Search results
1 – 10 of over 1000With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology…
Abstract
Purpose
With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology. Researchers and practitioners submit the need to inspect: how technology and ethics interact, how ethical principles regulate technology and what could be the probable future course of action to execute techno-ethical practices in a socio-technical discourse effectively. To address the thoughts related to techno-ethics, the authors of the present study conducted exploratory research to understand the trend and relevance of technology ethics since its inception.
Design/methodology/approach
The study collected over 679 documents for the period 1990–2022 from the Scopus database. A quantitative approach of bibliometric analysis was conducted to study the pattern of authorship, publications, citations, prominent journals and contributors in the subject area. VOS viewer software was utilized to visualize and map academic performance in techno-ethics.
Findings
The findings revealed that the concept of techno-ethics is an emerging field and requires more investigation to harness its relevance with everchanging technology development. The data revealed substantial growth in the field of techno-ethics in humanities, social science and management domain in the last two decades. Also, most of the prominent cited references and documents in the database tend to cover the theme of Artificial Intelligence, Big data, computer ethics, morality, decision-making, IT ethics, human rights, responsibility and privacy.
Originality/value
The article provides a comprehensive overview of scientific production and main research trends in techno-ethics until 2022. The study is a pioneer in expanding the academic productivity and performance of embedding ethics in technology.
Details
Keywords
Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous…
Abstract
Purpose
Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous generations. With the advancement of technology, the ethical dilemma associated with its use has evolved. This paper aims to develop and validate a measurement scale for the ethical orientation of post-millennial technology usage by capturing the key factors that best describe the behavior adopted by students.
Design/methodology/approach
A systematic scale development procedure was used, involving both reviews of the literature and focus group discussions to generate the items that specify the domain of this study. After generating items, exploratory factor analysis and confirmatory factor analysis were applied to identify latent constructs of techno-ethical orientation. Lastly, the scale was subjected to reliability and validity testing.
Findings
The study found that the techno-ethical orientation scale has five dimensions: privacy concerns, classroom behavior, accessibility dilemma, social media usage and assignment ethics. Overall, a scale comprising 17 statements was derived.
Research limitations/implications
The findings of our study attempt to augment the growing efforts to explore all facets of techno-ethics. It is probably the first attempt to develop a valid and reliable scale for the techno-ethical orientation of post-millennial.
Practical implications
This scale could be used by academicians and practitioners to assess the techno-ethical orientation of post-millennial for positive interventions.
Originality/value
This study derives a new reliable and valid scale for measuring the techno-ethical orientation of post-millennial toward technology usage.
Details
Keywords
Shanshan Zhang, Fengchun Huang, Lingling Yu, Jeremy Fei Wang and Paul Benjamin Lowry
Researchers continue to address the concept of self-disclosure because it is foundational for helping social networking sites (SNS) function and thrive. Nevertheless, the authors'…
Abstract
Purpose
Researchers continue to address the concept of self-disclosure because it is foundational for helping social networking sites (SNS) function and thrive. Nevertheless, the authors' literature review indicates that uncertainty remains around the underlying mechanisms and factors involved in the self-disclosure process. The purpose of this research is to better understand the self-disclosure process from the lens of dual-process theory (DPT). The authors consider both the controlled factors (i.e. self-presentation and reciprocity) and an automatic factor (i.e. social influence to use an SNS) involved in self-disclosure and broaden The authors proposed a model to include the interactive facets of enjoyment.
Design/methodology/approach
The proposed model was empirically validated by conducting a survey among users of WeChat Moments in China.
Findings
As hypothesized, this research confirms that enjoyment and automatic processing (i.e. social influence to use an SNS) are complementary in the SNS self-disclosure process and enjoyment negatively moderates the positive relationship between controlled factor (i.e. self-presentation) and self-disclosure.
Originality/value
Theoretically, this study offers a new perspective on explaining SNS self-disclosure by adopting DPT. Specifically, this study contributes to the extant SNS research by applying DPT to examine how the controlled factors and the automatic factor shape self-disclosure processes and how enjoyment influences vary across these processes – enriching knowledge about SNS self-disclosure behaviors. Practically, the authors provide important design guidelines to practitioners concerning devising mechanisms to foster more automatic-enjoyable value-added functions to improve SNS users' participation and engagement.
Details
Keywords
Liangzhi Yu and Yao Zhang
This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).
Abstract
Purpose
This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).
Design/methodology/approach
This study consists of two parts: the first part present IE’s central theses and the main critiques it has received; the second part offers the authors' own evaluation of the theory from the LIS perspective in two steps: (1) assessing its internal consistency by testing its major theses against each other; (2) assessing its utility for resolving frequently debated LIS ethical dilemmas by comparing its solutions with solutions from other ethical theories.
