Search results
1 – 10 of over 1000Magnus Osahon Igbinovia and Bolanle Clifford Ishola
Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this…
Abstract
Purpose
Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this menace. Consequently, this study aims to examine cyber security in university libraries and its implication for Library and Information Science education.
Design/methodology/approach
The study adopted descriptive research design, while questionnaire and interview were used to elicit data from library personnel and heads of library schools, respectively. A total of 134 responses were elicited through structured questionnaire (administered online due to the closure of universities) while six heads of library schools were interviewed, one from each of the six geopolitical zones in Nigeria.
Findings
The data from the questionnaire which were descriptively analysed revealed that the perceived knowledge of cyber security among the librarians was moderately low. Also, the university libraries were exposed to various cyber threats, with cyber security/guideline been one of the critical measures to combat cybercrime. Also, the result showed that librarians displayed high level of adherence to cyber ethics. However, the disposition of library management towards cyber security issues was revealed to be the main challenge to the deployment of cyber security in university libraries, follow by poor password management. Majority of the librarians possess basic knowledge of cyber security, though with serious interest to learn more about it. They were not taught cyber security in library school and they indicated enthusiasm to learn about it. The result of the interview with heads of library schools showed majority of these schools do not offer cyber security course due to dearth in skilled manpower.
Originality/value
The study presents cybercrime as a menace, if not tackled, would affect the university libraries’ sustainability as information institution, compromising their ability to deliver quality services.
Details
Keywords
Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…
Abstract
Purpose
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.
Design/methodology/approach
The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.
Findings
This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.
Research limitations/implications
The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.
Practical implications
Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.
Social implications
Shared awareness and protection of ICT resources.
Originality/value
Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.
Details
Keywords
The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).
Abstract
Purpose
The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).
Design/methodology/approach
The determinants that would impact on securing IoT-enabled system in SCI have been identified by the studies of literature. Some hypothesis has been formulated. A conceptual model has been developed. Hypotheses and conceptual models have been tested by a statistical approach through survey works considering the feedbacks of 331 usable respondents. The results have been discussed followed by explaining the implications of this study. A comprehensive conclusion has been provided at the end.
Findings
The validated results show that the trust factor has insignificant impacts on the system and technology use, as well as on the behavioural intention. The model provided could achieve 79% explanative power.
Practical implications
For ensuring safety and security of IoT-enabled devices in SCI, the ethical sense of the stakeholders of SCI has considerable impact on securing safety of IoT-enabled devices in SCI. The practitioner should, as such, be sincere to motivate the stakeholders to ameliorate the ethical sense of the stakeholders for securing safety of IoT-enabled devices in SCI.
Originality/value
A few studies in the areas of Indian smart cities, IoT and related ethical issues have been conducted. In that sense, this approach is deemed to be a novel attempt.
Details
Keywords
David H. Gleason and Lawrence Friedman
This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management…
Abstract
This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management of cyberspace, and to hold accountable the parties responsible for those decisions, whether the responsible party is a government actor, market actor or private individual. The authors argue that the Open Systems Interconnection (OSI) model, with certain modifications, should serve as a primary educational tool in helping individuals to gain the understanding of ICT necessary to protect public interests related to cyberspace.
Details
Keywords
Kerem Kilicer, Ahmet Naci Coklar and Vildan Ozeke
The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.
Abstract
Purpose
The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.
Design/methodology/approach
The paper is based on a scale-development process by following a systematic approach. First, the current scales were examined; following this, focus group interviews were held; next, an item pool was formed; and the validity and reliability of the items were tested. The validity and reliability studies of the scale were conducted with 1,495 social media users. An application on Facebook was used to collect the data.
Findings
As a result of the validity study, 25 items under five factors were obtained. These factors were being peaceful, truth, solidarity, respect and tolerance. The items obtained were capable of discriminating the individuals in terms of the features to be measured by the scale. In addition, the scale was confirmed to measure correctly the structure obtained in line with the fit indices. The internal consistency coefficient of the scale was 0.90 and split-half reliability coefficient was 0.88.
