Search results
1 – 10 of over 2000Magnus Osahon Igbinovia and Bolanle Clifford Ishola
Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this…
Abstract
Purpose
Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this menace. Consequently, this study aims to examine cyber security in university libraries and its implication for Library and Information Science education.
Design/methodology/approach
The study adopted descriptive research design, while questionnaire and interview were used to elicit data from library personnel and heads of library schools, respectively. A total of 134 responses were elicited through structured questionnaire (administered online due to the closure of universities) while six heads of library schools were interviewed, one from each of the six geopolitical zones in Nigeria.
Findings
The data from the questionnaire which were descriptively analysed revealed that the perceived knowledge of cyber security among the librarians was moderately low. Also, the university libraries were exposed to various cyber threats, with cyber security/guideline been one of the critical measures to combat cybercrime. Also, the result showed that librarians displayed high level of adherence to cyber ethics. However, the disposition of library management towards cyber security issues was revealed to be the main challenge to the deployment of cyber security in university libraries, follow by poor password management. Majority of the librarians possess basic knowledge of cyber security, though with serious interest to learn more about it. They were not taught cyber security in library school and they indicated enthusiasm to learn about it. The result of the interview with heads of library schools showed majority of these schools do not offer cyber security course due to dearth in skilled manpower.
Originality/value
The study presents cybercrime as a menace, if not tackled, would affect the university libraries’ sustainability as information institution, compromising their ability to deliver quality services.
Details
Keywords
Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…
Abstract
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.
In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.
In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.
Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.
Details
Keywords
Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…
Abstract
Purpose
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.
Design/methodology/approach
The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.
Findings
This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.
Research limitations/implications
The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.
Practical implications
Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.
Social implications
Shared awareness and protection of ICT resources.
Originality/value
Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.
Details
Keywords
The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).
Abstract
Purpose
The purpose of this study is to analyze the impact of ethics and technology towards safety of internet of things (IoT)-enabled system in smart cities of India (SCI).
Design/methodology/approach
The determinants that would impact on securing IoT-enabled system in SCI have been identified by the studies of literature. Some hypothesis has been formulated. A conceptual model has been developed. Hypotheses and conceptual models have been tested by a statistical approach through survey works considering the feedbacks of 331 usable respondents. The results have been discussed followed by explaining the implications of this study. A comprehensive conclusion has been provided at the end.
Findings
The validated results show that the trust factor has insignificant impacts on the system and technology use, as well as on the behavioural intention. The model provided could achieve 79% explanative power.
Practical implications
For ensuring safety and security of IoT-enabled devices in SCI, the ethical sense of the stakeholders of SCI has considerable impact on securing safety of IoT-enabled devices in SCI. The practitioner should, as such, be sincere to motivate the stakeholders to ameliorate the ethical sense of the stakeholders for securing safety of IoT-enabled devices in SCI.
Originality/value
A few studies in the areas of Indian smart cities, IoT and related ethical issues have been conducted. In that sense, this approach is deemed to be a novel attempt.
Details
Keywords
David H. Gleason and Lawrence Friedman
This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management…
Abstract
This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management of cyberspace, and to hold accountable the parties responsible for those decisions, whether the responsible party is a government actor, market actor or private individual. The authors argue that the Open Systems Interconnection (OSI) model, with certain modifications, should serve as a primary educational tool in helping individuals to gain the understanding of ICT necessary to protect public interests related to cyberspace.
Details
Keywords
Kerem Kilicer, Ahmet Naci Coklar and Vildan Ozeke
The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.
Abstract
Purpose
The purpose of this paper is to develop a scale to measure the level of cyber human values based on the behaviors of social media users in cyberspace.
Design/methodology/approach
The paper is based on a scale-development process by following a systematic approach. First, the current scales were examined; following this, focus group interviews were held; next, an item pool was formed; and the validity and reliability of the items were tested. The validity and reliability studies of the scale were conducted with 1,495 social media users. An application on Facebook was used to collect the data.
Findings
As a result of the validity study, 25 items under five factors were obtained. These factors were being peaceful, truth, solidarity, respect and tolerance. The items obtained were capable of discriminating the individuals in terms of the features to be measured by the scale. In addition, the scale was confirmed to measure correctly the structure obtained in line with the fit indices. The internal consistency coefficient of the scale was 0.90 and split-half reliability coefficient was 0.88.
Research limitations/implications
The sample has several limitations. Most of the participants were male and the data were collected on social media. Thus, to enhance the validity and reliability of the scale, further in-depth qualitative and cross-cultural studies should be examined.
Practical implications
This study could provide convenience for practitioners about how to diagnose the cyber human values of the internet users in cyberspace.
Originality/value
It was concluded that this scale was valid, reliable and beneficial to measure social media users’ levels of cyber human values.
Details
Keywords
Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance…
Abstract
Purpose
Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance. This development along with the growing power of SNS providers calls for an investigation of the CSR engagement of SNS companies. The chapter examines to what extent three prominent providers – Google, Facebook and Twitter – fulfill their responsibilities.
