Search results

1 – 10 of over 5000
Article
Publication date: 9 May 2023

Magnus Osahon Igbinovia and Bolanle Clifford Ishola

Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this…

Abstract

Purpose

Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this menace. Consequently, this study aims to examine cyber security in university libraries and its implication for Library and Information Science education.

Design/methodology/approach

The study adopted descriptive research design, while questionnaire and interview were used to elicit data from library personnel and heads of library schools, respectively. A total of 134 responses were elicited through structured questionnaire (administered online due to the closure of universities) while six heads of library schools were interviewed, one from each of the six geopolitical zones in Nigeria.

Findings

The data from the questionnaire which were descriptively analysed revealed that the perceived knowledge of cyber security among the librarians was moderately low. Also, the university libraries were exposed to various cyber threats, with cyber security/guideline been one of the critical measures to combat cybercrime. Also, the result showed that librarians displayed high level of adherence to cyber ethics. However, the disposition of library management towards cyber security issues was revealed to be the main challenge to the deployment of cyber security in university libraries, follow by poor password management. Majority of the librarians possess basic knowledge of cyber security, though with serious interest to learn more about it. They were not taught cyber security in library school and they indicated enthusiasm to learn about it. The result of the interview with heads of library schools showed majority of these schools do not offer cyber security course due to dearth in skilled manpower.

Originality/value

The study presents cybercrime as a menace, if not tackled, would affect the university libraries’ sustainability as information institution, compromising their ability to deliver quality services.

Details

Digital Library Perspectives, vol. 39 no. 3
Type: Research Article
ISSN: 2059-5816

Keywords

Article
Publication date: 5 October 2022

Shubhi Gupta and Govind Swaroop Pathak

However, while the benefits of adopting virtual work structures have been extensively discussed, ethical considerations have been largely ignored in the existing literature. To…

1192

Abstract

Purpose

However, while the benefits of adopting virtual work structures have been extensively discussed, ethical considerations have been largely ignored in the existing literature. To fill this gap, this study aims to investigate the key ethical issues associated with virtual workplaces. It also aimed to examine the various preventive measures that could be considered for effectively managing such challenges.

Design/methodology/approach

The study adopted an inductive research approach using qualitative methodology. Data was collected by executing the technique of dual moderator focus group discussion. By using the purposive sampling technique, the sample comprised 24 software professionals from emerging economies such as India. All sessions were transcribed, and the data were analysed using the content analysis method.

Findings

The study reports some interesting results related to various ethical issues and the preventive measures to handle such issues in virtual workplaces. The themes that emerged related to ethical issues have been categorised into three broad categories, i.e. People, Technology and Culture. In contrast, preventive measures have been reported in both contexts, i.e. pre-preventive and post-preventive measures. Furthermore, few recommendations have been made to improve virtual work experiences for remote work professionals. The identified themes and categories were classified and arranged in “Network View”, a feature embedded in Atlas.ti7 software, to analyse the conceptual relationships.

Practical implications

The findings may help managers regarding various ethical issues in virtual work settings. It may also provide an insight to the managers about the benefits of adopting preventive measures for handling ethical dilemmas in virtual workplaces in an emerging economy like India.

Originality/value

The study may be seen as one of the earliest attempts to consider the lingering debate on ethics in virtual workplaces. The findings of the study have implications for further theoretical research on the topic.

Details

European Journal of Training and Development, vol. 48 no. 1/2
Type: Research Article
ISSN: 2046-9012

Keywords

Article
Publication date: 9 January 2023

Stephen McCarthy, Wendy Rowan, Carolanne Mahony and Antoine Vergne

Social media platforms are a pervasive technology that continues to define the modern world. While social media has brought many benefits to society in terms of connection and…

1141

Abstract

Purpose

Social media platforms are a pervasive technology that continues to define the modern world. While social media has brought many benefits to society in terms of connection and content sharing, numerous concerns remain for the governance of social media platforms going forward, including (but not limited to) the spread of misinformation, hate speech and online surveillance. However, the voice of citizens and other non-experts is often missing from such conversations in information systems literature, which has led to an alleged gap between research and the everyday life of citizens.

Design/methodology/approach

The authors address this gap by presenting findings from 16 h of online dialog with 25 citizens on social media platform governance. The online dialog was undertaken as part of a worldwide consultation project called “We, the internet”, which sought to provide citizens with a voice on a range of topics such as “Digitalization and Me,” “My Data, Your Data, Our Data” and “A Strong Digital Public Sphere.” Five phases of thematic analysis were undertaken by the authors to code the corpus of qualitative data.

