Search results

1 – 10 of over 1000
Article
Publication date: 11 May 2023

Shivangi Verma and Naval Garg

With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology…

Abstract

Purpose

With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology. Researchers and practitioners submit the need to inspect: how technology and ethics interact, how ethical principles regulate technology and what could be the probable future course of action to execute techno-ethical practices in a socio-technical discourse effectively. To address the thoughts related to techno-ethics, the authors of the present study conducted exploratory research to understand the trend and relevance of technology ethics since its inception.

Design/methodology/approach

The study collected over 679 documents for the period 1990–2022 from the Scopus database. A quantitative approach of bibliometric analysis was conducted to study the pattern of authorship, publications, citations, prominent journals and contributors in the subject area. VOS viewer software was utilized to visualize and map academic performance in techno-ethics.

Findings

The findings revealed that the concept of techno-ethics is an emerging field and requires more investigation to harness its relevance with everchanging technology development. The data revealed substantial growth in the field of techno-ethics in humanities, social science and management domain in the last two decades. Also, most of the prominent cited references and documents in the database tend to cover the theme of Artificial Intelligence, Big data, computer ethics, morality, decision-making, IT ethics, human rights, responsibility and privacy.

Originality/value

The article provides a comprehensive overview of scientific production and main research trends in techno-ethics until 2022. The study is a pioneer in expanding the academic productivity and performance of embedding ethics in technology.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 5 May 2023

Shivangi Verma and Naval Garg

Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous…

Abstract

Purpose

Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous generations. With the advancement of technology, the ethical dilemma associated with its use has evolved. This paper aims to develop and validate a measurement scale for the ethical orientation of post-millennial technology usage by capturing the key factors that best describe the behavior adopted by students.

Design/methodology/approach

A systematic scale development procedure was used, involving both reviews of the literature and focus group discussions to generate the items that specify the domain of this study. After generating items, exploratory factor analysis and confirmatory factor analysis were applied to identify latent constructs of techno-ethical orientation. Lastly, the scale was subjected to reliability and validity testing.

Findings

The study found that the techno-ethical orientation scale has five dimensions: privacy concerns, classroom behavior, accessibility dilemma, social media usage and assignment ethics. Overall, a scale comprising 17 statements was derived.

Research limitations/implications

The findings of our study attempt to augment the growing efforts to explore all facets of techno-ethics. It is probably the first attempt to develop a valid and reliable scale for the techno-ethical orientation of post-millennial.

Practical implications

This scale could be used by academicians and practitioners to assess the techno-ethical orientation of post-millennial for positive interventions.

Originality/value

This study derives a new reliable and valid scale for measuring the techno-ethical orientation of post-millennial toward technology usage.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 28 November 2023

Shanshan Zhang, Fengchun Huang, Lingling Yu, Jeremy Fei Wang and Paul Benjamin Lowry

Researchers continue to address the concept of self-disclosure because it is foundational for helping social networking sites (SNS) function and thrive. Nevertheless, the authors'…

Abstract

Purpose

Researchers continue to address the concept of self-disclosure because it is foundational for helping social networking sites (SNS) function and thrive. Nevertheless, the authors' literature review indicates that uncertainty remains around the underlying mechanisms and factors involved in the self-disclosure process. The purpose of this research is to better understand the self-disclosure process from the lens of dual-process theory (DPT). The authors consider both the controlled factors (i.e. self-presentation and reciprocity) and an automatic factor (i.e. social influence to use an SNS) involved in self-disclosure and broaden The authors proposed a model to include the interactive facets of enjoyment.

Design/methodology/approach

The proposed model was empirically validated by conducting a survey among users of WeChat Moments in China.

Findings

As hypothesized, this research confirms that enjoyment and automatic processing (i.e. social influence to use an SNS) are complementary in the SNS self-disclosure process and enjoyment negatively moderates the positive relationship between controlled factor (i.e. self-presentation) and self-disclosure.

Originality/value

Theoretically, this study offers a new perspective on explaining SNS self-disclosure by adopting DPT. Specifically, this study contributes to the extant SNS research by applying DPT to examine how the controlled factors and the automatic factor shape self-disclosure processes and how enjoyment influences vary across these processes – enriching knowledge about SNS self-disclosure behaviors. Practically, the authors provide important design guidelines to practitioners concerning devising mechanisms to foster more automatic-enjoyable value-added functions to improve SNS users' participation and engagement.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 28 December 2023

Liangzhi Yu and Yao Zhang

This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).

Abstract

Purpose

This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).

Design/methodology/approach

This study consists of two parts: the first part present IE’s central theses and the main critiques it has received; the second part offers the authors' own evaluation of the theory from the LIS perspective in two steps: (1) assessing its internal consistency by testing its major theses against each other; (2) assessing its utility for resolving frequently debated LIS ethical dilemmas by comparing its solutions with solutions from other ethical theories.

