Search results

1 – 10 of 141
Article
Publication date: 18 September 2023

Miftachul Huda

In recent years, issues like untrusted or questionable sources of information are indisputably rampant in the digital era. The quality of information is now found to be…

Abstract

Purpose

In recent years, issues like untrusted or questionable sources of information are indisputably rampant in the digital era. The quality of information is now found to be challenging with its kind of issues, crisis and also clarity in which it requires to have a strategic scenario and practice to enhance quality assurance in order to creating safe cyber-spaces. The initiative to organise information at the organisational stage has widely emerged on the cyberspace. This paper aims to examine the insights of the element of trust in quality communication and information management to drive key performance indicator to support organisational sustainability. This approach is likely to play a significant role in enhancing critical inquiry in to issue of trust in information to ensure untainted integrity and quality assurance of the source of the information.

Design/methodology/approach

The preparation of this paper used a systematic literature review according to four phases, namely, identification, assessment or examination, extraction and interpretation. This approach was selected to advance critical inquiry into the most current topic on the trust for quality of information as way of strategic communication management to achieve safe cyber-organisational sustainability. The process was made through the various sources of peer-reviewed articles including journals, book chapters, books and conference proceedings. The literature review was carried out through the search for keywords such as trust in information, strategic communication and safe cyber-organisational sustainability.

Findings

The results revealed that the trust in quality of information with its wide range of initiatives could be enhanced as an initial attempt to embrace comprehensive approach in establishing strategic communication to ensure organisational sustainability and quality assurance of safe cyber space. The result further indicated three points, which follows development of virtual interaction with information management for safe cyberspace, enhancing continued predictability assessment in digital information process and practice and developing trust in information and quality of communication for organisational sustainability.

Research limitations/implications

This paper is expected to give an insightful value in contributing to quality measurement of the strategic communication to promote trust in quality of information. Hence, the design to expand strategic management to support digital social connections in the cyber space. As a result, the profound contribution would also lead to enhancement of organisational sustainability in the digital era, amid technological trends.

Practical implications

The need to develop an approach to strengthen the trust in information in the digital cyberspace should focus on providing insights into the quality of information, authenticity and integrity to develop quality assurance for social connection. The awareness raising process in consolidating the trust in information has to start with exploring early social interaction in the digital age. This approach provides quality assurance to linking digital connection to develop trust in the quality of information. This would enable feedback to ensure accessibility and accuracy of quality of information dealing with critical elements relating to organisational sustainability.

Originality/value

The entire awareness in expanding the trust as information quality indicator has to be started with exploring the early social interaction in the digital age, to achieve quality basis on linking the digital connection as an attempt to build the information quality. This would give a feedback in ensuring the accessibility and accuracy of information quality together with dealing with an ultimate element to lead to the organisational longevity.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 14 December 2023

Durrey Shahwar and Rajib Lochan Dhar

The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study…

Abstract

Purpose

The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study aims to shed light on the triggers, sources and impact of rude behaviours in cyberspace. The authors also present the boundary conditions that exacerbate or alleviate the effects of such negative experiences.

Design/methodology/approach

Through a systematic literature review based on predefined search protocols, the authors synthesised the current knowledge on cyber incivility and identified 21 peer-reviewed research articles.

Findings

The findings reveal the different sources of cyber incivility, its personal, relational and organisational antecedents and consequences, and its personal and situational boundary conditions that curb or enhance the negative impact.

Research limitations/implications

The authors unravel the main future research avenues based on the review findings by systemising knowledge on cyber incivility. Managerial efforts in the form of interventions and mitigation are also discussed to help combat this grieving issue in the workplace.

Originality/value

This paper presents the first systematic review of the cyber incivility literature and identifies new avenues for future research. Scholars can expand upon the findings of this study to fill gaps and move the incivility in cyberspace forward. It also offers practical insights on mitigating the advancement of such behaviours in organisations.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 13 June 2023

Adam Lovasz

Drawing on the work of Niklas Luhmann, the paper argues that technology can be viewed as a self-referential system which is autonomous from both human beings and other function…

Abstract

Purpose

Drawing on the work of Niklas Luhmann, the paper argues that technology can be viewed as a self-referential system which is autonomous from both human beings and other function systems of society. The paper aims to develop a philosophy of technology from the work of Niklas Luhmann. To achieve this aim, it draws upon the systems-theory work of Jacques Ellul, a philosopher of technology who focuses on the autonomous potential of technological evolution.

