Search results

1 – 10 of over 20000
Book part
Publication date: 18 July 2022

Priti Rani Rajvanshi, Taranjeet Singh, Deepa Gupta and Mukul Gupta

Introduction: The frequency and complexity of cyber assaults have grown in recent years. Consequently, organisations have increased their expenditures in more robust…

Abstract

Introduction: The frequency and complexity of cyber assaults have grown in recent years. Consequently, organisations have increased their expenditures in more robust infrastructure to protect themselves from these cyber assaults. These organisations’ assets, data, and reputations are at risk due to rapidly increasing cybercrimes. However, complete protection from these many and ever-changing threats is very challenging as a result. To deal with them, companies are taking steps to reduce risks and limit company losses in their occurrence.

Purpose: Progressively, the insurance sector organisations are including digital protection as a component of the board’s general danger technique. Protection enterprises, then again, depend on accurately expecting risks, while a significant number of them depend on normalised approaches. Because of the exceptional attributes of the digital assaults, transporters now and again depend on subjective strategies dependent on master decisions. There is an unmistakeable absence of observational information on digital protection, specifically subjective examinations planning to comprehend and depict necessities, impediments, and cycles applicable for digital protection.

Methodology: There are various unanswered inquiries and worries about the oversight and legitimate and administrative assessment of network safety weaknesses in the protection business. In the wake-up of looking over all these worries and issues, steps to alleviate them are laid out after an extensive literature survey and secondary data sources. In this study, the authors have principally viewed the executive parts of the associations as the danger. While considering network protection, their insight of needs was taken as one among a few dangerous treatment systems, just as the necessities of the organisations’ protection in assessing the danger level of likely customers.

Findings: This section analyses past research in network safety and information security in the protection market. The danger of the executives’ strategies, the numerical models, and the forecasts of digital occassions are illustrated in this section. Lastly, the future headings are likewise expressed momentarily.

Practical implications: This review might be valuable for additional examination and logical discussion, yet additionally for down-to-earth applications. Moreover, it could be gainful to organisations as a supportive instrument for better agreement on what digital protection is and how to get ready to take on network safety and information security procedures in the association.

Significance: These associations’ resources, information, and notoriety are in danger because of quickly expanding cybercrimes. Cybercriminals are utilising more refined approaches to start digital assaults. Digital protection was anticipated to affect security conduct before any proof was gathered. Progressively, organisations are including digital protection as a feature of their general danger to the executive system. Because of the exceptional attributes of the digital assaults, transporters as often as possible depend on subjective methods dependent on master decisions. Thus, this space of network safety and information security is vital uniquely in the protection market.

Details

Big Data Analytics in the Insurance Market
Type: Book
ISBN: 978-1-80262-638-4

Keywords

Article
Publication date: 5 June 2017

Jon D. Elhai, Jason C. Levine and Brian J. Hall

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables…

3332

Abstract

Purpose

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables predicting anxiety about data hacking, and the role that such anxiety and other potentially important variables have in explaining the use of digital privacy protection behavior.

Design/methodology/approach

In total, 305 participants from an online labor market were sampled who frequently use the internet, surveyed about recent anxiety (using the Generalized Anxiety Disorder-7 scale (GAD-7)), anxiety about data hacking (GAD-7, in reference to data hacking), and issues of digital privacy: news exposure, perceived importance, self-efficacy, protection behavior, and previous hacking victimization.

Findings

Profession (information technology-related) moderated the symptom structure for recent anxiety, but not data hacking anxiety. Using structural equation modeling, prior hacking victimization predicted anxiety about hacking. Digital privacy protection behavior was related to hacking anxiety and privacy self-efficacy. Data hacking anxiety mediated relations between hacking victimization and privacy protection. Privacy self-efficacy mediated relations between news exposure to hacking incidents and privacy protection.

Research limitations/implications

Limitations include the self-report nature of the instruments, and use of a selective, non-random sample.

Practical implications

Results highlight knowledge, self-efficacy, and threat appraisal among IT managers in motivating better digital security practices.