Findings
This study finds that IE, consisting of an informational ontology, a fundamental ethical assertion and a series of moral laws, forms a coherent ethical framework and holds promising potential to serve as a theoretical foundation for LIS ethical issues; its inclusion of nonhuman objects as moral patients and its levels of abstraction mechanism proved to be particularly relevant for the LIS profession. This study also shows that, to become more solid an ethical theory, IE needs to resolve some of its internal contradictions and ambiguities, particularly its conceptual conflations between internal correctness, rightness and goodness; between destruction, entropy and evil; and the discrepancy between its deontological ethical assertion and its utilitarian moral laws.
Practical implications
This study alerts LIS professionals to the possibility of having a coherent ethical foundation and the potential of IE in this regard.
Originality/value
This study provides a systemic explication, evaluation and field test of IE from the LIS perspective.
Details
Keywords
Arne Roar Nygård and Sokratis K. Katsikas
This paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital…
Abstract
Purpose
This paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital supply chain of critical infrastructure operators.
Design/methodology/approach
A thorough review and analysis of existing relevant literature was performed to establish the current state of knowledge in the field. Ethical frameworks proposed for other areas/disciplines and identified pertinent ethical principles have been used to inform the proposed framework’s development.
Findings
The proposed framework provides actionable guidance to security professionals engaged with such activities to support them in assessing whether an HRE project conforms to ethical principles. Recommendations on action needed to complement the framework are also proposed. According to the proposed framework, reverse engineering is neither unethical nor illegal if performed honourably. Collaboration with vendors and suppliers at an industry-wide level is critical for appropriately endorsing the proposed framework.
Originality/value
To the best of the authors’ knowledge, no ethical framework currently guides cybersecurity research, far less of cybersecurity vulnerability research and reverse engineering.
Details
Keywords
Paula Álvarez-González, Ana Dopico-Parada and María J. López-Miguens
The importance of packaging attributes for purchase decisions has generated interest in the research and food industry. As a matter of fact, innovation in packaging is constantly…
Abstract
Purpose
The importance of packaging attributes for purchase decisions has generated interest in the research and food industry. As a matter of fact, innovation in packaging is constantly searching for new solutions that generate customer experience. The aim of this study is to analyse the effect of packaging attributes (protection, convenience, portability and storage, information, sustainability, branding and engagement) on consumer purchase intention of experiential packaging especially designed to provide an extraordinary sensory or interactive communicational experience and the influence of potential moderators.
Design/methodology/approach
The authors used a quantitative methodology based on the partial least squares (PLS) technique to estimate the structural model proposed. A purposely developed questionnaire was administered to a non-probabilistic sample of 1,489 European consumers. The questionnaire included questions related to consumers' perception of packaging attributes and purchase intention of different experiential packages.
Findings
The results indicate that packaging attributes are related to consumer purchase intention of experiential packaging. Engagement attributes show the strongest positive influence followed by branding and economy. However, attributes such as sustainability showed a negative effect on the purchase intention of these packages. The authors’ results also show the influence of gender, family structure and residential background as moderators of the relationships.
Originality/value
Customers' decision-making processes are strongly influenced by product packaging. However, little is known about how new technologies and design in packaging influence consumers' responses. This research provides evidence of the influence of packaging attributes on consumer purchase intention for experiential packaging, a proliferating area of research.
Details
Keywords
Shubhi Gupta, Sireesha Rani Vasa and Prachee Sehgal
This study aims to explore how information technology (IT) professionals perceive work-life balance (WLB) in a work-from-home (WFH) setup. Additionally, it explores what emotions…
Abstract
Purpose
This study aims to explore how information technology (IT) professionals perceive work-life balance (WLB) in a work-from-home (WFH) setup. Additionally, it explores what emotions one may associate with such changing work environments, which have high implications for organisational success.
Design/methodology/approach
The two primary research questions guided this research. An online questionnaire-based survey was conducted to collect the data so that respondents’ both subjective and objective perceptions were documented. Purposive cum snowball sampling was used to collect data from 262 IT professionals. However, the data was analysed using both qualitative (content analysis) and quantitative (chi-square) techniques.
Findings
The findings of this study are interesting in nature and reported the work-life experiences at various socio-demographic levels (age, gender, educational qualification, designation, work experience, income, type of family and the number of children). The comprehensive examination of the data obtained from diverse aspects related to remote work environments has shed light on crucial facets impacting IT professionals. A predominant observation derived from the study reveals a significant disparity in working hours between male and female respondents during remote work. This discrepancy is notable, with male employees tending to work longer hours (i.e. 10 or more hours daily) than their female counterparts. The investigation into respondents’ sleep patterns revealed that the majority slept between 5 h and 7 h daily, underscoring reduced sleep hours for IT professionals during remote work. This comprehensive study thus emphasises the multifaceted nature of gender-associated influences on work patterns, health and well-being during remote work scenarios among IT professionals. As remote work is the new normal, this study has high implications for future work arrangements and organisational success.
