Search results
1 – 10 of over 4000Yafei Feng, Yongqiang Sun, Nan Wang and Xiao-Liang Shen
Sharing co-owned information on social network platforms has become a common and inevitable phenomenon. However, due to the uniqueness of co-owned information, the privacy…
Abstract
Purpose
Sharing co-owned information on social network platforms has become a common and inevitable phenomenon. However, due to the uniqueness of co-owned information, the privacy calculus theory based on a single information owner cannot explain co-owned information disclosure. Therefore, this study tries to investigate the underlying mechanism of users’ co-owned information disclosure from a collective privacy calculus perspective.
Design/methodology/approach
Through a survey of 740 participants, covariance-based structural equation modeling (CB-SEM) was used to verify the proposed model and hypotheses.
Findings
The results show that personal benefit, others’ benefit and relationship benefit promote users’ co-owned information disclosure by positively affecting personal distributive fairness and others’ distributive fairness perception. Meanwhile, personal privacy risk and others’ privacy risk prevent users’ co-owned information disclosure by negatively affecting personal distributive fairness and others’ distributive fairness perception. Besides, others’ information ownership perception enhances the positive effect of others’ distributive fairness perception on co-owned information disclosure intention. Furthermore, others’ information ownership strengthens the mediating role of others’ distributive fairness.
Research limitations/implications
The findings of this study enrich the research scope of information disclosure and privacy calculus theory and help social network platform developers design collective privacy protection functions.
Originality/value
This study develops a collective privacy calculus model to understand users’ co-owned information disclosure on social network platforms, confirming the mediating role of collective distributive fairness and the moderating role of others’ information ownership perception in the process of collective privacy calculus.
Details
Keywords
Ethiopia has enacted laws on transparency and disclosure of information in state-owned enterprises (SOEs). However, these laws are not strict enough, with the transparency and…
Abstract
Purpose
Ethiopia has enacted laws on transparency and disclosure of information in state-owned enterprises (SOEs). However, these laws are not strict enough, with the transparency and disclosure practices disappointing in the country. Thus, this study aims to investigate the legal framework governing transparency and disclosure in SOEs.
Design/methodology/approach
This study uses doctrinal, qualitative and comparative approaches. Domestic legal texts are appraised based on the organization for economic co-operation and development Guideline on Corporate Governance of State-owned Enterprises, the World Bank Toolkit on Corporate Governance of State-owned Enterprises and best national practices. This approach has been further corroborated by qualitative analysis of the basic principles of transparency and disclosure.
Findings
The finding reveals that the laws on transparency and disclosure do not comply with global practices and are inadequate to ensure transparency and discourse in SOEs. They fail to establish appropriate disclosure frameworks and practices at the SOE and state-ownership entity levels. They also indiscriminately subject enterprises to multiple auditing functions and conflicting responsibilities.
Originality/value
To the author’s knowledge, this study is the first legal literature on transparency and disclosure in Ethiopian SOEs. This study assists the state as owner in reforming the laws and uplifting SOEs from their current unpleasant condition. It can also become a reference for future research.
Details
Keywords
The purpose of this study is to examine the impact of cross-ownership on corporate digital innovation and their specific mechanisms. Cross-ownership, who hold equity in two or…
Abstract
Purpose
The purpose of this study is to examine the impact of cross-ownership on corporate digital innovation and their specific mechanisms. Cross-ownership, who hold equity in two or more companies simultaneously, have two different types of governance effects in the capital market: governance synergistic effects and competitive collusion effects.
Design/methodology/approach
This paper uses a panel model, selecting A-share company data from 2011 to 2021 in China. In total, 23,853 valid data were obtained, which came from the CSMAR database and Wind database. For some missing data, they were manually supplemented by consulting the company's annual report and Sina Finance. Data processing was conducted using EXCEL and Stata16.0 software.
Findings
The results show that cross-ownership promote corporate digital innovation by leveraging governance synergies. Further grouping tests show that the synergistic effects of cross-ownership are significant in non-state-owned, high-tech, weakly competitive and higher analyst attention enterprises. Mechanism testing shows that cross-ownership can empower corporate digital innovation in three ways: reducing information asymmetry, alleviating financing constraints and improving corporate governance.
