Search results

1 – 10 of over 4000
Article
Publication date: 9 September 2024

Yafei Feng, Yongqiang Sun, Nan Wang and Xiao-Liang Shen

Sharing co-owned information on social network platforms has become a common and inevitable phenomenon. However, due to the uniqueness of co-owned information, the privacy…

Abstract

Purpose

Sharing co-owned information on social network platforms has become a common and inevitable phenomenon. However, due to the uniqueness of co-owned information, the privacy calculus theory based on a single information owner cannot explain co-owned information disclosure. Therefore, this study tries to investigate the underlying mechanism of users’ co-owned information disclosure from a collective privacy calculus perspective.

Design/methodology/approach

Through a survey of 740 participants, covariance-based structural equation modeling (CB-SEM) was used to verify the proposed model and hypotheses.

Findings

The results show that personal benefit, others’ benefit and relationship benefit promote users’ co-owned information disclosure by positively affecting personal distributive fairness and others’ distributive fairness perception. Meanwhile, personal privacy risk and others’ privacy risk prevent users’ co-owned information disclosure by negatively affecting personal distributive fairness and others’ distributive fairness perception. Besides, others’ information ownership perception enhances the positive effect of others’ distributive fairness perception on co-owned information disclosure intention. Furthermore, others’ information ownership strengthens the mediating role of others’ distributive fairness.

Research limitations/implications

The findings of this study enrich the research scope of information disclosure and privacy calculus theory and help social network platform developers design collective privacy protection functions.

Originality/value

This study develops a collective privacy calculus model to understand users’ co-owned information disclosure on social network platforms, confirming the mediating role of collective distributive fairness and the moderating role of others’ information ownership perception in the process of collective privacy calculus.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 15 February 2024

Alemayehu Yismaw Demamu

Ethiopia has enacted laws on transparency and disclosure of information in state-owned enterprises (SOEs). However, these laws are not strict enough, with the transparency and…

Abstract

Purpose

Ethiopia has enacted laws on transparency and disclosure of information in state-owned enterprises (SOEs). However, these laws are not strict enough, with the transparency and disclosure practices disappointing in the country. Thus, this study aims to investigate the legal framework governing transparency and disclosure in SOEs.

Design/methodology/approach

This study uses doctrinal, qualitative and comparative approaches. Domestic legal texts are appraised based on the organization for economic co-operation and development Guideline on Corporate Governance of State-owned Enterprises, the World Bank Toolkit on Corporate Governance of State-owned Enterprises and best national practices. This approach has been further corroborated by qualitative analysis of the basic principles of transparency and disclosure.

Findings

The finding reveals that the laws on transparency and disclosure do not comply with global practices and are inadequate to ensure transparency and discourse in SOEs. They fail to establish appropriate disclosure frameworks and practices at the SOE and state-ownership entity levels. They also indiscriminately subject enterprises to multiple auditing functions and conflicting responsibilities.

Originality/value

To the author’s knowledge, this study is the first legal literature on transparency and disclosure in Ethiopian SOEs. This study assists the state as owner in reforming the laws and uplifting SOEs from their current unpleasant condition. It can also become a reference for future research.

Details

International Journal of Law and Management, vol. 66 no. 5
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 29 August 2024

Maochun Zhou and Yuhua Niu

The purpose of this study is to examine the impact of cross-ownership on corporate digital innovation and their specific mechanisms. Cross-ownership, who hold equity in two or…

Abstract

Purpose

The purpose of this study is to examine the impact of cross-ownership on corporate digital innovation and their specific mechanisms. Cross-ownership, who hold equity in two or more companies simultaneously, have two different types of governance effects in the capital market: governance synergistic effects and competitive collusion effects.

Design/methodology/approach

This paper uses a panel model, selecting A-share company data from 2011 to 2021 in China. In total, 23,853 valid data were obtained, which came from the CSMAR database and Wind database. For some missing data, they were manually supplemented by consulting the company's annual report and Sina Finance. Data processing was conducted using EXCEL and Stata16.0 software.

Findings

The results show that cross-ownership promote corporate digital innovation by leveraging governance synergies. Further grouping tests show that the synergistic effects of cross-ownership are significant in non-state-owned, high-tech, weakly competitive and higher analyst attention enterprises. Mechanism testing shows that cross-ownership can empower corporate digital innovation in three ways: reducing information asymmetry, alleviating financing constraints and improving corporate governance.

