Search results
1 – 10 of over 3000With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology…
Abstract
Purpose
With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology. Researchers and practitioners submit the need to inspect: how technology and ethics interact, how ethical principles regulate technology and what could be the probable future course of action to execute techno-ethical practices in a socio-technical discourse effectively. To address the thoughts related to techno-ethics, the authors of the present study conducted exploratory research to understand the trend and relevance of technology ethics since its inception.
Design/methodology/approach
The study collected over 679 documents for the period 1990–2022 from the Scopus database. A quantitative approach of bibliometric analysis was conducted to study the pattern of authorship, publications, citations, prominent journals and contributors in the subject area. VOS viewer software was utilized to visualize and map academic performance in techno-ethics.
Findings
The findings revealed that the concept of techno-ethics is an emerging field and requires more investigation to harness its relevance with everchanging technology development. The data revealed substantial growth in the field of techno-ethics in humanities, social science and management domain in the last two decades. Also, most of the prominent cited references and documents in the database tend to cover the theme of Artificial Intelligence, Big data, computer ethics, morality, decision-making, IT ethics, human rights, responsibility and privacy.
Originality/value
The article provides a comprehensive overview of scientific production and main research trends in techno-ethics until 2022. The study is a pioneer in expanding the academic productivity and performance of embedding ethics in technology.
Details
Keywords
Magnus Osahon Igbinovia and Bolanle Clifford Ishola
Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this…
Abstract
Purpose
Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this menace. Consequently, this study aims to examine cyber security in university libraries and its implication for Library and Information Science education.
Design/methodology/approach
The study adopted descriptive research design, while questionnaire and interview were used to elicit data from library personnel and heads of library schools, respectively. A total of 134 responses were elicited through structured questionnaire (administered online due to the closure of universities) while six heads of library schools were interviewed, one from each of the six geopolitical zones in Nigeria.
Findings
The data from the questionnaire which were descriptively analysed revealed that the perceived knowledge of cyber security among the librarians was moderately low. Also, the university libraries were exposed to various cyber threats, with cyber security/guideline been one of the critical measures to combat cybercrime. Also, the result showed that librarians displayed high level of adherence to cyber ethics. However, the disposition of library management towards cyber security issues was revealed to be the main challenge to the deployment of cyber security in university libraries, follow by poor password management. Majority of the librarians possess basic knowledge of cyber security, though with serious interest to learn more about it. They were not taught cyber security in library school and they indicated enthusiasm to learn about it. The result of the interview with heads of library schools showed majority of these schools do not offer cyber security course due to dearth in skilled manpower.
Originality/value
The study presents cybercrime as a menace, if not tackled, would affect the university libraries’ sustainability as information institution, compromising their ability to deliver quality services.
Details
Keywords
Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous…
Abstract
Purpose
Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous generations. With the advancement of technology, the ethical dilemma associated with its use has evolved. This paper aims to develop and validate a measurement scale for the ethical orientation of post-millennial technology usage by capturing the key factors that best describe the behavior adopted by students.
Design/methodology/approach
A systematic scale development procedure was used, involving both reviews of the literature and focus group discussions to generate the items that specify the domain of this study. After generating items, exploratory factor analysis and confirmatory factor analysis were applied to identify latent constructs of techno-ethical orientation. Lastly, the scale was subjected to reliability and validity testing.
Findings
The study found that the techno-ethical orientation scale has five dimensions: privacy concerns, classroom behavior, accessibility dilemma, social media usage and assignment ethics. Overall, a scale comprising 17 statements was derived.
Research limitations/implications
The findings of our study attempt to augment the growing efforts to explore all facets of techno-ethics. It is probably the first attempt to develop a valid and reliable scale for the techno-ethical orientation of post-millennial.
Practical implications
This scale could be used by academicians and practitioners to assess the techno-ethical orientation of post-millennial for positive interventions.
Originality/value
This study derives a new reliable and valid scale for measuring the techno-ethical orientation of post-millennial toward technology usage.
Details
Keywords
Jani Koskinen, Sari Knaapi-Junnila, Ari Helin, Minna Marjaana Rantanen and Sami Hyrynsalmi
Data economy is a recent phenomenon, raised by digital transformation and platformisation, which has enabled the concentration of data that can be used in economic purposes…
Abstract
Purpose
Data economy is a recent phenomenon, raised by digital transformation and platformisation, which has enabled the concentration of data that can be used in economic purposes. However, there is a lack of clear procedures and ethical rules on how data economy ecosystems are governed. As a response to the current situation, there has been criticism and demands for the governance of data use to prevent unethical consequences that have already manifested. Thus, ethical governance of the data economy ecosystems is needed. The purpose of this paper is to introduce a new ethical governance model for data economy ecosystems. The proposed model offers a more balanced solution for the current situation where a few global large-scale enterprises dominate the data market and may use oligopolistic power over other stakeholders.
