Search results

1 – 10 of 161
Open Access
Article
Publication date: 12 December 2023

Cristina A. Huertas-Abril and Francisco Javier Palacios-Hidalgo

Considering the potential of Collaborative International Online Learning (COIL) for cross-boundaries interacting and collaborating effectively, this study aims to explore the…

Abstract

Purpose

Considering the potential of Collaborative International Online Learning (COIL) for cross-boundaries interacting and collaborating effectively, this study aims to explore the intercultural awareness of pre-service language teachers after participating in a COIL project.

Design/methodology/approach

Following a quantitative research approach and an exploratory cross-sectional method, the authors administered a 13-item questionnaire to unveil the perceptions of 64 future language teachers from Spain after their online experience with counterparts from the USA.

Findings

Participants consider that COIL may have enhanced their intercultural and global awareness and equipped them with valuable skills and knowledge for the future, being women more positive than men. Moreover, the results also suggest that those participants who have not traveled abroad consider COIL to be a good opportunity to compensate for the lack of knowledge or experience with other cultures resulting from not having had the opportunity to visit other countries.

Practical implications

COIL needs to be seen as a powerful tool to promote global learning, intercultural understanding and the development of skills among students that will be vital for success in today’s interconnected world. Nevertheless, universities and teacher training centers need to rethink the preparation of future teachers for the increasing demands to prepare students for the requirements of the global world, and to do so, they need to consider that COIL may offer them significant benefits.

Originality/value

This work offers an interesting exploration of teachers’ attitudes toward COIL, providing insights into the potential of online collaboration for developing intercultural awareness.

Details

Journal for Multicultural Education, vol. 18 no. 1/2
Type: Research Article
ISSN: 2053-535X

Keywords

Article
Publication date: 15 April 2024

Aswathy Sreenivasan and Suresh M.

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying…

Abstract

Purpose

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying ethical dimensions to the field of entrepreneurship. By combining a bibliometric analysis with the literature review, the purpose of this paper is to provide an overview of entrepreneurship ethics and its contribution to sustainable development goals, along with future research directions on the topic of entrepreneurship and ethics.

Design/methodology/approach

The research looked for literature based on entrepreneurship ethics from the Dimension database. The authors accumulated 2,279 articles for the period of 2002–2022 for analysis. The authors used bibliometric analysis for analyzing the topic with the use of VosViewer and Excel.

Findings

By combining a bibliometric analysis with a literature review, this study aimed to provide an overview of the ethics and entrepreneurship and contribution to sustainable development goals. The most influential author and journal are Vanessa Ratten and the Journal of Business Ethics, respectively. The top sustainable development goals (SDGs) being contributed by entrepreneurship ethics are SDG4, SDG8, SDG16, SDG11 and SDG3. By contrasting these two interpretations, the authors have demonstrated that the entrepreneurship environment involves various ethical issues connected to personal, organizational and societal sectors.

Research limitations/implications

The current study may serve as a general guideline for future investigation into this topic.

Practical implications

Regarding the practical ramifications, the findings can help entrepreneurs who are preparing to launch a business or are already doing so. The findings provide a comprehensive framework of success variables that must be considered to improve the venture’s performance.

Originality/value

This study’s originality is from presenting a structured and in-depth literature review that describes the current state of entrepreneurship ethics and its contribution to sustainable development goals. A complete analysis of the data gathered on entrepreneurship ethics is offered to establish that it is sustainable.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Book part
Publication date: 8 April 2024

Amaresh Panda and Sanjay Mohapatra

Abstract

Details

The Online Healthcare Community
Type: Book
ISBN: 978-1-83549-141-6

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1033

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 22 December 2023

Grace Enriquez, Victoria Gill, Gerald Campano, Tracey T. Flores, Stephanie Jones, Kevin M. Leander, Lucinda McKnight and Detra Price-Dennis

The purpose of this paper is to provide a transcript of a dialogue among literacy educators and researchers on the impact of generative aritficial intelligence (AI) in the field…

Abstract

Purpose

The purpose of this paper is to provide a transcript of a dialogue among literacy educators and researchers on the impact of generative aritficial intelligence (AI) in the field. In the spring of 2023, a lively conversation emerged on the National Council of Research on Language and Literacy (NCRLL)’s listserv. Stephanie initiated the conversation by sharing an op-ed she wrote for Atlanta Journal-Constitution about the rise of ChatGPT and similar generative AI platforms, moving beyond the general public’s concerns about student cheating and robot takeovers. NCRLL then convened a webinar of eight leading scholars in writing and literacies development, inspired by that listerv conversation and an organizational interest in promoting intergenerational collaboration among literacy scholars.

Design/methodology/approach

As former doctoral students of two of the panel participants, webinar facilitators Grace and Victoria positioned themselves primarily as learners about this topic and gathered questions from colleagues, P-16 practitioners and those outside the field of education to assess the concerns and wonderings that ChatGPT and generative AI have raised. The following webinar conversation was recorded on two different days due to scheduling conflicts. It has been merged and edited into one dialogue for coherence and convergence.

