Search results

1 – 10 of over 25000
To view the access options for this content please click here
Book part
Publication date: 20 September 2014

Jennifer Earl and Jessica L. Beyer

We analyze reactions to the U.S. government-led repression of WikiLeaks in late 2010 by actors such as Anonymous and the Pirate Parties to argue that the potential for…

Abstract

We analyze reactions to the U.S. government-led repression of WikiLeaks in late 2010 by actors such as Anonymous and the Pirate Parties to argue that the potential for backlash, which has been so prominent offline, is also a potential repercussion of repression online. In doing so, we use existing research to identify different ways in which bystanders might be pulled into conflicts, and examine our case for evidence of any of these forms of backlash. We also hypothesize that the net observed effect of repression is really the result of competing and/or amplifying backlash and deterrence effects; when this net effect is in favor of backlash, we call it a “net backlash effect” to indicate that there was more backlash than deterrence. We argue that net backlash occurs when repression recruits more bystanders into a conflict than it is able to deter in terms of already active participants. We also argue that backlash is a very likely outcome when Internet activism is repressed.

Details

Intersectionality and Social Change
Type: Book
ISBN: 978-1-78441-105-3

Keywords

To view the access options for this content please click here
Article
Publication date: 30 September 2020

Jacob A. Young, James F. Courtney, Rebecca J. Bennett, Timothy Selwyn Ellis and Clay Posey

The purpose of this study was to investigate the impact of two-way, computer-mediated communication on investigator perceptions of whistleblower credibility.

Abstract

Purpose

The purpose of this study was to investigate the impact of two-way, computer-mediated communication on investigator perceptions of whistleblower credibility.

Design/methodology/approach

Investigators were recruited to participate in an online experiment that tasked subjects with evaluating simulated two-way, computer-mediated communication between an investigator and whistleblower. Several rival explanations were also examined to account for potential confounds.

Findings

While anonymous whistleblowers were perceived to be less credible than identified whistleblowers when reporting via one-way communication, perceived whistleblower credibility was not statistically different when using two-way communication. Further, investigators allocated statistically similar amounts to investigate anonymous and identified reports.

Research limitations/implications

Based upon the results of this study, several new research directions can be explored with respect to maintaining anonymity, assessing credibility and designing reporting systems.

Practical implications

The results support the use of anonymous, two-way communication in whistleblowing reporting systems. Anonymous whistleblowers would benefit from the ability to maintain an active dialogue with investigators without jeopardizing their safety or the investigation.

Social implications

This study provides empirical support for strengthening whistleblowing reporting channels through the adoption of anonymous, two-way, computer-mediated communication. Doing so can better preserve the anonymity of those willing to report wrongdoing and better protect them from potential retaliation.

Originality/value

This study is among the first to empirically test the longstanding theory that anonymous reports are perceived by investigators as less credible than those from identified individuals. This study is also among the first to consider and incorporate anonymous, two-way communication in whistleblowing reporting.

Details

Information Technology & People, vol. 34 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

To view the access options for this content please click here
Article
Publication date: 5 June 2019

Heewon Kim and Craig Scott

The purpose of this paper is to investigate how employees use anonymous social media to cope with organizational change, which may affect various engagement outcomes…

Downloads
1557

Abstract

Purpose

The purpose of this paper is to investigate how employees use anonymous social media to cope with organizational change, which may affect various engagement outcomes. Specifically, this study focuses on change communication from management (i.e. top–down communication) and workplace freedom of speech (i.e. bottom–up communication) as potential antecedents of anonymous communication. In turn, commitment, turnover intention and job satisfaction are examined as engagement outcomes.

Design/methodology/approach

An online survey was conducted at Microsoft through Blind, a mobile platform for anonymous communication at work. A series of regression models were used to test hypotheses.

Findings

Results demonstrate that: the quality of change communication was related to anonymous social media use for information and support seeking; workplace freedom of speech was related to anonymous social media use for expressing ideas; perceived usefulness and trustworthiness of anonymous social media positively affected the usage of them; and the quality of change communication and workplace freedom of speech were linked to affective commitment and job satisfaction.

Originality/value

Despite the growing popularity of anonymous social media at work, their use and influences have received scarce empirical attention. This study advances the authors’ knowledge of the antecedents, characteristics and outcomes of anonymous social media use in a work environment characterized by frequent organizational changes. The findings also highlight the significance of communication qualities and freedom of speech at work.

Details

Corporate Communications: An International Journal, vol. 24 no. 3
Type: Research Article
ISSN: 1356-3289

Keywords

To view the access options for this content please click here
Article
Publication date: 4 November 2014

Pin Luarn and Ai-Yun Hsieh

The purpose of this paper is to extend a traditional communication theory, spiral of silence, to explore the effects of user anonymity and member familiarity on opinion…

Downloads
1506

Abstract

Purpose

The purpose of this paper is to extend a traditional communication theory, spiral of silence, to explore the effects of user anonymity and member familiarity on opinion expression behaviour in a virtual environment.

Design/methodology/approach

A laboratory experiment method was used to manipulate user anonymity, member familiarity, and opinion congruity to measure the willingness to express opinions concerning controversial topics.

Findings

A total of 147 participants were recruited in the experiment. The results revealed that anonymous users in virtual communities and users in groups comprising familiar members are more willing to express inconsistent opinions than non-anonymous users and users in groups containing unfamiliar members, respectively. In addition, anonymous and non-anonymous users as well as users in groups comprising familiar members and those in groups containing unfamiliar members are equally willing to express consistent opinions.

Originality/value

This is the first study to verify the effect of user anonymity and member familiarity on the willingness to express opinions in online social communities. The findings have crucial implications regarding how governments and businesses can stimulate creativity and feedback through virtual communities.

Details

Online Information Review, vol. 38 no. 7
Type: Research Article
ISSN: 1468-4527

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 2006

Vicente Benjumea, Javier Lopez and Jose M. Troya

To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions.

Abstract

Purpose

To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions.

Design/methodology/approach

The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”.

Findings

The cryptographic primitive provides a suitable tool for anonymous and unlinkable access to web resources based on the privileges that users hold. Moreover, the scheme allows for anonymity revocation and tracing of unlinkable accesses.

Research limitations/implications

The power of the attribute authority should be divided into several entities, one of them being a trusted third party, to avoid illicit disclosing of information.

Practical implications

New systems with support for anonymous access to web resources can be developed.

Originality/value

This paper adds the unlinkability property to anonymous accesses together with a tracing facility to existing proposals.

Details

Internet Research, vol. 16 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 1 October 2003

Joris Claessens, Claudia Díaz, Caroline Goemans, Jos Dumortier, Bart Preneel and Joos Vandewalle

With the worldwide growth of open telecommunication networks and in particular the Internet, the privacy and security concerns of people using these networks have…

Downloads
1295

Abstract

With the worldwide growth of open telecommunication networks and in particular the Internet, the privacy and security concerns of people using these networks have increased. On the one hand, users are concerned about their privacy, and desire to anonymously access the network. On the other hand, some organizations are concerned about how this anonymous access might be abused. This paper intends to bridge these conflicting interests, and proposes a solution for revocable anonymous access to the Internet. Moreover, the paper presents some legal background and motivation for such a solution. However, the paper also indicates some difficulties and disadvantages of the proposed solution, and suggests the need for further debate on the issue of online anonymity.

Details

Internet Research, vol. 13 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 11 January 2021

Philip James Catt

This paper aims to describe the development of a tailorable framework of practices for maintenance delivery (MD) and present a range of examples to demonstrate the…

Abstract

Purpose

This paper aims to describe the development of a tailorable framework of practices for maintenance delivery (MD) and present a range of examples to demonstrate the tailoring process. The framework covers the entire scope of MD in detail, including several related subjects where significant business process interaction occurs. It offers a wide range of optional practices throughout, complete with expert guidance to enable tailoring based on the business context.

Design/methodology/approach

The framework was developed in two stages: firstly, via a review of existing MD processes from the literature to establish a preliminary version; this was then developed further via a Delphi study utilising the opinion of experts from industry to validate, critique and improve the initial framework design.

Findings

The completed framework was implemented and tested by the industrial sponsor of this research and was found to deliver significant improvement to their MD practices.

Practical implications

The tailorable nature of the framework means that it can be utilised by any business to design an MD process that is fully effective within their specific context. Alongside a tailored MD process, the framework will also generate a fully aligned implementation specification for the supporting computerised maintenance management system (CMMS), which is also tailored according to the same contextual requirements. This will enable the end user of the framework to procure, implement and configure a CMMS that has all of the functionality required to fully support their business requirements.

Originality/value

Innovation is delivered by combining a novel business process design tool with a software specification tool to solve a common industry problem (i.e. poor CMMS implementation).

Details

Journal of Quality in Maintenance Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2511

Keywords

To view the access options for this content please click here
Article
Publication date: 2 February 2021

Yeunjae Lee

This study explores the link between internal corporate social responsibility (CSR) and employee advocacy intention in the anonymous online environment, viewing the…

Abstract

Purpose

This study explores the link between internal corporate social responsibility (CSR) and employee advocacy intention in the anonymous online environment, viewing the positive behavior of employees in anonymous social media as discretionary and altruistic efforts for their organization. Guided by social exchange theory (SET) and relationship management theory, the role of a communal relationship and organizational citizenship behavior (OCB) is likewise explored.

