Search results

1 – 10 of over 1000
Article
Publication date: 9 May 2023

Magnus Osahon Igbinovia and Bolanle Clifford Ishola

Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this…

Abstract

Purpose

Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this menace. Consequently, this study aims to examine cyber security in university libraries and its implication for Library and Information Science education.

Design/methodology/approach

The study adopted descriptive research design, while questionnaire and interview were used to elicit data from library personnel and heads of library schools, respectively. A total of 134 responses were elicited through structured questionnaire (administered online due to the closure of universities) while six heads of library schools were interviewed, one from each of the six geopolitical zones in Nigeria.

Findings

The data from the questionnaire which were descriptively analysed revealed that the perceived knowledge of cyber security among the librarians was moderately low. Also, the university libraries were exposed to various cyber threats, with cyber security/guideline been one of the critical measures to combat cybercrime. Also, the result showed that librarians displayed high level of adherence to cyber ethics. However, the disposition of library management towards cyber security issues was revealed to be the main challenge to the deployment of cyber security in university libraries, follow by poor password management. Majority of the librarians possess basic knowledge of cyber security, though with serious interest to learn more about it. They were not taught cyber security in library school and they indicated enthusiasm to learn about it. The result of the interview with heads of library schools showed majority of these schools do not offer cyber security course due to dearth in skilled manpower.

Originality/value

The study presents cybercrime as a menace, if not tackled, would affect the university libraries’ sustainability as information institution, compromising their ability to deliver quality services.

Details

Digital Library Perspectives, vol. 39 no. 3
Type: Research Article
ISSN: 2059-5816

Keywords

Open Access
Article
Publication date: 20 October 2022

Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…

Abstract

Purpose

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.

Design/methodology/approach

The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.

Findings

This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.

Research limitations/implications

The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.

Practical implications

Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.

Social implications

Shared awareness and protection of ICT resources.

Originality/value

Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 7 September 2020

Sheshadri Chatterjee

The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).

Abstract

Purpose

The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).

Design/methodology/approach

The determinants that would impact on securing IoT-enabled system in SCI have been identified by the studies of literature. Some hypothesis has been formulated. A conceptual model has been developed. Hypotheses and conceptual models have been tested by a statistical approach through survey works considering the feedbacks of 331 usable respondents. The results have been discussed followed by explaining the implications of this study. A comprehensive conclusion has been provided at the end.

Findings

The validated results show that the trust factor has insignificant impacts on the system and technology use, as well as on the behavioural intention. The model provided could achieve 79% explanative power.

Practical implications

For ensuring safety and security of IoT-enabled devices in SCI, the ethical sense of the stakeholders of SCI has considerable impact on securing safety of IoT-enabled devices in SCI. The practitioner should, as such, be sincere to motivate the stakeholders to ameliorate the ethical sense of the stakeholders for securing safety of IoT-enabled devices in SCI.

Originality/value

A few studies in the areas of Indian smart cities, IoT and related ethical issues have been conducted. In that sense, this approach is deemed to be a novel attempt.

Details

International Journal of Ethics and Systems, vol. 36 no. 4
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 28 February 2005

David H. Gleason and Lawrence Friedman

This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management…

Abstract

This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management of cyberspace, and to hold accountable the parties responsible for those decisions, whether the responsible party is a government actor, market actor or private individual. The authors argue that the Open Systems Interconnection (OSI) model, with certain modifications, should serve as a primary educational tool in helping individuals to gain the understanding of ICT necessary to protect public interests related to cyberspace.

Details

Journal of Information, Communication and Ethics in Society, vol. 3 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 2 October 2017

Kerem Kilicer, Ahmet Naci Coklar and Vildan Ozeke

The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.

1423

Abstract

Purpose

The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.

Design/methodology/approach

The paper is based on a scale-development process by following a systematic approach. First, the current scales were examined; following this, focus group interviews were held; next, an item pool was formed; and the validity and reliability of the items were tested. The validity and reliability studies of the scale were conducted with 1,495 social media users. An application on Facebook was used to collect the data.

Findings

As a result of the validity study, 25 items under five factors were obtained. These factors were being peaceful, truth, solidarity, respect and tolerance. The items obtained were capable of discriminating the individuals in terms of the features to be measured by the scale. In addition, the scale was confirmed to measure correctly the structure obtained in line with the fit indices. The internal consistency coefficient of the scale was 0.90 and split-half reliability coefficient was 0.88.

