Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of over 1000
To view the access options for this content please click here
Article
Publication date: 9 September 2020

The safety of IoT-enabled system in smart cities of India: do ethics matter?

Sheshadri Chatterjee

The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).

HTML
PDF (431 KB)

Abstract

Purpose

The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).

Design/methodology/approach

The determinants that would impact on securing IoT-enabled system in SCI have been identified by the studies of literature. Some hypothesis has been formulated. A conceptual model has been developed. Hypotheses and conceptual models have been tested by a statistical approach through survey works considering the feedbacks of 331 usable respondents. The results have been discussed followed by explaining the implications of this study. A comprehensive conclusion has been provided at the end.

Findings

The validated results show that the trust factor has insignificant impacts on the system and technology use, as well as on the behavioural intention. The model provided could achieve 79% explanative power.

Practical implications

For ensuring safety and security of IoT-enabled devices in SCI, the ethical sense of the stakeholders of SCI has considerable impact on securing safety of IoT-enabled devices in SCI. The practitioner should, as such, be sincere to motivate the stakeholders to ameliorate the ethical sense of the stakeholders for securing safety of IoT-enabled devices in SCI.

Originality/value

A few studies in the areas of Indian smart cities, IoT and related ethical issues have been conducted. In that sense, this approach is deemed to be a novel attempt.

Details

International Journal of Ethics and Systems, vol. 36 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/IJOES-05-2019-0085
ISSN: 2514-9369

Keywords

  • Ethics
  • EIS
  • Privacy
  • Smart city
  • IoT
  • Code of conduct

To view the access options for this content please click here
Article
Publication date: 28 February 2005

Proposal for an accessible conception of cyberspace

David H. Gleason and Lawrence Friedman

This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and…

HTML
PDF (103 KB)

Abstract

This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management of cyberspace, and to hold accountable the parties responsible for those decisions, whether the responsible party is a government actor, market actor or private individual. The authors argue that the Open Systems Interconnection (OSI) model, with certain modifications, should serve as a primary educational tool in helping individuals to gain the understanding of ICT necessary to protect public interests related to cyberspace.

Details

Journal of Information, Communication and Ethics in Society, vol. 3 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/14779960580000258
ISSN: 1477-996X

Keywords

  • Cyberspace
  • ICT
  • Conception

To view the access options for this content please click here
Article
Publication date: 2 October 2017

Cyber human values scale (i-value): the study of development, validity and reliability

Kerem Kilicer, Ahmet Naci Coklar and Vildan Ozeke

The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.

HTML
PDF (298 KB)

Abstract

Purpose

The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.

Design/methodology/approach

The paper is based on a scale-development process by following a systematic approach. First, the current scales were examined; following this, focus group interviews were held; next, an item pool was formed; and the validity and reliability of the items were tested. The validity and reliability studies of the scale were conducted with 1,495 social media users. An application on Facebook was used to collect the data.

Findings

As a result of the validity study, 25 items under five factors were obtained. These factors were being peaceful, truth, solidarity, respect and tolerance. The items obtained were capable of discriminating the individuals in terms of the features to be measured by the scale. In addition, the scale was confirmed to measure correctly the structure obtained in line with the fit indices. The internal consistency coefficient of the scale was 0.90 and split-half reliability coefficient was 0.88.

Research limitations/implications

The sample has several limitations. Most of the participants were male and the data were collected on social media. Thus, to enhance the validity and reliability of the scale, further in-depth qualitative and cross-cultural studies should be examined.

Practical implications

This study could provide convenience for practitioners about how to diagnose the cyber human values of the internet users in cyberspace.

Originality/value

It was concluded that this scale was valid, reliable and beneficial to measure social media users’ levels of cyber human values.

