Search results

1 – 10 of over 17000
Article
Publication date: 7 July 2021

Si Li and Yi Chen

This paper explains the formation of government resistance to open data based on the cognition of stakeholders in Chinese context.

Abstract

Purpose

This paper explains the formation of government resistance to open data based on the cognition of stakeholders in Chinese context.

Design/methodology/approach

Adopting grounded theory, this study interviewed 22 stakeholders to collect data. Through continuous coding, this study identified the main categories and then constructed theoretical models.

Findings

This study identified and explained five main categories that relate to resistance: practice, perception, organizational culture, motivation and resistance strategies. Then, a framework was developed that conceptualizes the government' resistance to open data. Based on the division of the forms of motivation, there are three paths through which government departments resist open data, namely, avoiding disadvantages to the organization, being unwilling to increase the workload and being unwilling to take the initiative.

Originality/value

This paper reveals the internal logic of government departments' resistance to open data and provides a process explanation beyond causality. It also provides a reference for other countries in the same preliminary stage as China with respect to open data implementation.

Details

Aslib Journal of Information Management, vol. 73 no. 4
Type: Research Article
ISSN: 2050-3806

Keywords

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Article
Publication date: 13 May 2014

Matteo Corciolani and Daniele Dalli

Through an empirical analysis of a consumption community, the purpose of this paper is to demonstrate that the theories of gift-giving, sharing and commodity exchange should not…

2427

Abstract

Purpose

Through an empirical analysis of a consumption community, the purpose of this paper is to demonstrate that the theories of gift-giving, sharing and commodity exchange should not be kept separated but integrated into a unifying model.

Design/methodology/approach

The paper provides new evidence about Bookcrossing.com, whose members share and give books as gifts; that is, physical goods rather than digital ones as in most of the communities considered in the literature. This community is analysed with qualitative tools, such as netnography, personal interviews and participant observation.

Findings

The main result of the analysis of Bookcrossing is that gift-giving is not the only process responsible for value creation and distribution in consumption communities: sharing and commodity exchange also play a role. Furthermore, the paper provides new evidence about aspects of gift-giving and sharing that have received limited attention in the literature: collective reciprocity and anonymous sharing.

Research limitations/implications

The limitations are related to the intrinsic properties of the methods employed (netnography, personal interviews and participant observation) and to the paper, which analyses only one community and one product category. The implications refer to the role of gift-giving in consumption communities and its relationships with other processes: consumer gift systems are not only gifting platforms, but they and the elements of sharing and commodity exchange need to be integrated.

Practical implications

The empirical evidence and implications matter for the organisation and management of collaborative consumption platforms and the way in which traditional business models could and should interact with these platforms in an increasing number of businesses.

Originality/value

The paper adds new evidence of and original insights into gift-giving and collective forms of exchange. Moreover, it provides managerial implications of the analysed community for the book publishing industry.

Details

Management Decision, vol. 52 no. 4
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 2 January 2020

Po-Yen Chen

This study attempts to use a new source of data collection from open government data sets to identify potential academic social networks (ASNs) and defines their collaboration…

Abstract

Purpose

This study attempts to use a new source of data collection from open government data sets to identify potential academic social networks (ASNs) and defines their collaboration patterns. The purpose of this paper is to propose a direction that may advance our current understanding on how or why ASNs are formed or motivated and influence their research collaboration.

Design/methodology/approach

This study first reviews the open data sets in Taiwan, which is ranked as the first state in Global Open Data Index published by Open Knowledge Foundation to select the data sets that expose the government’s R&D activities. Then, based on the theory review of research collaboration, potential ASNs in those data sets are identified and are further generalized as various collaboration patterns. A research collaboration framework is used to present these patterns.

Findings

Project-based social networks, learning-based social networks and institution-based social networks are identified and linked to various collaboration patterns. Their collaboration mechanisms, e.g., team composition, motivation, relationship, measurement, and benefit-cost, are also discussed and compared.