Design/methodology/approach
This is a conceptual article that covers theory-based discourse ethical reflection of data economy ecosystems governance. The study is based on the premise of the discourse ethics where inclusion of all stakeholders is needed for creating a transparent and ethical data economy.
Findings
This article offers self-regulation tool for data economy ecosystems by discourse ethical approach which is designed in the governance model. The model aims to balance data “markets” by offering more transparent, democratic and equal system than currently.
Originality/value
By offering a new ethically justified governance model, we may create a trust structure where rules are visible and all stakeholders are treated fairly.
Details
Keywords
The geographic information systems (GIS) sector is witnessing significant growth in recent times at the global level and in the Kingdom of Saudi Arabia at the same pace. In this…
Abstract
Purpose
The geographic information systems (GIS) sector is witnessing significant growth in recent times at the global level and in the Kingdom of Saudi Arabia at the same pace. In this research, the authors aim to measure the GIS market employability in the Kingdom of Saudi Arabia, the required skills of those seeking GIS employees, existing knowledge and abilities of graduates of relevant academic programs and gaps, if any, between the graduates and the labor market requirements in terms of GIS. Research on GIS education and GIS employability from an information system perspective is scarce; thus, this study is needed.
Design/methodology/approach
In this study, a questionnaire was distributed manually and electronically to a specific group of GIS students, teachers and employees. The questionnaire was prepared in Arabic and English language. It was distributed manually to the attendees of the 12th GIS Symposium, organized by Imam Abdulrahman Bin Faisal University at Dammam city, Saudi Arabia in April of 2018. The event is a yearly one that gathers local GIS community and outside speakers and guests. An electronic version of the questionnaire was also available and distributed via personal contacts. Responses were received until the end of 2019.
Findings
The results of 107 respondents indicates good GIS foundation (for example in topology, geospatial data processing and cartography); however, programming and business skills (namely cost benefit analysis, organizational perspective and business understanding) are lacking from Saudi GIS graduates. About 67% of respondents acknowledge directly that it is difficult to find locally qualified GIS graduates. Moreover, 55% of respondents classify GIS job candidates as underqualified. This research identifies under qualification in business competencies and computer programming skills for GIS students and workers in Saudi Arabia. This research did not find a statistically significant different response between GIS teachers and GIS employees/employers; however, students’ response was significantly different from these two groups.
Originality/value
Research on GIS education and GIS employability from an Information System perspective is scarce; thus, this study is needed. Moreover, research about this topic in Saudi Arabia and the Arabian Gulf is almost nonexistent.
Details
Keywords
Aderinola Ololade Dunmade and Adeyinka Tella
This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.
Abstract
Purpose
This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.
Design/methodology/approach
Using content analysis and a review of relevant literature, this study examines the challenges that librarians face in enforcing cyberethics and highlights the strategies that libraries can adopt to promote responsible online behaviour.
Findings
This paper identifies the lack of awareness among postgraduate students regarding cybersecurity risks and the need for training and resources for librarians as key challenges in promoting cyberethics.
Originality/value
This study recommends that libraries provide access to training resources and develop policies and guidelines to promote cyberethics among postgraduate students. Overall, this paper argues that libraries and librarians can play a critical role in promoting responsible online behaviour and ensuring the safety and security of postgraduate students in Nigeria.
Details
Keywords
Shanshan Zhang, Fengchun Huang, Lingling Yu, Jeremy Fei Wang and Paul Benjamin Lowry
Researchers continue to address the concept of self-disclosure because it is foundational for helping social networking sites (SNS) function and thrive. Nevertheless, the authors'…
Abstract
Purpose
Researchers continue to address the concept of self-disclosure because it is foundational for helping social networking sites (SNS) function and thrive. Nevertheless, the authors' literature review indicates that uncertainty remains around the underlying mechanisms and factors involved in the self-disclosure process. The purpose of this research is to better understand the self-disclosure process from the lens of dual-process theory (DPT). The authors consider both the controlled factors (i.e. self-presentation and reciprocity) and an automatic factor (i.e. social influence to use an SNS) involved in self-disclosure and broaden The authors proposed a model to include the interactive facets of enjoyment.
Design/methodology/approach
The proposed model was empirically validated by conducting a survey among users of WeChat Moments in China.
Findings
As hypothesized, this research confirms that enjoyment and automatic processing (i.e. social influence to use an SNS) are complementary in the SNS self-disclosure process and enjoyment negatively moderates the positive relationship between controlled factor (i.e. self-presentation) and self-disclosure.
