Search results

1 – 10 of over 2000
Article
Publication date: 3 March 2023

Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…

Abstract

Purpose

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.

Design/methodology/approach

This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.

Findings

The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.

Originality/value

Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 9 October 2023

Yong Sun, Ya-Feng Zhang, Yalin Wang and Sihui Zhang

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference…

Abstract

Purpose

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference for the formulation of protection policies for personal information security.

Design/methodology/approach

This paper constructs an evolutionary game model consisting of regulators, digital enterprises and consumers, which is combined with the simulation method to examine the influence of different factors on personal information protection and governance.

Findings

The results reveal seven stable equilibrium strategies for personal information security within the cooperative governance game system. The non-compliant processing of personal information by digital enterprises can damage the rights and interests of consumers. However, the combination of regulatory measures implemented by supervisory authorities and the rights protection measures enacted by consumers can effectively promote the self-regulation of digital enterprises. The reputation mechanism exerts a restricting effect on the opportunistic behaviour of the participants.

Research limitations/implications

The authors focus on the regulation of digital enterprises and do not consider the involvement of malicious actors such as hackers, and the authors will continue to focus on the game when assessing the governance of malicious actors in subsequent research.

Practical implications

This study's results enhance digital governance research and offer a reference for developing policies that protect personal information security.

Originality/value

This paper builds an analytical framework for cooperative governance for personal information security, which helps to understand the decision-making behaviour and motivation of different subjects and to better address issues in the governance for personal information security.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 27 February 2024

Nofie Iman

Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the…

Abstract

Purpose

Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the big tech really care about our personal data? This paper aims to look at data practices, data-related policy making as well as its economic consequences in the context of emerging economies.

Design/methodology/approach

Using qualitative methods such as literature review and analysis of numerous government documents, this paper inquires into the dynamics in the use of data by the business sectors, explains how data governance can add value to the business sectors while ensuring customers’ data privacy protection based on the data governance mechanism framework and details what it takes.

Findings

Using the case of Indonesian recent development on data privacy regulation, this paper describes the problems and threats to personal data protection. The advent of latest computing and mobile technology is shifting power relations between the governments, the big tech, as well as the end users. To conclude, the strategy and policy recommendations for implementing data privacy protection are also presented.

Originality/value

This paper provides a timely synthesis of data practices in the context of developing countries, particularly in relation to policy making and economic consequences. This paper also identifies and shares several promising future research ideas.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 9 January 2024

Ananda Dwitha Yuniar

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in…

Abstract

Purpose

Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in the privacy policy (PP). This study describes several aspects of the PP that consumers need to pay attention to, especially points prone to misuse of personal information.

Design/methodology/approach

This research used a taxonomy of consumer privacy concerns in e-commerce to reveal general and specific privacy concerns. The privacy calculus theory was also applied to explore consumer rationalization using (1) consumer knowledge about PP, (2) subjective perception, and (3) proximity to the PP features. Furthermore, the netnographic approach was used to combine the interrelation between technology and social construction. A sample of 378 young consumers in several major cities in Indonesia participated online and offline. Semi-structured interviews were also conducted to gain more in-depth comprehension.

Findings

The results showed that most young consumers have sufficient basic knowledge of the important points of PP. Furthermore, they tend not to read the PP because it is long and cumbersome, and therefore do not wish to expend much cognitive effort on it.

Originality/value

This study provides several results that can be utilized by policymakers or e-commerce companies to pay more attention to PPs for young groups. In addition, e-commerce companies can increase the knowledge of the privacy situation of Internet users in general.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-11-2022-0740

Details

International Journal of Social Economics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 4 December 2023

Ben Krishna, Satish Krishnan and M.P. Sebastian

The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level…

Abstract

Purpose

The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level analysis, overlooking the intricate dynamics between institutions' cybersecurity commitments and the trust levels of digital payment users. In light of this limitation, this study aims to offer a more comprehensive understanding of this complex relationship.

Design/methodology/approach

A case study was conducted on digital payment users in India through the critical realist lens. To gather data, interviews and focus group discussions were conducted with digital payment users from various regions of the country.

Findings

The citizen-centric outcomes of the national cybersecurity commitment (performance and responsiveness) are the most prominent and impactful trust indicators. These outcomes play a crucial role in shaping digital payment users' perception and trust in the cybersecurity commitment of public institutions. Individuals' value positions also influence trust judgments, as it is essential to recognize the value tensions that may arise due to security implementation and their congruence with citizens' values.

Research limitations/implications

The findings of this study have significant implications for policymakers. They are potentially an artifact of the security and perception of digital payment users and the cultural uniqueness of digital payment users in India.

