Search results

1 – 10 of 17
Article
Publication date: 21 February 2020

Mayya Shmidt

The objective of this contribution is to pinpoint the practices of users' interactions with sharing economy platforms in Russia, as well as explore the source of motivation to use…

Abstract

Purpose

The objective of this contribution is to pinpoint the practices of users' interactions with sharing economy platforms in Russia, as well as explore the source of motivation to use such platforms on the three cases of sharing economy platforms in Russia: Darudar [Gift-to-gift] (sharing goods), Bank Vremeny [Timebank] (sharing time and services) and Couchsurfing (sharing accommodation and leisure).

Design/methodology/approach

Empirical data were gathered from 25 in-depth interviews conducted for active users of the platforms and ethnographic observations of users' offline meetings as well as digital observations.

Findings

The results reveal that participants of the platforms tend to establish their own rules and norms of interaction, thus, fostering social connection. Findings suggest that users of sharing economy platforms are driven by the potential of minimising transaction costs and intrinsic motivation, such as getting experiences which have no market alternatives, upcycling and disposal of belongings, self-promotion and self-realisation.

Original/value

In this study, sharing as based in the sharing economy is conceptualised as a separate principle of resource allocation. The theory was applied to the empirical material of three Russian platforms, which has not been done previously in the paradigm of sharing. The current literature on the sharing economy is largely switched to the for-profit North American platforms, while case studies from other settings are lacking. This article aims to fill this gap by providing insights into non-profit platforms' operation in Russia.

Details

Information Technology & People, vol. 33 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 10 September 2019

Yong Tang, Jason Xiong, Rafael Becerril-Arreola and Lakshmi Iyer

The purpose of this paper is fourfold: first, to provide the first systematic study on the ethics of blockchain, mapping its main socio-technical challenges in technology and…

8646

Abstract

Purpose

The purpose of this paper is fourfold: first, to provide the first systematic study on the ethics of blockchain, mapping its main socio-technical challenges in technology and applications; second, to identify ethical issues of blockchain; third, to propose a conceptual framework of blockchain ethics study; fourth, to discuss ethical issues for stakeholders.

Design/methodology/approach

The paper employs literature research, research agenda and framework development.

Findings

Ethics of blockchain and its applications is essential for technology adoption. There is a void of research on blockchain ethics. The authors propose a first theoretical framework of blockchain ethics. Research agenda is proposed for future search. Finally, the authors recommend measures for stakeholders to facilitate the ethical adequacy of blockchain implementations and future Information Systems (IS) research directions. This research raises timely awareness and stimulates further debate on the ethics of blockchain in the IS community.

Originality/value

First, this work provides timely systematic research on blockchain ethics. Second, the authors propose the first research framework of blockchain ethics. Third, the authors identify key research questions of blockchain ethics. Fourth, this study contributes to the understanding of blockchain technology and its societal impacts.

Article
Publication date: 4 September 2019

Jason M. Walter

Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional…

Abstract

Purpose

Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker.

Design/methodology/approach

A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences.

Findings

Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention.

Originality/value

This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 5
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 1 April 2000

Siriginidi Subba Rao

Discusses CD‐ROM as a provider of multiple, simultaneous and remote access to a large amount of information such as abstracts, full text, directories, education materials, music…

Abstract

Discusses CD‐ROM as a provider of multiple, simultaneous and remote access to a large amount of information such as abstracts, full text, directories, education materials, music, etc. Presents a number of options that are available to increase access to a CD‐ROM collection and commonly used CD‐ROM networks under LANs, viz., peer‐to‐peer, file servers, client/server and optical servers. Also discusses selection of hardware and software for successful networking. Concludes that careful study of the pros and cons of establishing a CD‐ROM network has to be weighed in terms of cost and usage.

Details

Library Review, vol. 49 no. 3
Type: Research Article
ISSN: 0024-2535

Keywords

Article
Publication date: 1 June 1998

As libraries make increasing use of computer resources, a local network that interconnects personal computers and other machines within the library is becoming a necessity.

Abstract

As libraries make increasing use of computer resources, a local network that interconnects personal computers and other machines within the library is becoming a necessity.

Details

The Electronic Library, vol. 16 no. 6
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 20 November 2009

Ashish Raniwala, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng and Tzi‐cker Chiueh

This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any…

Abstract

Purpose

This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any prior security association and infrastructure support, to form a secure collaboration workspace, and share files and application content instantly with minimal human intervention.

Design/methodology/approach

The paper looks at the system implementation and experimentation.

Findings

WShare can automatically establish a peer‐to‐peer network among the participating mobile stations, and provides a transparent shared file repository through which the mobile stations can securely exchange files with simple drag‐and‐drop operations. This file sharing application can also be specialized to support the same file beaming service over wireless LAN as that provided by Palm PDAs over infrared links. On the application sharing front, WShare supports a general remote execution mechanism that can synchronize the state of multiple instances of a standard productivity application, such as PowerPoint, Excel, and Word, across different machines. Finally for sharing generic applications, WShare also integrates virtual network computing with reliable wireless broadcast to provide a user‐interface level sharing mechanism. Performance measurement on the fully operational WShare prototype shows that a collaboration workspace among five mobile nodes can be set up within 3.5 seconds.