Design/methodology/approach

The paper draws on the work of Niklas Luhmann and Jacques Ellul to explore the theme of autonomous technology and what this means for our thinking about technological issues in the twenty-first century. Insights from these two thinkers and researchers working in the Luhmannian sociological tradition are applied to remote work.

Findings

The sociological approach of Luhmann, coupled with Ellul's insights into the autonomous nature of technology, can help us develop a systems theory of technology which takes seriously its irreducibility to human functions.

Research limitations/implications

The paper contributes to the growing sociological literature that thematizes the Luhmannian approach to technology, helping us better understand this phenomenon and think in new ways about what technological autonomy means.

Originality/value

The paper brings together the work of Luhmann, Ellul and contemporary researchers to advance a new understanding of technology and technological communication.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 3 January 2023

Saleem Raja A., Sundaravadivazhagan Balasubaramanian, Pradeepa Ganesan, Justin Rajasekaran and Karthikeyan R.

The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about…

Abstract

Purpose

The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about people and organizations is available online, which encourages the proliferation of cybercrimes. Cybercriminals often use malicious links for large-scale cyberattacks, which are disseminated via email, SMS and social media. Recognizing malicious links online can be exceedingly challenging. The purpose of this paper is to present a strong security system that can detect malicious links in the cyberspace using natural language processing technique.

Design/methodology/approach

The researcher recommends a variety of approaches, including blacklisting and rules-based machine/deep learning, for automatically recognizing malicious links. But the approaches generally necessitate the generation of a set of features to generalize the detection process. Most of the features are generated by processing URLs and content of the web page, as well as some external features such as the ranking of the web page and domain name system information. This process of feature extraction and selection typically takes more time and demands a high level of expertise in the domain. Sometimes the generated features may not leverage the full potentials of the data set. In addition, the majority of the currently deployed systems make use of a single classifier for the classification of malicious links. However, prediction accuracy may vary widely depending on the data set and the classifier used.

Findings

To address the issue of generating feature sets, the proposed method uses natural language processing techniques (term frequency and inverse document frequency) that vectorize URLs. To build a robust system for the classification of malicious links, the proposed system implements weighted soft voting classifier, an ensemble classifier that combines predictions of base classifiers. The ability or skill of each classifier serves as the base for the weight that is assigned to it.

Originality/value

The proposed method performs better when the optimal weights are assigned. The performance of the proposed method was assessed by using two different data sets (D1 and D2) and compared performance against base machine learning classifiers and previous research results. The outcome accuracy shows that the proposed method is superior to the existing methods, offering 91.4% and 98.8% accuracy for data sets D1 and D2, respectively.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 January 2022

Yang Li, Jiaze Li, Qi Fan and Zhihong Wang

The teenager community is the most affected community by cybercrime in the COVID-19 era. Increasing social networks and facilitating teenager access to the Internet have increased…

Abstract

Purpose

The teenager community is the most affected community by cybercrime in the COVID-19 era. Increasing social networks and facilitating teenager access to the Internet have increased the probability of cybercrimes. On the other hand, entertainment such as mobile and computer games is top-rated among teenagers. Teenagers' tendency to cybercrime may be influenced by individual, parent, social, economic and political factors. Studying the impact of social networks, mobile games and parents' religious attitudes on teenagers' tendency to cybercrimes in the COVID-19 era is the primary goal of this paper.

Design/methodology/approach

The outbreak of COVID-19 caused a considerable change in the world and the lifestyle of all people. Information and Communication Technology (ICT) was also affected by the special conditions of this virus. Changes in ICT and rapid access to it have empowered individuals and organizations, and people have increased civic participation and interaction through ICT. However, the outbreak of COVID-19 has created new challenges for the government and citizens and may cause new crimes. Cybercrime is a type of crime that occurs in a cyber environment. These crimes range from invasions of privacy to crimes in which the offender vaguely paralyzes the macroeconomic. In this research, 265 students of high schools and universities are used for collecting data by utilizing a survey. Measuring actions have been done in all surveys employing a Likert scale. The causal pattern is assessed through a constructional equation modeling procedure to study the scheme's validity and reliability.

