Search results
21 – 30 of 60Julia Crouse Waddell, Caitlin McLaughlin, Robert LaRose, Nora Rifon and Christina Wirth-Hawkins
The purpose of this research was to utilize protection motivation theory, which states that individuals will take actions to protect themselves from threats when they have both…
Abstract
Purpose
The purpose of this research was to utilize protection motivation theory, which states that individuals will take actions to protect themselves from threats when they have both knowledge of actions that will protect them from the threat and the motivation to do so, to develop a better way of training adolescents to be safe on the Internet.
Design/methodology/approach
This study utilized an experimental approach in a high school environment to test its hypotheses. Participants were split into two groups: a group who received a tutorial about how to stay safe on the Internet (an enactive mastery tutorial that allowed students to actually try out the skills they were learning) and a group who did not receive the training. Participants were then asked about their intentions to engage in protective behaviors, their perceived ability to do so, and the likelihood that these protective behaviors would help them to stay safer on the Internet.
Findings
The findings indicated that an enactive mastery training program increased intentions to engage in safe online behavior in the future, offering a foundation for the development of future theory-based online safety interventions.
Research limitations/implications
This study was conducted in a small geographic region in schools that agreed to utilize a class period to test the enactive mastery tutorial, which limits its external validity. Furthermore, this study only measured intentions to engage in protective behaviors, not actual behaviors.
Practical implications
This research provides a guideline for an effective way of increasing the likelihood that adolescents will engage in protective behaviors online, which has great practical applications for teachers, administrators, PSA advertisers, etc.
Originality/value
This chapter provides a framework for creating programs to help adolescents engage in safer behavior. Furthermore, it introduces the idea of involvement to the protection motivation theory literature, which is a valuable variable to consider when determining how to create an effective campaign to change behavior.
Details
Keywords
Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance…
Abstract
Purpose
Social networking sites (SNS) are enjoying growing popularity and have triggered new ethical issues including risks of deception, social grooming, cyber-bullying and surveillance. This development along with the growing power of SNS providers calls for an investigation of the CSR engagement of SNS companies. The chapter examines to what extent three prominent providers – Google, Facebook and Twitter – fulfill their responsibilities.
Methodology/approach
The chapter draws heavily on a politicized concept of CSR, namely ‘corporate citizenship’ (Crane, Matten, & Moon, 2008a; Matten & Crane, 2005) and ‘political CSR’ (Scherer & Palazzo, 2007, 2011) and discusses the role SNS providers play in administering citizenship rights. The chapter takes a qualitative case study approach.
Findings
Facebook, Twitter and Google have not only made clear commitments to act responsibly, they actually enhance the citizenship status of their users in many ways, e.g. by offering a platform for democracy activists. Deficiencies and contradictions also become visible, e.g. SNS providers inhibit citizenship by failing to provide sufficient privacy protection.
Research limitations/implications
The chapter is limited by its case study approach, but provides valuable insights to an industry with considerable influence. It contributes to CSR research by applying and testing the politicized concept of CSR in the context of SNS providers.
Originality/value
Although SNS have received appraisal as effective tools of CSR communication, there has been little attention to CSR policy and practice of the companies providing social networks. This is unfortunate since the activities of SNS providers directly impact on millions of users worldwide.
Details
Keywords
Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens and Malcolm Ryan
Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity…
Abstract
Purpose
Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity professionals, the authors conducted a study to uncover profiles of human factors that influence which ethical principles are valued highest following exposure to ethical dilemmas presented in a cybersecurity game.
Design/methodology/approach
The authors’ game first sensitises players (cybersecurity trainees) to five cybersecurity ethical principles (beneficence, non-maleficence, justice, autonomy and explicability) and then allows the player to explore their application in multiple cybersecurity scenarios. After playing the game, players rank the five ethical principles in terms of importance. A total of 250 first-year cybersecurity students played the game. To develop profiles, the authors collected players' demographics, knowledge about ethics, personality, moral stance and values.
Findings
The authors built models to predict the importance of each of the five ethical principles. The analyses show that, generally, the main driver influencing the priority given to specific ethical principles is cultural background, followed by the personality traits of extraversion and conscientiousness. The importance of the ingroup was also a prominent factor.
Originality/value
Cybersecurity professionals need to understand the impact of users' ethical choices. To provide ethics training, the profiles uncovered will be used to build artificially intelligent (AI) non-player characters (NPCs) to expose the player to multiple viewpoints. The NPCs will adapt their training according to the predicted players’ viewpoint.
