Search results

1 – 10 of 42
Open Access
Book part
Publication date: 9 May 2023

Volker Stocker, William Lehr and Georgios Smaragdakis

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…

Abstract

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Open Access
Book part
Publication date: 21 November 2022

Alexandra Kviat

This chapter explores the concept of authenticity in the context of today’s highly competitive hospitality industry. Drawing on the multi-sited ethnographic case study of…

Abstract

This chapter explores the concept of authenticity in the context of today’s highly competitive hospitality industry. Drawing on the multi-sited ethnographic case study of Ziferblat, the world’s first pay-per-minute cafe franchise, the author examines how the imperative of authenticity is addressed by small international enterprises falling in between the categories of chain and independent. By tracing how Ziferblat’s original concept, shaped by the personal and socioeconomic background of its founder, was subsequently transformed by the local teams and adapted to different cultural-geographical contexts, this chapter adds new empirical evidence to the dynamic and pluralistic notion of multiple authenticities.

Details

Cultures of Authenticity
Type: Book
ISBN: 978-1-80117-937-9

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olga Marques

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many…

Abstract

Media attention on nonconsensual intimate image dissemination has led to the relatively recent proliferation of academic research on the topic. This literature has focused on many areas including victimization and perpetration prevalence rates, coerced sexting, legal and/or criminal contexts, sexual violence in digital spaces, gendered constructions of blame and risk, and legal analysis of high-profile cases and legislation. Despite this research, several gaps exist, including a lack of empirical research with service providers. Informed by in-depth interviews with 10 sexual violence frontline professionals in Southern Ontario (Canada), this chapter focuses on their perspectives of the additive role of technology. With respect to nonconsensual intimate image dissemination, technology acts as a digital “layer” that operates in addition to the commission of physical acts of sexual violence, and compounds the harms experienced by the victim by adding a virtual – and indelible – “permanent remembering” of the violence. Nuancing the contours of consent in a digital age, this chapter concludes by considering what consent means in a technological context.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 18 July 2022

Fabian Akkerman, Eduardo Lalla-Ruiz, Martijn Mes and Taco Spitters

Cross-docking is a supply chain distribution and logistics strategy for which less-than-truckload shipments are consolidated into full-truckload shipments. Goods are stored up to…

Abstract

Cross-docking is a supply chain distribution and logistics strategy for which less-than-truckload shipments are consolidated into full-truckload shipments. Goods are stored up to a maximum of 24 hours in a cross-docking terminal. In this chapter, we build on the literature review by Ladier and Alpan (2016), who reviewed cross-docking research and conducted interviews with cross-docking managers to find research gaps and provide recommendations for future research. We conduct a systematic literature review, following the framework by Ladier and Alpan (2016), on cross-docking literature from 2015 up to 2020. We focus on papers that consider the intersection of research and industry, e.g., case studies or studies presenting real-world data. We investigate whether the research has changed according to the recommendations of Ladier and Alpan (2016). Additionally, we examine the adoption of Industry 4.0 practices in cross-docking research, e.g., related to features of the physical internet, the Internet of Things and cyber-physical systems in cross-docking methodologies or case studies. We conclude that only small adaptations have been done based on the recommendations of Ladier and Alpan (2016), but we see growing attention for Industry 4.0 concepts in cross-docking, especially for physical internet hubs.

Open Access
Book part
Publication date: 29 September 2023

Ekaterina Chicherina

This chapter considers adolescents' migration aspirations in Kyrgyzstan. The discussion is based on the data obtained from 14 semi-structured interviews with adolescents as part…

Abstract

This chapter considers adolescents' migration aspirations in Kyrgyzstan. The discussion is based on the data obtained from 14 semi-structured interviews with adolescents as part of a qualitative study devoted to changes and continuities in biographic projecting across three generations. The study reveals the tendency towards having aspirations to move abroad for studies, work and/or life. Thus, the objective of this chapter is to consider the adolescents' motivation and to trace opportunities and challenges which may promote or hinder the realisation of individuals' migration projects. Special attention is paid to the role of an adolescent's family in this process. Adolescents' aspirations oriented towards future life in foreign countries are analysed with the help of two theoretical concepts – the concept of intergenerational solidarity and the concept of individualisation.

The analysis has shown that in Kyrgyzstan, adolescents' plans concerning going abroad are often framed by their extended families' interests and expectations. Adolescents' migration aspirations become a collective project of every family member for the sake of the family's future well-being. Parental expectation of care and support in their older age is one of the main limitations on adolescents' aspirations to move abroad. Those adolescents whose migration aspirations do not correspond with parental expectations may experience strong ambivalence, when they face the conflict between their individualised biographic projects oriented towards promising global opportunities and intergenerational solidarity norms.

Details

The Emerald Handbook of Childhood and Youth in Asian Societies
Type: Book
ISBN: 978-1-80382-284-6

Keywords

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Abstract

Details

Obsessive Measurement Disorder or Pragmatic Bureaucracy?
Type: Book
ISBN: 978-1-80117-377-3

Open Access
Book part
Publication date: 9 December 2021

Kevin Macnish

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of…

Abstract

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of essays because it anticipates and supplements the range of issues covered in this collection and lays out some of the fundamental considerations necessary to ensure if surveillance must be conducted, it will be done as ethically as possible.

When is surveillance justified? We can largely agree that there are cases in which surveillance seems, at least prima facie, to be morally correct: police tracking a suspected mass murderer, domestic state security tracking a spy network, or a spouse uncovering partner’s infidelity. At the same time, there are other cases in which surveillance seems clearly not to be justified: the mass surveillance practices of the East German Stasi, an employer watching over an employee to ensure that they do not spend too long in the toilet, or a voyeur watching the subject of his lust undress night after night.

As an introductory text, my book does not seek to provide a list of necessary and sufficient conditions for ethical surveillance. What it does provide is an overview of the current thinking in surveillance ethics, looking at a range of proposed arguments about these questions, and how those arguments might play out in a variety of applied settings. It hence provides a useful and accessible volume for policymakers wishing to rapidly get up to speed on developments in surveillance and the accompanying ethical discussions.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Access

Only Open Access

Year

Content type

Book part (42)
1 – 10 of 42