Search results

1 – 10 of 124
Open Access
Article
Publication date: 22 August 2023

Brijesh Sivathanu, Rajasshrie Pillai, Mahek Mahtta and Angappa Gunasekaran

This study aims to examine the tourists' visit intention by watching deepfake destination videos, using Information Manipulation and Media Richness Theory.

1069

Abstract

Purpose

This study aims to examine the tourists' visit intention by watching deepfake destination videos, using Information Manipulation and Media Richness Theory.

Design/methodology/approach

This study conducted a primary survey utilizing a structured questionnaire. In total, 1,360 tourists were surveyed, and quantitative data analysis was done using PLS-SEM.

Findings

The results indicate that the factors that affect the tourists' visit intention after watching deepfake videos include information manipulation tactics, trust and media richness. This study also found that perceived deception and cognitive load do not influence the tourists' visit intention.

Originality/value

The originality/salience of this study lies in the fact that this is possibly among the first to combine the Media Richness Theory and Information Manipulation for understanding tourists' visit intention and post-viewing deepfake destination videos.

Details

Journal of Tourism Futures, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2055-5911

Keywords

Open Access
Article
Publication date: 21 December 2020

R. Venkatesakumar, Sudhakar Vijayakumar, S. Riasudeen, S. Madhavan and B. Rajeswari

The star rating summarises the review content and conveys the message faster than other review components. Star ratings influence helpfulness of the reviews, and extreme reviews

4330

Abstract

Purpose

The star rating summarises the review content and conveys the message faster than other review components. Star ratings influence helpfulness of the reviews, and extreme reviews are considered as less helpful in the decision process. However, literature has rarely addressed variations in star ratings across product categories and variations between two online retailers. In this paper, the authors have compared the distribution of star ratings across 11 products and among the retailers.

Design/methodology/approach

Online reviews for 11 product categories have collected, and the authors compared the distribution of star ratings across 11 products and retailers. Correspondence analysis has been applied to show the association between star ratings and product categories for the e-retail firms.

Findings

The Amazon site contains proportionately more number of 1-star rated reviews than Flipkart. In Amazon reviews, few product categories are closely associated with 1-star and 2-star reviews, whereas no product categories are closely associated with 1-star and 2-star reviews in Flipkart reviews. The results indicate two distinct communication strategies followed by the firms in managing online consumer reviews.

Research limitations/implications

The authors did not analyse data across demographic details because of access restriction policies of the websites.

Practical implications

Understanding the distribution of review characteristics will improve the consumer’s decision-making ability and using online review content judiciously.

Social implications

This study’s results show significant insights on online retailing by providing cues in using shopping sites and online review characteristics of two prominent retailers.

Originality/value

This paper has brought out a distinct distribution pattern of online review between Amazon and Flipkart. Amazon allows a higher degree of negative contents, whereas Flipkart allows more number of positive reviews.

Details

Vilakshan - XIMB Journal of Management, vol. 18 no. 2
Type: Research Article
ISSN: 0973-1954

Keywords

Open Access
Book part
Publication date: 9 December 2021

Ron Iphofen and Dónal O'Mathúna

In light of the many crises and catastrophes faced in the modern world, policymakers frequently make claims to be ‘following the science’ or being ‘governed by the data’. Yet…

Abstract

In light of the many crises and catastrophes faced in the modern world, policymakers frequently make claims to be ‘following the science’ or being ‘governed by the data’. Yet, conflict based on inequalities continue to fuel dissatisfaction with the decisions and actions of authorities. Research into public security may require surveillance and covert observations, all of which are subject to major ethical challenges. Any neat distinction between covert and overt research is difficult to maintain given the variety of definitions used for all the terms addressed here. Covert research may be ethically justified and is not necessarily deceptive. In any case, deception may be ethical if engaged in for the ‘right’ reasons. Modern research sites and innovative research methods may enhance opportunities for covert work. In all surveillance and covert work, care must be taken about how consent is managed, how observed subjects are protected and harm to all involved minimised in all situations.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Article
Publication date: 16 November 2023

Bahareh Farhoudinia, Selcen Ozturkcan and Nihat Kasap

This paper aims to conduct an interdisciplinary systematic literature review (SLR) of fake news research and to advance the socio-technical understanding of digital information…

1328

Abstract

Purpose

This paper aims to conduct an interdisciplinary systematic literature review (SLR) of fake news research and to advance the socio-technical understanding of digital information practices and platforms in business and management studies.

Design/methodology/approach

The paper applies a focused, SLR method to analyze articles on fake news in business and management journals from 2010 to 2020.

