Search results
1 – 10 of over 1000
The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).
Abstract
Purpose
The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).
Design/methodology/approach
The determinants that would impact on securing IoT-enabled system in SCI have been identified by the studies of literature. Some hypothesis has been formulated. A conceptual model has been developed. Hypotheses and conceptual models have been tested by a statistical approach through survey works considering the feedbacks of 331 usable respondents. The results have been discussed followed by explaining the implications of this study. A comprehensive conclusion has been provided at the end.
Findings
The validated results show that the trust factor has insignificant impacts on the system and technology use, as well as on the behavioural intention. The model provided could achieve 79% explanative power.
Practical implications
For ensuring safety and security of IoT-enabled devices in SCI, the ethical sense of the stakeholders of SCI has considerable impact on securing safety of IoT-enabled devices in SCI. The practitioner should, as such, be sincere to motivate the stakeholders to ameliorate the ethical sense of the stakeholders for securing safety of IoT-enabled devices in SCI.
Originality/value
A few studies in the areas of Indian smart cities, IoT and related ethical issues have been conducted. In that sense, this approach is deemed to be a novel attempt.
Details
Keywords
David H. Gleason and Lawrence Friedman
This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and…
Abstract
This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management of cyberspace, and to hold accountable the parties responsible for those decisions, whether the responsible party is a government actor, market actor or private individual. The authors argue that the Open Systems Interconnection (OSI) model, with certain modifications, should serve as a primary educational tool in helping individuals to gain the understanding of ICT necessary to protect public interests related to cyberspace.
Details
Keywords
Kerem Kilicer, Ahmet Naci Coklar and Vildan Ozeke
The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.
Abstract
Purpose
The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.
Design/methodology/approach
The paper is based on a scale-development process by following a systematic approach. First, the current scales were examined; following this, focus group interviews were held; next, an item pool was formed; and the validity and reliability of the items were tested. The validity and reliability studies of the scale were conducted with 1,495 social media users. An application on Facebook was used to collect the data.
Findings
As a result of the validity study, 25 items under five factors were obtained. These factors were being peaceful, truth, solidarity, respect and tolerance. The items obtained were capable of discriminating the individuals in terms of the features to be measured by the scale. In addition, the scale was confirmed to measure correctly the structure obtained in line with the fit indices. The internal consistency coefficient of the scale was 0.90 and split-half reliability coefficient was 0.88.
Research limitations/implications
The sample has several limitations. Most of the participants were male and the data were collected on social media. Thus, to enhance the validity and reliability of the scale, further in-depth qualitative and cross-cultural studies should be examined.
Practical implications
This study could provide convenience for practitioners about how to diagnose the cyber human values of the internet users in cyberspace.
Originality/value
It was concluded that this scale was valid, reliable and beneficial to measure social media users’ levels of cyber human values.
Details
Keywords
Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and…
Abstract
Purpose
Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance. This development along with the growing power of SNS providers calls for an investigation of the CSR engagement of SNS companies. The chapter examines to what extent three prominent providers – Google, Facebook and Twitter – fulfill their responsibilities.
Methodology/approach
The chapter draws heavily on a politicized concept of CSR, namely ‘corporate citizenship’ (Crane, Matten, & Moon, 2008a; Matten & Crane, 2005) and ‘political CSR’ (Scherer & Palazzo, 2007, 2011) and discusses the role SNS providers play in administering citizenship rights. The chapter takes a qualitative case study approach.
Findings
Facebook, Twitter and Google have not only made clear commitments to act responsibly, they actually enhance the citizenship status of their users in many ways, e.g. by offering a platform for democracy activists. Deficiencies and contradictions also become visible, e.g. SNS providers inhibit citizenship by failing to provide sufficient privacy protection.
Research limitations/implications
The chapter is limited by its case study approach, but provides valuable insights to an industry with considerable influence. It contributes to CSR research by applying and testing the politicized concept of CSR in the context of SNS providers.
Originality/value
Although SNS have received appraisal as effective tools of CSR communication, there has been little attention to CSR policy and practice of the companies providing social networks. This is unfortunate since the activities of SNS providers directly impact on millions of users worldwide.
Details
Keywords
FR. Oswald A. J. Mascarenhas, S.J.
This chapter covers basic concepts, ethical theories, and moral paradigms of corporate ethics for identifying, understanding, and responding to the turbulent market…
Abstract
Executive Summary
This chapter covers basic concepts, ethical theories, and moral paradigms of corporate ethics for identifying, understanding, and responding to the turbulent market challenges of today. The concept, nature, and domain of ethics, business ethics, managerial ethics, and corporate executive ethics are defined and differentiated for their significance. The domain, scope, and nature of related concepts such as legality, ethicality, morality, and executive spirituality are distinguished and developed. Among normative and descriptive ethical theories that we briefly review and critique here are teleology or utilitarianism, deontology or existentialism, distributive justice, corrective justice, and ethics of malfeasance and beneficence. Other moral theories of ethics such as ethics of human dignity, ethics of cardinal virtues, ethics of trusting relations, ethics of stakeholder rights and duties, ethics of moral reasoning and judgment calls, ethics of executive and moral leadership, and ethics of social and moral responsibility will be treated in a later book. The thrust of this book is positive: despite our not very commendable track record in managing this planet and its resources, our basic questions are: Where are we now? What are we now? Where should we as corporations go, and why? What are the specific positive mandates and metrics to corporate executives to reach that desired destiny? This chapter explores responses to these strategic corporate questions.