Details

Internet Research, vol. 27 no. 5
Type: Research Article
DOI: https://doi.org/10.1108/IntR-10-2016-0290
ISSN: 1066-2243

Keywords

  • Value
  • Social media
  • Scale development
  • Cyber human values

To view the access options for this content please click here
Book part
Publication date: 28 July 2014

The Responsibilities of Social Networking Companies: Applying Political CSR Theory to Google, Facebook and Twitter

Theresa Bauer

Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and…

HTML
PDF (247 KB)
EPUB (144 KB)

Abstract

Purpose

Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance. This development along with the growing power of SNS providers calls for an investigation of the CSR engagement of SNS companies. The chapter examines to what extent three prominent providers – Google, Facebook and Twitter – fulfill their responsibilities.

Methodology/approach

The chapter draws heavily on a politicized concept of CSR, namely ‘corporate citizenship’ (Crane, Matten, & Moon, 2008a; Matten & Crane, 2005) and ‘political CSR’ (Scherer & Palazzo, 2007, 2011) and discusses the role SNS providers play in administering citizenship rights. The chapter takes a qualitative case study approach.

Findings

Facebook, Twitter and Google have not only made clear commitments to act responsibly, they actually enhance the citizenship status of their users in many ways, e.g. by offering a platform for democracy activists. Deficiencies and contradictions also become visible, e.g. SNS providers inhibit citizenship by failing to provide sufficient privacy protection.

Research limitations/implications

The chapter is limited by its case study approach, but provides valuable insights to an industry with considerable influence. It contributes to CSR research by applying and testing the politicized concept of CSR in the context of SNS providers.

Originality/value

Although SNS have received appraisal as effective tools of CSR communication, there has been little attention to CSR policy and practice of the companies providing social networks. This is unfortunate since the activities of SNS providers directly impact on millions of users worldwide.

Details

Communicating Corporate Social Responsibility: Perspectives and Practice
Type: Book
DOI: https://doi.org/10.1108/S2043-9059(2014)0000006005
ISBN: 978-1-78350-796-2

Keywords

  • Social networking sites
  • social media
  • CSR
  • corporate citizenship
  • CSR communication

To view the access options for this content please click here
Book part
Publication date: 30 October 2018

The Domain and Context of Corporate Ethics: Introducing Concepts and Directions

FR. Oswald A. J. Mascarenhas, S.J.

This chapter covers basic concepts, ethical theories, and moral paradigms of corporate ethics for identifying, understanding, and responding to the turbulent market…

HTML
PDF (323 KB)
EPUB (454 KB)

Abstract

Executive Summary

This chapter covers basic concepts, ethical theories, and moral paradigms of corporate ethics for identifying, understanding, and responding to the turbulent market challenges of today. The concept, nature, and domain of ethics, business ethics, managerial ethics, and corporate executive ethics are defined and differentiated for their significance. The domain, scope, and nature of related concepts such as legality, ethicality, morality, and executive spirituality are distinguished and developed. Among normative and descriptive ethical theories that we briefly review and critique here are teleology or utilitarianism, deontology or existentialism, distributive justice, corrective justice, and ethics of malfeasance and beneficence. Other moral theories of ethics such as ethics of human dignity, ethics of cardinal virtues, ethics of trusting relations, ethics of stakeholder rights and duties, ethics of moral reasoning and judgment calls, ethics of executive and moral leadership, and ethics of social and moral responsibility will be treated in a later book. The thrust of this book is positive: despite our not very commendable track record in managing this planet and its resources, our basic questions are: Where are we now? What are we now? Where should we as corporations go, and why? What are the specific positive mandates and metrics to corporate executives to reach that desired destiny? This chapter explores responses to these strategic corporate questions.

Details

Corporate Ethics for Turbulent Markets
Type: Book
DOI: https://doi.org/10.1108/978-1-78756-187-820181003
ISBN: 978-1-78756-187-8

To view the access options for this content please click here
Article
Publication date: 5 September 2017

The effects of sociocultural factors on the information ethics of undergraduate students: A literature review

Mariam Al-Nuaimi, Ali Al-Aufi and Abdelmajid Bouazza

This paper aims to evaluate the literature dealing with the sociocultural influences on undergraduate students’ information ethics (IE) cognition and behaviour. Much of…

HTML
PDF (488 KB)

Abstract

Purpose

This paper aims to evaluate the literature dealing with the sociocultural influences on undergraduate students’ information ethics (IE) cognition and behaviour. Much of the reviewed literature draws on the experiences of countries that differ in terms of cultural and economic aspects.