Findings

The paper analyzes the definition, theoretical frameworks, methods and research gaps of fake news in the business and management domains. It also identifies some promising research opportunities for future scholars.

Practical implications

The paper offers practical implications for various stakeholders who are affected by or involved in fake news dissemination, such as brands, consumers and policymakers. It provides recommendations to cope with the challenges and risks of fake news.

Social implications

The paper discusses the social consequences and future threats of fake news, especially in relation to social networking and social media. It calls for more awareness and responsibility from online communities to prevent and combat fake news.

Originality/value

The paper contributes to the literature on information management by showing the importance and consequences of fake news sharing for societies. It is among the frontier systematic reviews in the field that covers studies from different disciplines and focuses on business and management studies.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Open Access
Article
Publication date: 11 August 2023

Michael Nii Laryeafio and Omoruyi Courage Ogbewe

Qualitative research that involves the use of human participants calls for the need to protect those participants to give their honest view during data collection. This is an…

13946

Abstract

Purpose

Qualitative research that involves the use of human participants calls for the need to protect those participants to give their honest view during data collection. This is an important part of every primary data collection in qualitative studies using interviews. This paper aims to investigate all available ethical considerations that need to be observed by the researcher when conducting primary data collection through interview and to explore the theories that underpin the ethics in qualitative studies.

Design/methodology/approach

This paper systemically reviewed existing qualitative data on ethics and gathered information that were analysed and presented on the topic area.

Findings

The findings show that ethical considerations deal with the various approaches adopted by the researcher to make the participants feel safe to participate in any given researcher. During an interview process in qualitative research, the findings show that anonymity, voluntary participation, privacy, confidentiality, option to opt out and avoiding misuse of findings are ethical considerations that must be observed by the researcher. The outcome of the investigation also shows that deontology and utilitarianism, rights and virtue are the main theories that underpin ethical considerations in research.

Originality/value

The rights of the research participants need to be respected in qualitative research to assist in gathering accurate information to achieve the objectives of study. This and other ethical principles such as anonymity, privacy, confidentiality, voluntary participation and option to opt out guide the researcher to systematically adhere to data collection approaches that yield valid results in qualitative data collection using interviews.

Details

Journal of Ethics in Entrepreneurship and Technology, vol. 3 no. 2
Type: Research Article
ISSN: 2633-7436

Keywords

Open Access
Article
Publication date: 27 December 2022

Camilla Hällgren and Åsa Björk

This conceptual paper takes identity, digital technology, young people and education as a combined starting point and suggests how to research young people’s identity practices in…

3380

Abstract

Purpose

This conceptual paper takes identity, digital technology, young people and education as a combined starting point and suggests how to research young people’s identity practices in and out of school. Today’s young people form their identities in a world that is increasingly imbued by digital technologies. What is evident too is that these technologies and the use of them are not restricted to one single context. Rather, digital technologies mediate multiple contexts simultaneously – to an extent where they collapse. This means that school and leisure time, public and private, digital and analog, virtual and material, time and place, social contexts and audiences, through digital technology, merge in various ways in young people’s identity practices and everyday life.

Design/methodology/approach

Little is known about what identity practices in collapsing contexts means to young people in their lives and how educators and others can support them. Most studies to date investigate digital technology use as a discrete phenomenon and few studies concern young people’s identity practices in contexts, as they occur. In an increasingly digital world, where dependency on digital technologies continues this forms an urgent knowledge gap to bridge. In particular to guide educators, and others, who support young people as they live and learn through interconnected spaces in and out of school. The conceptual approach of this paper is of importance to better understand how to bridge this gap.

Findings

This paper suggests a research approach that extends previous research at the intersection of identity, young people, digital technology by outlining extended ways for thinking about identity in a digital world that can be useful for investigating identity as an existential practice, extending beyond identity representations, in conditions mediated by contemporary digital technologies and in collapsing contexts. What is also included are methodological considerations about researching young people, identity and technology as dynamic research objects, rendering a holistic approach.

Research limitations/implications

It is a conceptual paper that addresses identity, digital technology, young people and education as a combined starting point to outline further research.

Originality/value

The Guided Tour Technique and Social Media Research is suggested as possible methodologies for holistic and ethically sensitive, empirical research on identity, digital technology, young people and education.

Details

The International Journal of Information and Learning Technology, vol. 40 no. 1
Type: Research Article
ISSN: 2056-4880

Keywords

Open Access
Article
Publication date: 7 December 2017

Sille Obelitz Søe

With the outset of automatic detection of information, misinformation, and disinformation, the purpose of this paper is to examine and discuss various conceptions of information…

13888

Abstract

Purpose

With the outset of automatic detection of information, misinformation, and disinformation, the purpose of this paper is to examine and discuss various conceptions of information, misinformation, and disinformation within philosophy of information.