Originality/value

The study proposes a holistic understanding of the relationship between institutions' cybersecurity commitments and the trust levels of digital payment users. It offers a qualitative evaluation of how digital payment users perceive and construe efficient information security management implemented by public institutions.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 2 August 2023

Andrea Sestino, Adham Kahlawi and Andrea De Mauro

The data economy, emerging from the current hyper-technological landscape, is a global digital ecosystem where data is gathered, organized and exchanged to create economic value…

Abstract

Purpose

The data economy, emerging from the current hyper-technological landscape, is a global digital ecosystem where data is gathered, organized and exchanged to create economic value. This paper aims to shed light on the interplay of the different topics involved in the data economy, as found in the literature. The study research provides a comprehensive understanding of the opportunities, challenges and implications of the data economy for businesses, governments, individuals and society at large, while investigating its impact on business value creation, knowledge and digital business transformation.

Design/methodology/approach

The authors conducted a literature review that generated a conceptual map of the data economy by analyzing a corpus of research papers through a combination of machine learning algorithms, text mining techniques and a qualitative research approach.

Findings

The study findings revealed eight topics that collectively represent the essential features of data economy in the current literature, namely (1) Data Security, (2) Technology Enablers, (3) Business Implications, (4) Social Implications, (5) Political Framework, (6) Legal Enablers, (7) Privacy Concerns and (8) Data Marketplace. The study resulting model may help researchers and practitioners to develop the concept of data economy in a structured way and provide a subset of specific areas that require further research exploration.

Practical implications

Practically, this paper offers managers and marketers valuable insights to comprehend how to manage the opportunities deriving from a constantly changing competitive arena whose value is today also generated by the data economy.

Social implications

Socially, the authors also reveal insights explaining how the data economy features may be exploited to build a better society.

Originality/value

This is the first paper exploring the data economy opportunity for business value creation from a critical perspective.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran and Kamal Gulati

The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…

Abstract

Purpose

The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with multiple gateways. It entails IoMT devices and wearables connecting to exchange sensitive data with a sensor node which performs the aggeration process and then communicates the data using a Fog server. If the aggregator sensor loses the connection from the Fog server, it will be unable to submit data directly to the Fog server. The node transmits encrypted information with a neighboring sensor and sends it to the Fog server integrated with federated learning, which encrypts data to the existing data. The fog server performs the operations on the measured data, and the values are stored in the local storage area and later it is updated to the cloud server.

Design/methodology/approach

SHDCT uses an Internet-of-things (IoT)-based monitoring network, making it possible for smart devices to connect and interact with each other. The main purpose of the monitoring network has been in the collection of biological data and additional information from mobile devices to the patients. The monitoring network is composed of three different types of smart devices that is at the heart of the IoT.

Findings

It has been addressed in this work how to design an architecture for safe data aggregation in heterogeneous IoT-federated learning-enabled wireless sensor networks (WSNs), which makes use of basic encoding and data aggregation methods to achieve this. The authors suggest that the small gateway node (SGN) captures all of the sensed data from the SD and uses a simple, lightweight encoding scheme and cryptographic techniques to convey the data to the gateway node (GWN). The GWN gets all of the medical data from SGN and ensures that the data is accurate and up to date. If the data obtained is trustworthy, then the medical data should be aggregated and sent to the Fog server for further processing. The Java programming language simulates and analyzes the proposed SHDCT model for deployment and message initiation. When comparing the SHDCT scheme to the SPPDA and electrohydrodynamic atomisation (EHDA) schemes, the results show that the SHDCT method performs significantly better. When compared with the SPPDA and EHDA schemes, the suggested SHDCT plan necessitates a lower communication cost. In comparison to EHDA and SPPDA, SHDCT achieves 4.72% and 13.59% less, respectively. When compared to other transmission techniques, SHDCT has a higher transmission ratio. When compared with EHDA and SPPDA, SHDCT achieves 8.47% and 24.41% higher transmission ratios, respectively. When compared with other ways it uses less electricity. When compared with EHDA and SPPDA, SHDCT achieves 5.85% and 18.86% greater residual energy, respectively.

Originality/value

In the health care sector, a series of interconnected medical devices collect data using IoT networks in the health care domain. Preventive, predictive, personalized and participatory care is becoming increasingly popular in the health care sector. Safe data collection and transfer to a centralized server is a challenging scenario. This study presents a mechanism for SHDCT. The mechanism consists of Smart healthcare IoT devices working on federated learning that link up with one another to exchange health data. Health data is sensitive and needs to be exchanged securely and efficiently. In the mechanism, the sensing devices send data to a SGN. This SGN uses a lightweight encoding scheme and performs cryptography techniques to communicate the data with the GWN. The GWN gets all the health data from the SGN and makes it possible to confirm that the data is validated. If the received data is reliable, then aggregate the medical data and transmit it to the Fog server for further process. The performance parameters are compared with the other systems in terms of communication costs, transmission ratio and energy use.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 20 February 2024

Ylenia Cavacece, Giulio Maggiore, Riccardo Resciniti and Andrea Moretta Tartaglione

The purpose of this paper is to investigate user satisfaction with digital health solutions by identifying and prioritizing different service attributes on the basis of their…

Abstract

Purpose

The purpose of this paper is to investigate user satisfaction with digital health solutions by identifying and prioritizing different service attributes on the basis of their impact on improving user satisfaction.