Findings

Drawing on the Theory of Communicative Action, the authors discuss three dialogical processes critical to citizen discourse: lifeworld reasoning, rationalization and moral action. The findings point toward citizens’ perspectives of current and future issues associated with social media platform governance, including concerns around the multiplicity of digital identities, consent for vulnerable groups and transparency in content moderation. The findings also reveal citizens’ rationalization of the dilemmas faced in addressing these issues going forward, including tensions such as digital accountability vs data privacy, protection vs inclusion and algorithmic censorship vs free speech.

Originality/value

Based on outcomes from this dialogical process, moral actions in the form of policy recommendations are proposed by citizens and for citizens. The authors find that tackling these dark sides of digitalization is something too important to be left to “Big Tech” and equally requires an understanding of citizens’ perspectives to ensure an informed and positive imprint for change.

Details

Internet Research, vol. 33 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Open Access
Article
Publication date: 27 June 2023

Teemu Birkstedt, Matti Minkkinen, Anushree Tandon and Matti Mäntymäki

Following the surge of documents laying out organizations' ethical principles for their use of artificial intelligence (AI), there is a growing demand for translating ethical…

7472

Abstract

Purpose

Following the surge of documents laying out organizations' ethical principles for their use of artificial intelligence (AI), there is a growing demand for translating ethical principles to practice through AI governance (AIG). AIG has emerged as a rapidly growing, yet fragmented, research area. This paper synthesizes the organizational AIG literature by outlining research themes and knowledge gaps as well as putting forward future agendas.

Design/methodology/approach

The authors undertake a systematic literature review on AIG, addressing the current state of its conceptualization and suggesting future directions for AIG scholarship and practice. The review protocol was developed following recommended guidelines for systematic reviews and the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA).

Findings

The results of the authors’ review confirmed the assumption that AIG is an emerging research topic with few explicit definitions. Moreover, the authors’ review identified four themes in the AIG literature: technology, stakeholders and context, regulation and processes. The central knowledge gaps revealed were the limited understanding of AIG implementation, lack of attention to the AIG context, uncertain effectiveness of ethical principles and regulation, and insufficient operationalization of AIG processes. To address these gaps, the authors present four future AIG agendas: technical, stakeholder and contextual, regulatory, and process. Going forward, the authors propose focused empirical research on organizational AIG processes, the establishment of an AI oversight unit and collaborative governance as a research approach.

Research limitations/implications

To address the identified knowledge gaps, the authors present the following working definition of AIG: AI governance is a system of rules, practices and processes employed to ensure an organization's use of AI technologies aligns with its strategies, objectives, and values, complete with legal requirements, ethical principles and the requirements set by stakeholders. Going forward, the authors propose focused empirical research on organizational AIG processes, the establishment of an AI oversight unit and collaborative governance as a research approach.

Practical implications

For practitioners, the authors highlight training and awareness, stakeholder management and the crucial role of organizational culture, including senior management commitment.

Social implications

For society, the authors review elucidates the multitude of stakeholders involved in AI governance activities and complexities related to balancing the needs of different stakeholders.

Originality/value

By delineating the AIG concept and the associated research themes, knowledge gaps and future agendas, the authors review builds a foundation for organizational AIG research, calling for broad contextual investigations and a deep understanding of AIG mechanisms. For practitioners, the authors highlight training and awareness, stakeholder management and the crucial role of organizational culture, including senior management commitment.

Details

Internet Research, vol. 33 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 9 August 2022

Shivangi Verma, Naval Garg and Thangaraja Arumugam

The present study aims to examine the relationship between techno-ethical orientation and ethical decision-making (EDM) in Indian supply chain companies during the COVID-19…

Abstract

Purpose

The present study aims to examine the relationship between techno-ethical orientation and ethical decision-making (EDM) in Indian supply chain companies during the COVID-19 pandemic. It also aims to explore the moderating role of technological frames (TF) in the relationship between techno-ethical orientation and EDM.

Design/methodology/approach

The relationship between techno-ethical orientation and EDM is examined using correlation and regression analysis. The moderating effect of five dimensions of TFs (personal attitude, application value, organisational influence, supervisor influence and industry influence) is analysed using structural equation modelling.

Findings

The correlation coefficient between techno-ethical orientation and EDM is 0.513. Also, the regression coefficient (β = 0.213) is significant at 0.05, establishing a positive linkage between the two. R-square values showed a 45.2% variation in EDM is explained by techno-ethical orientation. Similarly, all variables of TFs have a positive and significant moderating effect on the relationship between techno-ethical orientation and EDM.