Originality/value
The conclusion of this paper provides new empirical evidence for a comprehensive understanding of the role of cross-ownership in corporate development, enriches the economic consequences research of chain institutional investors in China and broadens the research perspective of corporate digital innovation. It also provides important references for the digital transformation of enterprises and the healthy development of the capital market.
Details
Keywords
Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…
Abstract
Purpose
Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.
Design/methodology/approach
Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.
Practical implications
Based on the findings, the authors provided several implications for app stores, app developers and app marketers.
Originality/value
This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.
Details
Keywords
The implementation of the Directive 2015/849 of the European Parliament and of the Council of 20 May 2015 on the prevention of the use of the financial system for the purposes of…
Abstract
Purpose
The implementation of the Directive 2015/849 of the European Parliament and of the Council of 20 May 2015 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing resulted in the enactment by the Polish Parliament of the Act of March 1, 2018, on the prevention of money laundering and terrorist financing. One of the most important issues identified in the Act was the establishment of the Central Register of Beneficial Owners. The purpose of this paper is to critically analyze the functioning of the Register in Poland from the perspective of three years since its establishment. The text presents the most important problems faced by reporting institutions and obliged entities due to discrepancies in the interpretation of the Act’s provisions – especially in terms of the definition of a beneficial owner.
Design/methodology/approach
The basic research approach was a comparative content analysis method. The objects of analysis included Polish Laws, Directive of the European Parliament and the Council (EU) 2015/849 and the judgment of the Court of Justice of the European Union. The theoretical legislative assumptions contained in the Acts were compared with reports, studies and communications prepared by public and private institutions. This made it possible to draw conclusions regarding the causes of problems with the functioning of the Register in Poland.
Findings
The results of the research showed that the ambiguity of the definition of the beneficial owner leads to a number of problems on the part of reporting institutions, such as companies, foundations and associations. On the other hand, a large part of the data entered in the Register is questioned by obliged entities. The lack of personal data protection is also a problem. Consequently, this reduces the value of the Register as a tool that effectively mitigates the risk of money laundering.
Research limitations/implications
The research focused only on the functioning of the Central Register of Beneficial Owners in Poland. The subject of the analysis addressed problems with the definition of beneficial owner, issues of data quality and openness and the process of verifying the Register’s data. The technical aspects of the Register operation and the financial penalties imposed by public oversight institutions were not reviewed. Also, no comparison was made with other European Union (EU) member states that have implemented Directive of the European Parliament and of the Council (EU) 2015/849.
Originality/value
This study discusses the important issue of regulatory requirements introduced under EU regulations for private companies. Familiarization of companies, NGOs and obliged entities with the conclusions of the study can positively influence the consolidation of the correct interpretative path. In addition, to the best of the author’s knowledge, this is the first scientific text that identifies and systematizes the most important problems of the Register’s functioning in Poland.
Details
Keywords
Yajun Guo, Huifang Ma, Jiahua Zhou, Yanchen Chen and Yiming Yuan
This article aims to understand users' information needs in the metaverse communities and to analyze the similarities and differences between their information needs and those of…
Abstract
Purpose
This article aims to understand users' information needs in the metaverse communities and to analyze the similarities and differences between their information needs and those of users in Internet communities.
Design/methodology/approach
This study conducted semi-structured interviews with users in the metaverse communities to gather raw data. Grounded theory research methods were employed to code and analyze the collected interview data, resulting in the extraction of 40 initial concepts, 15 subcategories and 5 main categories. Based on Maslow’s hierarchy of needs theory, this paper constructs the hierarchical model of users' information needs in the metaverse communities. It compares the differences between users' information needs in the metaverse and Internet fields.
Findings
The user’s information needs in the metaverse communities are divided into two types: deficiency needs and growth needs. Deficiency needs have two levels. The first level is the demand for basic information resources. The second level is the users demand for information assistance. Growth needs have three levels. The first level is the need for information interactions. The second level is the need for community rules. The ownership information in the community rules can provide proof of user status, assets and so on. The third level is the need for users to contribute and share their own created information content.
Originality/value
This article presents the latest research data from in-depth interviews with users in the metaverse communities. It aims to help builders and managers of metaverse communities understand users' information needs and improve the design of virtual communities.
Details
Keywords
This study aims to explore the eye movement behavior of preadolescent children accessing and diagnosing information.