Research limitations/implications

The sample has several limitations. Most of the participants were male and the data were collected on social media. Thus, to enhance the validity and reliability of the scale, further in-depth qualitative and cross-cultural studies should be examined.

Practical implications

This study could provide convenience for practitioners about how to diagnose the cyber human values of the internet users in cyberspace.

Originality/value

It was concluded that this scale was valid, reliable and beneficial to measure social media users’ levels of cyber human values.

Details

Internet Research, vol. 27 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 19 June 2021

Mudit Kumar Verma and Shyam Sundar Kushwaha

The study aims to determine the cybercrime awareness among secondary school students with reference to their gender and school management type.

Abstract

Purpose

The study aims to determine the cybercrime awareness among secondary school students with reference to their gender and school management type.

Design/methodology/approach

For the purpose, a sample of 100 students from secondary schools situated in Lucknow city, state of Uttar Pradesh, India was selected. To obtain initial data from the respondents and to determine the cybercrime awareness categories a five-point Likert type cybercrime awareness rating scale exclusively constructed to fulfil the purpose of this study was used to determine the cybercrime awareness in five categories viz; excellent, high, above average, average, below average and low cybercrime awareness. Further, “t” test was used to analyse the difference between the means of groups.

Findings

Results revealed that gender (male and female) and type of school management (government and self-finance) are not significant predictors of cybercrime awareness among secondary school students.

Research limitations/implications

This study is limited to the government and self-finance English medium schools of Lucknow city, state of Uttar Pradesh, India.

Practical implications

Policymakers, various societies involved in investigating cyber behavior/child computer interaction/safer communities, etc. should consider that school management is not a predictor of cybercrime along with gender and can look for other possible visible and latent factors affecting cybercrime awareness among students while formulating a policy or designing a course/prevention program for secondary school students.

Social implications

School administration should consider the existing gender and school management roles of the present scenario to make effective policies for the students and providing them effective cybercrime prevention programs and activities. Also, parents can adequately understand the role of school management type and gender of their belongings to understand their cybercrime awareness and take necessary measures accordingly.

Originality/value

The paper is focused on the cybercrime awareness of secondary school students and how their gender and school management type affects their cybercrime awareness. To the best of the authors’ knowledge, this study is first of its kind which investigates the role of school management in cybercrime awareness of the students. As the education sector is depending more and more on the cyber world, this paper is of the great significance for the safety of education sector, organizations and communities involved in making the policies and designing the curriculum to avoid students being a victim of cybercrime and to make education sector a safer community.

Details

Safer Communities, vol. 20 no. 3
Type: Research Article
ISSN: 1757-8043

Keywords

Article
Publication date: 5 September 2017

Mariam Al-Nuaimi, Ali Al-Aufi and Abdelmajid Bouazza

This paper aims to evaluate the literature dealing with the sociocultural influences on undergraduate students’ information ethics (IE) cognition and behaviour. Much of the…

Abstract

Purpose

This paper aims to evaluate the literature dealing with the sociocultural influences on undergraduate students’ information ethics (IE) cognition and behaviour. Much of the reviewed literature draws on the experiences of countries that differ in terms of cultural and economic aspects.

Design/methodology/approach

This structured review uses an integrative approach to synthesize the existing literature relevant to the factors in question. Correspondingly, limitations, agreements and disagreements within the relevant literature are indicated. A set of relevance criteria is developed, and analytical information for each study is then organized and summarized into aggregate findings.

Findings

Despite the significant explanatory power of the reciprocal correlation between individualism and economic wealth to predict declines in unethical information practices, IE studies persist in producing inconsistent findings in this regard. Thus, further facets of cross-cultural differences should be addressed beyond the individualistic/collectivistic typology.

Originality/value

This paper has pedagogical worth for students, researchers and developers of IE educational programs at the tertiary level. It also possesses methodological value for studying the sociocultural effects on the IE behaviour of computing professionals within the broader context of global IE research.

Article
Publication date: 5 January 2015

Lucy Bowden, Colm Fearon, Heather McLaughlin and Stephen Jackson

The purpose of this paper is to explore a possible strategic role for computing ethics and investigate how they might align with corporate values and higher education (HE…

Abstract

Purpose

The purpose of this paper is to explore a possible strategic role for computing ethics and investigate how they might align with corporate values and higher education (HE) strategy making.

