Search results

21 – 30 of 60
Content available
Article
Publication date: 1 April 2001

Stuart Hannabuss

290

Abstract

Details

Library Hi Tech News, vol. 18 no. 4
Type: Research Article
ISSN: 0741-9058

Content available
Article
Publication date: 1 January 2006

Ranulph Glanville

44

Abstract

Details

Kybernetes, vol. 35 no. 1/2
Type: Research Article
ISSN: 0368-492X

Book part
Publication date: 27 November 2014

Julia Crouse Waddell, Caitlin McLaughlin, Robert LaRose, Nora Rifon and Christina Wirth-Hawkins

The purpose of this research was to utilize protection motivation theory, which states that individuals will take actions to protect themselves from threats when they have both…

Abstract

Purpose

The purpose of this research was to utilize protection motivation theory, which states that individuals will take actions to protect themselves from threats when they have both knowledge of actions that will protect them from the threat and the motivation to do so, to develop a better way of training adolescents to be safe on the Internet.

Design/methodology/approach

This study utilized an experimental approach in a high school environment to test its hypotheses. Participants were split into two groups: a group who received a tutorial about how to stay safe on the Internet (an enactive mastery tutorial that allowed students to actually try out the skills they were learning) and a group who did not receive the training. Participants were then asked about their intentions to engage in protective behaviors, their perceived ability to do so, and the likelihood that these protective behaviors would help them to stay safer on the Internet.

Findings

The findings indicated that an enactive mastery training program increased intentions to engage in safe online behavior in the future, offering a foundation for the development of future theory-based online safety interventions.

Research limitations/implications

This study was conducted in a small geographic region in schools that agreed to utilize a class period to test the enactive mastery tutorial, which limits its external validity. Furthermore, this study only measured intentions to engage in protective behaviors, not actual behaviors.

Practical implications

This research provides a guideline for an effective way of increasing the likelihood that adolescents will engage in protective behaviors online, which has great practical applications for teachers, administrators, PSA advertisers, etc.

Originality/value

This chapter provides a framework for creating programs to help adolescents engage in safer behavior. Furthermore, it introduces the idea of involvement to the protection motivation theory literature, which is a valuable variable to consider when determining how to create an effective campaign to change behavior.

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78350-629-3

Keywords

Book part
Publication date: 28 July 2014

Theresa Bauer

Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance…

Abstract

Purpose

Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance. This development along with the growing power of SNS providers calls for an investigation of the CSR engagement of SNS companies. The chapter examines to what extent three prominent providers – Google, Facebook and Twitter – fulfill their responsibilities.

Methodology/approach

The chapter draws heavily on a politicized concept of CSR, namely ‘corporate citizenship’ (Crane, Matten, & Moon, 2008a; Matten & Crane, 2005) and ‘political CSR’ (Scherer & Palazzo, 2007, 2011) and discusses the role SNS providers play in administering citizenship rights. The chapter takes a qualitative case study approach.

Findings

Facebook, Twitter and Google have not only made clear commitments to act responsibly, they actually enhance the citizenship status of their users in many ways, e.g. by offering a platform for democracy activists. Deficiencies and contradictions also become visible, e.g. SNS providers inhibit citizenship by failing to provide sufficient privacy protection.

Research limitations/implications

The chapter is limited by its case study approach, but provides valuable insights to an industry with considerable influence. It contributes to CSR research by applying and testing the politicized concept of CSR in the context of SNS providers.

Originality/value

Although SNS have received appraisal as effective tools of CSR communication, there has been little attention to CSR policy and practice of the companies providing social networks. This is unfortunate since the activities of SNS providers directly impact on millions of users worldwide.

Details

Communicating Corporate Social Responsibility: Perspectives and Practice
Type: Book
ISBN: 978-1-78350-796-2

Keywords

Open Access
Article
Publication date: 24 May 2023

Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens and Malcolm Ryan

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity…

2347

Abstract

Purpose

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity professionals, the authors conducted a study to uncover profiles of human factors that influence which ethical principles are valued highest following exposure to ethical dilemmas presented in a cybersecurity game.

Design/methodology/approach

The authors’ game first sensitises players (cybersecurity trainees) to five cybersecurity ethical principles (beneficence, non-maleficence, justice, autonomy and explicability) and then allows the player to explore their application in multiple cybersecurity scenarios. After playing the game, players rank the five ethical principles in terms of importance. A total of 250 first-year cybersecurity students played the game. To develop profiles, the authors collected players' demographics, knowledge about ethics, personality, moral stance and values.

Findings

The authors built models to predict the importance of each of the five ethical principles. The analyses show that, generally, the main driver influencing the priority given to specific ethical principles is cultural background, followed by the personality traits of extraversion and conscientiousness. The importance of the ingroup was also a prominent factor.

