Search results

1 – 10 of 65
Article
Publication date: 4 August 2021

Tripti Bhushan

We live in a techno savvy era that is called as virtual connection and communication.

Abstract

Purpose

We live in a techno savvy era that is called as virtual connection and communication.

Design/methodology/approach

During this pandemic crisis, we all are dependent upon technology, internet for connecting to our families and our friends; this all is monitored by cyberlaw.

Findings

Today, the computer crimes are increasing at a high rate, and it should be controlled and managed to maintain the platform .Cyberspace on the other hand can be discussed as the space where all internet-related activities are taking place and cyberlaw regulates. The paper will throw light on the impact of internet on the COVID-19 pandemic.

Originality/value

The paper will throw light on the impact of internet on the COVID-19 pandemic.

Details

World Journal of Engineering, vol. 19 no. 1
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 1 May 2006

Robert Ware

The purpose of this paper is to examine the impact of jurisdictional conflict on the internationalization of firms with internet – focused strategies – in both the physical and…

1074

Abstract

Purpose

The purpose of this paper is to examine the impact of jurisdictional conflict on the internationalization of firms with internet – focused strategies – in both the physical and virtual environments.

Design/methodology/approach

This paper examines this new phenomenon in the international legal environment through the analysis of Yahoo!'s website internationalization and a review of American cyberlaw jurisprudence.

Findings

This paper suggests that firms with Internet‐focused strategies are aware of the asymmetries in the application and enforcement of extraterritorial judgments, and use these asymmetries as a component of their website internationalization strategy. This paper also suggests that previous calls for the regulation of cyberspace, which are based only on an analysis of the virtual environment, may provide misleading conclusions regarding the operation of international jurisdictional conflict.

Research limitations/implications

This is a nonquantitative analysis and scope‐limited to American law.

Practical limitations

The paper contain practical and actionable information, and suggests framework for future quantitative and nonquantitative research.

Originality/value

This is the only paper, known to the author, to investigate cyberspace jurisprudence using theories from Law and International Business.

Details

Managerial Law, vol. 48 no. 3
Type: Research Article
ISSN: 0309-0558

Keywords

Content available
Article
Publication date: 1 June 2002

Paul Rutherford

233

Abstract

Details

info, vol. 4 no. 3
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 7 October 2019

Sisira Dharmasri Jayasekara and Iroshini Abeysekara

The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral…

Abstract

Purpose

The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) countries, comprising Bangladesh, India, Myanmar, Sri Lanka, Thailand, Nepal and Bhutan, in a dynamic global context.

Design/methodology/approach

This study uses a case study approach to discuss the digital forensics and cyber laws of BIMSTEC countries. The objective of the study was expected to be achieved by referring to decided cases in different jurisdictions. Cyber laws of BIMSTEC countries were studied for the purpose of this study.

Findings

The analysis revealed that BIMSTEC countries are required to amend legislation to support the growth of information technology. Most of the legislation are 10-15 years old and have not been amended to resolve issues on cyber jurisdictions.

Research limitations/implications

This study was limited to the members of the BIMSTEC.

Originality/value

This paper is an original work done by the authors who have discussed the issues of conducting investigations with respect to digital crimes in a rapidly changing environment of information technology and deficient legal frameworks.

Details

Journal of Money Laundering Control, vol. 22 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 14 December 2023

Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…

Abstract

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.

In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.

In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.

Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.

Abstract

Subject area

Operation and logistics.

Study level/applicability

Students and practitioners.

Case overview

This case study analysis the logistical and operational issues that one of the leading pharmaceutical companies in the MENA region is facing. The case provides a practical example of a company which positioned itself well to be a leading company. However, there are some inherent operational and logistical problems that hinder the company to reach its leading position. The first section of this case describes the company, its process and its operational problems. The second section is dedicated to the analysis of the operational capabilities and current key issues. The last section provides recommendations on how to improve the current operations and ways in which the improvements can be implemented, as well showing the benefits to the company based on the theoretical and practical frameworks.

Expected learning outcomes

Understand how operational issues affect company performance.

Analyse the effect that poor operational process can have on the overall company business.

Evaluate alternatives for process modifications.

Create plans for process improvements and assess its operational and logistical implications.

Supplementary materials

Teaching notes.

Details

Emerald Emerging Markets Case Studies, vol. 1 no. 4
Type: Case Study
ISSN: 2045-0621

Keywords

Case study
Publication date: 1 January 2011

Jawahitha Sarabdeen and Kamal Jaafar

Strategic management, international business, branding, innovation and retail management

Abstract

Subject area

Strategic management, international business, branding, innovation and retail management

Study level/applicability

Undergraduate, postgraduate business and management students.