Design/methodology/approach

A longitudinal study of a university in the South East of England is used to examine qualitative findings and develop a formative discussion. The findings, discussion and conceptual framework draw upon documents analysis and 14 semi-structured interviews with senior informants involved in strategy making and implementation within a HE case study setting.

Findings

Findings are discussed in terms of: first, dealing with everyday computing ethical issues facing HE, such as common information technology (IT) threats and data protection; second, responding to ethical opportunities, dilemmas and challenges associated with the adoption of new information and communication technology in areas such as eLearning; and third, harnessing aligned IT opportunities, computing ethics and organizational values for long-term strategy development.

Research limitations/implications

This paper is important for strategic decision makers as they consider the joined-up nature of computing ethics and organizational strategy. Explicating hidden ethical opportunity and threat dimensions of eLearning, computing networks and organizational design should be an area for future research. The authors are limited by the use of a single case study, and generalizability of findings.

Originality/value

The contribution of the paper is a macro-analytical and conceptual approach that explores tentative links between computing ethics, corporate values and strategy making, while supporting future empirical studies between traditionally disparate research domains.

Details

The International Journal of Information and Learning Technology, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4880

Keywords

Article
Publication date: 25 January 2021

Raphael Ebiefung and Airen Adetimirin

This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information resources…

Abstract

Purpose

This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information resources (EIRs).

Design/methodology/approach

Descriptive survey research design was used for this study. A total of 7,771 undergraduates of University of Uyo (UNIUYO) and Akwa Ibom State University (AKSU), Nigeria constitute the study population. The sampling technique used for the study is the multistage technique. A sampling fraction of 5% was used to arrive at a sample size of 389.

Findings

This study revealed that in UNIUYO, more than four-fifths of the undergraduates – 55 (84.6%) in science, 55 (82.1%) in engineering and 61 (81.3%) in education – noted that they used the internet on a daily basis, and in AKSU, almost all the respondents in science (50, 90.9%) and about four-fifths in engineering (45, 80.4%) observed that they also used the internet on a daily basis for academic work. Adherence to cyber ethics guidelines was high at UNIUYO in education (44.2) and science (43.0) and at AKSU in engineering (42.9) and science (44.7).

Practical implications

The use of EIRs in universities has brought enormous changes, especially on how information are accessed and used by undergraduates. As EIRs have become important component in university libraries and continuously used by undergraduates for academic work, there is the possibility that frequent accessibility and utilization could increase the chances of unethical usage. This study is therefore significant in taming the tide of abuse and misuse of e-information resources in universities.

Originality/value

The correlation between adherence to ethics guidelines and the use of EIRs was positively significant at both UNIUYO (r = 0.139*; df = 206; p < 0.05) and AKSU (r = 0.136*; df = 168; p < 0.05). A high level of adherence to cyber ethics by the undergraduates can be encouraged and maintained through the formulation of cyber ethics policy in the universities by academic librarians.

Article
Publication date: 12 February 2021

Dan Bouhnik, Nurit Reich and Noa Aharony

The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness…

Abstract

Purpose

The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness – on self-disclosure. These personality traits, combined with the ability to cope with stress, determine the degree of threat felt by an individual towards their information, their evaluation of their personal ability to keep their information secure, and their willingness to secure information.

Design/methodology/approach

Five questionnaires relating to the big five personality traits, self-disclosure, cognitive assessment, self-efficacy and IS awareness were distributed among 157 adolescents.

Findings

Readiness for IS. Furthermore, the study showed that the more ostentatiousness, agreeable, goal oriented and open the subjects are, the lower they will evaluate the threat to their information. A relationship was also revealed between the subjects' agreeableness, goal orientation and their information threat assessment. It was also found that the more extroverted, agreeable, conscientious and the more inclined to self-disclosure, the higher they evaluate their self-ability to handle threats to their information.

Originality/value

For IS behavior to become second nature to adolescents they must first be educated and trained to do so. Knowing what motivates them and, on the other hand, what hinders them, to practice IS can help build training models for teachers which may be adapted according to their personal traits, thus getting the most out of such programs.

Details

Online Information Review, vol. 45 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

1 – 10 of over 1000