Search results

1 – 10 of 125
Open Access
Article
Publication date: 3 May 2022

Matteo Cristofaro, Pier Luigi Giardino, Sanjay Misra, Quoc Trung Pham and Hai Hiep Phan

This paper claims to identify the behavioral and cultural features that push to use, or not, cryptocurrencies for electronic commerce. Indeed, despite the use of cryptocurrencies…

4902

Abstract

Purpose

This paper claims to identify the behavioral and cultural features that push to use, or not, cryptocurrencies for electronic commerce. Indeed, despite the use of cryptocurrencies for electronic commerce spreading worldwide at a fast and growing pace, there are supporters and detractors among their users. The analysis of what distinguish these two groups of users is fundamental for understanding their different intention to use cryptocurrencies for electronic commerce.

Design/methodology/approach

A survey has been administered to 2,532 cryptocurrencies’ users across the USA and China, collecting data on their behavioral predispositions and cultural features. Results were then analyzed through structured equation modeling.

Findings

Results showed that while attitude, subjective norms, perceived behavioral control and herding behavior have a positive impact on the intention to use cryptocurrencies for electronic commerce, financial literacy has no influence. Cultural dimensions amplified or reduced the discovered relationships and caused different effects: positive for the USA and negative for China when considering illegal attitude and perceived risk.

Originality/value

Theory of planned behavior, financial behavior and cultural factors can, all together, represent a useful framework for envisioning the behavior of users in adopting cryptocurrencies for electronic commerce purposes through a test of all its elements. To the best of the authors’ knowledge, this is the first study considering behavior and cultural variables on the intention to use cryptocurrencies for electronic commerce as well as being the largest carried out, in terms of sample, on the cryptocurrency topic.

Details

Management Research Review, vol. 46 no. 3
Type: Research Article
ISSN: 2040-8269

Keywords

Open Access
Article
Publication date: 6 November 2017

Bee Leng Chew, Marnisya Abdul Rahim and Vighnarajah Vighnarajah

Recent advancement in technological development has encouraged distance learning institutions to be more productive and creative in effectively utilizing the Learning Management…

3724

Abstract

Purpose

Recent advancement in technological development has encouraged distance learning institutions to be more productive and creative in effectively utilizing the Learning Management System (LMS). Among the many measures employed is the integration of federated search engine into the LMS which allows for a more productive and wider scope of information retrieval through the provisions of library resources and services. The purpose of this paper is to report one such case study in Wawasan Open University exploring the integration of federated search engine (EBSCO Discovery Service (EDS) widget) into the learning spaces of LMS. Widgets resemble apps that enable the integration of EDS functionality in providing access for students to retrieve library learning resources from the convenience of the LMS, excluding the need to log onto the library.

Design/methodology/approach

This paper presents a discussion that highlights the development and conjectural implementation of a framework on the integration of the EDS widget into the University’s LMS. Data collection includes meta-analysis data from the micro- and macro-level infrastructure that make up the framework, namely, end-user layer, system layer and data management layer.

Findings

Findings from this study addressed significant importance to the library in promoting effective search and utilization of information needs. The findings will also make clear recommendations in developing effective collaborations between the library and faculties. Although the implementation of this framework is still in a developmental stage, this study still provides pertinent information in validating the integration of EDS into the University’s LMS.

Research limitations/implications

While serious limitations are not anticipated, possible concerns do exist with programming algorithms in the integration of EDS into the LMS. These challenges will be reported in the paper as reference for future replications of study

Practical implications

One key implication is the increase in the usage of the library resources and the potential to reach a larger audience of remote library users.

Originality/value

The primary advantage is to minimize the need for multiple gateway login while ensuring the library to monitor relevant library databases activities throughout the system check of the LMS.

Details

Asian Association of Open Universities Journal, vol. 12 no. 2
Type: Research Article
ISSN: 2414-6994

Keywords

Open Access
Article
Publication date: 3 May 2022

Zakayo Kjellström

This paper aims to show how an illegal repository of literature, the Z-library, relates to and influences its users and how this relation is unique due to the illegal nature of…

4185

Abstract

Purpose

This paper aims to show how an illegal repository of literature, the Z-library, relates to and influences its users and how this relation is unique due to the illegal nature of the platform. The paper utilizes the idea of gamification to exemplify how to motivate users to contribute to a large shadow library in order to create the “world's largest e-book library,” sans “librarians.”

Design/methodology/approach

The study makes use of an ethnographic approach. It interrogates the functions of the website through intensive use—a close reading of sorts. The data provide a foundation for illustrating how illegal text repositories function at a surface level and how their design appeals to their user-base.

Findings

The paper provides a thorough and non-biased overview of how a “black open access” or “shadow library” site provides its users with pirated literature. It suggests that the lynchpin sustaining their functionality is a gamification of piracy designed to motivate a fragmented collective of individuals who work primarily for personal reward, rather than altruistic goals.

