Search results
1 – 10 of 98Rashmi Gupta, Martin Crane and Cathal Gurrin
The continuous advancements in wearable sensing technologies enable the easy collection and publishing of visual lifelog data. The widespread adaptation of visual lifelog…
Abstract
Purpose
The continuous advancements in wearable sensing technologies enable the easy collection and publishing of visual lifelog data. The widespread adaptation of visual lifelog technologies would have the potential to pose challenges for ensuring the personal privacy of subjects and bystanders in lifelog data. This paper presents preliminary findings from a study of lifeloggers with the aim of better understanding their concerns regarding privacy in lifelog data.
Design/methodology/approach
In this study, we have collected a visual dataset of 64,837 images from 25 lifelogging participants over a period of two days each, and we conducted an interactive session (face to face conversation) with each participant in order to capture their concerns when sharing the lifelog data across three specified categories (i.e. Private (Only for Me), Semi-Private (Family/Friends) and Public).
Findings
In general, we found that participants tend to err on the side of conservative privacy settings and that there is a noticeable difference in what different participants are willing to share. In summary, we found that the categories of images that the participants wished to be kept private included personally identifiable information and professional information; categories of images that could be shared with family/friends include family moments or content related to daily routine lifestyle, and other visual lifelog data could potentially be made public).
Originality/value
We analysed the potential differences in the willingness of 25 participants to share data. In addition, reasons for being a volunteer to collect lifelog data and how the lifelogging device affected the lifestyle of the lifelogger are analysed. Based on the findings of this study, we propose a set of challenges for the anonymisation of lifelog data that should be solved when supporting lifelog data sharing.
Details
Keywords
This paper aims to offer exploratory remarks by discussing whether blockchain can help organizations attain sustained competitive advantage in view of its increased applications…
Abstract
Purpose
This paper aims to offer exploratory remarks by discussing whether blockchain can help organizations attain sustained competitive advantage in view of its increased applications and untapped potential. Organizations are yet to test its utilization as an intangible strategic resource at a time when organizational strategic landscapes – rapidly changing in a globally networked digitally empowered world – require them to enhance capability of combining resources for meeting stakeholders’ expectations.
Design/methodology/approach
Blockchain as an emerging technology draws frequent industry announcements and specialists’ posts on daily basis in media, and there exist inadequacies with respect to the availability of relevant studies in the extant literature on the subject of blockchain, which itself is in infancy. Keeping in view the limitations associated with the traditional understandings of scholarship underscoring, thereby that research and knowledge discovery have been restricting the progress across disciplines on account of which knowledge domains fail to make a meaningful effect; research design of the paper comprises the scholarship of integration method, which might appear to be less systematic but was more emergent in comparison to a traditional methodology of systematic literature review, and suitable for conducting this study.
Findings
Findings of this study suggest that blockchain with huge popularity as a technological innovation has huge potentialities and promises to be a strategic intangible resource for organizations helpful in attaining sustained advantage. However, the findings also suggest several cautionary remarks.
Research limitations/implications
This paper offers exploratory remarks by discussing blockchain in the context of its consideration as a significant intangible strategic resource helpful in attaining sustained competitive advantage, emphasizing the need for continuous attention and revision with its increased applications. It attempts to assess the untapped potential of blockchain incorporating ample scholarly value in this era of fourth industrial revolution. The findings offer greater significance for different stakeholders including researchers and policymakers. However, this paper limits itself by throwing light on the strategic aspects only while attempting to touch upon only those aspects of blockchain that were perceived to be helpful in understanding it as a resource of sustained competitive advantage.
Originality/value
This paper presents originality and value by offering exploratory remarks that can be immensely useful given the scarcity of literature on the novel blockchain with respect to its consideration as a strategic resource. This paper attempts to provide much needed underpinnings to the notion whether blockchain can help organizations attain and sustain competitive advantage.
Details
Keywords
Paula Shaw and Sarah Rawlinson
The chapter discusses pedagogical models of digital learning in the United Kingdom with a focus on online and blended learning, rolled out as a case study in one university. The…
Abstract
The chapter discusses pedagogical models of digital learning in the United Kingdom with a focus on online and blended learning, rolled out as a case study in one university. The chapter appraises the effectiveness of the model that implemented and foregrounded the evidence in the wider literature on models of digital learning in higher education. The chapter provides thematic analysis and methodological opportunities for the improvement of practice and presents a set of implementation implications and pitfalls to avoid for higher education institutions in Africa. Furthermore, a number of trends regarding the blending of learning and communication synchrony in digital learning have also been identified.
Details
Keywords
Yong Jin Park, Yoonmo Sang, Hoon Lee and S. Mo Jones-Jang
The digitization of the life has brought complexities associated with addressing digital life after one’s death. This paper aims to investigate the two related issues of the…
Abstract
Purpose
The digitization of the life has brought complexities associated with addressing digital life after one’s death. This paper aims to investigate the two related issues of the privacy and property of postlife digital assets.