Case overview

Emerging Technologies was the first United Arab Emirates software application developer of Arabic (also available in English and Hindi) voice recognition solutions. Emerging Technologies developed and deployed fully automated voice recognition applications to meet specific business wants and needs. The case provides a practical example of a company which position itself well to be a raising star through proper strategy.

Expected learning outcomes

The students will be able to learn various business strategies that could be applied in emerging markets.

Supplementary materials

Teaching note available upon request.

Details

Emerald Emerging Markets Case Studies, vol. 1 no. 1
Type: Case Study
ISSN: 2045-0621

Keywords

Article
Publication date: 1 May 2003

Mark Van Hoorebeek

This article discusses the effects of “Napster‐like” clone programs on the future of academic e‐books. This review will, first, catalogue the rise and fall of Napster and the…

1376

Abstract

This article discusses the effects of “Napster‐like” clone programs on the future of academic e‐books. This review will, first, catalogue the rise and fall of Napster and the development of clone programs that facilitate peer‐to‐peer file sharing; second, examine the main methods by which e‐books are placed on the Web; third, discuss piracy and the subsequent legal issues of intellectual property. Finally, the concept of e‐books in the world of academic publications will be analysed.

Details

New Library World, vol. 104 no. 4/5
Type: Research Article
ISSN: 0307-4803

Keywords

Article
Publication date: 21 June 2011

Mohammad Mahabubur Rahman, Fariduddin Ahmed, Mohammad Osiur Rahman and Azizul Hoque

The purpose of this paper is to focus on how law, together with the internet, has created a new environment in the legal arena; and how the USA as a high‐tech nation relying upon…

414

Abstract

Purpose

The purpose of this paper is to focus on how law, together with the internet, has created a new environment in the legal arena; and how the USA as a high‐tech nation relying upon previous territorial experience is making a new pathway for all the concerned persons and organizations to overcome the problems that have come out of cyber peculiarity.

Design/methodology/approach

This article is based on keen observation and intensive analysis of the US case laws and practices. This article concentrates on the study of the American cases as a representative type of hi‐tech nations for searching the influences of traditional territorial concept on the settlement of internet cases.

Findings

In spite of the inevitability of a distinct set of laws and legal principles to be adopted for cyber offences, the traditional territorial law can provide elements for cyber‐legal issues. As for being a pioneer hi‐tech nation, the US courts, whether federal or provincial, are very much inclined to decide the internet cases on the basis of territorial concept by applying the principles of traditional territorial notions.

Originality/value

The judges, lawyers, jurists, governments, public authorities, local authorities, statutory bodies and all other persons and institutes concerned from around the world shall find indications to chalk out the framework of solution for cyber disputes from the US practices.

Details

Journal of International Trade Law and Policy, vol. 10 no. 2
Type: Research Article
ISSN: 1477-0024

Keywords

Article
Publication date: 1 May 2006

Siong Choy Chong

This research examines the level of perception and implementation of 11 identified knowledge management (KM) success factors and their differences among the information and…

5247

Abstract

Purpose

This research examines the level of perception and implementation of 11 identified knowledge management (KM) success factors and their differences among the information and communication technology (ICT) companies operating in Malaysia.

Design/methodology/approach

The survey data was obtained from a study of 427 middle managers from 194 ICT companies using a set of structured questionnaire. Factor analysis was used to confirm that the 11 KM variables are valid and are in conformity to the literature review. Paired t‐test was then used to identify the differences between the KM factors perceived as important and the implementation of those factors.

Findings

The results show that all the 11 factors are perceived as important for successful KM implementation, but there are significant differences between all the factors perceived as important and the level of implementation of those factors.

Research limitations/implications

Future studies should include a bigger sample size and from various industries so as to ensure that the results can be generalised. It is also important that the success factors presented can be correlated with organisational performance. Since the study examines the level of implementation of KM factors, a longitudinal study is necessary.

Practical implications

Such significant findings reinforce the findings of previous researchers on the importance of the various KM success factors proposed. In addition, it provides information on the current level of KM implementation in these companies in Malaysia. Based on the differences between the two, strategies are recommended on how the Malaysian ICT companies can improve their KM practices and thus narrow the gap between the two.

Originality/value

This paper has implications on the Malaysian ICT companies in formulating strategies on how to deploy a full swing KM programme as a strategic weapon for their business success.

Details

The Learning Organization, vol. 13 no. 3
Type: Research Article
ISSN: 0969-6474

Keywords

1 – 10 of 65