Research limitations/implications

Due to the design of the study, the findings are not universal or applicable to all illegal repositories of text. Readers and researchers are encouraged to apply the concept introduced here to other cases.

Social implications

This paper includes implication on the perception of literature piracy, how pirated literature is distributed and who performs the labor required to sustain illicit text repositories.

Originality/value

This paper provides a novel conceptual basis to study literature piracy.

Details

Journal of Documentation, vol. 78 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 20 October 2022

Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…

1202

Abstract

Purpose

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.

Design/methodology/approach

The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.

Findings

This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.

Research limitations/implications

The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.

Practical implications

Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.

Social implications

Shared awareness and protection of ICT resources.

Originality/value

Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 18 April 2023

Keenan Cross

The purpose of this study is to survey the landscape of online collections of digital games.

Abstract

Purpose

The purpose of this study is to survey the landscape of online collections of digital games.

Design/methodology/approach

First, the study identifies existing sites hosting collections and criteria that make a collection valuable for research, then it reports on sites that fit the criteria and analyzes trends.

Findings

Most sites provide simple binary downloads, but some choose encapsulation. Common metadata terms consistently include genre, year of release and publisher. Most sites claim the right to provide their collections as “abandonware,” but remove games if they are asked to.

Research limitations/implications

This study was conducted using a very limited subcategory of digital games, which could be expanded in other studies. Future research may require a multilingual team to account for collections based in non–English-speaking countries. Direct communication with sites’ management may be valuable in the future as well, but was not conducted in this study.

Practical implications

The study identifies practices that have developed organically in this field without any guiding standards. Understanding these may aid in Humanities research into digital games, as well as potential collection development in the future.

Social implications

Digital games are increasingly important as cultural artifacts, and there is a growing effort to preserve them for the future, but there are no standards for collecting and providing them. Understanding how this is currently done can help in providing access into the future for both casual and analytical use.

Originality/value

While game preservation is a growing and active field of research, no study has been published in recent years on this particular subject. It will be valuable for the development of future collections and for research using current ones.

Details

Digital Transformation and Society, vol. 2 no. 2
Type: Research Article
ISSN: 2755-0761

Keywords

Open Access
Article
Publication date: 2 June 2022

Marie Eneman

This article aims to describe the personal experience and ethical dilemmas that the author encountered when conducting qualitative research on a highly sensitive topic, i.e…

1058

Abstract

Purpose

This article aims to describe the personal experience and ethical dilemmas that the author encountered when conducting qualitative research on a highly sensitive topic, i.e. interviews with offenders convicted of child pornography.

Design/methodology/approach

This study uses an autoethnographic approach to describe and reflect on my personal experience, emotions and ethical dilemmas when undertaking sensitive research that examines illegal acts.

Findings

Ethical dilemmas and emotional challenges highlighted refer to the issue of access to useful empirical material, conducting interviews with convicted offenders in prison environments, the complexity surrounding confidentiality when interviewing offenders about their criminal activities, vulnerability and insecurity for the researcher and emotional challenges for the researcher when listening to the offenders’ stories describing serious crimes against children.

Originality/value

This article contributes with insights and reflections on conducting qualitative research with a marginalized and stigmatized group in prison environments.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 6 May 2014

Rachel Spacey, Louise Cooke, Adrienne Muir and Claire Creaser

The purpose of this paper is to review current knowledge, research and thinking about the difficulties facing public libraries offering internet access to their users in ensuring…

8812

Abstract

Purpose

The purpose of this paper is to review current knowledge, research and thinking about the difficulties facing public libraries offering internet access to their users in ensuring legally compliant and non-offensive use of this facility whilst still adhering to the professional value of freedom of access to information.

Design/methodology/approach

A range of recently published sources (1997-2013) relating to the technical and organisational measures used to manage public internet access primarily in public libraries in the UK with some limited international examples were reviewed and analysed. This work was undertaken as the underpinning research for an AHRC-funded project, MAIPLE (Managing Access to the internet in Public Libraries).

Findings

The provision of public internet access is a well-established component of the role of public libraries, but is seen as a potential problem due to the possibility of misuse, and it appears that simplistic technical solutions have disappointed. Legislation increases the need for more effective solutions that can provide a balance between the need for legal compliance, a welcoming environment for users, and the protection of key freedoms. A range of measures are being adopted worldwide in response to this dilemma.

Originality/value

Research exploring internet access in public libraries and its management in the UK is numerically small and much of it dates back to the start of the twenty-first century. This review presents a comprehensive analysis of the available literature and is of relevance to practitioners and academics in the fields of public librarianship.

Details

Journal of Documentation, vol. 70 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 23 March 2023

Rubel Amin, Bijay Prasad Kushwaha and Md Helal Miah

This paper examines the process optimization method of the online sales model of information product demand concerning the spillover effect. It illustrates the spillover effect…

Abstract

Purpose

This paper examines the process optimization method of the online sales model of information product demand concerning the spillover effect. It illustrates the spillover effect (SE) of online product demand compared with traditional market demand. Also, optimized the SE for the ethical and ordinary consumer.

