Search results
1 – 10 of 204Briony Anderson and Mark A. Wood
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…
Abstract
This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.
Details
Keywords
Response to suggestion that EU-wide cash payment limits would assist in the control of terrorism finance and money laundering.
Abstract
Purpose
Response to suggestion that EU-wide cash payment limits would assist in the control of terrorism finance and money laundering.
Design/methodology/approach
Desk review and interviews
Findings
The inception impact assessment (IIA) is ill-conceived, not grounded on firm empirical evidence and harmful to both crime control and the legitimate interests and rights of the EU citizens. The action under discussion is presented as a measure against terrorism finance, serious crime and tax evasion. The problem is that these criminal acts correspond to very different methods, volumes, perpetrators, causes and control challenges. Cash payment limitations (CPLs) are nowhere near a panacea that can address all of them and cannot make any of them go away magically. Even when each of these crime challenges are considered on their own, the empirical linkage of CPLs to effective controls is not there. The evidence from EU countries with CPLs in place shows higher levels of informal economy, corruption, tax evasion and terrorism risks than those without. There is substantial evidence of non-cash, very serious and organized crime, while the amounts needed and used by terrorists in Europe are usually very small in cash transactions, way below the thresholds under consideration. In fact, determined offenders will shift to other methods and become more sophisticated, posing new problems to controllers. Displacement and incentives for better-organized crime may well be the main products of such measures.
Originality/value
It counters the argument that the cash payment limits can help reduce serious crime, while pointing to several adverse consequences on legitimate interests and human rights.
Details
Keywords
Jeanette Carlsson Hauff and Jonas Nilsson
During 2020, governments around the world introduced contact-tracing apps to fight the COVID-19 pandemic. In order for contact-tracing apps to be efficient tools in combatting…
Abstract
Purpose
During 2020, governments around the world introduced contact-tracing apps to fight the COVID-19 pandemic. In order for contact-tracing apps to be efficient tools in combatting pandemics, a significant proportion of the population has to install it. However, in many countries, the success of apps introduced during the COVID-19 pandemic has been limited due to lack of public support. This paper aims to better understand why consumers seem unwilling to install and use a contact-tracing app.
Design/methodology/approach
In this study, the authors test a number of determinants hypothesized to influence acceptance of contact-tracing apps based on the theory of privacy calculus (Dinev and Hart, 2006). Both perceived privacy concerns, as well as perceived hedonic, utilitarian and pro-social benefits are included. The hypotheses are tested through SEM analysis on a representative sample of 1,007 Swedish citizens.
Findings
The results indicate significant privacy concerns with using contact-tracing apps. However, this is to some extent offset by perceived hedonic and pro-social positive consequences of using the app. This study further shows that a general positive attitude towards innovation increases acceptance of the app.
Originality/value
The study contributes to research on consumer privacy, both in general in its application of the calculus model but also specifically in the context of contact-tracing apps. Moreover, as the results highlight which aspects that are important for consumers to accept and install an app of this kind, they also represent an important contribution to policymakers in countries around the world.
Details
Keywords
Renata Monteiro Martins, Sofia Batista Ferraz and André Francisco Alcântara Fagundes
This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information…
Abstract
Purpose
This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information control on privacy concerns (PC) and, consequently, in consumers’ willingness to disclose personal information online. The authors also propose to test the mediation role of trust between PCs and willingness to disclose information. Trust is not a predictor of PC but a causal mechanism – considering that the focus is to understand consumers’ attitudes and behavior regarding the virtual environment (not context-specific) (Martin, 2018).
Design/methodology/approach
The authors developed a survey questionnaire based on the constructs that compose the proposed model to collect data from 864 respondents. The survey questionnaire included the following scales: internet usage expertise from Ohanian (1990); perceived risk, attitude toward information control, trust and willingness to disclose personal information online from Malhotra et al. (2004); and PC from Castañeda and Montoro (2007). All items were measured on a Likert seven-point scale (1 = totally disagree; 7 = totally agree). To obtain Westin’s attitudinal categories toward privacy, respondents answered Westin’s three-item privacy index. For data analysis, the authors applied covariance-based structural equation modeling.
Findings
First, the proposed model explains the drivers of consumers’ disposition to provide personal information at a level that surpasses specific contexts (Martin, 2018), bringing the analysis to consumers’ level and considering their general perceptions toward data privacy. Second, the findings provide inputs to propose a better definition of Westin’s attitudinal categories toward privacy, which used to be defined only by individuals’ information privacy perception. Consumers’ perceptions about their abilities in using the internet, the risks, their beliefs toward information control and trust also help to delimitate and distinguish the fundamentalists, the pragmatics and the unconcerned.
