Special Section Introduction - Ubiquitous IT and Digital Vulnerabilities

While information technology benefits society in numerous ways, it unfortunately also has potential to create new vulnerabilities. This special issue intends to stimulate thought and research into understanding and mitigating these vulnerabilities. We identify four mechanisms by which ubiquitous computing makes various entities (people, devices, organizations, societies, etc.) more vulnerable, including: increased visibility, enhanced cloaking, increased interconnectedness, and decreased costs. We use the papers in the special issue to explain these mechanisms, and then outline a research agenda for future work on digital vulnerabilities spanning four areas that are, or could become, significant societal problems with implications at multiple levels of analysis: Online harassment and incivility, technology-driven economic inequality, industrial Internet of Things, and algorithmic ethics and bias.

[1]  Hock-Hai Teo,et al.  Conceptualizing and Testing a Social Cognitive Model of the Digital Divide , 2011, Inf. Syst. Res..

[2]  E. Wolff,et al.  Recent Trends in Household Wealth in the United States: Rising Debt and the Middle-Class Squeeze - An Update to 2007 , 2010 .

[3]  Sandra Slaughter,et al.  Research Commentary - The Design, Use, and Consequences of Virtual Processes , 2010, Inf. Syst. Res..

[4]  Emmanuel Saez,et al.  Top Incomes in the Long Run of History , 2009 .

[5]  Kevin M. Murphy,et al.  A Theory of Rational Addiction , 1988, Journal of Political Economy.

[6]  George Valkanas,et al.  The Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry , 2016, Inf. Syst. Res..

[7]  Panagiotis G. Ipeirotis,et al.  Reputation Transferability in Online Labor Markets , 2016, Manag. Sci..

[8]  Herman Aguinis,et al.  THE BEST AND THE REST: REVISITING THE NORM OF NORMALITY OF INDIVIDUAL PERFORMANCE , 2012 .

[9]  Vijay S. Mookerjee,et al.  When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security , 2016, Inf. Syst. Res..

[10]  Dominique Brossard,et al.  The "Nasty Effect: " Online Incivility and Risk Perceptions of Emerging Technologies , 2014, J. Comput. Mediat. Commun..

[11]  Emmanuel Saez,et al.  The Top 1 Percent in International and Historical Perspective , 2013 .

[12]  Iyad Rahwan,et al.  The social dilemma of autonomous vehicles , 2015, Science.

[13]  David H. Autor,et al.  Trends in U.S. Wage Inequality: Revising the Revisionists , 2008, The Review of Economics and Statistics.

[14]  Bonnie Brinton Anderson,et al.  More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable , 2016, Inf. Syst. Res..

[15]  Erik Brynjolfsson,et al.  The New World Order , 2014, Restoring the Global Judiciary.

[16]  Sam Ransbotham,et al.  Information Disclosure and the Diffusion of Information Security Attacks , 2015, Inf. Syst. Res..

[17]  Frank E. McGarry,et al.  A summary of software measurement experiences in the Software Engineering Laboratory , 1988, [1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track.

[18]  Richard O. Mason,et al.  Studying cyborgs: re-examining internet studies as human subjects research , 2012, J. Inf. Technol..

[19]  Wonseok Oh,et al.  Excessive Dependence on Mobile Social Apps: A Rational Addiction Perspective , 2016, Inf. Syst. Res..