Search results

1 – 10 of over 1000
Book part
Publication date: 3 June 2008

Sunwoong Kim

The basic structure of Korea's formal education system is 6-3-3-4. This school system, which was established soon after its independence from Japan after World War II, has not…

Abstract

The basic structure of Korea's formal education system is 6-3-3-4. This school system, which was established soon after its independence from Japan after World War II, has not been changed very much until recently. Primary education covers grades 1–6. Kindergarten has not been a part of the official school system until now, although making it a part of the pubic school system has been under discussion for some years. In the secondary education sector, there are two levels of schools: middle schools covering grades 7–9, and high schools covering grades 10–12. After 12 years of formal education, students advance to higher education. Typically, undergraduate degree (B.A. or B.S.) takes four years.

Details

The Worldwide Transformation of Higher Education
Type: Book
ISBN: 978-0-7623-1487-4

Book part
Publication date: 22 August 2022

Andy Phippen and Emma Bond

The COVID-19 pandemic has driven universities to deliver education online, making use of digital platforms for both formal and informal learning. This move has accelerated…

Abstract

The COVID-19 pandemic has driven universities to deliver education online, making use of digital platforms for both formal and informal learning. This move has accelerated concerns regarding institutions’ capabilities to protect students from online abuse and support those who fall victim to its many forms. Empirical data drawn from UK universities prior to the pandemic highlight the lack of policy and practice across the university sector around both awareness of, and support from, online abuse among the student body. Further concerns during the pandemic, which highlight failures not just of safeguarding policy, but cybersecurity practice, demonstrate the need for universities to not only recognise their duty of care regarding student welfare but also to provide training and education for all, making use of online and hybrid higher education.

Details

The Emerald Handbook of Higher Education in a Post-Covid World: New Approaches and Technologies for Teaching and Learning
Type: Book
ISBN: 978-1-80382-193-1

Keywords

Book part
Publication date: 29 December 2004

Joan C. Durrance

Libraries and librarians have long been early adopters of information technologies. For decades, librarians have applied computerization to library operations. Standardization and…

Abstract

Libraries and librarians have long been early adopters of information technologies. For decades, librarians have applied computerization to library operations. Standardization and computerization of bibliographic records decades ago made possible automation of library systems, the creation and utilization of giant bibliographic utilities such as OCLC with its 52 million records. Collaborative adoption of information technologies decades ago brought shared cataloging, on-line public access catalogs, bibliographic databases, enhanced interlibrary loan and document delivery, and acquisition of information in digital formats, resulting in worldwide access to library resources. Nonetheless the revolution in information technologies that produced the World Wide Web in the mid-1990s hit the information profession of librarianship and the educational establishment like an earthquake.

Details

Advances in Librarianship
Type: Book
ISBN: 978-1-84950-005-0

Content available
Book part
Publication date: 2 May 2007

Abstract

Details

Cross-Cultural Buyer Behavior
Type: Book
ISBN: 978-1-84950-485-0

Book part
Publication date: 17 September 2014

Dania Bilal and Valerie Jopeck

To identify research work on Information and Communication Technology (ICT) in the context of young girls’ affective responses to access and use of ICT in developing countries.

Abstract

Purpose

To identify research work on Information and Communication Technology (ICT) in the context of young girls’ affective responses to access and use of ICT in developing countries.

Methodology/approach

A literature search covering the period from early 1990s to date in fields of information science, human–computer interaction, ICT, and educational technologies was performed using relevant databases and Google Scholar. Related literature in the context of specific theoretical frameworks was retrieved and analyzed.

Findings

Abundant research exists on ICT in developing countries. However, little empirical work was found on young girls’ affective responses to access and use of ICT. The gendered digital divide in relation to ICT showed differing perspectives on this issue. Generally, affective information behavior is much less observed in empirical research than the cognitive behavior, regardless of age, gender, or culture.

Practical implications

Young girls’ affective responses to access and use of ICT in these countries warrant additional research in this area of study. Findings from research on youth information behavior in Western countries may have little or no bearings on youth in developing countries. The study of young girls’ access and use of ICT in developing countries should account for cultural, socioeconomic, and institutional differences among countries and between societies or communities in a given developing country.

Originality/value

Minimal research exists on young girls’ affective responses to accessing and using ICT in developing countries. The literature review covered in this chapter is grounded in theoretical frameworks derived from varied disciplines, including the field of library and information science.

Details

New Directions in Children’s and Adolescents’ Information Behavior Research
Type: Book
ISBN: 978-1-78350-814-3

Keywords

Book part
Publication date: 14 December 2023

Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…

Abstract

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.

In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.

In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.

Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.

Book part
Publication date: 28 September 2023

Ieva Auzina, Tatjana Volkova, Diego Norena-Chavez, Marta Kadłubek and Eleftherios Thalassinos

There is a research gap in the explanation of cyber incident response approaches in management to increase cyber maturity for small–medium-size enterprises (SMEs). Therefore…