Originality/value

This is one of the pioneer studies exploring techno-ethical orientation’s impact on EDM in supply chain companies.

Details

The International Journal of Logistics Management, vol. 34 no. 4
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 3 May 2023

Yuanye Ma

Privacy has been understood as about one’s own information, information that is not one’s own is not typically considered with regards to an individual’s privacy. This paper aims…

Abstract

Purpose

Privacy has been understood as about one’s own information, information that is not one’s own is not typically considered with regards to an individual’s privacy. This paper aims to draw attention to this issue for conceptualizing privacy when one’s privacy is breached by others’ information.

Design/methodology/approach

To illustrate the issue that others' information can breach one's own privacy, this paper uses real-world applications of forensic genealogy and recommender systems to motivate the discussion.

Findings

In both forensic genealogy and recommender systems, the individual’s privacy is breached by information that is not one’s own. The information that breached one’s privacy, by its nature, is beyond the scope of an individual, which is a phenomenon that has already been captured by emerging discussions about group privacy. This paper further argues that the underlying issue reflected by the examples of forensic genealogy is an extreme case even under the consideration of group privacy. This is because, unlike recommender systems that rely on large amounts of data to make inferences about an individual, forensic genealogy exposes one’s identity by using only one other individual’s information. This paper echoes existing discussions that this peculiar situation where others’ information breaches one’s own privacy reveals the problematic nature of conceptualizing privacy relying only on individualistic assumptions. Moreover, this paper suggests a relational perspective as an alternative for theorizing privacy.

Originality/value

This situation that others’ information breached one’s own privacy calls for an updated understanding of not only privacy but also the relationship between the person and their information. Privacy scholars need to renew their ethical language and vocabularies to properly understand the issue, which recent privacy conceptualizations are already doing (e.g. group privacy).

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 2 February 2023

Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger and Erik S. Boyle

Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information…

Abstract

Purpose

Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information systems, carried out to coerce people or governments to further the social or political objectives of the attacker. Cyber terrorism is costly in terms of impaired operations and damaged assets. Cyber terrorism harms a firm’s reputation, thereby negatively affecting a firm’s stock market valuation. This poses grave worries to company management, financial analysts, creditors and investors. This study aims to evaluate the effect of cyber terrorism on the market value of publicly traded firms.

Design/methodology/approach

Financial information was obtained on business firms that were featured in news stories as targets of cyber terrorism. The firm’s stock price was recorded for 1, 3 and 7 days before and after the news article. Percentage changes in the firm’s stock price were compared to percentage changes in the Dow Jones Index to ascertain whether the firm’s stock price went up or down matching the market overall.

Findings

Results indicate that stock prices are significantly negatively affected by news of cyber terrorist attacks on companies. In all three time periods after the cyber terrorist attack, there was a significant negative decline in the stock value relative to the Dow Jones Index. Thus, the market valuation of the firm is damaged. As a result, the shareholders and institutions are financially damaged. Furthermore, exposed system vulnerability may lead to loss of business from consumers who have reduced confidence in the firm’s operations.

Practical implications

This paper examines the risks posed by cyber terrorism, including its impact on individual business firms, which in turn affect entire national economic systems. This makes clear the high value of cybersecurity in safeguarding computer systems. Taking steps to avoid being a victim of cyber terrorism is an important aspect of cybersecurity. Preventative steps are normally far less costly than rebuilding an information system after a cyber terrorist attack.

Originality/value

This study is original in examining the effect of cyber terrorism on the stock value of a company.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 19 July 2021

Ewald Kuoribo, De-Graft Owusu-Manu, Roland Yomoah, Caleb Debrah, Alex Acheampong and David John Edwards

The construction industry is an enabler of economic growth in developing countries, but its performance is governed by the professional behaviour of construction professionals…

Abstract

Purpose

The construction industry is an enabler of economic growth in developing countries, but its performance is governed by the professional behaviour of construction professionals. Unethical behaviour (UB) breaches codes of practice and undermines economic performance hence, ubiquitous academic attention has been given to understanding this phenomenon. This paper aims to contribute to the ensuing discourse by reporting upon the most critical ethical behaviours (EBs and UBs) of professionals in the Ghanaian construction industry (GCI).

Design/methodology/approach

The study compounded identified factors into a closed-ended questionnaire in a quantitative research strategy. Data analysis was conducted using the relative importance index and one sample t-test. To measure the reliability of the scale, Cronbach’s alpha was used, which indicated that all measured items were reliable for further analysis.