Methodology/approach
The chapter draws heavily on a politicized concept of CSR, namely ‘corporate citizenship’ (Crane, Matten, & Moon, 2008a; Matten & Crane, 2005) and ‘political CSR’ (Scherer & Palazzo, 2007, 2011) and discusses the role SNS providers play in administering citizenship rights. The chapter takes a qualitative case study approach.
Findings
Facebook, Twitter and Google have not only made clear commitments to act responsibly, they actually enhance the citizenship status of their users in many ways, e.g. by offering a platform for democracy activists. Deficiencies and contradictions also become visible, e.g. SNS providers inhibit citizenship by failing to provide sufficient privacy protection.
Research limitations/implications
The chapter is limited by its case study approach, but provides valuable insights to an industry with considerable influence. It contributes to CSR research by applying and testing the politicized concept of CSR in the context of SNS providers.
Originality/value
Although SNS have received appraisal as effective tools of CSR communication, there has been little attention to CSR policy and practice of the companies providing social networks. This is unfortunate since the activities of SNS providers directly impact on millions of users worldwide.
Details
Keywords
FR. Oswald A. J. Mascarenhas, S.J.
This chapter covers basic concepts, ethical theories, and moral paradigms of corporate ethics for identifying, understanding, and responding to the turbulent market challenges of…
Abstract
Executive Summary
This chapter covers basic concepts, ethical theories, and moral paradigms of corporate ethics for identifying, understanding, and responding to the turbulent market challenges of today. The concept, nature, and domain of ethics, business ethics, managerial ethics, and corporate executive ethics are defined and differentiated for their significance. The domain, scope, and nature of related concepts such as legality, ethicality, morality, and executive spirituality are distinguished and developed. Among normative and descriptive ethical theories that we briefly review and critique here are teleology or utilitarianism, deontology or existentialism, distributive justice, corrective justice, and ethics of malfeasance and beneficence. Other moral theories of ethics such as ethics of human dignity, ethics of cardinal virtues, ethics of trusting relations, ethics of stakeholder rights and duties, ethics of moral reasoning and judgment calls, ethics of executive and moral leadership, and ethics of social and moral responsibility will be treated in a later book. The thrust of this book is positive: despite our not very commendable track record in managing this planet and its resources, our basic questions are: Where are we now? What are we now? Where should we as corporations go, and why? What are the specific positive mandates and metrics to corporate executives to reach that desired destiny? This chapter explores responses to these strategic corporate questions.
With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology…
Abstract
Purpose
With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology. Researchers and practitioners submit the need to inspect: how technology and ethics interact, how ethical principles regulate technology and what could be the probable future course of action to execute techno-ethical practices in a socio-technical discourse effectively. To address the thoughts related to techno-ethics, the authors of the present study conducted exploratory research to understand the trend and relevance of technology ethics since its inception.
Design/methodology/approach
The study collected over 679 documents for the period 1990–2022 from the Scopus database. A quantitative approach of bibliometric analysis was conducted to study the pattern of authorship, publications, citations, prominent journals and contributors in the subject area. VOS viewer software was utilized to visualize and map academic performance in techno-ethics.
Findings
The findings revealed that the concept of techno-ethics is an emerging field and requires more investigation to harness its relevance with everchanging technology development. The data revealed substantial growth in the field of techno-ethics in humanities, social science and management domain in the last two decades. Also, most of the prominent cited references and documents in the database tend to cover the theme of Artificial Intelligence, Big data, computer ethics, morality, decision-making, IT ethics, human rights, responsibility and privacy.
Originality/value
The article provides a comprehensive overview of scientific production and main research trends in techno-ethics until 2022. The study is a pioneer in expanding the academic productivity and performance of embedding ethics in technology.
Details
Keywords
Stephy K. Sunny and K. Ramasamy
The study aimed to assess the digital literacy skills of the students of Sacred Heart College, Chalakudy, to know whether they possess the digital literacy skills to perform well…
Abstract
Purpose
The study aimed to assess the digital literacy skills of the students of Sacred Heart College, Chalakudy, to know whether they possess the digital literacy skills to perform well in the digital environment. The study also analyzed how digital literacy skills were affected by various factors.
Design/methodology/approach
The study used stratified random sampling technique, and data were collected through a self-assessment survey using an online questionnaire designed based on DigComp 2.1: The Digital Competence Framework by the European Commission.
Findings
The results indicated that the college students needed training on digital literacy skills, as the majority students had only moderate to low digital literacy skills. It was proven that exposure to technology and the Internet will not necessarily yield skills to perform well in the digital environment. Also, digital literacy skills were not affected by various factors like age, level of study, etc.
Practical implications
The study helped to identify the digital literacy deficiencies in the students of Sacred Heart College, and it can serve as a valuable model for conducting similar investigations in diverse educational institutions. Conducting such studies offers institutions valuable insights, enabling them to create and implement personalized digital literacy training programs that can enhance students' abilities to navigate the digital landscape with proficiency and effectiveness. The study results can be insightful for educators, policymakers and the Kerala Government to reassess the current approaches and design an effective curriculum for integrating technology in education.
Originality/value
Although there are several studies that evaluated college students’ digital literacy in India and other countries, there are very few studies in the context of Kerala. Therefore, this study is distinctive and will serve as an example for all such studies in the future.
Details