Research limitations/implications
The sample has several limitations. Most of the participants were male and the data were collected on social media. Thus, to enhance the validity and reliability of the scale, further in-depth qualitative and cross-cultural studies should be examined.
Practical implications
This study could provide convenience for practitioners about how to diagnose the cyber human values of the internet users in cyberspace.
Originality/value
It was concluded that this scale was valid, reliable and beneficial to measure social media users’ levels of cyber human values.
Details
Keywords
Mudit Kumar Verma and Shyam Sundar Kushwaha
The study aims to determine the cybercrime awareness among secondary school students with reference to their gender and school management type.
Abstract
Purpose
The study aims to determine the cybercrime awareness among secondary school students with reference to their gender and school management type.
Design/methodology/approach
For the purpose, a sample of 100 students from secondary schools situated in Lucknow city, state of Uttar Pradesh, India was selected. To obtain initial data from the respondents and to determine the cybercrime awareness categories a five-point Likert type cybercrime awareness rating scale exclusively constructed to fulfil the purpose of this study was used to determine the cybercrime awareness in five categories viz; excellent, high, above average, average, below average and low cybercrime awareness. Further, “t” test was used to analyse the difference between the means of groups.
Findings
Results revealed that gender (male and female) and type of school management (government and self-finance) are not significant predictors of cybercrime awareness among secondary school students.
Research limitations/implications
This study is limited to the government and self-finance English medium schools of Lucknow city, state of Uttar Pradesh, India.
Practical implications
Policymakers, various societies involved in investigating cyber behavior/child computer interaction/safer communities, etc. should consider that school management is not a predictor of cybercrime along with gender and can look for other possible visible and latent factors affecting cybercrime awareness among students while formulating a policy or designing a course/prevention program for secondary school students.
Social implications
School administration should consider the existing gender and school management roles of the present scenario to make effective policies for the students and providing them effective cybercrime prevention programs and activities. Also, parents can adequately understand the role of school management type and gender of their belongings to understand their cybercrime awareness and take necessary measures accordingly.
Originality/value
The paper is focused on the cybercrime awareness of secondary school students and how their gender and school management type affects their cybercrime awareness. To the best of the authors’ knowledge, this study is first of its kind which investigates the role of school management in cybercrime awareness of the students. As the education sector is depending more and more on the cyber world, this paper is of the great significance for the safety of education sector, organizations and communities involved in making the policies and designing the curriculum to avoid students being a victim of cybercrime and to make education sector a safer community.
Details
Keywords
Mariam Al-Nuaimi, Ali Al-Aufi and Abdelmajid Bouazza
This paper aims to evaluate the literature dealing with the sociocultural influences on undergraduate students’ information ethics (IE) cognition and behaviour. Much of the…
Abstract
Purpose
This paper aims to evaluate the literature dealing with the sociocultural influences on undergraduate students’ information ethics (IE) cognition and behaviour. Much of the reviewed literature draws on the experiences of countries that differ in terms of cultural and economic aspects.
Design/methodology/approach
This structured review uses an integrative approach to synthesize the existing literature relevant to the factors in question. Correspondingly, limitations, agreements and disagreements within the relevant literature are indicated. A set of relevance criteria is developed, and analytical information for each study is then organized and summarized into aggregate findings.
Findings
Despite the significant explanatory power of the reciprocal correlation between individualism and economic wealth to predict declines in unethical information practices, IE studies persist in producing inconsistent findings in this regard. Thus, further facets of cross-cultural differences should be addressed beyond the individualistic/collectivistic typology.
Originality/value
This paper has pedagogical worth for students, researchers and developers of IE educational programs at the tertiary level. It also possesses methodological value for studying the sociocultural effects on the IE behaviour of computing professionals within the broader context of global IE research.
Details
Keywords
Lucy Bowden, Colm Fearon, Heather McLaughlin and Stephen Jackson
The purpose of this paper is to explore a possible strategic role for computing ethics and investigate how they might align with corporate values and higher education (HE…
Abstract
Purpose
The purpose of this paper is to explore a possible strategic role for computing ethics and investigate how they might align with corporate values and higher education (HE) strategy making.
