Search results

1 – 10 of 80
Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Eva PenzeyMoog and Danielle C. Slakoff

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…

Abstract

The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.

While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 9 December 2021

Kevin Macnish

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of…

Abstract

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of essays because it anticipates and supplements the range of issues covered in this collection and lays out some of the fundamental considerations necessary to ensure if surveillance must be conducted, it will be done as ethically as possible.

When is surveillance justified? We can largely agree that there are cases in which surveillance seems, at least prima facie, to be morally correct: police tracking a suspected mass murderer, domestic state security tracking a spy network, or a spouse uncovering partner’s infidelity. At the same time, there are other cases in which surveillance seems clearly not to be justified: the mass surveillance practices of the East German Stasi, an employer watching over an employee to ensure that they do not spend too long in the toilet, or a voyeur watching the subject of his lust undress night after night.

As an introductory text, my book does not seek to provide a list of necessary and sufficient conditions for ethical surveillance. What it does provide is an overview of the current thinking in surveillance ethics, looking at a range of proposed arguments about these questions, and how those arguments might play out in a variety of applied settings. It hence provides a useful and accessible volume for policymakers wishing to rapidly get up to speed on developments in surveillance and the accompanying ethical discussions.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Article
Publication date: 22 December 2022

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

This study aims to investigate the feasibility of employing a multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation. The…

Abstract

Purpose

This study aims to investigate the feasibility of employing a multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation. The formulated objectives are the minimisation of the total allocation cost of the anti-fraud capacities and the maximisation of the forensic accounting capacities in all cyberfraud incident prone spots.

Design/methodology/approach

From the literature survey conducted and primary qualitative data gathered from the 17 licenced banks in South Africa on fraud investigators, the suggested fraud investigators are the organisation’s finance department, the internal audit committee, the external risk manager, accountants and forensic accountants. These five human resource capacities were considered for the formulation of the multi-objectives integer programming (MOIP) model. The MOIP model is employed for the optimisation of the employed capacities for cyberfraud mitigation to ensure the effective allocation and utilisation of human resources. Thus, the MOIP model is validated by a genetic algorithm (GA) solver to obtain the Pareto-optimum solution without the violation of the identified constraints.

Findings

The formulated objective functions are optimised simultaneously. The Pareto front for the two objectives of the MOIP model comprises the set of optimal solutions, which are not dominated by any other feasible solution. These are the feasible choices, which indicate the suitability of the MOIP to achieve the set objectives.

Practical implications

The results obtained indicate the feasibility of simultaneously achieving the minimisation of the total allocation cost of the anti-fraud capacities, or the maximisation of the forensic accounting capacities in all cyberfraud incident prone spots – or the trade-off between them, if they cannot be reached simultaneously. This study recommends the use of an iterative MOIP framework for decision-makers which may aid decision-making with respect to the allocation and utilisation of human resources.

Originality/value

The originality of this work lies in the development of multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 27 August 2021

Laura Häkkilä and Timo Toikko

The paper presents a study on whether citizens’ immigration attitudes shape their attitudes towards social welfare in three Nordic countries.

Abstract

Purpose

The paper presents a study on whether citizens’ immigration attitudes shape their attitudes towards social welfare in three Nordic countries.

Design/methodology/approach

The main analysis was performed using linear regression analysis. Data were retrieved from the eighth round of the European Social Survey (2016). The data cover the Finnish, Norwegian and Swedish respondents (N = 5,021).

Findings

The analyses indicate that citizens’ immigration attitudes are associated with their social welfare attitudes. The more positive the attitudes towards immigration are, the more positive the attitudes toward social welfare will be. Further, people in the political Left have more positive attitudes towards social welfare compared to those in the political Right; but, the immigration issue is more divisive of the political Left’s opinion than that of the Right.

Research limitations/implications

Public opinion research has its limitations because behind an individual’s opinion there are many hidden factors. An individual may also have different opinions depending on the dimensions of the welfare state.

Social implications

If the immigration issue reduces the support for social welfare among the political Left, it may reduce the legitimacy of the Nordic social policy because the support of the political Left has traditionally been in favour of the universal principles of the welfare state.

Originality/value

The association of the immigration issue and social welfare attitudes has been broadly studied; but, the interaction of the immigration issue and political opinion on social welfare attitudes is less studied.

Details

International Journal of Sociology and Social Policy, vol. 41 no. 13/14
Type: Research Article
ISSN: 0144-333X

Keywords

Open Access
Article
Publication date: 26 February 2018

Li Lin, Peter Ping Li and Hein Roelfsema

As the global presence of Chinese firms grows, increasing numbers of Chinese managers are working abroad as expatriates. However, little attention has been paid to such Chinese…

9888

Abstract

Purpose

As the global presence of Chinese firms grows, increasing numbers of Chinese managers are working abroad as expatriates. However, little attention has been paid to such Chinese expatriate managers and their leadership challenges in an inter-cultural context, especially across a large cultural distance. To fill the gap in the literature concerning the leadership challenges for expatriate managers in an inter-cultural context, the purpose of this paper is to elucidate the leadership styles of Chinese expatriate managers from the perspectives of three traditional Chinese philosophies (i.e. Confucianism, Taoism, and Legalism) in the inter-cultural context of the Netherlands.