Findings

The outcomes have indicated that social networks have no significant relationship with teenagers' tendency to cybercrimes in the COVID-19 era. Mobile games have a mild effect on teenagers' tendency to cybercrimes in the COVID-19 era, and parents' religious attitudes significantly impact teenagers' tendency to cybercrimes in the COVID-19 era.

Research limitations/implications

Current research also has some restrictions that must be noticed in assessing the outcomes. First, sample research was selected from high schools and universities in one city. So, the size of the model is small, and the generalization of results is limited. Second, this research may have ignored other variables that affect the tendency of teenagers' to cybercrime. Future researchers intend to investigate the parents' upbringing system's impact on teenager's trend to cybercrime in the COVID-19 era. Future research can also examine practical factors such as parental upbringing, attitudes toward technology development and virtual addiction in the COVID-19 era.

Originality/value

In this study, teenagers' tendency to cybercrimes in the COVID-19 era is investigated, and a procedure is applied depending on a practical occasion. This article's offered sample provides a perfect framework for influencing parents' social networks, mobile games and religious attitudes on teenagers' tendency to cybercrimes in the COVID-19 era.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 15 March 2024

Namita Jain, Vikas Gupta, Valerio Temperini, Dirk Meissner and Eugenio D’angelo

This paper aims to provide insight into the evolving relationship between humans and machines, understanding its multifaceted impact on our lifestyle and landscape in the past as…

Abstract

Purpose

This paper aims to provide insight into the evolving relationship between humans and machines, understanding its multifaceted impact on our lifestyle and landscape in the past as well as in the present, with implications for the near future. It uses bibliometric analysis combined with a systematic literature review to identify themes, trace historical developments and offer a direction for future human–machine interactions (HMIs).

Design/methodology/approach

To provide thorough coverage of publications from the previous four decades, the first section presents a text-based cluster bibliometric analysis based on 305 articles from 2,293 initial papers in the Scopus and Web of Science databases produced between 1984 and 2022. The authors used VOS viewer software to identify the most prominent themes through cluster identification. This paper presents a systematic literature review of 63 qualified papers using the PRISMA framework.

Findings

Next, the systematic literature review and bibliometric analysis revealed four major historical themes and future directions. The results highlight four major research themes for the future: from Taylorism to advanced technologies; machine learning and innovation; Industry 4.0, Society 5.0 and cyber–physical system; and psychology and emotions.

Research limitations/implications

There is growing anxiety among humankind that in the future, machines will overtake humans to replace them in various roles. The current study investigates the evolution of HMIs from their historical roots to Society 5.0, which is understood to be a human-centred society. It balances economic advancement with the resolution of social problems through a system that radically integrates cyberspace and physical space. This paper contributes to research and current limited knowledge by identifying relevant themes and offering scope for future research directions. A close look at the analysis posits that humans and machines complement each other in various roles. Machines reduce the mechanical work of human beings, bringing the elements of humanism and compassion to mechanical tasks. However, in the future, smart innovations may yield machines with unmatched dexterity and capability unthinkable today.

Originality/value

This paper attempts to explore the ambiguous and dynamic relationships between humans and machines. The present study combines systematic review and bibliometric analysis to identify prominent trends and themes. This provides a more robust and systematic encapsulation of this evolution and interaction, from Taylorism to Society 5.0. The principles of Taylorism are extended and redefined in the context of HMIs, especially advanced technologies.

Details

Journal of Management History, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1751-1348

Keywords

Article
Publication date: 12 December 2023

Nguyen Sinh My, Long T.V. Nguyen and Hiep Cong Pham

Property developers identify the vital role of social media brand engagement (SMBE) in sustaining their businesses in competitive marketplaces, but it remains underexplored. This…

Abstract

Purpose

Property developers identify the vital role of social media brand engagement (SMBE) in sustaining their businesses in competitive marketplaces, but it remains underexplored. This paper examines how SMBE mediates the effects of firm-generated content (FGC) and user-generated content (UGC) on brand trust, considering the moderating effects of social media influencer endorsement (SMIE) and self-image congruence (SIC) for luxury residential properties (LRPs).