Findings

This study finds that IE, consisting of an informational ontology, a fundamental ethical assertion and a series of moral laws, forms a coherent ethical framework and holds promising potential to serve as a theoretical foundation for LIS ethical issues; its inclusion of nonhuman objects as moral patients and its levels of abstraction mechanism proved to be particularly relevant for the LIS profession. This study also shows that, to become more solid an ethical theory, IE needs to resolve some of its internal contradictions and ambiguities, particularly its conceptual conflations between internal correctness, rightness and goodness; between destruction, entropy and evil; and the discrepancy between its deontological ethical assertion and its utilitarian moral laws.

Practical implications

This study alerts LIS professionals to the possibility of having a coherent ethical foundation and the potential of IE in this regard.

Originality/value

This study provides a systemic explication, evaluation and field test of IE from the LIS perspective.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 15 January 2024

Arne Roar Nygård and Sokratis K. Katsikas

This paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital…

Abstract

Purpose

This paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital supply chain of critical infrastructure operators.

Design/methodology/approach

A thorough review and analysis of existing relevant literature was performed to establish the current state of knowledge in the field. Ethical frameworks proposed for other areas/disciplines and identified pertinent ethical principles have been used to inform the proposed framework’s development.

Findings

The proposed framework provides actionable guidance to security professionals engaged with such activities to support them in assessing whether an HRE project conforms to ethical principles. Recommendations on action needed to complement the framework are also proposed. According to the proposed framework, reverse engineering is neither unethical nor illegal if performed honourably. Collaboration with vendors and suppliers at an industry-wide level is critical for appropriately endorsing the proposed framework.

Originality/value

To the best of the authors’ knowledge, no ethical framework currently guides cybersecurity research, far less of cybersecurity vulnerability research and reverse engineering.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 April 2023

Paula Álvarez-González, Ana Dopico-Parada and María J. López-Miguens

The importance of packaging attributes for purchase decisions has generated interest in the research and food industry. As a matter of fact, innovation in packaging is constantly…

Abstract

Purpose

The importance of packaging attributes for purchase decisions has generated interest in the research and food industry. As a matter of fact, innovation in packaging is constantly searching for new solutions that generate customer experience. The aim of this study is to analyse the effect of packaging attributes (protection, convenience, portability and storage, information, sustainability, branding and engagement) on consumer purchase intention of experiential packaging especially designed to provide an extraordinary sensory or interactive communicational experience and the influence of potential moderators.

Design/methodology/approach

The authors used a quantitative methodology based on the partial least squares (PLS) technique to estimate the structural model proposed. A purposely developed questionnaire was administered to a non-probabilistic sample of 1,489 European consumers. The questionnaire included questions related to consumers' perception of packaging attributes and purchase intention of different experiential packages.

Findings

The results indicate that packaging attributes are related to consumer purchase intention of experiential packaging. Engagement attributes show the strongest positive influence followed by branding and economy. However, attributes such as sustainability showed a negative effect on the purchase intention of these packages. The authors’ results also show the influence of gender, family structure and residential background as moderators of the relationships.

Originality/value

Customers' decision-making processes are strongly influenced by product packaging. However, little is known about how new technologies and design in packaging influence consumers' responses. This research provides evidence of the influence of packaging attributes on consumer purchase intention for experiential packaging, a proliferating area of research.

Details

British Food Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0007-070X

Keywords

Article
Publication date: 2 February 2024

Shubhi Gupta, Sireesha Rani Vasa and Prachee Sehgal

This study aims to explore how information technology (IT) professionals perceive work-life balance (WLB) in a work-from-home (WFH) setup. Additionally, it explores what emotions…

Abstract

Purpose

This study aims to explore how information technology (IT) professionals perceive work-life balance (WLB) in a work-from-home (WFH) setup. Additionally, it explores what emotions one may associate with such changing work environments, which have high implications for organisational success.

Design/methodology/approach

The two primary research questions guided this research. An online questionnaire-based survey was conducted to collect the data so that respondents’ both subjective and objective perceptions were documented. Purposive cum snowball sampling was used to collect data from 262 IT professionals. However, the data was analysed using both qualitative (content analysis) and quantitative (chi-square) techniques.

Findings

The findings of this study are interesting in nature and reported the work-life experiences at various socio-demographic levels (age, gender, educational qualification, designation, work experience, income, type of family and the number of children). The comprehensive examination of the data obtained from diverse aspects related to remote work environments has shed light on crucial facets impacting IT professionals. A predominant observation derived from the study reveals a significant disparity in working hours between male and female respondents during remote work. This discrepancy is notable, with male employees tending to work longer hours (i.e. 10 or more hours daily) than their female counterparts. The investigation into respondents’ sleep patterns revealed that the majority slept between 5 h and 7 h daily, underscoring reduced sleep hours for IT professionals during remote work. This comprehensive study thus emphasises the multifaceted nature of gender-associated influences on work patterns, health and well-being during remote work scenarios among IT professionals. As remote work is the new normal, this study has high implications for future work arrangements and organisational success.