Originality/value

In traditional, ASNs have usually been known as co-authorship networks or co-inventorship networks due to the limitation of data collection. This study first identifies some ASNs that may be formed before co-authorship networks or co-inventorship networks are formally built-up, and may influence the outcomes of research collaborations. These information allow researchers to deeply dive into the structure of ASNs and resolve collaboration mechanisms.

Details

Library Hi Tech, vol. 38 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 13 October 2020

Ji Yeon Cho and Bong Gyou Lee

The revitalization of big data has gained attention in the public sector. However, such open government data (OGD) is facing major challenges with respect to data quality and…

Abstract

Purpose

The revitalization of big data has gained attention in the public sector. However, such open government data (OGD) is facing major challenges with respect to data quality and limited use. To solve this problem, this study analyzes the factors driving the use of OGD from the perspective of data providers in the public sector.

Design/methodology/approach

Using the analytic hierarchy process and analytic network process methodologies, the importance of the factors driving the use of big data in the public sector was ranked. In addition, the different characteristics of tasks among the departments in a public agency were compared based on expert interviews.

Findings

The factors driving OGD use are not only political environment or the technological environment. The importance of the institutional culture within the organization increases with the motivation of the data provider. The priorities of the OGD factors also depend on the objectives of the department involved.

Originality/value

This study provides implications for improving the publication of open data by analyzing the priorities of the factors driving its use from the perspective of big data providers. It focuses on different perceptions of the factors valued by public officials in charge of data in institutions. The results suggest the need to explore officials' perceptions of value creation in big data fields.

Details

Information Technology & People, vol. 35 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Book part
Publication date: 10 December 2015

Dekar Urumsah

The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is…

Abstract

The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is especially relevant in the context of Indonesian Airline companies. Therefore, many airline customers in Indonesia are still in doubt about it, or even do not use it. To fill this gap, this study attempts to develop a model for e-services adoption and empirically examines the factors influencing the airlines customers in Indonesia in using e-services offered by the Indonesian airline companies. Taking six Indonesian airline companies as a case example, the study investigated the antecedents of e-services usage of Indonesian airlines. This study further examined the impacts of motivation on customers in using e-services in the Indonesian context. Another important aim of this study was to investigate how ages, experiences and geographical areas moderate effects of e-services usage.

The study adopts a positivist research paradigm with a two-phase sequential mixed method design involving qualitative and quantitative approaches. An initial research model was first developed based on an extensive literature review, by combining acceptance and use of information technology theories, expectancy theory and the inter-organizational system motivation models. A qualitative field study via semi-structured interviews was then conducted to explore the present state among 15 respondents. The results of the interviews were analysed using content analysis yielding the final model of e-services usage. Eighteen antecedent factors hypotheses and three moderating factors hypotheses and 52-item questionnaire were developed. A focus group discussion of five respondents and a pilot study of 59 respondents resulted in final version of the questionnaire.

In the second phase, the main survey was conducted nationally to collect the research data among Indonesian airline customers who had already used Indonesian airline e-services. A total of 819 valid questionnaires were obtained. The data was then analysed using a partial least square (PLS) based structural equation modelling (SEM) technique to produce the contributions of links in the e-services model (22% of all the variances in e-services usage, 37.8% in intention to use, 46.6% in motivation, 39.2% in outcome expectancy, and 37.7% in effort expectancy). Meanwhile, path coefficients and t-values demonstrated various different influences of antecedent factors towards e-services usage. Additionally, a multi-group analysis based on PLS is employed with mixed results. In the final findings, 14 hypotheses were supported and 7 hypotheses were not supported.

The major findings of this study have confirmed that motivation has the strongest contribution in e-services usage. In addition, motivation affects e-services usage both directly and indirectly through intention-to-use. This study provides contributions to the existing knowledge of e-services models, and practical applications of IT usage. Most importantly, an understanding of antecedents of e-services adoption will provide guidelines for stakeholders in developing better e-services and strategies in order to promote and encourage more customers to use e-services. Finally, the accomplishment of this study can be expanded through possible adaptations in other industries and other geographical contexts.