Research limitations/implications
Some limitations weigh the theoretical and practical implications of this study. The sample size of pragmatic and unconcerned respondents was substantially smaller than that of fundamentalists. It might be explained by applying Westin’s self-report index to classify the groups according to their score regarding PCs. Most individuals affirm having a great concern for their data privacy but still provide online information for the benefit of personalization – known as the privacy paradox (Zeng et al., 2021). It leads to another limitation of this research, given the lack of measures that classify respondents by considering their actual behavior toward privacy.
Practical implications
PC emerges as an important predictor of consumer trust and willingness to disclose their data online, and trust also influences this disposition. Managers need to implement actions that effectively reduce consumers’ concerns about privacy and increase their trust in the company – e.g. adopting a clear and transparent policy on how the data collected is stored, treated, protected and used to benefit the consumer. Regarding the perception of risk, if managers convince consumers that the data collected on the internet is protected, they tend to be less concerned about privacy.
Social implications
The results suggest different aspects influencing the willingness to disclose personal information online, including different responses considering consumers’ PCs. Through their policies and legislation, the authors understand that governments must be attentive to this aspect, establishing regulations that protect consumers’ data in the virtual environment. In addition to regulatory policies, education campaigns can be carried out for both consumers and managers to raise the discussion about privacy and the availability of information in the online environment, demonstrating the importance of protecting personal data to benefit the government, consumers and organizations.
Originality/value
Although there is increasing research on consumers’ privacy, studies have not considered their attitudinal classifications – high, moderate and low concern – as moderators of willingness to disclose information online. Researchers have also increased attention to the antecedents of PCs and disclosure of information but overlooked possible mechanisms that explain the relationship between them.
Details
Keywords
Abstract
Details
Keywords
Damian Gordon, Ioannis Stavrakakis, J. Paul Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O’Mahony and Dympna O’Sullivan
Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of…
Abstract
Purpose
Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they consider to be crucial computing ethics concerns. The overlap between these stakeholder groups are explored, as well as whether their concerns are reflected in the existing literature.
Design/methodology/approach
Data collection was performed using focus groups, and the data was analysed using a thematic analysis. The data was also analysed to determine if there were overlaps between the literature and the stakeholders’ concerns and attitudes towards computing ethics.
Findings
The results of the focus group analysis show a mixture of overlapping concerns between the different groups, as well as some concerns that are unique to each of the specific groups. All groups stressed the importance of data as a key topic in computing ethics. This includes concerns around the accuracy, completeness and representativeness of data sets used to develop computing applications. Academics were concerned with the best ways to teach computing ethics to university students. Industry professionals believed that a lack of diversity in software teams resulted in important questions not being asked during design and development. Citizens discussed at length the negative and unexpected impacts of social media applications. These are all topics that have gained broad coverage in the literature.
Social implications
In recent years, the impact of ICT on society and the environment at large has grown tremendously. From this fast-paced growth, a myriad of ethical concerns have arisen. The analysis aims to shed light on what a diverse group of stakeholders consider the most important social impacts of technology and whether these concerns are reflected in the literature on computing ethics. The outcomes of this analysis will form the basis for new teaching content that will be developed in future to help illuminate and address these concerns.
Originality/value
The multi-stakeholder analysis provides individual and differing perspectives on the issues related to the rapidly evolving discipline of computing ethics.
Details
Keywords
Artificial intelligence (AI) reasoning is fuelled by high-quality, detailed behavioural data. These can usually be obtained by the biometrical sensors embedded in smart devices…
Abstract
Purpose
Artificial intelligence (AI) reasoning is fuelled by high-quality, detailed behavioural data. These can usually be obtained by the biometrical sensors embedded in smart devices. The currently used data collecting approach, where data ownership and property rights are taken by the data scientists, designers of a device or a related application, delivers multiple ethical, sociological and governance concerns. In this paper, the author is opening a systemic examination of a data sharing concept in which data producers execute their data property rights.
Design/methodology/approach
Since data sharing concept delivers a substantially different alternative, it needs to be thoroughly examined from multiple perspectives, among them: the ethical, social and feasibility. At this stage, theoretical examination modes in the form of literature analysis and mental model development are being performed.
Findings
Data sharing concepts, framework, mechanisms and swift viability are examined. The author determined that data sharing could lead to virtuous data science by augmenting data producers' capacity to govern their data and regulators' capacity to interact in the process. Truly interdisciplinary research is proposed to follow up on this research.
Research limitations/implications
Since the research proposal is theoretical, the proposal may not provide direct applicative value but is largely focussed on fuelling the research directions.
Practical implications
For the researchers, data sharing concepts will provide an alternative approach and help resolve multiple ethical considerations related to the internet of things (IoT) data collecting approach. For the practitioners in data science, it will provide numerous new challenges, such as distributed data storing, distributed data analysis and intelligent data sharing protocols.
Social implications
Data sharing may post significant implications in research and development. Since ethical, legislative moral and trust-related issues are managed in the negotiation process, data can be shared freely, which in a practical sense expands the data pool for virtuous research in social sciences.
Originality/value
The paper opens new research directions of data sharing concepts and space for a new field of research.
Details