Abstract
Purpose
This study aims to explore the eye movement behavior of preadolescent children accessing and diagnosing information.
Design/methodology/approach
The researchers tracked the eye movements of 30 children with an eye-tracking apparatus. Using the kit of factor-referenced cognitive tests to measure perceptual speed and associative memory, they measured information-searching behavior with screen recordings, the data of which were analyzed by IBM SPSS Statistics 26.
Findings
Regarding information accessibility, there was a correlation between the child’s age, associative memory and the number of round-trip choices, and there were differences in the total fixation area among children of different age groups. Regarding diagnosticity, perceptual speed was positively correlated with the total fixation area, and the number of round-trip choices was negatively correlated with fixation duration.
Originality/value
Empirical evidence suggests that during information encoding, perceptual speed is the most important influencing factor. Extensive research indicates that children predominantly rely on recall and familiarity when searching for new information, both of which play roles in associative memory. Through an examination of the psychological and behavioral indicators of children, the study elucidated the cognitive processes involved in information processing and how children engage with information at both visual and cognitive levels.
Details
Keywords
Hani El-Chaarani and Zouhour El-Abiad
The purpose of this research is to reveal the impact of public legal protection on the efficiency of internal corporate governance in banks. In addition, this research proposes a…
Abstract
Purpose
The purpose of this research is to reveal the impact of public legal protection on the efficiency of internal corporate governance in banks. In addition, this research proposes a new corporate governance index that could be employed by the banking sector to evaluate the performance of their internal corporate governance mechanisms.
Design/methodology/approach
Orbis database, annual reports and direct questionnaire are used to collect corporate governance data of 127 banks from 14 countries during 2020. The Mann–Whitney U-test is employed to compare the efficiency of corporate governance mechanisms based on three subsamples of countries having different legal protection levels (weak, middle and strong).
Findings
This research suggests a new corporate governance index for banks based on seven constructs and 62 variables. This new non-parametric index could be used by bankers to improve the monitoring process and enhance the overall performance of banking. The results of this research show that the existence of a strong public legal protection environment within a specific country enhances the efficiency of corporate governance mechanisms in the banking sector and thus, leads to improve the protection of shareholders, depositors and other relevant stakeholders. However, in countries that are characterized by weak legal protection level, the efficiency of corporate governance mechanisms is very low and there are possibilities of entrenchment, expropriation and extraction of private benefits. These findings could be interpreted within the prediction of agency, moral hazard, asymmetric information, political and entrenchment theories.
Originality/value
This research paper provides information that bankers and other relevant stakeholders in the banking sector working in MENA (the Middle East and North Africa) and European countries. A strong public legal protection level could improve the efficiency of internal corporate governance mechanisms within banks.
Details
Keywords
Laura L. Lemon, Claudia Bawole, Nancy H. Brinson and Bahareh Amini
The purpose of this paper is to use the concept of boundary turbulence from Communication Privacy Management (CPM) theory to better understand how employee monitoring impacts…
Abstract
Purpose
The purpose of this paper is to use the concept of boundary turbulence from Communication Privacy Management (CPM) theory to better understand how employee monitoring impacts employee engagement. This study is one of the first in corporate communication to combine the frameworks of CPM and employee engagement to better understand employee experiences.
Design/methodology/approach
To answer the research question, we conducted an online, open-ended survey that asked 633 participants to provide feedback regarding being monitored at work and how these experiences impacted their engagement with their employer.
Findings
This study sought to understand how boundary turbulence occurs in relation to employee engagement when employees are monitored at work. In total, four examples of boundary turbulence were illustrated in the data: employer monitoring creates distrust; employees find ways to resist being monitored; monitoring doesn’t accurately capture employee engagement; and monitoring leads to disengagement.
Originality/value
The findings from this study lead to important conclusions regarding what happens when employees experience boundary turbulence, and how it relates to employee engagement. This study illustrates how employee monitoring is interpreted as an attempt to control employees, which can lead to distrust and negatively impact employee engagement. Furthermore, boundary turbulence can threaten psychological safety and presence, which can cultivate employee disengagement. Therefore, employees may seek out ways to actively resist, which reiterates that internal publics are distinctive, active, and agentic audiences that cannot be forgotten or assumed.
Details