Search results
1 – 10 of over 68000Devang Chhtrapati, Dharmendra Trivedi, Shanti P. Chaudhari, Arpit Sharma and Atul Bhatt
This study concentrates on assessing the research productivity in the domain of social media security in the past decades. The purpose of this study is to conduct a comprehensive…
Abstract
Purpose
This study concentrates on assessing the research productivity in the domain of social media security in the past decades. The purpose of this study is to conduct a comprehensive bibliometric review on social media using various bibliometric indicators.
Design/methodology/approach
A total of 8,121 scientific publications were retrieved from Scopus database from period 1998 to 2021 using associated keyword search. This study also used VOSviewer© tool to evaluate the network visualisation.
Findings
The result of this study revealed that there is a steady growth of annual publications except for the years 2015 and 2016. A total of 8,121 scientific publications and 80,454 total citations were found with 11.2 average citations per publication. The USA, China and India were top productive countries in terms of publishing research in the field; Chinese Academy of Sciences secured top position with 126 publications in highly productive organisation in the domain. The lecture notes in computer science from Springer Nature received a highly produced title with 553 publications and 4,453 total citations. For co-occurrence of author’s keywords, network visualisation analysis revealed that “Social Media”, “Social Network”, “Security”, “Privacy” and “Trust” found maximum occurrence in the domain of social media security.
Research limitations/implications
This study provides comprehensive research status of social media security by performing a bibliometric analysis. The findings of this study will help relevant researchers to understand the research trend, pursue scientific collaborators and enhance research topic preferences.
Originality/value
The rareness of this study, detailed bibliometric analysis on the domain of social media security, is proven using numerous bibliometric indicators and application of VOSviewer in the domain.
Details
Keywords
Oluwafemi David Bodunde, Goodluck Tamaramieye Layefa and Joseph Kehinde Fasae
This paper aims to investigate the relationship between media reporting and violent extremism to explain the ethical and security issues emanating from it in Nigeria.
Abstract
Purpose
This paper aims to investigate the relationship between media reporting and violent extremism to explain the ethical and security issues emanating from it in Nigeria.
Design/methodology/approach
This paper draws on security and ethical literature, while a multimethod approach consisting of in-depth and focus group interviews was used. Content analysis was also relied upon from the interviews granted by media experts on terrorism, security and ethics.
Findings
Findings revealed that journalists are facing problems in areas of freedom of expression, framing, content selection and personal security. Again, this paper opines that elements of public awareness and issues of relevance also push the media to excessive reporting in which ethics and security must stand to play a restraining role.
Research limitations/implications
The first limitation of this paper is the inability to interview some terrorists and know their reaction to mass media reporting on their activities because nobody is ready to own up that he is a terrorist and to point to an individual as a terrorist is a dangerous phenomenon. Again, not all reporters are ready for interviews because of the fact that they are not prepared for the academic exercise but rather for assignments that can yield fat money such as selling secret information to those who can buy them with huge amounts of money like the politicians.
Practical implications
There is a threat to life on both sides of the government and terrorists. Favoring one side in their report is an offense from another side. There is also a violation of their human rights in freedom of speech as a result of the political situation in Nigeria where the government is faced with insecurity that hinders media from freedom of the press to publish reports. Moreover, where the ethical issue is suppressed, it makes the government unpopular all over the world because of the lack of press freedom.
Originality/value
To the best of the authors’ knowledge, this paper is novel as being the first of its kind where media experts are involved in research attempts on media reporting and violent extremism in relation to security and ethical issues in Nigeria.
Details
Keywords
Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai and Quynh-Chi Le
This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.
Abstract
Purpose
This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.
Design/methodology/approach
Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.
Findings
The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.
Research limitations/implications
This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.
Practical implications
Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.
Originality/value
The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.