Originality/value
Theoretically, this study offers a new perspective on explaining SNS self-disclosure by adopting DPT. Specifically, this study contributes to the extant SNS research by applying DPT to examine how the controlled factors and the automatic factor shape self-disclosure processes and how enjoyment influences vary across these processes – enriching knowledge about SNS self-disclosure behaviors. Practically, the authors provide important design guidelines to practitioners concerning devising mechanisms to foster more automatic-enjoyable value-added functions to improve SNS users' participation and engagement.
Details
Keywords
Sheshadri Chatterjee, Ranjan Chaudhuri, Demetris Vrontis and Ajith Kumar V.V.
The purpose of this study is to examine how the adoption of blockchain technology can improve organizational sustainability and what are the contributions of morality, ethics and…
Abstract
Purpose
The purpose of this study is to examine how the adoption of blockchain technology can improve organizational sustainability and what are the contributions of morality, ethics and governance in this scenario.
Design/methodology/approach
This study has used different literature and theories to build a successful theoretical model and then validated it using the partial least squares structural equation modeling approach. Various statistical modeling analyses have been performed to test the robustness of the proposed model, which is found to be effective and unique as it has a high explanatory power.
Findings
This study has found that adoption of blockchain technology can improve the sustainability performance of organizations. It has also highlighted that organizational sustainability will be further enhanced if the underlying algorithms of blockchain technology are transparent to make the applications moral and ethical. This study has further demonstrated that appropriate governance of blockchain technology can support the organizations to enhance their sustainability performance.
Research limitations/implications
This study demonstrates the importance of an organization’s governance over blockchain technology and its impact on sustainability. The study provides valuable input to practitioners and policy makers regarding blockchain technology and its governance models. Also, the study provides valuable recommendations to leaders and managers of organizations on how to successfully adopt blockchain technology.
Originality/value
This study presents a unique theoretical model to explain the influence of the adoption of blockchain technology and an organization’s sustainability. The study also adds value to the overall body of literature in the areas of ethics, governance and blockchain technology along with sustainability.
Details
Keywords
Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens and Malcolm Ryan
Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity…
Abstract
Purpose
Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity professionals, the authors conducted a study to uncover profiles of human factors that influence which ethical principles are valued highest following exposure to ethical dilemmas presented in a cybersecurity game.
Design/methodology/approach
The authors’ game first sensitises players (cybersecurity trainees) to five cybersecurity ethical principles (beneficence, non-maleficence, justice, autonomy and explicability) and then allows the player to explore their application in multiple cybersecurity scenarios. After playing the game, players rank the five ethical principles in terms of importance. A total of 250 first-year cybersecurity students played the game. To develop profiles, the authors collected players' demographics, knowledge about ethics, personality, moral stance and values.
Findings
The authors built models to predict the importance of each of the five ethical principles. The analyses show that, generally, the main driver influencing the priority given to specific ethical principles is cultural background, followed by the personality traits of extraversion and conscientiousness. The importance of the ingroup was also a prominent factor.
Originality/value
Cybersecurity professionals need to understand the impact of users' ethical choices. To provide ethics training, the profiles uncovered will be used to build artificially intelligent (AI) non-player characters (NPCs) to expose the player to multiple viewpoints. The NPCs will adapt their training according to the predicted players’ viewpoint.
Details
Keywords
Liangzhi Yu and Yao Zhang
This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).
Abstract
Purpose
This study aims to examine the potential of Information Ethics (IE) to serve as a coherent ethical foundation for the library and information science profession (LIS profession).
Design/methodology/approach
This study consists of two parts: the first part present IE’s central theses and the main critiques it has received; the second part offers the authors' own evaluation of the theory from the LIS perspective in two steps: (1) assessing its internal consistency by testing its major theses against each other; (2) assessing its utility for resolving frequently debated LIS ethical dilemmas by comparing its solutions with solutions from other ethical theories.
Findings
This study finds that IE, consisting of an informational ontology, a fundamental ethical assertion and a series of moral laws, forms a coherent ethical framework and holds promising potential to serve as a theoretical foundation for LIS ethical issues; its inclusion of nonhuman objects as moral patients and its levels of abstraction mechanism proved to be particularly relevant for the LIS profession. This study also shows that, to become more solid an ethical theory, IE needs to resolve some of its internal contradictions and ambiguities, particularly its conceptual conflations between internal correctness, rightness and goodness; between destruction, entropy and evil; and the discrepancy between its deontological ethical assertion and its utilitarian moral laws.
Practical implications
This study alerts LIS professionals to the possibility of having a coherent ethical foundation and the potential of IE in this regard.
Originality/value
This study provides a systemic explication, evaluation and field test of IE from the LIS perspective.
Details