Search results
1 – 10 of 65
We live in a techno savvy era that is called as virtual connection and communication.
Abstract
Purpose
We live in a techno savvy era that is called as virtual connection and communication.
Design/methodology/approach
During this pandemic crisis, we all are dependent upon technology, internet for connecting to our families and our friends; this all is monitored by cyberlaw.
Findings
Today, the computer crimes are increasing at a high rate, and it should be controlled and managed to maintain the platform .Cyberspace on the other hand can be discussed as the space where all internet-related activities are taking place and cyberlaw regulates. The paper will throw light on the impact of internet on the COVID-19 pandemic.
Originality/value
The paper will throw light on the impact of internet on the COVID-19 pandemic.
Details
Keywords
The purpose of this paper is to examine the impact of jurisdictional conflict on the internationalization of firms with internet – focused strategies – in both the physical and…
Abstract
Purpose
The purpose of this paper is to examine the impact of jurisdictional conflict on the internationalization of firms with internet – focused strategies – in both the physical and virtual environments.
Design/methodology/approach
This paper examines this new phenomenon in the international legal environment through the analysis of Yahoo!'s website internationalization and a review of American cyberlaw jurisprudence.
Findings
This paper suggests that firms with Internet‐focused strategies are aware of the asymmetries in the application and enforcement of extraterritorial judgments, and use these asymmetries as a component of their website internationalization strategy. This paper also suggests that previous calls for the regulation of cyberspace, which are based only on an analysis of the virtual environment, may provide misleading conclusions regarding the operation of international jurisdictional conflict.
Research limitations/implications
This is a nonquantitative analysis and scope‐limited to American law.
Practical limitations
The paper contain practical and actionable information, and suggests framework for future quantitative and nonquantitative research.
Originality/value
This is the only paper, known to the author, to investigate cyberspace jurisprudence using theories from Law and International Business.
Details
Keywords
Abstract
Details
Keywords
Sisira Dharmasri Jayasekara and Iroshini Abeysekara
The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral…
Abstract
Purpose
The purpose of this paper is to discuss the role of digital forensics in an evolving environment of cyber laws giving attention to Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) countries, comprising Bangladesh, India, Myanmar, Sri Lanka, Thailand, Nepal and Bhutan, in a dynamic global context.
Design/methodology/approach
This study uses a case study approach to discuss the digital forensics and cyber laws of BIMSTEC countries. The objective of the study was expected to be achieved by referring to decided cases in different jurisdictions. Cyber laws of BIMSTEC countries were studied for the purpose of this study.
Findings
The analysis revealed that BIMSTEC countries are required to amend legislation to support the growth of information technology. Most of the legislation are 10-15 years old and have not been amended to resolve issues on cyber jurisdictions.
Research limitations/implications
This study was limited to the members of the BIMSTEC.
Originality/value
This paper is an original work done by the authors who have discussed the issues of conducting investigations with respect to digital crimes in a rapidly changing environment of information technology and deficient legal frameworks.
Details
Keywords
Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…
Abstract
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.
In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.
In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.
Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.
Details
Keywords
Kamal Jaafar and Jawahitha Sarabdeen
Operation and logistics.
Abstract
Subject area
Operation and logistics.
Study level/applicability
Students and practitioners.
Case overview
This case study analysis the logistical and operational issues that one of the leading pharmaceutical companies in the MENA region is facing. The case provides a practical example of a company which positioned itself well to be a leading company. However, there are some inherent operational and logistical problems that hinder the company to reach its leading position. The first section of this case describes the company, its process and its operational problems. The second section is dedicated to the analysis of the operational capabilities and current key issues. The last section provides recommendations on how to improve the current operations and ways in which the improvements can be implemented, as well showing the benefits to the company based on the theoretical and practical frameworks.
Expected learning outcomes
Understand how operational issues affect company performance.
Analyse the effect that poor operational process can have on the overall company business.
Evaluate alternatives for process modifications.
Create plans for process improvements and assess its operational and logistical implications.
Supplementary materials
Teaching notes.