Originality/value

This is the first study using a standardized instrument of anxiety to examine distress about hacking and predictors of digital privacy protection behavior.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 20 May 2020

George Okello Candiya Bongomin and Joseph Mpeera Ntayi

Drawing from the argument that mobile money services have a significant potential to provide a wide range of affordable, convenient and secure financial services, there have been…

2425

Abstract

Purpose

Drawing from the argument that mobile money services have a significant potential to provide a wide range of affordable, convenient and secure financial services, there have been rampant frauds on consumers of financial products over the digital financial platform. Thus, this study aims to establish the mediating effect of digital consumer protection in the relationship between mobile money adoption and usage and financial inclusion with data collected from micro small and medium enterprises (MSMEs) in northern Uganda.

Design/methodology/approach

To achieve the main objective of this study, a research model was developed to test for the mediating effect of digital consumer protection in the relationship between mobile money adoption and usage and financial inclusion. The data were collected from MSMEs and structural equation modelling in partial least square (PLS) combined with bootstrap was applied to analyze and test the hypotheses of this study. The direct and indirect effect of mobile money adoption and usage on financial inclusion was tested through digital consumer protection as a mediator variable.

Findings

The findings from the PLS-structural equation modelling (SEM) showed that mobile money adoption and usage has both direct and indirect effect on financial inclusion. Moreover, financial inclusion is influenced by both mobile money adoption and usage and digital consumer protection.

Research limitations/implications

The study used partial least square (PLS-SEM) combined with bootstrap confidence intervals through a formative approach to establish the mediating effect of the mediator variable. Hence, it ignored the use of covariance-based SEM and the MedGraph programme. Furthermore, data were collected from samples located in Gulu district, northern Uganda and specifically from MSMEs. This limits generalization of the study findings to other population who also use mobile money services.

Practical implications

Promoters of digital financial services, managers of telecommunication companies, and financial inclusion advocates should consider strengthening the existing digital consumer protection laws on the mobile money platform. A collaborative approach between the mobile network operators, financial institutions and regulators should tighten the existing laws against mobile money fraudsters and an efficient mechanism for recourse, compensation and remedy should be set up to benefit the victims of frauds and cybercrime on the Fintech ecosystem.

Originality/value

The current study gives a useful insight into the critical mediating role of digital consumer protection as a cushion for promoting financial inclusion through mobile phones over the Fintech that face great threat and risk from cyber insecurity.

Details

Digital Policy, Regulation and Governance, vol. 22 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 15 June 2015

Parul Zaveri

Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is…

2695

Abstract

Purpose

Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is necessary for librarians to understand and apply the ways of protecting digital data and the related equipment from disaster. The purpose of this paper is to address the issues related to digital data protection in libraries in India. It aims to investigate the perceptions of librarians about the probability of digital disasters happening in their libraries, and to assess the level of digital disaster preparedness among libraries.

Design/methodology/approach

A questionnaire based survey of 276 libraries in the Western region of India was conducted to find out the digital data protection measures taken by them. The paper provides an overview and analysis of the general trends in digital data protection in these libraries.

Findings

The research results indicate that due to lack of knowledge about handling of digital data, and inadequate digital infrastructure setup in organizations, the chances of loss of digital data are high. However, common measures like taking backup of data manually are mostly followed by all libraries. The paper has identified the trends in protection of digital data, as well as the lacunae, in Indian libraries. Basic guidelines on digital data preservation are also presented in the paper.

Practical implications

The guidelines provided in the paper will be useful to any libraries to take measures for protection of the digital data. The libraries will be able to prepare their digital data protection plan and train the staff accordingly.

Originality/value

This paper is the first to address the issue of digital disaster management in libraries in India. It provides a detailed analysis of digital data protection measures taken by Indian libraries currently.

Details

Library Hi Tech, vol. 33 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 27 September 2011

Natali Helberger

The purpose of this paper is to make suggestions of how to improve the legal standing of consumers of digital content products.