Findings

The study confirmed that professionals within the GCI are aware of the existence of UBs and revealed that the most prevalent ethical conducts exhibited, namely, level of accuracy, accountability, honesty, reliability, fairness and respect for colleagues. Common unethical conducts exhibited included: favouritism, bribery and corruption, professional negligence, falsification, fraud and overbilling.

Research limitations/implications

The study reported on the dominant ethical conduct among built environment professionals. The claims put forward in the analysis are, thus, affected by Ghana’s social, economic and political environments, which could restrict the generalization of the findings.

Practical implications

Incipient findings presented from this research will guide stakeholders to develop and device strategies that will aid alleviate persistent ethical issues within the built environment.

Social implications

The study highlights individuals’ perspectives on ethical issues persistent in the built environment. The findings suggest individuals adhere to ethical practices in a project environment by the evidence presented.

Originality/value

This pioneering study is a novel assessment on EBs and UBs of built environment professionals in the GCI. The study supplementary adds value to the literature on ethical and unethical practices. By identifying these practices, construction firms have a competitive edge in combating UB and promoting EB among built environment professionals in the GCI.

Details

Journal of Engineering, Design and Technology , vol. 21 no. 3
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 6 June 2022

Fabian Maximilian Johannes Teichmann and Chiara Wittmann

The European Union’s Whistleblower Directive (WBD), or formally the “Directive (EU) 2019/1937 of the European Parliament and of the Council of 23 October 2019 on the protection of…

Abstract

Purpose

The European Union’s Whistleblower Directive (WBD), or formally the “Directive (EU) 2019/1937 of the European Parliament and of the Council of 23 October 2019 on the protection of persons reporting infringements of Union law” seeks to establish a uniform standard for whistleblowing protection across member state jurisdictions. Considering the international reach of the directive, it inevitably confronts divergent national attitudes towards whistleblowing. This paper aims to examine various cultural attitudes which have contributed to the common understanding of whistleblowing, under the directive.

Design/methodology/approach

The rhetoric on whistleblowing from a combination of business and national cultures is examined herein. A focus is cast on the information technology sector, which has traditionally protected trade secrecy over whistleblowing, under the guise of protecting of innovation. Moreover, the juxtaposition of American and German employment culture is testimony to the discrepancy in national narratives.

Findings

The WBD is both a symptom and a yardstick of modern employment culture in Europe. There are crucial clashes with trade secrecy which the directive has not resolved as well as an acknowledgement of the paradigm of legal thought which the directive pushes.

Originality/value

By reference to both business and national culture, this paper highlights the heterogenous conception of whistleblowing which the directive aims to reconcile. Whilst a vast amount of literature has covered isolated criticism of the WBD, a wider lens has not been cast to consider the pervasive influence of specific aspects on business culture.

Details

Journal of Financial Crime, vol. 30 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 19 July 2023

Magnus Söderlund

Service robots are expected to become increasingly common, but the ways in which they can move around in an environment with humans, collect and store data about humans and share…

1183

Abstract

Purpose

Service robots are expected to become increasingly common, but the ways in which they can move around in an environment with humans, collect and store data about humans and share such data produce a potential for privacy violations. In human-to-human contexts, such violations are transgression of norms to which humans typically react negatively. This study examines if similar reactions occur when the transgressor is a robot. The main dependent variable was the overall evaluation of the robot.

Design/methodology/approach

Service robot privacy violations were manipulated in a between-subjects experiment in which a human user interacted with an embodied humanoid robot in an office environment.

Findings

The results show that the robot's violations of human privacy attenuated the overall evaluation of the robot and that this effect was sequentially mediated by perceived robot morality and perceived robot humanness. Given that a similar reaction pattern would be expected when humans violate other humans' privacy, the present study offers evidence in support of the notion that humanlike non-humans can elicit responses similar to those elicited by real humans.

Practical implications

The results imply that designers of service robots and managers in firms using such robots for providing service to employees should be concerned with restricting the potential for robots' privacy violation activities if the goal is to increase the acceptance of service robots in the habitat of humans.

Originality/value

To date, few empirical studies have examined reactions to service robots that violate privacy norms.

Details

Journal of Service Theory and Practice, vol. 33 no. 7
Type: Research Article
ISSN: 2055-6225

Keywords

Access

Year

Last 12 months (5706)

Content type

Article (5706)
1 – 10 of over 5000