Details
Keywords
Jawahitha Sarabdeen and Kamal Jaafar
Strategic management, international business, branding, innovation and retail management
Abstract
Subject area
Strategic management, international business, branding, innovation and retail management
Study level/applicability
Undergraduate, postgraduate business and management students.
Case overview
Emerging Technologies was the first United Arab Emirates software application developer of Arabic (also available in English and Hindi) voice recognition solutions. Emerging Technologies developed and deployed fully automated voice recognition applications to meet specific business wants and needs. The case provides a practical example of a company which position itself well to be a raising star through proper strategy.
Expected learning outcomes
The students will be able to learn various business strategies that could be applied in emerging markets.
Supplementary materials
Teaching note available upon request.
Details
Keywords
This article discusses the effects of “Napster‐like” clone programs on the future of academic e‐books. This review will, first, catalogue the rise and fall of Napster and the…
Abstract
This article discusses the effects of “Napster‐like” clone programs on the future of academic e‐books. This review will, first, catalogue the rise and fall of Napster and the development of clone programs that facilitate peer‐to‐peer file sharing; second, examine the main methods by which e‐books are placed on the Web; third, discuss piracy and the subsequent legal issues of intellectual property. Finally, the concept of e‐books in the world of academic publications will be analysed.
Details
Keywords
Mohammad Mahabubur Rahman, Fariduddin Ahmed, Mohammad Osiur Rahman and Azizul Hoque
The purpose of this paper is to focus on how law, together with the internet, has created a new environment in the legal arena; and how the USA as a high‐tech nation relying upon…
Abstract
Purpose
The purpose of this paper is to focus on how law, together with the internet, has created a new environment in the legal arena; and how the USA as a high‐tech nation relying upon previous territorial experience is making a new pathway for all the concerned persons and organizations to overcome the problems that have come out of cyber peculiarity.
Design/methodology/approach
This article is based on keen observation and intensive analysis of the US case laws and practices. This article concentrates on the study of the American cases as a representative type of hi‐tech nations for searching the influences of traditional territorial concept on the settlement of internet cases.
Findings
In spite of the inevitability of a distinct set of laws and legal principles to be adopted for cyber offences, the traditional territorial law can provide elements for cyber‐legal issues. As for being a pioneer hi‐tech nation, the US courts, whether federal or provincial, are very much inclined to decide the internet cases on the basis of territorial concept by applying the principles of traditional territorial notions.
Originality/value
The judges, lawyers, jurists, governments, public authorities, local authorities, statutory bodies and all other persons and institutes concerned from around the world shall find indications to chalk out the framework of solution for cyber disputes from the US practices.
Details
Keywords
This research examines the level of perception and implementation of 11 identified knowledge management (KM) success factors and their differences among the information and…
Abstract
Purpose
This research examines the level of perception and implementation of 11 identified knowledge management (KM) success factors and their differences among the information and communication technology (ICT) companies operating in Malaysia.
Design/methodology/approach
The survey data was obtained from a study of 427 middle managers from 194 ICT companies using a set of structured questionnaire. Factor analysis was used to confirm that the 11 KM variables are valid and are in conformity to the literature review. Paired t‐test was then used to identify the differences between the KM factors perceived as important and the implementation of those factors.
Findings
The results show that all the 11 factors are perceived as important for successful KM implementation, but there are significant differences between all the factors perceived as important and the level of implementation of those factors.
Research limitations/implications
Future studies should include a bigger sample size and from various industries so as to ensure that the results can be generalised. It is also important that the success factors presented can be correlated with organisational performance. Since the study examines the level of implementation of KM factors, a longitudinal study is necessary.
Practical implications
Such significant findings reinforce the findings of previous researchers on the importance of the various KM success factors proposed. In addition, it provides information on the current level of KM implementation in these companies in Malaysia. Based on the differences between the two, strategies are recommended on how the Malaysian ICT companies can improve their KM practices and thus narrow the gap between the two.
Originality/value
This paper has implications on the Malaysian ICT companies in formulating strategies on how to deploy a full swing KM programme as a strategic weapon for their business success.
Details