Search results
1 – 10 of over 2000Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu
Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…
Abstract
Purpose
Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.
Design/methodology/approach
This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.
Findings
The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.
Originality/value
Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.
Details
Keywords
Yong Sun, Ya-Feng Zhang, Yalin Wang and Sihui Zhang
This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference…
Abstract
Purpose
This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference for the formulation of protection policies for personal information security.
Design/methodology/approach
This paper constructs an evolutionary game model consisting of regulators, digital enterprises and consumers, which is combined with the simulation method to examine the influence of different factors on personal information protection and governance.
Findings
The results reveal seven stable equilibrium strategies for personal information security within the cooperative governance game system. The non-compliant processing of personal information by digital enterprises can damage the rights and interests of consumers. However, the combination of regulatory measures implemented by supervisory authorities and the rights protection measures enacted by consumers can effectively promote the self-regulation of digital enterprises. The reputation mechanism exerts a restricting effect on the opportunistic behaviour of the participants.
Research limitations/implications
The authors focus on the regulation of digital enterprises and do not consider the involvement of malicious actors such as hackers, and the authors will continue to focus on the game when assessing the governance of malicious actors in subsequent research.
Practical implications
This study's results enhance digital governance research and offer a reference for developing policies that protect personal information security.
Originality/value
This paper builds an analytical framework for cooperative governance for personal information security, which helps to understand the decision-making behaviour and motivation of different subjects and to better address issues in the governance for personal information security.
Details
Keywords
Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the…
Abstract
Purpose
Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the big tech really care about our personal data? This paper aims to look at data practices, data-related policy making as well as its economic consequences in the context of emerging economies.
Design/methodology/approach
Using qualitative methods such as literature review and analysis of numerous government documents, this paper inquires into the dynamics in the use of data by the business sectors, explains how data governance can add value to the business sectors while ensuring customers’ data privacy protection based on the data governance mechanism framework and details what it takes.
Findings
Using the case of Indonesian recent development on data privacy regulation, this paper describes the problems and threats to personal data protection. The advent of latest computing and mobile technology is shifting power relations between the governments, the big tech, as well as the end users. To conclude, the strategy and policy recommendations for implementing data privacy protection are also presented.
Originality/value
This paper provides a timely synthesis of data practices in the context of developing countries, particularly in relation to policy making and economic consequences. This paper also identifies and shares several promising future research ideas.
Details
Keywords
Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in…
Abstract
Purpose
Privacy is a sensitive issue in business because it involves how a platform uses consumer personal data. In terms of consumer rights, personal information needs to be protected in the privacy policy (PP). This study describes several aspects of the PP that consumers need to pay attention to, especially points prone to misuse of personal information.
Design/methodology/approach
This research used a taxonomy of consumer privacy concerns in e-commerce to reveal general and specific privacy concerns. The privacy calculus theory was also applied to explore consumer rationalization using (1) consumer knowledge about PP, (2) subjective perception, and (3) proximity to the PP features. Furthermore, the netnographic approach was used to combine the interrelation between technology and social construction. A sample of 378 young consumers in several major cities in Indonesia participated online and offline. Semi-structured interviews were also conducted to gain more in-depth comprehension.
Findings
The results showed that most young consumers have sufficient basic knowledge of the important points of PP. Furthermore, they tend not to read the PP because it is long and cumbersome, and therefore do not wish to expend much cognitive effort on it.
Originality/value
This study provides several results that can be utilized by policymakers or e-commerce companies to pay more attention to PPs for young groups. In addition, e-commerce companies can increase the knowledge of the privacy situation of Internet users in general.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-11-2022-0740
Details
Keywords
Ben Krishna, Satish Krishnan and M.P. Sebastian
The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level…
Abstract
Purpose
The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level analysis, overlooking the intricate dynamics between institutions' cybersecurity commitments and the trust levels of digital payment users. In light of this limitation, this study aims to offer a more comprehensive understanding of this complex relationship.
Design/methodology/approach
A case study was conducted on digital payment users in India through the critical realist lens. To gather data, interviews and focus group discussions were conducted with digital payment users from various regions of the country.
Findings
The citizen-centric outcomes of the national cybersecurity commitment (performance and responsiveness) are the most prominent and impactful trust indicators. These outcomes play a crucial role in shaping digital payment users' perception and trust in the cybersecurity commitment of public institutions. Individuals' value positions also influence trust judgments, as it is essential to recognize the value tensions that may arise due to security implementation and their congruence with citizens' values.
Research limitations/implications
The findings of this study have significant implications for policymakers. They are potentially an artifact of the security and perception of digital payment users and the cultural uniqueness of digital payment users in India.