Findings

Panel participants raise a host of questions and issues that go beyond topics of ethics, morality and basic writing instruction. Furthermore, in dialogue with one another, they describe possibilities for meaningful pedagogy and critical literacy to ensure that generative AI is used for a socially just future for students. While the discussion addressed matters of pedagogy, definitions of literacy and the purpose of (literacy) education, other themes included a critique of capitalism; an interrogation of the systems of power and oppression involved in using generative AI; and the philosophical, ontological, ethical and practical life questions about being human.

Originality/value

This paper provides a glimpse into one of the first panel conversations about ChatGPT and generative AI in the field of literacy. Not only are the panel members respected scholars in the field, they are also former doctoral students and advisors of one another, thus positioning all involved as both learners and teachers of this new technology.

Details

English Teaching: Practice & Critique, vol. 23 no. 1
Type: Research Article
ISSN: 1175-8708

Keywords

Article
Publication date: 2 April 2024

Tiera Chante Tanksley

This paper aims to center the experiences of three cohorts (n = 40) of Black high school students who participated in a critical race technology course that exposed anti-blackness…

Abstract

Purpose

This paper aims to center the experiences of three cohorts (n = 40) of Black high school students who participated in a critical race technology course that exposed anti-blackness as the organizing logic and default setting of digital and artificially intelligent technology. This paper centers the voices, experiences and technological innovations of the students, and in doing so, introduces a new type of digital literacy: critical race algorithmic literacy.

Design/methodology/approach

Data for this study include student interviews (called “talk backs”), journal reflections and final technology presentations.

Findings

Broadly, the data suggests that critical race algorithmic literacies prepare Black students to critically read the algorithmic word (e.g. data, code, machine learning models, etc.) so that they can not only resist and survive, but also rebuild and reimagine the algorithmic world.

Originality/value

While critical race media literacy draws upon critical race theory in education – a theorization of race, and a critique of white supremacy and multiculturalism in schools – critical race algorithmic literacy is rooted in critical race technology theory, which is a theorization of blackness as a technology and a critique of algorithmic anti-blackness as the organizing logic of schools and AI systems.

Details

English Teaching: Practice & Critique, vol. 23 no. 1
Type: Research Article
ISSN: 1175-8708

Keywords

Article
Publication date: 5 April 2024

Maria Krysfeldt, Jannick Friis Christensen and Thomas Burø

The paper discusses how the management of a sports and fashion company, which we refer to as NULMA, successfully applied the neo/normative control technology “karma organisation”…

Abstract

Purpose

The paper discusses how the management of a sports and fashion company, which we refer to as NULMA, successfully applied the neo/normative control technology “karma organisation” and gained employee engagement. Whereas other studies have documented employee resistance to organisational cultures when used for managerial control, our case demonstrates resistance to management practices that employees find inconsistent with the dominant karma culture.

Design/methodology/approach

The study is based on a six-year longitudinal organisational at-home ethnography conducted by one of the authors using methods of both participant and non-participant observation, semi-structured interviews and collaborative production of secondary data in the case organisation.

Findings

While our research shows that management can successfully apply neo/normative control which employees accept and support, we further show that employees mobilise the same values to resist management when it fails to deliver on the commitments and promises of the organisational culture.

Originality/value

The study contributes to the literature on organisational culture and, in particular, neo/normative control by theorising employee resistance as being by “accident”, by which we mean an inherent negative potentiality co-invented and released by managers establishing a “karma organisation”. Our theorising culminates in a discussion of the study’s implications for research and practice.

Details

Journal of Organizational Ethnography, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6749

Keywords

Open Access
Article
Publication date: 11 December 2023

Eoin Whelan and Ofir Turel

Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The…

2842

Abstract

Purpose

Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The purpose of this study is to bridge this gap and examine how the non-work use of smartphones in the workplace affects work–life conflict.

Design/methodology/approach

Drawing from three literature streams: technostress, work–life conflict and role boundary theory, the authors theorise on how limiting employees' ability to integrate the personal life domain into work, by means of technology use policy, contributes to stress and work–life conflict. To test this model, the authors employ a natural experiment in a company that changed its policy from fully restricting to open smartphone access for non-work purposes in the workplace. The insights gained from the experiment were explored further through qualitative interviews.

Findings

Work–life conflict declines when a ban on using smartphones for non-work purposes in the workplace is revoked. This study's results show that the relationship between smartphone use in the workplace and work–life conflict is mediated by sensed stress. Additionally, a post-hoc analysis reveals that work performance was unchanged when the smartphone ban was revoked.

Originality/value

First, this study advances the authors' understanding of how smartphone use policies in the workplace spill over to affect non-work life. Second, this work contributes to the technostress literature by revealing how, in specific situations, engagement with ICT can reduce distress and strain.

Details

Internet Research, vol. 34 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 161