Practical implications

The findings of the study will assist managers in dealing with the work conflict issue of remote workers. Importantly, these managers should try eliminating or reducing workplace conflict, emotional exhaustion and social overload associated with remote work.

Originality/value

This study is a humble attempt to highlight the employee’s WLB in the context of WFH in an emerging market (i.e. India). Furthermore, emphasises practical issues associated with changing work paradigms and concludes with interesting recommendations for future work arrangements.

Details

Journal of Asia Business Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 24 January 2024

Pablo Cabanelas, Andrea Mezger, María Jesús López-Míguens and Klaus Rüdiger

Clean and sustainable energy becomes an alternative to differentiate electricity suppliers, but it is necessary to have a better understanding of their behaviour to achieve green…

Abstract

Purpose

Clean and sustainable energy becomes an alternative to differentiate electricity suppliers, but it is necessary to have a better understanding of their behaviour to achieve green customer loyalty. This paper aims to deploy a behavioural model that helps explain loyalty of customers towards green electricity providers by including a series of antecedents such as trust, satisfaction, perceived environmental impact, propensity to trust and perceived risk.

Design/methodology/approach

The paper deploys a behavioural model that it is tested through structural equation modelling to a sample of 231 German electricity consumers with green contracts. The data analysis included two steps: first, the development and validation of the scales used to measure the constructs proposed in the model, and second, the model test.

Findings

Results demonstrate that trust and satisfaction directly influence loyalty, while satisfaction and the other variables included in the model have an indirect relationship with loyalty mediated by trust and satisfaction. As green characteristics of electricity are difficult to evaluate, managers should demonstrate in their communication the environmental effects of their activities while emphasising their capacity to attend to supply requirements for building long-term customer relationships.

Originality/value

The paper is focused on the understanding of those consumers who have signed a green electricity contract and the antecedents associated to their loyalty. The behavioural model helps identify how managers should apply marketing strategies to foster green consumers loyalty.

Details

International Journal of Energy Sector Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-6220

Keywords

Article
Publication date: 26 June 2023

Fidelia Ibekwe

Celebrate Michael Buckland's impressive legacy to LIS by showing his humanity, generosity and versatility.

Abstract

Purpose

Celebrate Michael Buckland's impressive legacy to LIS by showing his humanity, generosity and versatility.

Design/methodology/approach

This article is walk through a scientific career in LIS. Through personal anecdotes and life history and building upon Michael Buckland's legacy, it summarises the author’s own work seen through the prism of her interactions with Buckland, leading to scholarly contributions articulating significant statements about the field of LIS as well as pointers to past relevant publications.

Findings

Michael Buckland has a unique way of putting an end to thorny LIS issues as well as being a documentator extraordinaire.

Originality/value

It is a personal account, as such cannot be evaluated through the classical norms of empirical research as there is no ground truth. This account shows how chance encounters with fellow scholars can have a lasting influence on one's academic career as well as wider impact in a field.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 20 July 2023

Elaheh Hosseini, Kimiya Taghizadeh Milani and Mohammad Shaker Sabetnasab

This research aimed to visualize and analyze the co-word network and thematic clusters of the intellectual structure in the field of linked data during 1900–2021.

Abstract

Purpose

This research aimed to visualize and analyze the co-word network and thematic clusters of the intellectual structure in the field of linked data during 1900–2021.

Design/methodology/approach

This applied research employed a descriptive and analytical method, scientometric indicators, co-word techniques, and social network analysis. VOSviewer, SPSS, Python programming, and UCINet software were used for data analysis and network structure visualization.

Findings

The top ranks of the Web of Science (WOS) subject categorization belonged to various fields of computer science. Besides, the USA was the most prolific country. The keyword ontology had the highest frequency of co-occurrence. Ontology and semantic were the most frequent co-word pairs. In terms of the network structure, nine major topic clusters were identified based on co-occurrence, and 29 thematic clusters were identified based on hierarchical clustering. Comparisons between the two clustering techniques indicated that three clusters, namely semantic bioinformatics, knowledge representation, and semantic tools were in common. The most mature and mainstream thematic clusters were natural language processing techniques to boost modeling and visualization, context-aware knowledge discovery, probabilistic latent semantic analysis (PLSA), semantic tools, latent semantic indexing, web ontology language (OWL) syntax, and ontology-based deep learning.

Originality/value

This study adopted various techniques such as co-word analysis, social network analysis network structure visualization, and hierarchical clustering to represent a suitable, visual, methodical, and comprehensive perspective into linked data.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of over 1000