Originality/value
The study proposes a holistic understanding of the relationship between institutions' cybersecurity commitments and the trust levels of digital payment users. It offers a qualitative evaluation of how digital payment users perceive and construe efficient information security management implemented by public institutions.
Details
Keywords
Andrea Sestino, Adham Kahlawi and Andrea De Mauro
The data economy, emerging from the current hyper-technological landscape, is a global digital ecosystem where data is gathered, organized and exchanged to create economic value…
Abstract
Purpose
The data economy, emerging from the current hyper-technological landscape, is a global digital ecosystem where data is gathered, organized and exchanged to create economic value. This paper aims to shed light on the interplay of the different topics involved in the data economy, as found in the literature. The study research provides a comprehensive understanding of the opportunities, challenges and implications of the data economy for businesses, governments, individuals and society at large, while investigating its impact on business value creation, knowledge and digital business transformation.
Design/methodology/approach
The authors conducted a literature review that generated a conceptual map of the data economy by analyzing a corpus of research papers through a combination of machine learning algorithms, text mining techniques and a qualitative research approach.
Findings
The study findings revealed eight topics that collectively represent the essential features of data economy in the current literature, namely (1) Data Security, (2) Technology Enablers, (3) Business Implications, (4) Social Implications, (5) Political Framework, (6) Legal Enablers, (7) Privacy Concerns and (8) Data Marketplace. The study resulting model may help researchers and practitioners to develop the concept of data economy in a structured way and provide a subset of specific areas that require further research exploration.
Practical implications
Practically, this paper offers managers and marketers valuable insights to comprehend how to manage the opportunities deriving from a constantly changing competitive arena whose value is today also generated by the data economy.
Social implications
Socially, the authors also reveal insights explaining how the data economy features may be exploited to build a better society.
Originality/value
This is the first paper exploring the data economy opportunity for business value creation from a critical perspective.
Details
Keywords
Priyanka Kumari Bhansali, Dilendra Hiran and Kamal Gulati
The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…
Abstract
Purpose
The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with multiple gateways. It entails IoMT devices and wearables connecting to exchange sensitive data with a sensor node which performs the aggeration process and then communicates the data using a Fog server. If the aggregator sensor loses the connection from the Fog server, it will be unable to submit data directly to the Fog server. The node transmits encrypted information with a neighboring sensor and sends it to the Fog server integrated with federated learning, which encrypts data to the existing data. The fog server performs the operations on the measured data, and the values are stored in the local storage area and later it is updated to the cloud server.
Design/methodology/approach
SHDCT uses an Internet-of-things (IoT)-based monitoring network, making it possible for smart devices to connect and interact with each other. The main purpose of the monitoring network has been in the collection of biological data and additional information from mobile devices to the patients. The monitoring network is composed of three different types of smart devices that is at the heart of the IoT.
Findings
It has been addressed in this work how to design an architecture for safe data aggregation in heterogeneous IoT-federated learning-enabled wireless sensor networks (WSNs), which makes use of basic encoding and data aggregation methods to achieve this. The authors suggest that the small gateway node (SGN) captures all of the sensed data from the SD and uses a simple, lightweight encoding scheme and cryptographic techniques to convey the data to the gateway node (GWN). The GWN gets all of the medical data from SGN and ensures that the data is accurate and up to date. If the data obtained is trustworthy, then the medical data should be aggregated and sent to the Fog server for further processing. The Java programming language simulates and analyzes the proposed SHDCT model for deployment and message initiation. When comparing the SHDCT scheme to the SPPDA and electrohydrodynamic atomisation (EHDA) schemes, the results show that the SHDCT method performs significantly better. When compared with the SPPDA and EHDA schemes, the suggested SHDCT plan necessitates a lower communication cost. In comparison to EHDA and SPPDA, SHDCT achieves 4.72% and 13.59% less, respectively. When compared to other transmission techniques, SHDCT has a higher transmission ratio. When compared with EHDA and SPPDA, SHDCT achieves 8.47% and 24.41% higher transmission ratios, respectively. When compared with other ways it uses less electricity. When compared with EHDA and SPPDA, SHDCT achieves 5.85% and 18.86% greater residual energy, respectively.
Originality/value
In the health care sector, a series of interconnected medical devices collect data using IoT networks in the health care domain. Preventive, predictive, personalized and participatory care is becoming increasingly popular in the health care sector. Safe data collection and transfer to a centralized server is a challenging scenario. This study presents a mechanism for SHDCT. The mechanism consists of Smart healthcare IoT devices working on federated learning that link up with one another to exchange health data. Health data is sensitive and needs to be exchanged securely and efficiently. In the mechanism, the sensing devices send data to a SGN. This SGN uses a lightweight encoding scheme and performs cryptography techniques to communicate the data with the GWN. The GWN gets all the health data from the SGN and makes it possible to confirm that the data is validated. If the received data is reliable, then aggregate the medical data and transmit it to the Fog server for further process. The performance parameters are compared with the other systems in terms of communication costs, transmission ratio and energy use.