Mariam Al-Nuaimi, Ali Al-Aufi and Abdelmajid Bouazza
This paper aims to evaluate the literature dealing with the sociocultural influences on undergraduate students’ information ethics (IE) cognition and behaviour. Much of…
Abstract
Purpose
This paper aims to evaluate the literature dealing with the sociocultural influences on undergraduate students’ information ethics (IE) cognition and behaviour. Much of the reviewed literature draws on the experiences of countries that differ in terms of cultural and economic aspects.
Design/methodology/approach
This structured review uses an integrative approach to synthesize the existing literature relevant to the factors in question. Correspondingly, limitations, agreements and disagreements within the relevant literature are indicated. A set of relevance criteria is developed, and analytical information for each study is then organized and summarized into aggregate findings.
Findings
Despite the significant explanatory power of the reciprocal correlation between individualism and economic wealth to predict declines in unethical information practices, IE studies persist in producing inconsistent findings in this regard. Thus, further facets of cross-cultural differences should be addressed beyond the individualistic/collectivistic typology.
Originality/value
This paper has pedagogical worth for students, researchers and developers of IE educational programs at the tertiary level. It also possesses methodological value for studying the sociocultural effects on the IE behaviour of computing professionals within the broader context of global IE research.
Details
Keywords
Raphael Ebiefung and Airen Adetimirin
This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information…
Abstract
Purpose
This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information resources (EIRs).
Design/methodology/approach
Descriptive survey research design was used for this study. A total of 7,771 undergraduates of University of Uyo (UNIUYO) and Akwa Ibom State University (AKSU), Nigeria constitute the study population. The sampling technique used for the study is the multistage technique. A sampling fraction of 5% was used to arrive at a sample size of 389.
Findings
This study revealed that in UNIUYO, more than four-fifths of the undergraduates – 55 (84.6%) in science, 55 (82.1%) in engineering and 61 (81.3%) in education – noted that they used the internet on a daily basis, and in AKSU, almost all the respondents in science (50, 90.9%) and about four-fifths in engineering (45, 80.4%) observed that they also used the internet on a daily basis for academic work. Adherence to cyber ethics guidelines was high at UNIUYO in education (44.2) and science (43.0) and at AKSU in engineering (42.9) and science (44.7).
Practical implications
The use of EIRs in universities has brought enormous changes, especially on how information are accessed and used by undergraduates. As EIRs have become important component in university libraries and continuously used by undergraduates for academic work, there is the possibility that frequent accessibility and utilization could increase the chances of unethical usage. This study is therefore significant in taming the tide of abuse and misuse of e-information resources in universities.
Originality/value
The correlation between adherence to ethics guidelines and the use of EIRs was positively significant at both UNIUYO (r = 0.139*; df = 206; p < 0.05) and AKSU (r = 0.136*; df = 168; p < 0.05). A high level of adherence to cyber ethics by the undergraduates can be encouraged and maintained through the formulation of cyber ethics policy in the universities by academic librarians.
Details
Keywords
Lucy Bowden, Colm Fearon, Heather McLaughlin and Stephen Jackson
The purpose of this paper is to explore a possible strategic role for computing ethics and investigate how they might align with corporate values and higher education (HE…
Abstract
Purpose
The purpose of this paper is to explore a possible strategic role for computing ethics and investigate how they might align with corporate values and higher education (HE) strategy making.
Design/methodology/approach
A longitudinal study of a university in the South East of England is used to examine qualitative findings and develop a formative discussion. The findings, discussion and conceptual framework draw upon documents analysis and 14 semi-structured interviews with senior informants involved in strategy making and implementation within a HE case study setting.
Findings
Findings are discussed in terms of: first, dealing with everyday computing ethical issues facing HE, such as common information technology (IT) threats and data protection; second, responding to ethical opportunities, dilemmas and challenges associated with the adoption of new information and communication technology in areas such as eLearning; and third, harnessing aligned IT opportunities, computing ethics and organizational values for long-term strategy development.
Research limitations/implications
This paper is important for strategic decision makers as they consider the joined-up nature of computing ethics and organizational strategy. Explicating hidden ethical opportunity and threat dimensions of eLearning, computing networks and organizational design should be an area for future research. The authors are limited by the use of a single case study, and generalizability of findings.
Originality/value
The contribution of the paper is a macro-analytical and conceptual approach that explores tentative links between computing ethics, corporate values and strategy making, while supporting future empirical studies between traditionally disparate research domains.
Details
Keywords
Dan Bouhnik, Nurit Reich and Noa Aharony
The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and…
Abstract
Purpose
The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness – on self-disclosure. These personality traits, combined with the ability to cope with stress, determine the degree of threat felt by an individual towards their information, their evaluation of their personal ability to keep their information secure, and their willingness to secure information.
Design/methodology/approach
Five questionnaires relating to the big five personality traits, self-disclosure, cognitive assessment, self-efficacy and IS awareness were distributed among 157 adolescents.
Findings
Readiness for IS. Furthermore, the study showed that the more ostentatiousness, agreeable, goal oriented and open the subjects are, the lower they will evaluate the threat to their information. A relationship was also revealed between the subjects' agreeableness, goal orientation and their information threat assessment. It was also found that the more extroverted, agreeable, conscientious and the more inclined to self-disclosure, the higher they evaluate their self-ability to handle threats to their information.
Originality/value
For IS behavior to become second nature to adolescents they must first be educated and trained to do so. Knowing what motivates them and, on the other hand, what hinders them, to practice IS can help build training models for teachers which may be adapted according to their personal traits, thus getting the most out of such programs.
Details
Keywords
Abstract
Details