1646

Abstract

Purpose

The purpose of this paper is to make suggestions of how to improve the legal standing of consumers of digital content products.

Design/methodology/approach

The analysis in this paper is based on desk research and comparative legal research, among others in the context of research performed in the context of a grant from the Netherlands Organization for Scientific Research (NWO) and, in parts, on a study performed for the European Commission by Loos et al.

Findings

This paper demonstrates that the legal and technical complexities of digital content products and the resulting lack of a clear notion of which product characteristics are still reasonable and normal can result in uncertainty for consumers and businesses, or even a lower level of protection for digital content consumers, as compared to consumers of more conventional products. In order to improve the protection of digital content consumers, defaults for the main functionalities and characteristics of digital content products may be needed. The article describes possible routes to create such defaults and concludes with suggestions for the way forward.

Originality/value

The article suggests a new approach to improving the legal standing of digital consumers, one that takes into account the situation of digital consumers as well as the need for flexibility and room for innovation for digital content businesses. It is based on extensive legal and comparative research into the present legal framework and develops a new approach of conceptualizing the legal obstacles that digital consumers can be confronted with.

Details

info, vol. 13 no. 6
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 22 May 2009

Humphry Hung and Y.H. Wong

The purpose of this study is to develop and validate a model to analyze the inter‐relationship between information transparency and the protection of digital privacy of customers…

2870

Abstract

Purpose

The purpose of this study is to develop and validate a model to analyze the inter‐relationship between information transparency and the protection of digital privacy of customers, from the perspective of e‐services providers.

Design/methodology/approach

A total of 320 questionnaires were sent out to all e‐banking service providers in the Guangdong province in China in 2004 and 150 useable questionnaires were collected. The response rate was 46.9 percent.

Findings

The paper identifies three types of digital privacy: information, communication and individual privacy. The findings show that e‐service marketers who adopt a more open information transparency policy are more likely to pay attention to customers' information and communication privacy, but less to their individual privacy.

Practical implications

E‐services providers need to be very careful about the necessity to be transparent in information sharing, but at the same time, have to be well aware of the need of the protection of individual privacy of their customers. Unfortunately, at times they may be too aggressive in adopting an open information transparency policy that may upset their customers by intruding into their individual privacy.

Originality/value

The paper contributes to a more comprehensive conceptualization of digital privacy not only by identifying three generic types of privacy (information, communication and individual), but also by looking into the relationship between information transparency and these three generic types of privacy. This study shows that, unlike the first two types of privacy, individual privacy of customers is given less concern by most e‐service providers.

Details

Journal of Services Marketing, vol. 23 no. 3
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 1 August 2003

Siriginidi Subba Rao

This paper presents an overview of copyright, its history, and implications for electronic and multimedia. The international treaties on copyright are listed and the status of…

5741

Abstract

This paper presents an overview of copyright, its history, and implications for electronic and multimedia. The international treaties on copyright are listed and the status of copyright protection in select countries is covered, including copyright law enactment, term, scope, sanctions, percentage of piracy and revenue loss in software piracy. Copyright issues for e‐information, the Internet and library and information centres are discussed. Digital copyright protection technologies – ECMS, watermarks, fingerprints and digital signatures, etc. – are described. It is concluded that copyright law has not disappeared with the evolution of technology and the development of a globalised IPR regime is recommended.

Details

Online Information Review, vol. 27 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 9 September 2014

XianRong Huang and Ting Hao

– The purpose of this paper is to find the problems in the establishment of Chinese digital publishing policies and regulations system.

1115

Abstract

Purpose

The purpose of this paper is to find the problems in the establishment of Chinese digital publishing policies and regulations system.

Design/methodology/approach

The research is through analysis the digital publishing policies and regulations in China referring to digital publishing macro policies, e-book policies, digital music policies, network animated cartoon policies, network game policies, as well as through examining the legal system (law, administrative regulation, departmental rules, judicial interpretation) in China.