Details
Keywords
Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure…
Abstract
Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure intellectual disability settings have not been robustly demonstrated. The same applies to staff perceptions of low security. The aims of the study were to ascertain the characteristics of patients referred to a low secure intellectual disability unit which lead to an offer of admission, identify the views of staff working on the unit on the concept of low security, and use both sets of data to discuss low secure provision for people with intellectual disability. A case‐controlled study was carried out for 33 patients referred to the unit over 42 months. The characteristics of 18 patients offered an admission were compared with those of 15 patients not offered an admission, and five of the staff working on the unit were interviewed about the concept of low security. Patients offered an admission were more able than those not offered an admission, posed more risks and were more complex diagnostically. Staff working on the unit agreed that their patients were complex, but felt that they were appropriately placed overall. The challenges of low secure provision were discussed by staff. Patients sampled were complex and heterogeneous, but not necessarily ‘forensic’. Their complexity requires sophisticated care plans and management strategies. This study has implications for referrers, staff, patients and managers, and highlights areas for future research.
Details
Keywords
Hillel Nossek and Yehiel Limor
Although the state of Israel is a democracy, military censorship has been in use since its establishment in 1948 and is still imposed. The chapter analyzes the theoretical and…
Abstract
Although the state of Israel is a democracy, military censorship has been in use since its establishment in 1948 and is still imposed. The chapter analyzes the theoretical and practical grounds for military censorship in Israel based on an agreement between relevant parties: the government, the army, the media, and the public. Analysis of Israeli military censorship reveals that military censorship is not necessarily the enemy of the media and the public's right to know. On the contrary and paradoxically, we show that in Israel's case, military censorship not only performs its task of preventing the publication of information that threatens the national security, at times it sustains the country's freedom of the press, freedom of information, and the public's right to know.
Details
Keywords
Petra Habets, Inge Jeandarme and Harry G. Kennedy
Criteria to determine in which level of security forensic patients should receive treatment are currently non-existent in Belgium. Research regarding the assessment of security…
Abstract
Purpose
Criteria to determine in which level of security forensic patients should receive treatment are currently non-existent in Belgium. Research regarding the assessment of security level is minimal and few instruments are available. The DUNDRUM toolkit is a structured clinical judgement instrument that can be used to provide support when determining security level. The purpose of this paper is to investigate the applicability and validity of the DUNDRUM-1 in Flanders.
Design/methodology/approach
The DUNDRUM-1 was scored for 50 male patients admitted at the forensic units in the public psychiatric hospital Rekem. Some files were rated by three researchers who were blind to participants’ security status, resulting in 33 double measurements.
Findings
Almost all files (96 per cent) contained enough information to score the DUNDRUM-1. Average DUNDRUM-1 final judgement scores were concordant with a medium security profile. No difference was found between the current security levels and the DUNDRUM-1 final judgement scores. Inter-rater reliability was excellent for the DUNDRUM-1 final judgement scores. On item level, all items had excellent to good inter-rater reliability with the exception of one item institutional behaviour which had an average inter-rater reliability.
Practical implications
The DUNDRUM-1 can be a useful tool in Flemish forensic settings. It has good psychometric properties. More research is needed to investigate the relationship between DUNDRUM-1 scores and security level decisions by the courts.
Originality/value
This is the first study that investigated the applicability of the DUNDRUM-1 in a Belgian setting, also a relative large number of repeated measurements were available to investigate the inter-rater reliability of the DUNDRUM-1.
Details
Keywords
Jianqiang Hao and Hongying Dai
Security breaches have been arising issues that cast a large amount of financial losses and social problems to society and people. Little is known about how social media could be…
Abstract
Purpose
Security breaches have been arising issues that cast a large amount of financial losses and social problems to society and people. Little is known about how social media could be used a surveillance tool to track messages related to security breaches. This paper aims to fill the gap by proposing a framework in studying the social media surveillance on security breaches along with an empirical study to shed light on public attitudes and concerns.
Design/methodology/approach
In this study, the authors propose a framework for real-time monitoring of public perception to security breach events using social media metadata. Then, an empirical study was conducted on a sample of 1,13,340 related tweets collected in August 2015 on Twitter. By text mining a large number of unstructured, real-time information, the authors extracted topics, opinions and knowledge about security breaches from the general public. The time series analysis suggests significant trends for multiple topics and the results from sentiment analysis show a significant difference among topics.
Findings
The study confirms that social media monitoring provides a supplementary tool for the traditional surveys which are costly and time-consuming to track security breaches. Sentiment score and impact factors are good predictors of real-time public opinions and attitudes to security breaches. Unusual patterns/events of security breaches can be detected in the early stage, which could prevent further destruction by raising public awareness.