Design/methodology/approach
The understanding of digital assets has not been fully unpacked largely due to the current policy complexities in accessing and obtaining digital assets at death. This paper calls critical attention to the importance of respecting user rights in digital environments that currently favor service providers’ interests.
Findings
It is argued that there are ethical blind spots when protecting users’ rights, given no ontological difference between a person’s digital beings and physical existence. These derive from the restrictive corporate terms and ambiguous conditions drafted by digital service providers.
Originality/value
Fundamentally, the transition to the big data era, in which the collection, use and dissemination of digital activities became integral part of the ontology, poses new challenges to privacy and property rights after death.
Details
Keywords
Ali Katouzian Bolourforoush and Hamid Jahankhani
Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman…
Abstract
Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman Empire, lenders in temples, provided loans, and accepted deposits while performed change of money. The archaeological evidence uncovered in India and China corroborates this. The major development in banking came predominantly in the mediaeval, Renaissance Italy, with the major cities Florence, Venice and Genoa being the financial centres. Technology has become an inherent and integral part of our lives. We are generating a huge amount of data in transfer, storage and usage, with greater demands of ubiquitous accessibility, inducing an enormous impact on industry and society. With the emergence of smarter cities and societies, the security challenges pertinent to data become greater, impending impact on the consumer protection and security. The aim of this chapter is to highlight if SSI and passwordless authentication using FIDO-2 protocol assuage security concerns such as authentication and authorisation while preserving the individual's privacy.
Details
Keywords
Carolyn Caffrey, Hannah Lee, Tessa Withorn, Maggie Clarke, Amalia Castañeda, Kendra Macomber, Kimberly M. Jackson, Jillian Eslami, Aric Haas, Thomas Philo, Elizabeth Galoozis, Wendolyn Vermeer, Anthony Andora and Katie Paris Kohn
This paper presents recently published resources on library instruction and information literacy. It provides an introductory overview and a selected annotated bibliography of…
Abstract
Purpose
This paper presents recently published resources on library instruction and information literacy. It provides an introductory overview and a selected annotated bibliography of publications covering various library types, study populations and research contexts. The selected bibliography is useful to efficiently keep up with trends in library instruction for busy practitioners, library science students and those wishing to learn about information literacy in other contexts.
Design/methodology/approach
This article annotates 424 English-language periodical articles, monographs, dissertations, theses and reports on library instruction and information literacy published in 2021. The sources were selected from the EBSCO platform for Library, Information Science, and Technology Abstracts (LISTA), Education Resources Information Center (ERIC), Scopus, ProQuest Dissertations and Theses, and WorldCat, published in 2021 that included the terms “information literacy,” “library instruction,” or “information fluency” in the title, abstract or keywords. The sources were organized in Zotero. Annotations summarize the source, focusing on the findings or implications. Each source was categorized into one of seven pre-determined categories: K-12 Education, Children and Adolescents; Academic and Professional Programs; Everyday Life, Community, and the Workplace; Libraries and Health Information Literacy; Multiple Library Types; and Other Information Literacy Research and Theory.
Findings
The paper provides a brief description of 424 sources and highlights sources that contain unique or significant scholarly contributions.
Originality/value
The information may be used by librarians, researchers and anyone interested as a quick and comprehensive reference to literature on library instruction and information literacy within 2021.
Details
Keywords
Hannah R. Marston, Linda Shore, Laura Stoops and Robbie S. Turner
Jenna Condie, Garth Lean and Brittany Wilcockson
This chapter explores the ethical complexities of researching location-aware social discovery Smartphone applications (apps) and how they mediate contemporary experiences of…
Abstract
This chapter explores the ethical complexities of researching location-aware social discovery Smartphone applications (apps) and how they mediate contemporary experiences of travel. We highlight the context-specific approach required to carrying out research on Tinder, a location-aware app that enables people to connect with others in close proximity to them. By journeying through the early stages of our research project, we demonstrate how ethical considerations and dilemmas began long before our project became a project. We discuss the pulls toward data extraction/mining of user-generated content (i.e., Tinder user profiles) within digital social research and the ethical challenges of using this data for research purposes. We focus particularly on issues of informed consent, privacy, and copyright, and the differences between manual and automated data mining/extraction techniques. Excerpts from our university ethics application are included to demonstrate how our research sits uneasily within standardized ethical protocols. Our moves away from a ‘big data’ approach to more ‘traditional’ and participatory methodologies are located within questions of epistemology and ontology including our commitment to practicing a feminist research ethic. Our chapter concludes with the lessons learned in the aim to push forward with research in challenging online spaces and with new data sources.
Details