantages and risks of the Cyber-Space in terms of Cyber-Democracy and Cyber-Crime, inclusive of the latest trend of Bring-Your-Own-Device (BYOD). New risks and challenges ensue from this. While security issues are being put on the back burner, cyber-rebels and cyber-criminals grow in numbers. #Democracy 3 internet crime professionalAs technologies became democratized and societies got equipped with a plethora of high-potential technologies with which to access the Cyber-Space at any time, communication and action patterns would thoroughly change and alter our spheres of professional and private life, agenda setting, political participation, and behavioral patterns. Consumerization of IT has introduced multidimensional social changes which require a mature security response that is risk-based and demands a high degree of sophistication. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |