Search results

1 – 10 of 32
Open Access
Article
Publication date: 15 June 2023

Aderinola Ololade Dunmade and Adeyinka Tella

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

1169

Abstract

Purpose

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

Design/methodology/approach

Using content analysis and a review of relevant literature, this study examines the challenges that librarians face in enforcing cyberethics and highlights the strategies that libraries can adopt to promote responsible online behaviour.

Findings

This paper identifies the lack of awareness among postgraduate students regarding cybersecurity risks and the need for training and resources for librarians as key challenges in promoting cyberethics.

Originality/value

This study recommends that libraries provide access to training resources and develop policies and guidelines to promote cyberethics among postgraduate students. Overall, this paper argues that libraries and librarians can play a critical role in promoting responsible online behaviour and ensuring the safety and security of postgraduate students in Nigeria.

Article
Publication date: 21 September 2015

Omwoyo Bosire Onyancha

The purpose of this paper is to explore the differences and similarities between computer ethics, internet ethics and cyberethics as reflected in the contents of the published…

2099

Abstract

Purpose

The purpose of this paper is to explore the differences and similarities between computer ethics, internet ethics and cyberethics as reflected in the contents of the published literature as well as the search trends on Google.

Design/methodology/approach

The paper opted for an informetrics approach, and more specifically content analysis, to investigate the inter-relationships between computer ethics, internet ethics and cyberethics. The data sources for this study included Google Trends, Google Scholar and the Web of Science citation indexes. Different search queries were used, depending on the structure of each data source, to extract the relevant data sets.

Findings

Using different methods and techniques to analyse the data, the paper provides an alternative means of investigating relationships among concepts. The findings indicate that there is still no clear distinction between the concepts in terms of subject and title terms used to describe the published literature on the three concepts, as well as the research areas where the three concepts are applied. Going by the current trend, the paper envisages that cyberethics may, in the future, become a broader term to include computer ethics and internet ethics.

Research limitations/implications

The data sources that were selected for the study might have not been comprehensive in the coverage of the published literature on the three concepts and therefore there is need for further research, which will expand the scope of the data sources.

Practical implications

The paper’s findings may apply in the practice of indexing and abstracting as well as thesaurus construction as far as the three terms are concerned.

Originality/value

The paper offers an alternative technique that can be used to investigate relationships among concepts. The value of the paper could include curriculum development of programmes dealing with ethical issues that arise when developing and using computers and related technologies.

Details

Library Hi Tech, vol. 33 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Open Access
Article
Publication date: 20 October 2022

Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…

Abstract

Purpose

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.

Design/methodology/approach

The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.

Findings

This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.

Research limitations/implications

The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.

Practical implications

Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.

Social implications

Shared awareness and protection of ICT resources.

Originality/value

Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 3 March 2023

Tahani Al-Khatib

This study aims to investigate the trending term: “Netiquette” as an important element in the effective digital citizenship. The research suggests a systematic framework of

Abstract

Purpose

This study aims to investigate the trending term: “Netiquette” as an important element in the effective digital citizenship. The research suggests a systematic framework of netiquette rules in the field of online education based on the classical core rules of netiquette and according to the digital citizenship scale (DCS). The research also studies the corresponding responsibilities of both educators and students to raise awareness towards using technology in a balanced, safe, smart and ethical way as the shift towards the digital activities increased significantly in the post-corona time.

Design/methodology/approach

The research used the qualitative data that were based on the everyday observation and analysis of the online education experience at the university of Jordan in the academic year 2020/2021; the online group discussions of students and teachers; and investigating the guidelines of the online learning netiquette rules in various academic institutes. Comparative analysis was conducted to merge and eliminate redundant rules and to add sub rules, and then to cluster them into groups. The suggested clustered groups were distributed into the classical core rules outline of netiquette. In each core rule, the sub rules were reclassified and recategorized according to the DCS by studying the complexity levels and their corresponding factors. The suggested framework updates and adds DCS levels and factors considering the exceptional experience of online education through the pandemic.

Findings

The research finds that “Netiquette” had been neglected in cyber ethics literature, and so it has to be rediscovered through the lens of digital citizenship that becomes very noticeable issue in the post-COVID era. So, the research presents a systematic framework that outlines more than 150 netiquette sub rules in the field of online education, and that were clustered according to DCS and the classical core rules of netiquette. It also adds a new factor to the bottom level of DCS which is the primarily skills and traits, and also updates the internet and political activism fac-tor by adding the social perspective.

Originality/value

A novel classification of the classical core rules of netiquette was proposed in the field of online education to serve as a spectrum of identifying the complexity of digital citizenship levels and factors. This research can be a starting point of more works on netiquette research in online education and on other fields such as online business meetings, social media networking and online gaming.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 8 June 2021

Karen Renaud and Suzanne Prior

The purpose of this paper is to scope the field of child-related online harms and to produce a resource pack to communicate all the different dimensions of this domain to teachers…

Abstract

Purpose

The purpose of this paper is to scope the field of child-related online harms and to produce a resource pack to communicate all the different dimensions of this domain to teachers and carers.

Design/methodology/approach

With children increasingly operating as independent agents online, their teachers and carers need to understand the risks of their new playground and the range of risk management strategies they can deploy. Carers and teachers play a prominent role in applying the three M’s: mentoring the child, mitigating harms using a variety of technologies (where possible) and monitoring the child’s online activities to ensure their cybersecurity and cybersafety. In this space, the core concepts of “cybersafety” and “cybersecurity” are substantively different and this should be acknowledged for the full range of counter-measures to be appreciated. Evidence of core concept conflation emerged, confirming the need for a resource pack to improve comprehension. A carefully crafted resource pack was developed to convey knowledge of risky behaviors for three age groups and mapped to the appropriate “three M’s” to be used as counter-measures.

Findings

The investigation revealed key concept conflation, and then identified a wide range of harms and countermeasures. The resource pack brings clarity to this domain for all stakeholders.

Research limitations/implications

The number of people who were involved in the empirical investigation was limited to those living in Scotland and Nigeria, but it is unlikely that the situation is different elsewhere because the internet is global and children’s risky behaviors are likely to be similar across the globe.

Originality/value

Others have investigated this domain, but no one, to the authors’ knowledge, has come up with the “Three M’s” formulation and a visualization-based resource pack that can inform educators and carers in terms of actions they can take to address the harms.

Details

Information & Computer Security, vol. 29 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 November 2016

Lancelord Siphamandla Ncube and Luyanda Dube

Cyberbullying occurs when a minor is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child. Given that cyberbullying entails defamation…

1401

Abstract

Purpose

Cyberbullying occurs when a minor is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child. Given that cyberbullying entails defamation or spreading false information or portfolios about someone, it is regarded as a violation of the ethical code of information use. The purpose of the study was to explore the perceptions, experiences and challenges of post-high school youth with regards to cyberbullying. This is a quantitative study that used a survey approach to gather data using a self-administered questionnaire, which was distributed to 60 youth from the KwaZulu-Natal computer literacy community engagement project. The findings attest that youth recognise that cyberbullying might have detrimental effects on victims, such as alcohol and drugs abuse, low self-esteem, high level of absenteeism, poor grades and depression and suicidal thoughts. There is a low percentage of victims and perpetrators of cyberbullying in rural contexts in South Africa. It is hoped that findings may will a positive impact in the rural communities and enable the youth to interact with the modern technologies and handle them in an ethical manner. The study recommends that parents need to take cognisance of the probable possible dangers of the various technologies so that they could be instrumental in educating their children about children cyberbullying. Further, the schools and the Department of Education can play a fundamental role in educating children about cyberbullying and cyber ethics.

Design/methodology/approach

This survey was conducted to explore youth perceptions and experiences, as well as violations, of ethics through cyberbullying as experienced by the rural community at Mbazwana in the North Coast of KwaZulu-Natal. Convenience sampling was used, because although the questionnaire was distributed to all 60 participants in the project, not all of them completed the instrument, as participation was voluntary. Only 43 were completed, which is equal to 72 per cent response rate. The validity of the data collection instrument used was enhanced by the fact that questions were derived from the main objective of the study. Some themes of the instrument were self-designed and others were adapted from a similar study by Dehue et al. (2008), who looked at cyberbullying experiences of youth. The instrument was tried out in a pilot study in grade 12 classes in two high schools at Mbazwana in a bid to find out whether the learners would understand the questionnaire. Post-high school learners were considered to be at a similar level as the grade 12 learners polled. The pilot study proved its own importance: students who filled in the questionnaire indicated that they were not familiar with some terms and the researchers had to simplify the language to make it more understandable.

Findings

A large portion of the youth studied (45 per cent) indicated that they used their smartphones to access the internet, 25 per cent identified libraries as their source of access to the internet and 13 per cent reported accessing the internet from community laboratories (usually found in Department of Education centres). In total, 13 per cent of respondents reported accessing the internet from friends’ computers. Last, the smallest proportion at 4 per cent reported having internet access via their home desktop computers. The South African Mobile Report (2014) reveals that a great majority of South Africans access the internet via their own smartphones. These findings might indicate that many people nowadays do indeed have internet access in their regions.

Research limitations/implications

The results of this study indicate that not all households own a desktop computer, as some people rely on community laboratories and others rely on friends who own desktop or laptop computers.

Practical implications

The study results reveal that most students who did the computer literacy course consider themselves at an “intermediate” level. It was noted that cellphones/smartphones play a significant role in gaining access to the internet and to social networking applications in rural communities. The social media applications most visited by youth in this study were shown to be Facebook and WhatsApp. Only a relatively low percentage of the respondents in this study in a rural context in South Africa reported being either victims or perpetrators of cyberbullying.

Social implications

Social media give people ample opportunities to interact and socialise with other people in global context. Only a relatively low percentage of the respondents in this study in a rural context in South Africa reported being either victims or perpetrators of cyberbullying. It is hoped that insights gained from these findings may have a positive effect in the rural communities if awareness programmes are put in place to enable the youth to interact with the modern technologies and handle them in an ethical manner.

Originality/value

The contribution to the world of knowledge is that this study gives a clear indication of experiences and perceptions of cyberbullying in rural areas in South Africa. This will inform other scholars who want to engage in similar studies in different contexts that can be compared with the results of this study. It is notable that one cannot predict one’s own knowledge of a certain aspect of a community until one has fully engaged in research. Prior to this study, the researchers did not know whether the rural community youth participated in cyberbullying.

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 May 2006

Philip Brey

This paper addresses social and ethical issues in computer‐mediated education, with a focus on higher education. It will be argued if computer‐mediated education is to be…

Abstract

This paper addresses social and ethical issues in computer‐mediated education, with a focus on higher education. It will be argued if computer‐mediated education is to be implemented in a socially and ethically sound way, four major social and ethical issues much be confronted. These are: (1) the issue of value transfer in higher education: can social, cultural and academic values be successfully transmitted in computer‐mediated education? (2) the issue of academic freedom: are computer‐mediated educational settings conducive for academic freedom or do they threaten to undermine it? (3) the issue of equality and diversity: does a reliance on computer networks in higher education foster equality and equity for students and does it promote diversity, or does it disadvantage certain social classes and force conformity? (4) the issue of ethical student and staff behaviour: What kinds of unethical behaviour by students and staff are made possible in computer‐mediated education, and what can be done against it? Existing studies relating to these four issues are examined and some tentative policy conclusions are drawn.

Details

Journal of Information, Communication and Ethics in Society, vol. 4 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 6 May 2014

Ivana Greguric

This paper aims to focus on the modern development of bionics and linking new technologies with the human nervous system or other biological systems that cause changes of the…

3382

Abstract

Purpose

This paper aims to focus on the modern development of bionics and linking new technologies with the human nervous system or other biological systems that cause changes of the human biological structure.

Design/methodology/approach

The paper is a discursive evaluation of technological progress and new systems where computers and machines integrate, making a single matrix entity – the cyborg. Here fundamental questions arise, such as what it means to be human and what is (descriptive aspect) and what should be (normative aspect) a human being?

Findings

The paper argues for the value of twenty-first century human enhancement techniques and other emerging technologies that promised to “help” humans become “more than human”, trying to create human beings with greatly enhanced abilities, to improve human mental and physical characteristics and capacities. Modern man is gradually disappearing as a natural being and increasingly turning into an artificial creature “cyborg” that leads into the question, what will ultimately remain human in a human body?

Originality/value

The paper contributes to the existing debates about further development of cyborgisation and examines boundaries that will strictly divide man from a cyborg in the near future. In order to protect man from the omnipotence of technology and its unethical application is necessary to establish cyborgoethics that would determine the implementation of an artificial boundary in the natural body.

Details

Journal of Information, Communication and Ethics in Society, vol. 12 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 May 2003

Herman T Tavani

During the past decade, a fairly extensive literature on the digital divide has emerged. Many reports and studies have provided statistical data (Digital Divide Network, 2002;…

2825

Abstract

During the past decade, a fairly extensive literature on the digital divide has emerged. Many reports and studies have provided statistical data (Digital Divide Network, 2002; NTIA, 1995, 1998, 1999, 2000) pertaining to sociological aspects of ‘the divide,’ while some studies have examined policy issues involving universal service (Camp and Tsong, 2001) and universal access (Brewer and Chuter, 2002). Other studies have suggested ways in which the digital divide could be better understood if it were ‘reconceptualized’ in terms of an alternative metaphor, e.g. a ‘divide’ having to do with literacy (Warschauer, 2002), power (Moss, 2002), content (Carvin, 2000), or the (information) environment (Floridi, 2001). However, with the exception of Johnson (2001) and Koehler (2002), authors have tended not to question ‐ at least not directly ‐ whether the digital divide is, at bottom, an ethical issue. Many authors seem to assume that because disparities involving access to computing technology exist, issues underlying the digital divide are necessarily moral in nature. Many further assume that because this particular ‘divide’ has to do with something that is digital or technological in nature, it is best understood as a computer ethical issue. The present study, which examines both assumptions, considers four questions: (1) What exactly is the digital divide? (2) Is this ‘divide’ ultimately an ethical issue? (3) Assuming that the answer to (2) is ‘yes,’ is the digital divide necessarily an issue for computer ethics? (4) If the answer to (3) is ‘yes,’ what can/should computer professionals do bridge the digital divide?

Details

Journal of Information, Communication and Ethics in Society, vol. 1 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 13 November 2009

Wanjira Kinuthia

While there is significant existing literature on learner analysis in instructional design and separately in cultural issues in education, these two areas are rarely examined in…

745

Abstract

Purpose

While there is significant existing literature on learner analysis in instructional design and separately in cultural issues in education, these two areas are rarely examined in tandem. This paper aims to bring these two areas together.

Design/methodology/approach

This research uses qualitative methods within the context of a case study. A dual role is played by the author as instructor‐researcher in gathering and analyzing the data.

Findings

One area of success in the course is that it served to increase the coverage of the area of instructional design in addition to expanding the literature base in this area of study that has only recently begun to receive attention.

Research limitations/implications

One limitation of the course is that while it is designed to provide a blended mix of learning opportunities, the instructional design field is quite large and it is impossible to explore all relevant topics.

Practical implications

A challenge of the course is that socio‐cultural concepts are broad and it is recognized that a single course is not enough to effectively cover all relevant issues. Careful course design is therefore important.

Originality/value

Feedback from this study can serve as a resource for decision making about existing and additional courses, and specific content that could be incorporated into similar courses.

Details

Multicultural Education & Technology Journal, vol. 3 no. 4
Type: Research Article
ISSN: 1750-497X

Keywords

1 – 10 of 32