Virtual Social Networks (VSN) act as a catalyst for the success of the active participation of citizens in information sharing, collaboration, and decision making. VSN based e-participation tools allow many-to-many communication and collaboration near real-time with users who might be in geographically dispersed locations. It provides a platform to voice opinions and perspectives and share them with others in new and innovative ways. Cybersecurity is a key area that needs to be considered for the success and continuous use of e-participation systems as it protects user privacy and helps to avoid scams, harassment, and misinformation. The intervening effect of cybersecurity protection mechanisms and citizens' education level on the relationship between VSN diffusion and e-participation initiatives is explored in the proposed research model presented in this paper. Moreover, this research model is explored for different stages of e-participation (e-information, e-consultation, and e-decision making) and the five dimensions of cybersecurity (legal, technical, organizational, capacity building, and cooperation). The findings indicate that improved VSN usage has increased e-participation (especially in e-consultation and e-decision making) as a result of improved cybersecurity protection and public education, highlighting the varying importance of different cybersecurity protection measures for three stages of e-participation. Thus, considering the recent problems like platform manipulation, misinformation and data breaches associated with the use of VSN for e-participation, this study emphasizes the importance of regulations, policies, partnerships, technical frameworks, and research to ensure cybersecurity, as well as the importance of education to enable the public to interact productively in e-participation activities. This study is performed using publicly available data from 115 countries and the research model is developed, drawing theoretical basis from the Protection Motivation Theory, Structuration Theory, and Endogenous Growth Theory. This paper recognizes the theoretical and practical implications, and limitations while recommending future research directions.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10107556PMC
http://dx.doi.org/10.1007/s10796-023-10385-7DOI Listing

Publication Analysis

Top Keywords

cybersecurity protection
16
e-participation
9
education level
8
protection mechanisms
8
e-participation initiatives
8
stages e-participation
8
e-consultation e-decision
8
e-decision making
8
cybersecurity
7
protection
5

Similar Publications

The application of artificial intelligence (AI) to healthcare in Africa has the potential to transform productivity, diagnosis, disease surveillance, and resource allocation by improving accuracy and efficiency. However, to fully realize its benefits, it is necessary to consider issues concerning data privacy, equity, infrastructure integration, and ethical policy development. The use of these tools may improve the detection of diseases, the distribution of resources, and the continuity of care.

View Article and Find Full Text PDF

Chemical industries are highly vulnerable to accidental events or terrorist attacks due to their processing, storage, and transportation of explosive, flammable, and toxic materials. Major industrial risks include fire, explosion, and toxic chemical release. An effective risk evaluation system is essential to prevent accidents or terrorist attacks.

View Article and Find Full Text PDF

Background: Radiomics holds great potential for the noninvasive evaluation of EGFR-TKIs and ICIs responses, but data privacy and model robustness challenges limit its current efficacy and safety. This study aims to develop and validate an encrypted multidimensional radiomics approach to enhance the stratification and analysis of therapeutic responses.

Materials And Methods: This multicenter study incorporated various data types from 506 NSCLC patients, which underwent preprocessing through anonymization methods and were securely encrypted using the AES-CBC algorithm.

View Article and Find Full Text PDF

Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. As IoT, AI, and 5G endure to unite and understand the potential of Industry 4.0, security events and incidents on IoT systems have been enlarged.

View Article and Find Full Text PDF

FedKD-CPI: Combining the federated knowledge distillation technique to accomplish synergistic compound-protein interaction prediction.

Methods

January 2025

School of Computer Science and Engineering, Central South University, Changsha 410083, China; Hunan Provincial Key Lab on Bioinformatics, Central South University, Changsha 410083, China.

Compound-protein interaction (CPI) prediction is critical in the early stages of drug discovery, narrowing the search space for CPIs and reducing the cost and time required for traditional high-throughput screening. However, CPI-related data are usually distributed across different institutions and their sharing is restricted because of data privacy and intellectual property rights. Constructing a scheme that enhances multi-institutional collaboration to improve prediction accuracy while protecting data privacy is essential.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!