Details
Keywords
According to its supporters open source software is more secure and reliable than proprietary code, and even tends to foster more innovation. Its technical superiority can be…
Abstract
According to its supporters open source software is more secure and reliable than proprietary code, and even tends to foster more innovation. Its technical superiority can be linked to the ongoing peer review process which typifies the open source model. In addition, programs such as Linux offer a potential challenge to the hegemony of Microsoft. Open source holds out the possibility of restraining platform leaders such as Microsoft from acting opportunistically. Some even argue that the open source code model is ethically superior to the proprietary model because of its transparency. Given these economic and social benefits, should government policy makers intervene, by tilting the playing field to open source programs? Would such government intervention truly be welfare‐enhancing? Before answering that question we note that some of the presumed technical and economic benefits of open source software are open to question. At the same time, the claims of moral superiority or social desirability are inflated and discount incentives necessary for software development. But even if this software were technically and morally superior, there is still no basis for government intervention. Our position is simple: the invisible hand of the market and not the visible hand of government should decide the fate of open source code. There is no identifiable market failure for the government to fix nor is there any plausible policy justification for giving open source software preferential treatment.
Details
Keywords
F. S. Grodzinsky, K. Miller and M. J. Wolf
We contend that software developers have an ethical responsibility to strive for reliable software. We base that obligation on long standing engineering traditions that place the…
Abstract
We contend that software developers have an ethical responsibility to strive for reliable software. We base that obligation on long standing engineering traditions that place the public good as a central tenant and on the professional relationship between a software developer and the users of the software developed.
Details
Keywords
Sonja Petrovic‐Lazarevic and Amrik S. Sohal
Electronic business is based on using computers and networks in all aspects of business. This new business concept is developing its own culture, which faces many ethical…
Abstract
Electronic business is based on using computers and networks in all aspects of business. This new business concept is developing its own culture, which faces many ethical dilemmas. One is the role of the chief information officer (CIO). As a leader of information technology application in the organisation, the CIO's ethical behaviour influences the ethics of the electronic business culture in the organisation. In electronic business both the chief executive officer (CEO) and the CIO are responsible for the organisational culture. That is, the CIO has capabilities for reasoning, forming values and making information decisions that contributes to creating corporate core values. From an employee's perspective the CIO is treated as the employer. But being employed by the organisation in a similar way to the rest of the employees, the CIO can also be treated as an employee of the organisation. This duality in the role of CIO causes ethical dilemmas that may be solved through establishing ethical codes that are based on existing global ethical codes. Explores the nature of ethical dilemmas related to e‐business and proposes possible solutions, drawing on information from case studies of two Australian companies.
Details
Keywords
David H. Gleason and Lawrence Friedman
This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management…
Abstract
This paper addresses the knowledge required for individuals to evaluate Information and Communications Technologies (ICT) decisions that relate to the organization and management of cyberspace, and to hold accountable the parties responsible for those decisions, whether the responsible party is a government actor, market actor or private individual. The authors argue that the Open Systems Interconnection (OSI) model, with certain modifications, should serve as a primary educational tool in helping individuals to gain the understanding of ICT necessary to protect public interests related to cyberspace.
Details
Keywords
While there is significant existing literature on learner analysis in instructional design and separately in cultural issues in education, these two areas are rarely examined in…
Abstract
Purpose
While there is significant existing literature on learner analysis in instructional design and separately in cultural issues in education, these two areas are rarely examined in tandem. This paper aims to bring these two areas together.
Design/methodology/approach
This research uses qualitative methods within the context of a case study. A dual role is played by the author as instructor‐researcher in gathering and analyzing the data.
Findings
One area of success in the course is that it served to increase the coverage of the area of instructional design in addition to expanding the literature base in this area of study that has only recently begun to receive attention.
Research limitations/implications
One limitation of the course is that while it is designed to provide a blended mix of learning opportunities, the instructional design field is quite large and it is impossible to explore all relevant topics.
Practical implications
A challenge of the course is that socio‐cultural concepts are broad and it is recognized that a single course is not enough to effectively cover all relevant issues. Careful course design is therefore important.
Originality/value
Feedback from this study can serve as a resource for decision making about existing and additional courses, and specific content that could be incorporated into similar courses.
Details