Design/methodology/approach
A longitudinal study of a university in the South East of England is used to examine qualitative findings and develop a formative discussion. The findings, discussion and conceptual framework draw upon documents analysis and 14 semi-structured interviews with senior informants involved in strategy making and implementation within a HE case study setting.
Findings
Findings are discussed in terms of: first, dealing with everyday computing ethical issues facing HE, such as common information technology (IT) threats and data protection; second, responding to ethical opportunities, dilemmas and challenges associated with the adoption of new information and communication technology in areas such as eLearning; and third, harnessing aligned IT opportunities, computing ethics and organizational values for long-term strategy development.
Research limitations/implications
This paper is important for strategic decision makers as they consider the joined-up nature of computing ethics and organizational strategy. Explicating hidden ethical opportunity and threat dimensions of eLearning, computing networks and organizational design should be an area for future research. The authors are limited by the use of a single case study, and generalizability of findings.
Originality/value
The contribution of the paper is a macro-analytical and conceptual approach that explores tentative links between computing ethics, corporate values and strategy making, while supporting future empirical studies between traditionally disparate research domains.
Details
Keywords
Raphael Ebiefung and Airen Adetimirin
This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information resources…
Abstract
Purpose
This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information resources (EIRs).
Design/methodology/approach
Descriptive survey research design was used for this study. A total of 7,771 undergraduates of University of Uyo (UNIUYO) and Akwa Ibom State University (AKSU), Nigeria constitute the study population. The sampling technique used for the study is the multistage technique. A sampling fraction of 5% was used to arrive at a sample size of 389.
Findings
This study revealed that in UNIUYO, more than four-fifths of the undergraduates – 55 (84.6%) in science, 55 (82.1%) in engineering and 61 (81.3%) in education – noted that they used the internet on a daily basis, and in AKSU, almost all the respondents in science (50, 90.9%) and about four-fifths in engineering (45, 80.4%) observed that they also used the internet on a daily basis for academic work. Adherence to cyber ethics guidelines was high at UNIUYO in education (44.2) and science (43.0) and at AKSU in engineering (42.9) and science (44.7).
Practical implications
The use of EIRs in universities has brought enormous changes, especially on how information are accessed and used by undergraduates. As EIRs have become important component in university libraries and continuously used by undergraduates for academic work, there is the possibility that frequent accessibility and utilization could increase the chances of unethical usage. This study is therefore significant in taming the tide of abuse and misuse of e-information resources in universities.
Originality/value
The correlation between adherence to ethics guidelines and the use of EIRs was positively significant at both UNIUYO (r = 0.139*; df = 206; p < 0.05) and AKSU (r = 0.136*; df = 168; p < 0.05). A high level of adherence to cyber ethics by the undergraduates can be encouraged and maintained through the formulation of cyber ethics policy in the universities by academic librarians.
Details
Keywords
Dan Bouhnik, Nurit Reich and Noa Aharony
The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness…
Abstract
Purpose
The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness – on self-disclosure. These personality traits, combined with the ability to cope with stress, determine the degree of threat felt by an individual towards their information, their evaluation of their personal ability to keep their information secure, and their willingness to secure information.
Design/methodology/approach
Five questionnaires relating to the big five personality traits, self-disclosure, cognitive assessment, self-efficacy and IS awareness were distributed among 157 adolescents.
Findings
Readiness for IS. Furthermore, the study showed that the more ostentatiousness, agreeable, goal oriented and open the subjects are, the lower they will evaluate the threat to their information. A relationship was also revealed between the subjects' agreeableness, goal orientation and their information threat assessment. It was also found that the more extroverted, agreeable, conscientious and the more inclined to self-disclosure, the higher they evaluate their self-ability to handle threats to their information.
Originality/value
For IS behavior to become second nature to adolescents they must first be educated and trained to do so. Knowing what motivates them and, on the other hand, what hinders them, to practice IS can help build training models for teachers which may be adapted according to their personal traits, thus getting the most out of such programs.
Details