Originality/value

This paper proposes a new communication paradigm and presents the design, implementation, and evaluation of a fully‐working prototype.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 27 February 2007

Patrick Wolf, Martin Steinebach and Konstantin Diener

The purpose of this paper is to show how digital watermarking can be applied to assist and improve cryptography‐based digital rights management (DRM) systems by allowing the…

1059

Abstract

Purpose

The purpose of this paper is to show how digital watermarking can be applied to assist and improve cryptography‐based digital rights management (DRM) systems by allowing the protection of content beyond the domain protected by the DRM system.

Design/methodology/approach

Digital watermarking is a passive technology, not allowing the active prevention of copyright violations. But it allows the irreversible linking of information with multimedia data, ensuring that an embedded watermark can be retrieved even after analogue copies. Therefore watermarking can be used where DRM fails: whenever content needs to be moved out of the protected DRM domain, e.g. when playing back content via analogue output channels it can mark the content with information that would help to identify its origin if it is used for copyright violations. The remaining challenge now is to find the marked content within the channels regularly used for copyright violations. The paper therefore introduces a concept for scanning file sharing networks for marked content.

Findings

The vast number of files present in the file sharing networks prohibits every approach based on completely scanning and analysing each file. Therefore concepts for filtered search queries where only potentially watermarked files are downloaded are discussed.

Originality/value

The paper shows how watermarking can be applied as a technology to allow active content protection beyond the limitations of current DRM systems.

Details

Online Information Review, vol. 31 no. 1
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 13 March 2007

Richard A. Spinello

The purpose of this paper is to provide an overview of intellectual property justifications and the basics of intellectual property law.

12055

Abstract

Purpose

The purpose of this paper is to provide an overview of intellectual property justifications and the basics of intellectual property law.

Design/methodology/approach

The paper examines intellectual property rights, discussing such areas as: copyright protection, patents, trademarks, trade secrets and common and current misconceptions.

Findings

Overprotection can be as damaging as underprotection because of the harm to the intellectual commons. The ideal property rights regime is one that prudently seeks balance.

Originality/value

Advises that the goal of the legal system should be the provision of just enough protection to reward creative workers for their labor and to spur future innovation. At the same time, it is necessary to avoid overly strong protection that will deplete the intellectual commons or unduly restrict its expansion, and thereby fail to promote social welfare.

Details

Library Hi Tech, vol. 25 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 15 December 2023

Umar Nawaz Kayani

This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.

Abstract

Purpose

This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.

Design/methodology/approach

Systematic literature review is used as the research strategy for this investigation and other aspects of the preferred reporting items for systematic reviews and meta-analyses framework have been incorporated to create a scholarly publications evaluation of the blockchain-based application in the financial arena and its future. The research looks at 86 studies published between 2018 and 2022.

Findings

There has been a steady but noticeable increase in the study of blockchain’s potential in many application domains over the past few of years. This rising tendency illustrates the newness and potential of blockchain technology, as well as the increasing attention from academics. According to the findings, blockchain is an appropriate solution for processing transactions using cryptocurrencies; nevertheless, it still has significant technical issues and limits that require to be exploring and solving before it can be considered a viable option. It is therefore, necessary to have a high level of reliability for payments and confidentiality, in addition to maintaining the anonymity of nodes, to stop assaults and efforts to disrupt transactions in the blockchain.

Practical implications

This study has several important theoretical and practical implications. First, it adds to the body of knowledge on blockchain and Fintech, focusing on the transaction side. While much blockchain research has focused on how the technology may affect strategic choices, this study has shed light on its potential from the perspective of financial reporting. Second, by highlighting the importance of the demand for the prompt identification of losses, this work adds to the body of knowledge on the factors that influence transaction frauds involving paper money. Additionally, by establishing the link between transparency and virtual transactions, the author backs up the asymmetric responses of investors to different investment possibilities. It looks at the evolution of financial technology (Fintech) and shows how it can be used to take the advantage of unique opportunities.

Originality/value

The study is different and novel from the previously published literature on this topic mainly because of its comprehensiveness, as it revolves around all industrial and commercial areas. The three main lines of research have been outlined, namely, classifying the many blockchain-based innovations that will alter the financial landscape in many industries; identifying whether these industries are a good fit for blockchain’s wealth creation potential; and directing researchers by outlining prospective study pathways.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Content available
Article
Publication date: 23 January 2009

577

Abstract

Details

Library Hi Tech News, vol. 26 no. 1/2
Type: Research Article
ISSN: 0741-9058

1 – 10 of 17