Findings

The paper concludes that the framework of this system should contain three layers, and Chinese digital publishing policies and regulations system will continue to be improved and digital publishing market will be standardized operation. The digital publishing industry policies, digital publishing resource policies, digital technology policies, copyright policies and personnel training policies need for further investigation and research.

Research limitations/implications

Because of the coverage of digital publishing industry is so wide, the policies and regulations which the paper analyzed were not so comprehensive.

Practical implications

It can help the Chinese government make more comprehensive and rational policies and regulations for digital publishing industry and ensure the sustainable development of digital publishing industry.

Social implications

The sound of digital publishing policies and regulations system could create a regular and healthful environment for social community participating spiritual creating and sharing.

Originality/value

The paper proposes that the government should first make clear the basic objectives of the digital publishing policies and regulations system in China and then determine the content of the system. It has a positive significance to promote the establishment the system of policies and regulations in China and can ensure the sustainable development of digital publishing industry.

Details

Library Hi Tech, vol. 32 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 12 January 2024

Tami Dinh and Susan O'Leary

This study explores the evolving dynamics of participatory accountability within humanitarian contexts, where digitally connected crisis-affected populations demand better…

Abstract

Purpose

This study explores the evolving dynamics of participatory accountability within humanitarian contexts, where digitally connected crisis-affected populations demand better accountability from aid organisations, and as a result, shift traditional hierarchies and relationships between humanitarian agencies and beneficiaries.

Design/methodology/approach

This study employs a case study approach, focussing on the International Committee of the Red Cross (ICRC), to investigate how participatory accountability manifests outside formal practices and re-emerges in social media spaces. The study analyses internal organisational challenges and explores the implications of digital platforms on humanitarian practices. The authors employ Chouliaraki and Georgiou's (2015, 2019, 2022) networks of mediation, particularly intermediation and transmediation, to understand how digital expressions translate to offline contexts and reshape meanings and actions.

Findings

The study reveals that social media platforms enable beneficiaries to demand participatory accountability beyond traditional practices, democratising humanitarian response and challenging power structures. These effects are multifaceted, introducing enhanced democratic and inclusive humanitarian aid as well as new vulnerabilities. Digital intermediaries and gatekeepers play pivotal roles in curating and disseminating crisis-affected voices, which, when transmediated, result in nuanced meanings and understandings. Positive effects include capturing the potential of digital networks for democratic aid, while negative effects give rise to moral responsibilities, necessitating proactive measures from the ICRC.

Originality/value

This study contributes to the literature by highlighting the impact of digital technology, particularly social media, on participatory accountability. It expands the understanding of the evolving landscape of accountability within the humanitarian sector and offers critical insights into the complexities and dual purposes of participatory accountability in contexts of resistance. Employing Chouliaraki and Georgiou's networks of mediation adds depth to the understanding of digital technology's role in shaping participatory practices and introduces the concept of transmediation as a bridge between digital expressions and tangible actions.

Details

Accounting, Auditing & Accountability Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0951-3574

Keywords

Book part
Publication date: 25 May 2022

Igor Calzada

Insofar as the digital layer cannot be detached from the current democratic challenges of the 21st century including neoliberalism, scales, civic engagement and action…

Abstract

Insofar as the digital layer cannot be detached from the current democratic challenges of the 21st century including neoliberalism, scales, civic engagement and action research-driven co-production methodologies; this chapter advances trends, aftermaths and emancipatory strategies for the post-pandemic technopolitical democracies. Consequently, it suggests a democratic toolbox encompassing four intertwined trends, aftermaths and emancipations including (1) the context characterised by the algorithmic nations, (2) challenges stemming from data sovereignty, (3) mobilisation seen from the digital rights perspective and (4) grassroots innovation embodied through data co-operatives. This chapter elucidates that in the absence of coordinated and interdependent strategies to claim digital rights and data sovereignty by algorithmic nations, on the one hand, Big Tech data-opolies, and on the other hand, the GDPR led by the European Commission might bound (negatively) and expand (positively), respectively, algorithmic nations' capacity to mitigate the negative side effects of the algorithmic disruption in Western democracies.

1 – 10 of over 20000