Design/methodology/approach

This structured review uses an integrative approach to synthesize the existing literature relevant to the factors in question. Correspondingly, limitations, agreements and disagreements within the relevant literature are indicated. A set of relevance criteria is developed, and analytical information for each study is then organized and summarized into aggregate findings.

Findings

Despite the significant explanatory power of the reciprocal correlation between individualism and economic wealth to predict declines in unethical information practices, IE studies persist in producing inconsistent findings in this regard. Thus, further facets of cross-cultural differences should be addressed beyond the individualistic/collectivistic typology.

Originality/value

This paper has pedagogical worth for students, researchers and developers of IE educational programs at the tertiary level. It also possesses methodological value for studying the sociocultural effects on the IE behaviour of computing professionals within the broader context of global IE research.

Details

Library Review, vol. 66 no. 6/7
Type: Research Article
DOI: https://doi.org/10.1108/LR-09-2016-0082
ISSN: 0024-2535

Keywords

  • Academic dishonesty
  • Information ethics
  • Sociocultural factors
  • Digital piracy
  • Information ethics behaviour
  • Information ethics cognition

To view the access options for this content please click here
Article
Publication date: 25 January 2021

Cyber ethics adherence and the use of electronic information resources by undergraduates in public universities in Akwa Ibom state, Nigeria

Raphael Ebiefung and Airen Adetimirin

This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information…

HTML
PDF (142 KB)

Abstract

Purpose

This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information resources (EIRs).

Design/methodology/approach

Descriptive survey research design was used for this study. A total of 7,771 undergraduates of University of Uyo (UNIUYO) and Akwa Ibom State University (AKSU), Nigeria constitute the study population. The sampling technique used for the study is the multistage technique. A sampling fraction of 5% was used to arrive at a sample size of 389.

Findings

This study revealed that in UNIUYO, more than four-fifths of the undergraduates – 55 (84.6%) in science, 55 (82.1%) in engineering and 61 (81.3%) in education – noted that they used the internet on a daily basis, and in AKSU, almost all the respondents in science (50, 90.9%) and about four-fifths in engineering (45, 80.4%) observed that they also used the internet on a daily basis for academic work. Adherence to cyber ethics guidelines was high at UNIUYO in education (44.2) and science (43.0) and at AKSU in engineering (42.9) and science (44.7).

Practical implications

The use of EIRs in universities has brought enormous changes, especially on how information are accessed and used by undergraduates. As EIRs have become important component in university libraries and continuously used by undergraduates for academic work, there is the possibility that frequent accessibility and utilization could increase the chances of unethical usage. This study is therefore significant in taming the tide of abuse and misuse of e-information resources in universities.

Originality/value

The correlation between adherence to ethics guidelines and the use of EIRs was positively significant at both UNIUYO (r = 0.139*; df = 206; p < 0.05) and AKSU (r = 0.136*; df = 168; p < 0.05). A high level of adherence to cyber ethics by the undergraduates can be encouraged and maintained through the formulation of cyber ethics policy in the universities by academic librarians.

Details

Digital Library Perspectives, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/DLP-08-2020-0080
ISSN: 2059-5816

Keywords

  • Cyber ethics
  • Electronic information resources
  • Undergraduates
  • University of Uyo
  • Akwa Ibom State University
  • Nigeria
  • electronic information resources

To view the access options for this content please click here
Article
Publication date: 5 January 2015

Aligning computing ethics for strategy making in higher education (HE): A contrarian view – who knows?