Abstract

There is a research gap in the explanation of cyber incident response approaches in management to increase cyber maturity for small–medium-size enterprises (SMEs). Therefore, based on the literature analysis, the chapter aims to (1) provide cyber incident response characteristics, (2) show the importance for SMEs, (3) identify cyber incident response feasibility and causal factors, (4) provide scenarios for consideration to create an incident response plan (IRP), and (5) discuss the cyber incident response and managerial approaches in SMEs. The authors used content analysis of scientific and professional articles to develop the theoretical foundation of incident response approaches in management for SMEs. The authors start from the fundamentals to obtain knowledge and understanding of the latest threats and opportunities, and how to defend themselves using the limited capacity of resources might be the starting point to building an extensive incident response capability. Incident response capabilities and maturity levels vary widely between various organisations. There is no simple one-size-fits-all process for incident response; each case is unique and requires continuous refinement. Differentiation and adaptation to different types of SMEs are pivotal to developing cyber maturity and defining requirements that fit the market’s needs and are therefore more efficient in achieving the goal of increasing cyber security (CS) among business management. SMEs may not have a mature IRP, but at least one readiness indicator could lead to the preparation of a mature IRP. Implementation of the secure undertakings and information processes requires using modern information and communication technologies, incident response processes, and other modules that could enhance support for decision-making processes in management. The approach requires a systematic approach to issues related to constructing these solutions. The authors highlight that building efficient incident response approaches in management to improve cyber maturity will begin with infrastructure and people factors.

Details

Digital Transformation, Strategic Resilience, Cyber Security and Risk Management
Type: Book
ISBN: 978-1-80455-254-4

Keywords

Book part
Publication date: 27 January 2012

Robin M. Kowalski, Gary W. Giumetti, Amber N. Schroeder and Heather H. Reese

Although media and research accounts of cyber bullying suggest this misbehavior is localized primarily among middle school students, and that its frequency decreases with age…

Abstract

Although media and research accounts of cyber bullying suggest this misbehavior is localized primarily among middle school students, and that its frequency decreases with age, this chapter presents empirical data showing that cyber bullying occurs with considerable frequency among college students across multiple domains of life, specifically school and work. In Study 1, 28 male and 82 female undergraduate students completed a survey examining their online activities as well as their experiences with cyber bullying. Over 30% of the participants indicated that their first experience with cyber bullying was in college. No gender differences were observed with regard to victimization or perpetration, except with online gaming where males reported a higher rate of victimization than females. With regard to personality differences among victims and perpetrators, victims were lower in agreeableness than non-victims. Study 2 examined the prevalence of cyber bullying among 107 college students at work, as well as the negative outcomes linked to the experience of workplace cyber bullying. Nearly a third of the college student sample reported having been the target of cyber bullying within the past six months. Individuals in jobs in which the Internet is essential and racial minorities reported higher rates of cyber bullying at work. Additionally, cyber bullying was positively linked to several negative emotions, as well as burnout and job search effort. These findings have important implications not only for potential negative outcomes that college students may be facing at school and at work but also for organizational justice issues, as differential treatment at work can lead to lawsuits and other negative work outcomes.

Details

Misbehavior Online in Higher Education
Type: Book
ISBN: 978-1-78052-456-6

Book part
Publication date: 14 December 2023

Fevziye Bekar and M. Ferhat Özbek

Today, changing business systems, especially the COVID-19 epidemic, and the rapid development of technology have brought the phenomenon of spirituality to a new point. Cyber…

Abstract

Today, changing business systems, especially the COVID-19 epidemic, and the rapid development of technology have brought the phenomenon of spirituality to a new point. Cyber spirituality and dataism are also starting to become the focus of attention in this field. This situation also affects the issue of spirituality in the workplace. While the subject of spirituality in the workplace keeps up with innovations and expands in the literature, the relationship between religion and spirituality continues to be discussed and examined. For this reason, this study aims primarily to explain the relationship between the concept of religion and spirituality. In light of current developments, it is to mention the place of spirituality in the workplace between these two concepts.

Details

Spirituality Management in the Workplace
Type: Book
ISBN: 978-1-83753-450-0

Keywords

Book part
Publication date: 19 July 2022

Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Sanjay Kumar and Sandeep Lal

Purpose: A cyber insurance policy’s purpose is to help in the recovering of a person or corporation following a cyber breach and to compensate for civil suit expenses stemming…

Abstract

Purpose: A cyber insurance policy’s purpose is to help in the recovering of a person or corporation following a cyber breach and to compensate for civil suit expenses stemming from first- and third-party responsibility claims.

Methodology: The usage of cybersecurity spending has forecast a variety of security categories using F&S projection methodology. Each of these is suited to the end-user organisations of in-scope security mechanisms, as well as the particular market circumstances. Critical national infrastructure (CNI), immigration control, big events, first responding, executive branch, infrastructure, and transportation security are among the worldwide forecast categories. This segmentation is further subdivided into 16 subsegments, each with its own security forecasting system. F&S protection marketplaces are anticipated using a bottom-up technique for each nation, which adds up to worldwide market penetration. This covers 177 nations spread throughout seven zones.

Findings: The cybersecurity insurer industry was valued at USD 7.36 billion in 2020 and is predicted to be worth USD 27.83 billion by 2026, growing at a compound annual growth rate (CAGR) of 24.30% during the forecast time frame (2021–2026). The expanding use of digitalisation innovations such as the cloud, big data, mobile computing, internet of things (IoT), and artificial intelligence (AI) across more lines of employment and society, as well as improved connectivity, have enhanced the burden of already overburdened information technology (IT) staff.

Practical implications: Accepted the innovative Insurance Data Security Model Law (#668), which necessitates insurance providers and other agencies registered by government insurance agencies to advance, integrate, and establish an information security management system; start investigating any cybersecurity events; and advise the private insurance superintendent of such happenings. Too far, the approach has been embraced by governorates.

Details

Big Data: A Game Changer for Insurance Industry
Type: Book
ISBN: 978-1-80262-606-3

Keywords

1 – 10 of over 1000