Design/methodology/approach

The data for this qualitative study were collected via semi-structured, open-ended, narrative interviews with 30 Chinese expatriate managers in the Netherlands.

Findings

The results clearly show that the leadership style of Chinese expatriate managers is deeply rooted in the three traditional Chinese philosophies of Confucianism, Taoism, and Legalism, even in an inter-cultural context. Specifically, the study reveals two salient aspects of how Chinese expatriate managers frame and interact with a foreign cultural context from the perspectives of traditional Chinese philosophies. First, the Chinese expatriate managers reported an initial cultural shock related to frictions between the foreign cultural context and Confucianism or Taoism, but less so in the case of Legalism. Second, the Chinese expatriate managers also reported that their interactions with the Dutch culture are best described as a balance between partial conflict and partial complementarity (thus, a duality). In this sense, the leadership style of Chinese expatriate managers is influenced jointly by the three traditional Chinese philosophies and certain elements of the foreign cultural context. This is consistent with the Chinese perspective of yin-yang balancing.

Originality/value

This study is among the first to offer a more nuanced and highly contextualized understanding of leadership in the unique case of expatriate managers from an emerging market (e.g. China) in an advanced economy (e.g. the Netherlands). The authors call for more research to apply the unique perspective of yin-yang balancing in an inter-cultural context. The authors posit that this approach represents the most salient implication of this study. For practical implications, the authors argue that expatriate leaders should carefully manage the interplay between their deep-rooted home-country philosophies and their salient host-country culture. Reflecting on traditional philosophies in another culture can facilitate inter-cultural leadership training for Chinese expatriates.

Details

Cross Cultural & Strategic Management, vol. 25 no. 2
Type: Research Article
ISSN: 2059-5794

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 10 June 2020

Claudia Dossena, Francesca Mochi, Rita Bissola and Barbara Imperatori

The research and practice agree that social media are reshaping strategy and organization rules across industries. Nevertheless, how social media can become a source of…

6263

Abstract

Purpose

The research and practice agree that social media are reshaping strategy and organization rules across industries. Nevertheless, how social media can become a source of competitive advantage remains under-investigated and there is no evidence about which capabilities and competencies can effectively and strategically exploit social media. By merging the literature on social media management and hospitality, the authors develop and test a theoretical framework that identifies the most relevant capabilities and competencies for using social media in the food service sector. The paper aims to map them and understand which ones are relevant according to different strategic choices of social media use.

Design/methodology/approach

The authors adopted a qualitative methodology using semi-structured interviews to managers or owners of 14 restaurants in a big city in Northern Italy.

Findings

The theoretical framework suggests that social media could be strategically used for different aims by relying on specific capabilities and competencies. The authors tested it and found that, though nowadays restaurant managers mainly focus on a narrow set of social media competencies linked to relational and marketing capabilities, some also rely on social media to promote organizational change and innovation.

Originality/value

The authors propose a theoretical framework and preliminary evidence on capabilities and competencies declined for the food service sector. The model considers different uses of social media and related capabilities and competencies by mapping them accordingly to their strategic use. The authors preliminarily validate our framework and highlight the competencies possessed by the restaurant managers of our sample and their alignment with the strategic use of social media.

Details

Journal of Tourism Futures, vol. 7 no. 1
Type: Research Article
ISSN: 2055-5911

Keywords

Open Access
Article
Publication date: 28 November 2023

Silvia Massa, Maria Carmela Annosi, Lucia Marchegiani and Antonio Messeni Petruzzelli

This study aims to focus on a key unanswered question about how digitalization and the knowledge processes it enables affect firms’ strategies in the international arena.

3840

Abstract

Purpose

This study aims to focus on a key unanswered question about how digitalization and the knowledge processes it enables affect firms’ strategies in the international arena.

Design/methodology/approach

The authors conduct a systematic literature review of relevant theoretical and empirical studies covering over 20 years of research (from 2000 to 2023) and including 73 journal papers.

Findings

This review allows us to highlight a relationship between firms’ international strategies and the knowledge processes enabled by applying digital technologies. Specifically, the authors discuss the characteristics of patterns of knowledge flows and knowledge processes (their origin, the type of knowledge they carry on and their directionality) as determinants for the emergence of diverse international strategies embraced by single firms or by populations of firms within ecosystems, networks, global value chains or alliances.

Originality/value

Despite digital technologies constituting important antecedents and critical factors for the internationalization process, and international businesses in general, and operating cross borders implies the enactment of highly knowledge-intensive processes, current literature still fails to provide a holistic picture of how firms strategically use what they know and seek out what they do not know in the international environment, using the affordances of digital technologies.

Details

Journal of Knowledge Management, vol. 27 no. 11
Type: Research Article
ISSN: 1367-3270

Keywords

1 – 10 of 80