Originality/value

The conclusion of this paper provides new empirical evidence for a comprehensive understanding of the role of cross-ownership in corporate development, enriches the economic consequences research of chain institutional investors in China and broadens the research perspective of corporate digital innovation. It also provides important references for the digital transformation of enterprises and the healthy development of the capital market.

Details

Business Process Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

199

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 November 2023

Tomasz Michał Matras

The implementation of the Directive 2015/849 of the European Parliament and of the Council of 20 May 2015 on the prevention of the use of the financial system for the purposes of…

Abstract

Purpose

The implementation of the Directive 2015/849 of the European Parliament and of the Council of 20 May 2015 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing resulted in the enactment by the Polish Parliament of the Act of March 1, 2018, on the prevention of money laundering and terrorist financing. One of the most important issues identified in the Act was the establishment of the Central Register of Beneficial Owners. The purpose of this paper is to critically analyze the functioning of the Register in Poland from the perspective of three years since its establishment. The text presents the most important problems faced by reporting institutions and obliged entities due to discrepancies in the interpretation of the Act’s provisions – especially in terms of the definition of a beneficial owner.

Design/methodology/approach

The basic research approach was a comparative content analysis method. The objects of analysis included Polish Laws, Directive of the European Parliament and the Council (EU) 2015/849 and the judgment of the Court of Justice of the European Union. The theoretical legislative assumptions contained in the Acts were compared with reports, studies and communications prepared by public and private institutions. This made it possible to draw conclusions regarding the causes of problems with the functioning of the Register in Poland.

Findings

The results of the research showed that the ambiguity of the definition of the beneficial owner leads to a number of problems on the part of reporting institutions, such as companies, foundations and associations. On the other hand, a large part of the data entered in the Register is questioned by obliged entities. The lack of personal data protection is also a problem. Consequently, this reduces the value of the Register as a tool that effectively mitigates the risk of money laundering.

Research limitations/implications

The research focused only on the functioning of the Central Register of Beneficial Owners in Poland. The subject of the analysis addressed problems with the definition of beneficial owner, issues of data quality and openness and the process of verifying the Register’s data. The technical aspects of the Register operation and the financial penalties imposed by public oversight institutions were not reviewed. Also, no comparison was made with other European Union (EU) member states that have implemented Directive of the European Parliament and of the Council (EU) 2015/849.

Originality/value

This study discusses the important issue of regulatory requirements introduced under EU regulations for private companies. Familiarization of companies, NGOs and obliged entities with the conclusions of the study can positively influence the consolidation of the correct interpretative path. In addition, to the best of the author’s knowledge, this is the first scientific text that identifies and systematizes the most important problems of the Register’s functioning in Poland.

Content available

Abstract

Details

Journal of Financial Crime, vol. 31 no. 4
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 28 March 2024

Yajun Guo, Huifang Ma, Jiahua Zhou, Yanchen Chen and Yiming Yuan

This article aims to understand users' information needs in the metaverse communities and to analyze the similarities and differences between their information needs and those of…

Abstract

Purpose

This article aims to understand users' information needs in the metaverse communities and to analyze the similarities and differences between their information needs and those of users in Internet communities.

Design/methodology/approach

This study conducted semi-structured interviews with users in the metaverse communities to gather raw data. Grounded theory research methods were employed to code and analyze the collected interview data, resulting in the extraction of 40 initial concepts, 15 subcategories and 5 main categories. Based on Maslow’s hierarchy of needs theory, this paper constructs the hierarchical model of users' information needs in the metaverse communities. It compares the differences between users' information needs in the metaverse and Internet fields.

Findings

The user’s information needs in the metaverse communities are divided into two types: deficiency needs and growth needs. Deficiency needs have two levels. The first level is the demand for basic information resources. The second level is the users demand for information assistance. Growth needs have three levels. The first level is the need for information interactions. The second level is the need for community rules. The ownership information in the community rules can provide proof of user status, assets and so on. The third level is the need for users to contribute and share their own created information content.

Originality/value

This article presents the latest research data from in-depth interviews with users in the metaverse communities. It aims to help builders and managers of metaverse communities understand users' information needs and improve the design of virtual communities.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 31 May 2024

Jia-Rui Sun and Ko-Chiu Wu

This study aims to explore the eye movement behavior of preadolescent children accessing and diagnosing information.

64

Abstract

Purpose

This study aims to explore the eye movement behavior of preadolescent children accessing and diagnosing information.