Research limitations/implications
The sample data were collected from a short period of time on Twitter. Future study could extend the research to a longer period of time or expand key words search to observe the sentiment trend, especially before and after large security breaches, and to track various topics across time.
Practical implications
The findings could be useful to inform public policy and guide companies responding to consumer security breaches in shaping public perception.
Originality/value
This study is the first of its kind to undertake the analysis of social media (Twitter) content and sentiment on public perception to security breaches.
Details
Keywords
John Jacques, Sarah‐Jane Spencer and Paul Gilluley
Medium secure units were designed to treat patients for up to three years, but some patients spend longer in acute medium secure settings which in general do not have a 'longer…
Abstract
Medium secure units were designed to treat patients for up to three years, but some patients spend longer in acute medium secure settings which in general do not have a 'longer term focus'. The aim of this investigation was to assess and describe the needs of these patients. A survey questionnaire was designed and sent to responsible clinicians who had patients admitted at least five years previously to the Three Bridges Medium Secure Unit (males) in West London. Carer ratings using the Camberwell Assessment of Need: forensic version (CAN‐FOR) were completed by the primary nurse for each patient, complementing the survey questionnaire. Of 122 medium secure male patients 25 (21%) had been admitted at least five years before. We found high levels of co‐morbidity and treatment resistance. The CAN‐FOR revealed two groups, one with chronic challenging behaviour, treatment‐resistant mental illness and need for a high level of support, and another more able group not needing as much support but with a dependency on the hospital. It is considered here whether certain groups would benefit from a different approach or setting.
Details
Keywords
Yousaf Ali, Zainab Ahmed Shah and Amin Ullah Khan
This study aims to cover issues regarding traveling to a tourist destination which has seen war and terrorism. These problems can be addressed altogether, as they are…
Abstract
Purpose
This study aims to cover issues regarding traveling to a tourist destination which has seen war and terrorism. These problems can be addressed altogether, as they are interrelated. Based on tourists’ opinions, this paper aims to focus on measures or steps that can be taken to ensure changing their perceptions about a certain destination.
Design/methodology/approach
This study targets tourism experts for their opinions regarding the measures most necessary to change the perceptions of tourists. Their opinions were extracted through a questionnaire based on three criteria with four alternatives. Furthermore, raw data extracted are studied using the Fuzzy-VIKOR technique to rank the alternatives in order of importance. Moreover, the questionnaire also aims to know the perception of participants by asking them what would make them trust a destination with a history of terrorism.
Findings
The problems captivate the attention of government, guiding them to ensure that they need to focus more on physical security of tourists if they expect tourism industry to thrive. It was found that the steps needed to be taken are in the areas of international trade, cultural exchange programs and social media advertising.
Originality/value
Research based on improving tourist perception of Pakistan to develop Pakistan as a tourist destination is scarce. The study takes four different alternatives into account for image recovery and based on those alternatives, it provides a unique solution to the government in this regard with the necessary steps they need to take and attempts to help the government ensure tourism expansion in the country.
Details
Keywords
Mébarek Djebabra, Toufik Bentarcia, Saadia Saadi and Lylia Bahmed
This paper proposes a risk management process that provides general specifications of the impact and hazard studies applied to a natural medium called Oued el‐gourzi (Batna) in…
Abstract
Purpose
This paper proposes a risk management process that provides general specifications of the impact and hazard studies applied to a natural medium called Oued el‐gourzi (Batna) in Algeria.
Design/methodology/approach
The proposed approach can be divided into two phases. First, the diagnosis consists of medium description, analysis and assessment of pollution risk and second, the therapy which includes identification, qualification and implementation of means, follow‐up and continuous amelioration. This approach is supported by the Fault‐tree method.
Findings
The approach defines risks that can affect a natural medium. Improvement of the medium security is required. The establishment of a program for the management and control of these risks is needed.
Practical implications
In the context of impact studies, solutions required regarding the pollution of a natural medium are going to lead concerned authorities toward the establishment of a policy of preventive and curative measures. Instigators will be influenced by the comparison of indemnities and environmental investments of pollutants.
Originality/value
The diffusion of information about risk management allows the establishment of relations between different actors by the risk management process and consequently ensures its credibility.
Details