Details

E-services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-709-7

Keywords

Article
Publication date: 10 September 2019

Shuheng Wu and Adam Worrall

Prior studies identified a need for further comparison of data-sharing practices across different disciplines and communities. Toward addressing this need, the purpose of this…

Abstract

Purpose

Prior studies identified a need for further comparison of data-sharing practices across different disciplines and communities. Toward addressing this need, the purpose of this paper is to examine the data-sharing practices of the earthquake engineering (EE) community, which could help inform data-sharing policies in EE and provide different stakeholders of the EE community with suggestions regarding data management and curation.

Design/methodology/approach

This study conducted qualitative semi-structured interviews with 16 EE researchers to gain an understanding of which data might be shared, with whom, under what conditions and why; and their perceptions of data ownership.

Findings

This study identified 29 data-sharing factors categorized into five groups. Requirements from funding agencies and academic genealogy were frequent impacts on EE researchers’ data-sharing practices. EE researchers were uncertain of data ownership and their perceptions varied.

Originality/value

Based on the findings, this study provides funding agencies, research institutions, data repositories and other stakeholders of the EE community with suggestions, such as allowing researchers to adjust the timeframe they can withhold data based on project size and the amount of experimental data generated; expanding the types and states of data required to share; defining data ownership in grant requirements; integrating data sharing and curation into curriculum; and collaborating with library and information schools for curriculum development.

Details

Library Hi Tech, vol. 37 no. 4
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 December 2020

Nathan Moles

This paper aims to explore the curation of government-produced datasets for release as open government data (OGD) from the perspective of the digital curation and preservation…

Abstract

Purpose

This paper aims to explore the curation of government-produced datasets for release as open government data (OGD) from the perspective of the digital curation and preservation concept of a “Designated Community”. Specifically, it explores how digital curation functions when there is no clear Designated Community to which curation services can be targeted.

Design/methodology/approach

The research was conducted through a case study of the City of Toronto’s efforts to revitalize their OGD program. Data was collected using three methods: semi-structured interviews, non-participative observation and document analysis.

Findings

The curators of OGD responded to the absence of a Designated Community through two complementary methods. The first was to draw from the discourse that defines the OGD domain. The second was to take a participatory approach that incorporated members of the community surrounding OGD and various other stakeholders into the process of developing a plan for the revitalization of the program.

Research limitations/implications

This study opens new directions for investigating the application of the Designated Community concept and its role in digital curation and preservation.

Practical implications

The approach used by OGD curators in this case has the potential to be used in other curation situations where there is no clearly defined user group.

Originality/value

The findings presented in this paper contribute empirical insights to on-going discussions on the concept of a Designated Community in digital curation and preservation.

Details

Records Management Journal, vol. 31 no. 1
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 25 May 2023

Emanuel G. Boussios

The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western…

Abstract

Purpose

The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western governments. This research primarily focuses on such practices of the US Government.

Design/methodology/approach

This work is designed as a case study research of cybersecurity whistleblowers or leakers on Western governments, involving data collection from primary and secondary sources. The method is a content analysis to determine the presence of certain themes within this primary and secondary data which this research can then make inferences about the messages within the texts.

Findings

The findings show a formation of a recent class of power brokers, with its own collective ethos, who will be known by a new term: the “New Knowledge Cyberclass” (NKC). The development of the NKC was revealed through the shocking data revelations by Edward Snowden, Julian Assange and Chelsea Manning. What separates the NKC from government “protectors” (i.e. President Obama, Central Intelligence Agency Director Mike Pompeo), who argue that these leakers stole and leaked classified documents that endangered lives, is their definitions of what it means to be defenders of democracy, which here pertains to the rights to citizens’ online privacy and the degree of secrecy in US Government.

Originality/value

To the best of the author’s knowledge, this is the first study directed toward connecting, Snowden, Assange and Manning, to the birth of a new class of power brokers designed to directly challenge Western government malpractices with citizens’ online privacy and secrecy in foreign operations. This research explores both the birth of this new class and a collective ethos that binds this group together despite the tensions and conflicts within this new class.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 4
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 10 of over 17000