Lucy Bowden, Colm Fearon, Heather McLaughlin and Stephen Jackson

The purpose of this paper is to explore a possible strategic role for computing ethics and investigate how they might align with corporate values and higher education (HE…

HTML
PDF (158 KB)

Abstract

Purpose

The purpose of this paper is to explore a possible strategic role for computing ethics and investigate how they might align with corporate values and higher education (HE) strategy making.

Design/methodology/approach

A longitudinal study of a university in the South East of England is used to examine qualitative findings and develop a formative discussion. The findings, discussion and conceptual framework draw upon documents analysis and 14 semi-structured interviews with senior informants involved in strategy making and implementation within a HE case study setting.

Findings

Findings are discussed in terms of: first, dealing with everyday computing ethical issues facing HE, such as common information technology (IT) threats and data protection; second, responding to ethical opportunities, dilemmas and challenges associated with the adoption of new information and communication technology in areas such as eLearning; and third, harnessing aligned IT opportunities, computing ethics and organizational values for long-term strategy development.

Research limitations/implications

This paper is important for strategic decision makers as they consider the joined-up nature of computing ethics and organizational strategy. Explicating hidden ethical opportunity and threat dimensions of eLearning, computing networks and organizational design should be an area for future research. The authors are limited by the use of a single case study, and generalizability of findings.

Originality/value

The contribution of the paper is a macro-analytical and conceptual approach that explores tentative links between computing ethics, corporate values and strategy making, while supporting future empirical studies between traditionally disparate research domains.

Details

The International Journal of Information and Learning Technology, vol. 32 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/IJILT-08-2014-0016
ISSN: 2056-4880

Keywords

  • Higher education
  • Educational policy
  • Systems integration
  • Educational institutions
  • e-Learning
  • Strategic planning

To view the access options for this content please click here
Article
Publication date: 12 February 2021

Willingness to information security as a function of personality characteristics and threat assessment among adolescents

Dan Bouhnik, Nurit Reich and Noa Aharony

The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and…

HTML
PDF (202 KB)

Abstract

Purpose

The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness – on self-disclosure. These personality traits, combined with the ability to cope with stress, determine the degree of threat felt by an individual towards their information, their evaluation of their personal ability to keep their information secure, and their willingness to secure information.

Design/methodology/approach

Five questionnaires relating to the big five personality traits, self-disclosure, cognitive assessment, self-efficacy and IS awareness were distributed among 157 adolescents.

Findings

Readiness for IS. Furthermore, the study showed that the more ostentatiousness, agreeable, goal oriented and open the subjects are, the lower they will evaluate the threat to their information. A relationship was also revealed between the subjects' agreeableness, goal orientation and their information threat assessment. It was also found that the more extroverted, agreeable, conscientious and the more inclined to self-disclosure, the higher they evaluate their self-ability to handle threats to their information.

Originality/value

For IS behavior to become second nature to adolescents they must first be educated and trained to do so. Knowing what motivates them and, on the other hand, what hinders them, to practice IS can help build training models for teachers which may be adapted according to their personal traits, thus getting the most out of such programs.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/OIR-06-2020-0218
ISSN: 1468-4527

Keywords

  • Big five personality traits
  • Information security
  • InfoSec behavior
  • Threat assessment

To view the access options for this content please click here
Article
Publication date: 14 August 2007

Computer Network Security and Cyber Ethics (2nd ed.)

Ina Fourie

HTML

Abstract

Details

Online Information Review, vol. 31 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/14684520710780485
ISSN: 1468-4527

Keywords

  • Computer networks
  • Data security
  • ethics

Access
Only content I have access to
Only Open Access
Year
  • Last week (10)
  • Last month (34)
  • Last 3 months (78)
  • Last 6 months (161)
  • Last 12 months (291)
  • All dates (1459)
Content type
  • Article (1097)
  • Book part (236)
  • Earlycite article (116)
  • Case study (7)
  • Expert briefing (2)
  • Executive summary (1)
1 – 10 of over 1000
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here