Originality/value

Cybersecurity professionals need to understand the impact of users' ethical choices. To provide ethics training, the profiles uncovered will be used to build artificially intelligent (AI) non-player characters (NPCs) to expose the player to multiple viewpoints. The NPCs will adapt their training according to the predicted players’ viewpoint.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 1 November 2003

R A Spinello

According to its supporters open source software is more secure and reliable than proprietary code, and even tends to foster more innovation. Its technical superiority can be…

Abstract

According to its supporters open source software is more secure and reliable than proprietary code, and even tends to foster more innovation. Its technical superiority can be linked to the ongoing peer review process which typifies the open source model. In addition, programs such as Linux offer a potential challenge to the hegemony of Microsoft. Open source holds out the possibility of restraining platform leaders such as Microsoft from acting opportunistically. Some even argue that the open source code model is ethically superior to the proprietary model because of its transparency. Given these economic and social benefits, should government policy makers intervene, by tilting the playing field to open source programs? Would such government intervention truly be welfare‐enhancing? Before answering that question we note that some of the presumed technical and economic benefits of open source software are open to question. At the same time, the claims of moral superiority or social desirability are inflated and discount incentives necessary for software development. But even if this software were technically and morally superior, there is still no basis for government intervention. Our position is simple: the invisible hand of the market and not the visible hand of government should decide the fate of open source code. There is no identifiable market failure for the government to fix nor is there any plausible policy justification for giving open source software preferential treatment.

Details

Journal of Information, Communication and Ethics in Society, vol. 1 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 May 2006

F. S. Grodzinsky, K. Miller and M. J. Wolf

We contend that software developers have an ethical responsibility to strive for reliable software. We base that obligation on long standing engineering traditions that place the…

Abstract

We contend that software developers have an ethical responsibility to strive for reliable software. We base that obligation on long standing engineering traditions that place the public good as a central tenant and on the professional relationship between a software developer and the users of the software developed.

Details

Journal of Information, Communication and Ethics in Society, vol. 4 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 April 2004

Sonja Petrovic‐Lazarevic and Amrik S. Sohal

Electronic business is based on using computers and networks in all aspects of business. This new business concept is developing its own culture, which faces many ethical…

6020

Abstract

Electronic business is based on using computers and networks in all aspects of business. This new business concept is developing its own culture, which faces many ethical dilemmas. One is the role of the chief information officer (CIO). As a leader of information technology application in the organisation, the CIO's ethical behaviour influences the ethics of the electronic business culture in the organisation. In electronic business both the chief executive officer (CEO) and the CIO are responsible for the organisational culture. That is, the CIO has capabilities for reasoning, forming values and making information decisions that contributes to creating corporate core values. From an employee's perspective the CIO is treated as the employer. But being employed by the organisation in a similar way to the rest of the employees, the CIO can also be treated as an employee of the organisation. This duality in the role of CIO causes ethical dilemmas that may be solved through establishing ethical codes that are based on existing global ethical codes. Explores the nature of ethical dilemmas related to e‐business and proposes possible solutions, drawing on information from case studies of two Australian companies.

Details

Information Management & Computer Security, vol. 12 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 28 February 2005

David H. Gleason and Lawrence Friedman

This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management…

Abstract

This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management of cyberspace, and to hold accountable the parties responsible for those decisions, whether the responsible party is a government actor, market actor or private individual. The authors argue that the Open Systems Interconnection (OSI) model, with certain modifications, should serve as a primary educational tool in helping individuals to gain the understanding of ICT necessary to protect public interests related to cyberspace.

Details

Journal of Information, Communication and Ethics in Society, vol. 3 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 13 November 2009

Wanjira Kinuthia

While there is significant existing literature on learner analysis in instructional design and separately in cultural issues in education, these two areas are rarely examined in…

848

Abstract

Purpose

While there is significant existing literature on learner analysis in instructional design and separately in cultural issues in education, these two areas are rarely examined in tandem. This paper aims to bring these two areas together.

Design/methodology/approach

This research uses qualitative methods within the context of a case study. A dual role is played by the author as instructor‐researcher in gathering and analyzing the data.

Findings

One area of success in the course is that it served to increase the coverage of the area of instructional design in addition to expanding the literature base in this area of study that has only recently begun to receive attention.

Research limitations/implications

One limitation of the course is that while it is designed to provide a blended mix of learning opportunities, the instructional design field is quite large and it is impossible to explore all relevant topics.

Practical implications

A challenge of the course is that socio‐cultural concepts are broad and it is recognized that a single course is not enough to effectively cover all relevant issues. Careful course design is therefore important.

Originality/value

Feedback from this study can serve as a resource for decision making about existing and additional courses, and specific content that could be incorporated into similar courses.

Details

Multicultural Education & Technology Journal, vol. 3 no. 4
Type: Research Article
ISSN: 1750-497X

Keywords

21 – 30 of 60