Search results

1 – 5 of 5
Open Access
Article
Publication date: 15 June 2023

Aderinola Ololade Dunmade and Adeyinka Tella

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

1162

Abstract

Purpose

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

Design/methodology/approach

Using content analysis and a review of relevant literature, this study examines the challenges that librarians face in enforcing cyberethics and highlights the strategies that libraries can adopt to promote responsible online behaviour.

Findings

This paper identifies the lack of awareness among postgraduate students regarding cybersecurity risks and the need for training and resources for librarians as key challenges in promoting cyberethics.

Originality/value

This study recommends that libraries provide access to training resources and develop policies and guidelines to promote cyberethics among postgraduate students. Overall, this paper argues that libraries and librarians can play a critical role in promoting responsible online behaviour and ensuring the safety and security of postgraduate students in Nigeria.

Article
Publication date: 3 March 2023

Tahani Al-Khatib

This study aims to investigate the trending term: “Netiquette” as an important element in the effective digital citizenship. The research suggests a systematic framework of…

Abstract

Purpose

This study aims to investigate the trending term: “Netiquette” as an important element in the effective digital citizenship. The research suggests a systematic framework of netiquette rules in the field of online education based on the classical core rules of netiquette and according to the digital citizenship scale (DCS). The research also studies the corresponding responsibilities of both educators and students to raise awareness towards using technology in a balanced, safe, smart and ethical way as the shift towards the digital activities increased significantly in the post-corona time.

Design/methodology/approach

The research used the qualitative data that were based on the everyday observation and analysis of the online education experience at the university of Jordan in the academic year 2020/2021; the online group discussions of students and teachers; and investigating the guidelines of the online learning netiquette rules in various academic institutes. Comparative analysis was conducted to merge and eliminate redundant rules and to add sub rules, and then to cluster them into groups. The suggested clustered groups were distributed into the classical core rules outline of netiquette. In each core rule, the sub rules were reclassified and recategorized according to the DCS by studying the complexity levels and their corresponding factors. The suggested framework updates and adds DCS levels and factors considering the exceptional experience of online education through the pandemic.

Findings

The research finds that “Netiquette” had been neglected in cyber ethics literature, and so it has to be rediscovered through the lens of digital citizenship that becomes very noticeable issue in the post-COVID era. So, the research presents a systematic framework that outlines more than 150 netiquette sub rules in the field of online education, and that were clustered according to DCS and the classical core rules of netiquette. It also adds a new factor to the bottom level of DCS which is the primarily skills and traits, and also updates the internet and political activism fac-tor by adding the social perspective.

Originality/value

A novel classification of the classical core rules of netiquette was proposed in the field of online education to serve as a spectrum of identifying the complexity of digital citizenship levels and factors. This research can be a starting point of more works on netiquette research in online education and on other fields such as online business meetings, social media networking and online gaming.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 24 May 2023

Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens and Malcolm Ryan

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity…

1551

Abstract

Purpose

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity professionals, the authors conducted a study to uncover profiles of human factors that influence which ethical principles are valued highest following exposure to ethical dilemmas presented in a cybersecurity game.

Design/methodology/approach

The authors’ game first sensitises players (cybersecurity trainees) to five cybersecurity ethical principles (beneficence, non-maleficence, justice, autonomy and explicability) and then allows the player to explore their application in multiple cybersecurity scenarios. After playing the game, players rank the five ethical principles in terms of importance. A total of 250 first-year cybersecurity students played the game. To develop profiles, the authors collected players' demographics, knowledge about ethics, personality, moral stance and values.

Findings

The authors built models to predict the importance of each of the five ethical principles. The analyses show that, generally, the main driver influencing the priority given to specific ethical principles is cultural background, followed by the personality traits of extraversion and conscientiousness. The importance of the ingroup was also a prominent factor.

Originality/value

Cybersecurity professionals need to understand the impact of users' ethical choices. To provide ethics training, the profiles uncovered will be used to build artificially intelligent (AI) non-player characters (NPCs) to expose the player to multiple viewpoints. The NPCs will adapt their training according to the predicted players’ viewpoint.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 11 May 2023

Shivangi Verma and Naval Garg

With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology…

Abstract

Purpose

With the growth and profound influence of technology on our life, it is important to address the ethical issues inherent to the development and deployment of technology. Researchers and practitioners submit the need to inspect: how technology and ethics interact, how ethical principles regulate technology and what could be the probable future course of action to execute techno-ethical practices in a socio-technical discourse effectively. To address the thoughts related to techno-ethics, the authors of the present study conducted exploratory research to understand the trend and relevance of technology ethics since its inception.

Design/methodology/approach

The study collected over 679 documents for the period 1990–2022 from the Scopus database. A quantitative approach of bibliometric analysis was conducted to study the pattern of authorship, publications, citations, prominent journals and contributors in the subject area. VOS viewer software was utilized to visualize and map academic performance in techno-ethics.

Findings

The findings revealed that the concept of techno-ethics is an emerging field and requires more investigation to harness its relevance with everchanging technology development. The data revealed substantial growth in the field of techno-ethics in humanities, social science and management domain in the last two decades. Also, most of the prominent cited references and documents in the database tend to cover the theme of Artificial Intelligence, Big data, computer ethics, morality, decision-making, IT ethics, human rights, responsibility and privacy.

Originality/value

The article provides a comprehensive overview of scientific production and main research trends in techno-ethics until 2022. The study is a pioneer in expanding the academic productivity and performance of embedding ethics in technology.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 9 May 2023

Magnus Osahon Igbinovia and Bolanle Clifford Ishola

Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this…

Abstract

Purpose

Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this menace. Consequently, this study aims to examine cyber security in university libraries and its implication for Library and Information Science education.

Design/methodology/approach

The study adopted descriptive research design, while questionnaire and interview were used to elicit data from library personnel and heads of library schools, respectively. A total of 134 responses were elicited through structured questionnaire (administered online due to the closure of universities) while six heads of library schools were interviewed, one from each of the six geopolitical zones in Nigeria.

Findings

The data from the questionnaire which were descriptively analysed revealed that the perceived knowledge of cyber security among the librarians was moderately low. Also, the university libraries were exposed to various cyber threats, with cyber security/guideline been one of the critical measures to combat cybercrime. Also, the result showed that librarians displayed high level of adherence to cyber ethics. However, the disposition of library management towards cyber security issues was revealed to be the main challenge to the deployment of cyber security in university libraries, follow by poor password management. Majority of the librarians possess basic knowledge of cyber security, though with serious interest to learn more about it. They were not taught cyber security in library school and they indicated enthusiasm to learn about it. The result of the interview with heads of library schools showed majority of these schools do not offer cyber security course due to dearth in skilled manpower.

Originality/value

The study presents cybercrime as a menace, if not tackled, would affect the university libraries’ sustainability as information institution, compromising their ability to deliver quality services.

Details

Digital Library Perspectives, vol. 39 no. 3
Type: Research Article
ISSN: 2059-5816

Keywords

1 – 5 of 5