Design/methodology/approach

The examinations are conducted within a Gricean framework in order to account for the communicative aspects of information, misinformation, and disinformation as well as the detection enterprise.

Findings

While there often is an exclusive focus on truth and falsity as that which distinguish information from misinformation and disinformation, this paper finds that the distinguishing features are actually intention/intentionality and non-misleadingness/misleadingness – with non-misleadingness/misleadingness as the primary feature. Further, the paper rehearses the argument in favor of a true variety of disinformation and extends this argument to include true misinformation.

Originality/value

The findings are novel and pose a challenge to the possibility of automatic detection of misinformation and disinformation. Especially the notions of true disinformation and true misinformation, as varieties of disinformation and misinformation, which force the true/false dichotomy for information vs mis-/disinformation to collapse.

Details

Journal of Documentation, vol. 74 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 6 October 2023

Reijo Savolainen

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Abstract

Purpose

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Design/methodology/approach

Descriptive quantitative analysis and qualitative content analysis of 2,663 posts submitted to seven Reddit threads discussing a conspiracy operation, that is, the damage of the Nord Stream gas pipelines in September 2022. It was examined how the participants of online discussion assess the credibility of information constitutive of conspiracy theories speculating about (1) suspected actors responsible for the damage, (2) their motives and (3) the ways in which the damage was made. The credibility assessments focussed on diverse sources offering information about the above three factors.

Findings

The participants assessed the credibility of information by drawing on four main criteria: plausibility of arguments, honesty in argumentation, similarity to one's beliefs and provision of evidence. Most assessments were negative and indicated doubt about the informational believability of conspiracy theories about the damage. Of the information sources referred to in the discussion, the posts submitted by fellow participants, television programmes and statements provided by governmental organizations were judged most critically, due to implausible argumentation and advocacy of biased views.

Research limitations/implications

As the study focuses on a sample of posts dealing with conspiracy theories about a particular event, the findings cannot be generalized to concern the informational credibility conspiracy narratives.

Originality/value

The study pioneers by providing an in-depth analysis of the nature of credibility assessments by focussing on information constitutive of conspiracy theories.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Open Access
Article
Publication date: 8 February 2023

Antonio Iudici, Miriam Stefano and Davide Binato

This study aims to provide an overview of studies concerning bias in law, particularly in judges’ decisions. The authors intend to bring to light the factors that can most…

2708

Abstract

Purpose

This study aims to provide an overview of studies concerning bias in law, particularly in judges’ decisions. The authors intend to bring to light the factors that can most frequently lead to unequal decisions to enable judges to better perform their function.

Design/methodology/approach

A literature review was used as a methodology based on studies involving judges and juries.

Findings

The evidence reported by this review suggests how difficult the judge’s job is and how they can be unconsciously influenced by inferences, deductions and biases. The results show that the pleasantness of the witness and the confidence they exhibit during testification are crucial factors in influencing the decisions of judges and jurors. From these studies, it can be assumed that different personal aspects – smiling, pleasantness and the witness’s credibility – can be positively associated with each other, which could compromise the ongoing evaluation. Gender is another factor that can influence evaluations; in fact, witnesses are evaluated based on their own “gender” as well as that of the jurors. Another essential factor is self-confidence. Also, the age of both of the judge and of the witness can be a factor that influences decisions in court. Other factors such as communication effectiveness, degree of accuracy of reported information and non-verbal behaviour were also found to be important.

Research limitations/implications

Among the limitations of this research, the authors have to consider the low number of available research and that the most of these derive from a specific cultural context – the American one. There may also be limits to the way in which certain concepts are used in different parts of the world, particularly through a very broad construct, such as the credibility of witness.

Practical implications

This study highlights which inferences and biases can characterise decision-making processes and, above all, highlights the need for specific training courses aimed at managing the many processes involved in influencing human decisions.

Social implications

The authors believe that this work can raise awareness about the series of unconscious reasoning that may happen in the legal field, which has a major impact on people’s lives and on the general perception of justice.

Originality/value

In this research, the authors have considered some of the criteria that may intervene in the evaluation of witnesses, those present in the current scientific literature. From the research, it seems appropriate and necessary to provide judges with adequate training aimed at the recognition of their cognitive processes and bias. In fact, when they were made aware of them, they were less affected by bias, resulting in more objective and limiting improper inferences.

Details

The Journal of Forensic Practice, vol. 25 no. 2
Type: Research Article
ISSN: 2050-8794

Keywords

1 – 10 of 124