Details
Keywords
Ylenia Cavacece, Giulio Maggiore, Riccardo Resciniti and Andrea Moretta Tartaglione
The purpose of this paper is to investigate user satisfaction with digital health solutions by identifying and prioritizing different service attributes on the basis of their…
Abstract
Purpose
The purpose of this paper is to investigate user satisfaction with digital health solutions by identifying and prioritizing different service attributes on the basis of their impact on improving user satisfaction.
Design/methodology/approach
Through a literature review and interviews with health professionals and patients, 20 attributes of digital health services provided in Italy have been identified. User satisfaction with these attributes has been evaluated by adopting the Kano model’s continuous and discrete analyses.
Findings
The findings reveal the essential attributes of digital health services that meet users' expectations, identify the attributes that users appreciate or dislike having and highlight unexpected attributes that lead to a significant boost in satisfaction when provided.
Research limitations/implications
This study demonstrates the efficacy of the Kano model in assessing the nonlinear correlation between user satisfaction and the quality of digital health services, thus contributing to fill a gap in the literature in this area. The main limitation of this work is the use of a non-probabilistic sampling method.
Practical implications
This research suggests healthcare institutions and organizations consider user preferences when designing digital health solutions to increase their satisfaction. The results indicate different effects on user satisfaction and dissatisfaction for different categories of attributes in the Italian context.
Originality/value
Previous works studied customer satisfaction with digital health, assuming a linear relationship with service quality, or investigated consumer adoption intentions focusing on the technological factors. This work advances available knowledge by analyzing the nonlinear relationship between digital health attributes and users’ satisfaction and dissatisfaction.
Details
Keywords
Aswathy Sreenivasan and Suresh M.
Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying…
Abstract
Purpose
Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying ethical dimensions to the field of entrepreneurship. By combining a bibliometric analysis with the literature review, the purpose of this paper is to provide an overview of entrepreneurship ethics and its contribution to sustainable development goals, along with future research directions on the topic of entrepreneurship and ethics.
Design/methodology/approach
The research looked for literature based on entrepreneurship ethics from the Dimension database. The authors accumulated 2,279 articles for the period of 2002–2022 for analysis. The authors used bibliometric analysis for analyzing the topic with the use of VosViewer and Excel.
Findings
By combining a bibliometric analysis with a literature review, this study aimed to provide an overview of the ethics and entrepreneurship and contribution to sustainable development goals. The most influential author and journal are Vanessa Ratten and the Journal of Business Ethics, respectively. The top sustainable development goals (SDGs) being contributed by entrepreneurship ethics are SDG4, SDG8, SDG16, SDG11 and SDG3. By contrasting these two interpretations, the authors have demonstrated that the entrepreneurship environment involves various ethical issues connected to personal, organizational and societal sectors.
Research limitations/implications
The current study may serve as a general guideline for future investigation into this topic.
Practical implications
Regarding the practical ramifications, the findings can help entrepreneurs who are preparing to launch a business or are already doing so. The findings provide a comprehensive framework of success variables that must be considered to improve the venture’s performance.
Originality/value
This study’s originality is from presenting a structured and in-depth literature review that describes the current state of entrepreneurship ethics and its contribution to sustainable development goals. A complete analysis of the data gathered on entrepreneurship ethics is offered to establish that it is sustainable.
Details
Keywords
Rongxin Chen and Tianxing Zhang
In the global context, artificial intelligence (AI) technology and environmental, social and governance (ESG) have emerged as central drivers facilitating corporate transformation…
Abstract
Purpose
In the global context, artificial intelligence (AI) technology and environmental, social and governance (ESG) have emerged as central drivers facilitating corporate transformation and the business model revolution. This paper aims to investigate whether and how the application of AI enhances the ESG performance of enterprises.
Design/methodology/approach
This study uses panel data from Chinese A-share listed companies spanning the period from 2012 to 2022. Through a multivariate regression analysis, it examines the impact of AI on the ESG performance of enterprises.
Findings
The findings suggest that the application of AI in enterprises has a positive impact on ESG performance. Internal control systems within the organization and external information environments act as mediators in the relationship between AI and corporate ESG performance. Furthermore, corporate compliance plays a moderating role in the connection between AI and corporate ESG performance.
Originality/value
This paper underscores the pivotal role played by AI in enhancing corporate ESG performance. It explores the pathways to improving corporate ESG behavior from the perspectives of internal control and information environments. This discussion holds significant implications for advancing the application of AI in enterprises and enhancing their sustainable governance capabilities.
Details