Design/methodology/approach

The researchers tracked the eye movements of 30 children with an eye-tracking apparatus. Using the kit of factor-referenced cognitive tests to measure perceptual speed and associative memory, they measured information-searching behavior with screen recordings, the data of which were analyzed by IBM SPSS Statistics 26.

Findings

Regarding information accessibility, there was a correlation between the child’s age, associative memory and the number of round-trip choices, and there were differences in the total fixation area among children of different age groups. Regarding diagnosticity, perceptual speed was positively correlated with the total fixation area, and the number of round-trip choices was negatively correlated with fixation duration.

Originality/value

Empirical evidence suggests that during information encoding, perceptual speed is the most important influencing factor. Extensive research indicates that children predominantly rely on recall and familiarity when searching for new information, both of which play roles in associative memory. Through an examination of the psychological and behavioral indicators of children, the study elucidated the cognitive processes involved in information processing and how children engage with information at both visual and cognitive levels.

Details

The Electronic Library , vol. 42 no. 4
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 21 April 2022

Hani El-Chaarani and Zouhour El-Abiad

The purpose of this research is to reveal the impact of public legal protection on the efficiency of internal corporate governance in banks. In addition, this research proposes a…

Abstract

Purpose

The purpose of this research is to reveal the impact of public legal protection on the efficiency of internal corporate governance in banks. In addition, this research proposes a new corporate governance index that could be employed by the banking sector to evaluate the performance of their internal corporate governance mechanisms.

Design/methodology/approach

Orbis database, annual reports and direct questionnaire are used to collect corporate governance data of 127 banks from 14 countries during 2020. The Mann–Whitney U-test is employed to compare the efficiency of corporate governance mechanisms based on three subsamples of countries having different legal protection levels (weak, middle and strong).

Findings

This research suggests a new corporate governance index for banks based on seven constructs and 62 variables. This new non-parametric index could be used by bankers to improve the monitoring process and enhance the overall performance of banking. The results of this research show that the existence of a strong public legal protection environment within a specific country enhances the efficiency of corporate governance mechanisms in the banking sector and thus, leads to improve the protection of shareholders, depositors and other relevant stakeholders. However, in countries that are characterized by weak legal protection level, the efficiency of corporate governance mechanisms is very low and there are possibilities of entrenchment, expropriation and extraction of private benefits. These findings could be interpreted within the prediction of agency, moral hazard, asymmetric information, political and entrenchment theories.

Originality/value

This research paper provides information that bankers and other relevant stakeholders in the banking sector working in MENA (the Middle East and North Africa) and European countries. A strong public legal protection level could improve the efficiency of internal corporate governance mechanisms within banks.

Details

Journal of Economic and Administrative Sciences, vol. 40 no. 3
Type: Research Article
ISSN: 2054-6238

Keywords

Article
Publication date: 4 June 2024

Laura L. Lemon, Claudia Bawole, Nancy H. Brinson and Bahareh Amini

The purpose of this paper is to use the concept of boundary turbulence from Communication Privacy Management (CPM) theory to better understand how employee monitoring impacts…

Abstract

Purpose

The purpose of this paper is to use the concept of boundary turbulence from Communication Privacy Management (CPM) theory to better understand how employee monitoring impacts employee engagement. This study is one of the first in corporate communication to combine the frameworks of CPM and employee engagement to better understand employee experiences.

Design/methodology/approach

To answer the research question, we conducted an online, open-ended survey that asked 633 participants to provide feedback regarding being monitored at work and how these experiences impacted their engagement with their employer.

Findings

This study sought to understand how boundary turbulence occurs in relation to employee engagement when employees are monitored at work. In total, four examples of boundary turbulence were illustrated in the data: employer monitoring creates distrust; employees find ways to resist being monitored; monitoring doesn’t accurately capture employee engagement; and monitoring leads to disengagement.

Originality/value

The findings from this study lead to important conclusions regarding what happens when employees experience boundary turbulence, and how it relates to employee engagement. This study illustrates how employee monitoring is interpreted as an attempt to control employees, which can lead to distrust and negatively impact employee engagement. Furthermore, boundary turbulence can threaten psychological safety and presence, which can cultivate employee disengagement. Therefore, employees may seek out ways to actively resist, which reiterates that internal publics are distinctive, active, and agentic audiences that cannot be forgotten or assumed.

Details

Corporate Communications: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1356-3289

Keywords

1 – 10 of over 4000