Design/methodology/approach

This article primarily focused on two types of models for online marketing: one is wholesales, and another is the agency. Firstly, the wholesale and agency models without SE and the wholesale and agency models with SE are constructed, respectively, to realize the SE in different sales models. Secondly, online channel participants' optimal price, demand and profit under variant conditions are compared and analyzed. Finally, efficient supply chain theory is optimized for the decision-making of online marketing consumers using an equation-based comparative analysis method.

Findings

The study found that when SEs are not considered, stronger piracy regulation makes online channel participants more beneficial. When the positive SE is strong, it is detrimental to manufacturers. When SEs are not considered, online channel participants only reach Pareto in agency mode. Pareto optimality can be achieved in wholesale and agency modes when SEs are considered.

Originality/value

The research has practical implications for an effective supply chain model for online marketing. This is the first algorithm-based comparative study concerning theoretical spillover effect analysis in supply chain management.

Details

Journal of International Logistics and Trade, vol. 21 no. 2
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Article
Publication date: 14 March 2016

Adrienne Muir, Rachel Spacey, Louise Cooke and Claire Creaser

This paper aims to consider selected results from the Arts and Humanities Research Council (AHRC)-funded “Managing Access to the internet in Public Libraries” (MAIPLE) project…

5002

Abstract

Purpose

This paper aims to consider selected results from the Arts and Humanities Research Council (AHRC)-funded “Managing Access to the internet in Public Libraries” (MAIPLE) project, from 2012-2014. MAIPLE has explored the ways in which public library services manage use of the internet connections that they provide for the public. This included the how public library services balance their legal obligations and the needs of their communities in a public space and the ethical dilemmas that arise.

Design/methodology/approach

The researchers used a mixed-method approach involving a review of the literature, legal analysis, a questionnaire survey and case studies in five public library authorities.

Findings

UK public library services use a range of methods to regulate internet access. The research also confirms previous findings that filtering software is an ubiquitous tool for controlling access to and protecting library users from “inappropriate”, illegal and harmful internet content. There is a general, if sometimes reluctant, acceptance of filtering software as a practical tool by library staff, which seems to contrast with professional codes of ethics and attitudes in other countries. The research indicates that public library internet access will be a valued service for some time to come, but that some aspects of how public library services regulate internet access is currently managed can have socially undesirable consequences, including blocking legitimate sites and preventing users from accessing government services. Education could play a greater part in helping the general population to exercise judgement in selection of materials to view and use. This does not preclude implementing stricter controls to protect children, whilst allowing public libraries to continue providing a social good to those who are unable to otherwise participate in the digital age.

Research limitations/implications

The response to the survey was 39 per cent meaning that findings may not apply across the whole of the UK. The findings of this study are compared with and supplemented by other quantitative sources, but a strength of this study is the depth of understanding afforded by the use of case studies.

Originality/value

This paper provides both a quantitative and qualitative analysis of how internet access is managed in UK public libraries, including how library services fulfil their legal obligations and the ethical implications of how they balance their role in facilitating access to information with their perceived role as a safe and trusted environment for all members of their communities. The findings add to the international discussion on this issue and stimulate debate and policy making in the UK.

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 20 July 2020

Jarmo Saarti and Kimmo Tuominen

Although resource sharing between scholars is evolving rapidly, This paper uses paper-based interlibrary lending (ILL) procedures in the service repertoire of academic libraries…

2648

Abstract

Purpose

Although resource sharing between scholars is evolving rapidly, This paper uses paper-based interlibrary lending (ILL) procedures in the service repertoire of academic libraries. However, the current business model of acquiring toll-access journals and e-books does not seem to fit very well with traditional ILL practices. In addition, the new models of peer-to-peer resource sharing between academics seem to be much more effective than ILL. Scholars arrange access to the needed publications by using legal (buying, exchanging) and illegal means (Sci-Hub, etc.). Furthermore, the demands for open access have increased, voiced not only by librarians and science funders but also by politicians. This development might change the scholarly publication ecosystem, even though older publications are still likely to remain closed.

Design/methodology/approach

This paper contrasts the ILL and usage statistics of Finnish university libraries with the use of ResearchGate, a popular academic social network, which we treat as an example of a peer-to-peer sharing service.

Findings

Based on the data, there seems to be a change of paradigm in the resource sharing: the traditional ILL seems to be decreasing and becoming more like a niche service and the digital use and use of social media peer-to-peer resource sharing applications seem to increase rapidly.

Originality/value

The paper examines current resource sharing trends. The analysis is based on the data of Finnish resource sharing, interlibrary lending and ResearchGate usage.

Details

Information Discovery and Delivery, vol. 49 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

1 – 10 of 125