Design/methodology/approach

Around 516 high-income homebuyers in Vietnam who shared information about LRP on social media were targeted to test the research model empirically. The primary data collected from paper-based surveys were analysed using SPSS 26 and AMOS 24.

Findings

Results indicate that FGC and UGC positively impact SMBE and consequently significantly affect brand trust. Further, results confirm the moderating roles of SMIE and SIC in the effects of FGC and UGC on SMBE.

Research limitations/implications

Data and sample size were limited to meet the generalisation from different nations and cross cultures.

Practical implications

The authors' findings suggest that marketers should apply the authors' integrated SMBE model to strengthen brand–consumer interactions and increase their sales revenue.

Originality/value

This study is the first in its application of the uses and gratifications theory and self-congruence theory to investigate how SMBE mediates the relationship between FGC and brand trust as well as between UGC and brand trust. Noticeably, this study makes a novel contribution as the first to quantitatively explore the moderating effects of SMIE and SIC in the authors' research model.

Details

Asia Pacific Journal of Marketing and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 8 January 2024

Na Ye, Dingguo Yu, Xiaoyu Ma, Yijie Zhou and Yanqin Yan

Fake news in cyberspace has greatly interfered with national governance, economic development and cultural communication, which has greatly increased the demand for fake news…

Abstract

Purpose

Fake news in cyberspace has greatly interfered with national governance, economic development and cultural communication, which has greatly increased the demand for fake news detection and intervention. At present, the recognition methods based on news content all lose part of the information to varying degrees. This paper proposes a lightweight content-based detection method to achieve early identification of false information with low computation costs.

Design/methodology/approach

The authors' research proposes a lightweight fake news detection framework for English text, including a new textual feature extraction method, specifically mapping English text and symbols to 0–255 using American Standard Code for Information Interchange (ASCII) codes, treating the completed sequence of numbers as the values of picture pixel points and using a computer vision model to detect them. The authors also compare the authors' framework with traditional word2vec, Glove, bidirectional encoder representations from transformers (BERT) and other methods.

Findings

The authors conduct experiments on the lightweight neural networks Ghostnet and Shufflenet, and the experimental results show that the authors' proposed framework outperforms the baseline in accuracy on both lightweight networks.

Originality/value

The authors' method does not rely on additional information from text data and can efficiently perform the fake news detection task with less computational resource consumption. In addition, the feature extraction method of this framework is relatively new and enlightening for text content-based classification detection, which can detect fake news in time at the early stage of fake news propagation.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 13 October 2023

Chih-An Lin, Yu-Ming Hsu and Homin Chen

During COVID-19 restrictions, people spent more time in cyberspace and consuming health-related information. An increase was also observed in mediated caring messages or…

Abstract

Purpose

During COVID-19 restrictions, people spent more time in cyberspace and consuming health-related information. An increase was also observed in mediated caring messages or health-relevant information sent to one another. This study aims to explore how the information and interactions around COVID-19 can provide a good learning opportunity for public health, specifically related to eHealth literacy and eHealth promotion.

Design/methodology/approach

While mainstream literature has concentrated on experimental designs and a priming effect, this study inspects psychological distance related to a health threat under real-life circumstances. The article adopted a survey approach and utilized PLS-SEM techniques to examine the proposed hypotheses.

Findings

Results indicated that whereas closer social support correlates with closer psychological distance and less usage of the social media approach, more substantial COVID-19 impacts were associated with closer psychological distance but greater use of social media. Since both closer psychological distance and social media approach contribute to eHealth literacy, social support from closer and virtual social networks should be embraced but utilized through different routes and for different purposes. The timing of messages but not psychological distance affects people's social media approach, indicating that morning messages should be employed. Moreover, eHealth literacy mediates timing preferences and leads to a preference for eHealth communication earlier in the day. Overall, morning messages create a virtuous circle during a health crisis.

Originality/value

This paper establishes a mechanism of virtuous cycles for eHealth communication during a health threat. Additionally, it bridges existing research gaps by expanding chronopsychology and CLT in the health domain using an empirical approach, a real-life case and an extension of performance regarding information-seeking and utilization.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

1 – 10 of 141