Design/methodology/approach

Through a literature review and interviews with health professionals and patients, 20 attributes of digital health services provided in Italy have been identified. User satisfaction with these attributes has been evaluated by adopting the Kano model’s continuous and discrete analyses.

Findings

The findings reveal the essential attributes of digital health services that meet users' expectations, identify the attributes that users appreciate or dislike having and highlight unexpected attributes that lead to a significant boost in satisfaction when provided.

Research limitations/implications

This study demonstrates the efficacy of the Kano model in assessing the nonlinear correlation between user satisfaction and the quality of digital health services, thus contributing to fill a gap in the literature in this area. The main limitation of this work is the use of a non-probabilistic sampling method.

Practical implications

This research suggests healthcare institutions and organizations consider user preferences when designing digital health solutions to increase their satisfaction. The results indicate different effects on user satisfaction and dissatisfaction for different categories of attributes in the Italian context.

Originality/value

Previous works studied customer satisfaction with digital health, assuming a linear relationship with service quality, or investigated consumer adoption intentions focusing on the technological factors. This work advances available knowledge by analyzing the nonlinear relationship between digital health attributes and users’ satisfaction and dissatisfaction.

Details

The TQM Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-2731

Keywords

Article
Publication date: 15 April 2024

Aswathy Sreenivasan and Suresh M.

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying…

Abstract

Purpose

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying ethical dimensions to the field of entrepreneurship. By combining a bibliometric analysis with the literature review, the purpose of this paper is to provide an overview of entrepreneurship ethics and its contribution to sustainable development goals, along with future research directions on the topic of entrepreneurship and ethics.

Design/methodology/approach

The research looked for literature based on entrepreneurship ethics from the Dimension database. The authors accumulated 2,279 articles for the period of 2002–2022 for analysis. The authors used bibliometric analysis for analyzing the topic with the use of VosViewer and Excel.

Findings

By combining a bibliometric analysis with a literature review, this study aimed to provide an overview of the ethics and entrepreneurship and contribution to sustainable development goals. The most influential author and journal are Vanessa Ratten and the Journal of Business Ethics, respectively. The top sustainable development goals (SDGs) being contributed by entrepreneurship ethics are SDG4, SDG8, SDG16, SDG11 and SDG3. By contrasting these two interpretations, the authors have demonstrated that the entrepreneurship environment involves various ethical issues connected to personal, organizational and societal sectors.

Research limitations/implications

The current study may serve as a general guideline for future investigation into this topic.

Practical implications

Regarding the practical ramifications, the findings can help entrepreneurs who are preparing to launch a business or are already doing so. The findings provide a comprehensive framework of success variables that must be considered to improve the venture’s performance.

Originality/value

This study’s originality is from presenting a structured and in-depth literature review that describes the current state of entrepreneurship ethics and its contribution to sustainable development goals. A complete analysis of the data gathered on entrepreneurship ethics is offered to establish that it is sustainable.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 22 March 2024

Rongxin Chen and Tianxing Zhang

In the global context, artificial intelligence (AI) technology and environmental, social and governance (ESG) have emerged as central drivers facilitating corporate transformation…

Abstract

Purpose

In the global context, artificial intelligence (AI) technology and environmental, social and governance (ESG) have emerged as central drivers facilitating corporate transformation and the business model revolution. This paper aims to investigate whether and how the application of AI enhances the ESG performance of enterprises.

Design/methodology/approach

This study uses panel data from Chinese A-share listed companies spanning the period from 2012 to 2022. Through a multivariate regression analysis, it examines the impact of AI on the ESG performance of enterprises.

Findings

The findings suggest that the application of AI in enterprises has a positive impact on ESG performance. Internal control systems within the organization and external information environments act as mediators in the relationship between AI and corporate ESG performance. Furthermore, corporate compliance plays a moderating role in the connection between AI and corporate ESG performance.

Originality/value

This paper underscores the pivotal role played by AI in enhancing corporate ESG performance. It explores the pathways to improving corporate ESG behavior from the perspectives of internal control and information environments. This discussion holds significant implications for advancing the application of AI in enterprises and enhancing their sustainable governance capabilities.

Details

Chinese Management Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-614X

Keywords

1 – 10 of over 2000