Design/methodology/approach

An online survey was conducted with 405 full-time employees in the US.

Findings

Results showed that internal CSR positively influences the organization–employee communal relationship as well as OCB. Results further show that the employee-oriented communal relationship plays an important role in increasing OCB, which in turn enhances employee advocacy intention in anonymous social media.

Originality/value

This study is one of the first attempts to conceptualize employees' advocative behaviors in anonymous websites (e.g. Glassdoor) and to explore the antecedents of advocative behaviors, drawing insights from human resources management and internal relations.

Details

Management Decision, vol. 59 no. 10
Type: Research Article
ISSN: 0025-1747

Keywords

To view the access options for this content please click here
Article
Publication date: 2 March 2020

Yeunjae Lee

Given that an increasing number of social media platforms allow employees to share company-related information, the present study seeks to understand their complicated…

Abstract

Purpose

Given that an increasing number of social media platforms allow employees to share company-related information, the present study seeks to understand their complicated motivations for social media behaviors. Specifically, this study explores the antecedents of employees' positive and negative company-related information-sharing intentions on two distinctive social media platforms, personal (e.g. Facebook) and anonymous social networking sites (e.g. Glassdoor).

Design/methodology/approach

An online survey was conducted with 419 full-time employees in the United States from various industry sectors.

Findings

Individual (enjoyment, venting negative feelings, and self-enhancement), interpersonal (bonding and bridging ties), and organizational (organization–employee relationship and perceived external prestige) factors are considerably and distinctly associated with employees' behavioral intentions on different social media platforms.

Originality/value

This study is among the first to understand employees' communicative behaviors on social media (sECB) by linking diverse levels of motivational factors: individual, interpersonal, and organizational using a theoretical framework of socioecological model (SEM). This study also provides significant practical guidelines for organizational leaders and platform operators by explicating the dynamics of employee motives in engaging in a variety of social media platforms.

Details

Internet Research, vol. 30 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 13 December 2019

Yang Li and Xuhua Hu

The purpose of this paper is to solve the problem of information privacy and security of social users. Mobile internet and social network are more and more deeply…

Abstract

Purpose

The purpose of this paper is to solve the problem of information privacy and security of social users. Mobile internet and social network are more and more deeply integrated into people’s daily life, especially under the interaction of the fierce development momentum of the Internet of Things and diversified personalized services, more and more private information of social users is exposed to the network environment actively or unintentionally. In addition, a large amount of social network data not only brings more benefits to network application providers, but also provides motivation for malicious attackers. Therefore, under the social network environment, the research on the privacy protection of user information has great theoretical and practical significance.

Design/methodology/approach

In this study, based on the social network analysis, combined with the attribute reduction idea of rough set theory, the generalized reduction concept based on multi-level rough set from the perspectives of positive region, information entropy and knowledge granularity of rough set theory were proposed. Furthermore, it was traversed on the basis of the hierarchical compatible granularity space of the original information system and the corresponding attribute values are coarsened. The selected test data sets were tested, and the experimental results were analyzed.

Findings

The results showed that the algorithm can guarantee the anonymity requirement of data publishing and improve the effect of classification modeling on anonymous data in social network environment.

Research limitations/implications

In the test and verification of privacy protection algorithm and privacy protection scheme, the efficiency of algorithm and scheme needs to be tested on a larger data scale. However, the data in this study are not enough. In the following research, more data will be used for testing and verification.

Practical implications

In the context of social network, the hierarchical structure of data is introduced into rough set theory as domain knowledge by referring to human granulation cognitive mechanism, and rough set modeling for complex hierarchical data is studied for hierarchical data of decision table. The theoretical research results are applied to hierarchical decision rule mining and k-anonymous privacy protection data mining research, which enriches the connotation of rough set theory and has important theoretical and practical significance for further promoting the application of this theory. In addition, combined the theory of secure multi-party computing and the theory of attribute reduction in rough set, a privacy protection feature selection algorithm for multi-source decision table is proposed, which solves the privacy protection problem of feature selection in distributed environment. It provides a set of effective rough set feature selection method for privacy protection classification mining in distributed environment, which has practical application value for promoting the development of privacy protection data mining.

Originality/value

In this study, the proposed algorithm and scheme can effectively protect the privacy of social network data, ensure the availability of social network graph structure and realize the need of both protection and sharing of user attributes and relational data.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of over 25000