Practical implications
The findings of the study will assist managers in dealing with the work conflict issue of remote workers. Importantly, these managers should try eliminating or reducing workplace conflict, emotional exhaustion and social overload associated with remote work.
Originality/value
This study is a humble attempt to highlight the employee’s WLB in the context of WFH in an emerging market (i.e. India). Furthermore, emphasises practical issues associated with changing work paradigms and concludes with interesting recommendations for future work arrangements.
Details
Keywords
Pablo Cabanelas, Andrea Mezger, María Jesús López-Míguens and Klaus Rüdiger
Clean and sustainable energy becomes an alternative to differentiate electricity suppliers, but it is necessary to have a better understanding of their behaviour to achieve green…
Abstract
Purpose
Clean and sustainable energy becomes an alternative to differentiate electricity suppliers, but it is necessary to have a better understanding of their behaviour to achieve green customer loyalty. This paper aims to deploy a behavioural model that helps explain loyalty of customers towards green electricity providers by including a series of antecedents such as trust, satisfaction, perceived environmental impact, propensity to trust and perceived risk.
Design/methodology/approach
The paper deploys a behavioural model that it is tested through structural equation modelling to a sample of 231 German electricity consumers with green contracts. The data analysis included two steps: first, the development and validation of the scales used to measure the constructs proposed in the model, and second, the model test.
Findings
Results demonstrate that trust and satisfaction directly influence loyalty, while satisfaction and the other variables included in the model have an indirect relationship with loyalty mediated by trust and satisfaction. As green characteristics of electricity are difficult to evaluate, managers should demonstrate in their communication the environmental effects of their activities while emphasising their capacity to attend to supply requirements for building long-term customer relationships.
Originality/value
The paper is focused on the understanding of those consumers who have signed a green electricity contract and the antecedents associated to their loyalty. The behavioural model helps identify how managers should apply marketing strategies to foster green consumers loyalty.
Details
Keywords
Celebrate Michael Buckland's impressive legacy to LIS by showing his humanity, generosity and versatility.
Abstract
Purpose
Celebrate Michael Buckland's impressive legacy to LIS by showing his humanity, generosity and versatility.
Design/methodology/approach
This article is walk through a scientific career in LIS. Through personal anecdotes and life history and building upon Michael Buckland's legacy, it summarises the author’s own work seen through the prism of her interactions with Buckland, leading to scholarly contributions articulating significant statements about the field of LIS as well as pointers to past relevant publications.
Findings
Michael Buckland has a unique way of putting an end to thorny LIS issues as well as being a documentator extraordinaire.
Originality/value
It is a personal account, as such cannot be evaluated through the classical norms of empirical research as there is no ground truth. This account shows how chance encounters with fellow scholars can have a lasting influence on one's academic career as well as wider impact in a field.
Details
Keywords
Elaheh Hosseini, Kimiya Taghizadeh Milani and Mohammad Shaker Sabetnasab
This research aimed to visualize and analyze the co-word network and thematic clusters of the intellectual structure in the field of linked data during 1900–2021.
Abstract
Purpose
This research aimed to visualize and analyze the co-word network and thematic clusters of the intellectual structure in the field of linked data during 1900–2021.
Design/methodology/approach
This applied research employed a descriptive and analytical method, scientometric indicators, co-word techniques, and social network analysis. VOSviewer, SPSS, Python programming, and UCINet software were used for data analysis and network structure visualization.
Findings
The top ranks of the Web of Science (WOS) subject categorization belonged to various fields of computer science. Besides, the USA was the most prolific country. The keyword ontology had the highest frequency of co-occurrence. Ontology and semantic were the most frequent co-word pairs. In terms of the network structure, nine major topic clusters were identified based on co-occurrence, and 29 thematic clusters were identified based on hierarchical clustering. Comparisons between the two clustering techniques indicated that three clusters, namely semantic bioinformatics, knowledge representation, and semantic tools were in common. The most mature and mainstream thematic clusters were natural language processing techniques to boost modeling and visualization, context-aware knowledge discovery, probabilistic latent semantic analysis (PLSA), semantic tools, latent semantic indexing, web ontology language (OWL) syntax, and ontology-based deep learning.
Originality/value
This study adopted various techniques such as co-word analysis, social network analysis network structure visualization, and hierarchical clustering to represent a suitable, visual, methodical, and comprehensive perspective into linked data.
Details