Search results

1 – 10 of 10
Content available
Book part
Publication date: 28 September 2023

Abstract

Details

Digital Transformation, Strategic Resilience, Cyber Security and Risk Management
Type: Book
ISBN: 978-1-83797-009-4

Content available
Book part
Publication date: 25 October 2023

Abstract

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Open Access
Article
Publication date: 10 April 2023

Loretta Mastroeni, Maurizio Naldi and Pierluigi Vellucci

Though the circular economy (CE) is a current buzzword, this still lacks a precise definition. In the absence of a clear notion of what that term includes, actions taken by the…

1157

Abstract

Purpose

Though the circular economy (CE) is a current buzzword, this still lacks a precise definition. In the absence of a clear notion of what that term includes, actions taken by the government and companies may not be well informed. In particular, those actions need to consider what people mean when people talk about the CE, either to refocus people's decisions or to undertake a more effective communications strategy.

Design/methodology/approach

Since people voice people's opinions mainly through social media nowadays, special attention has to be paid to discussions on those media. In this paper, the authors focus on Twitter as a popular social platform to deliver one's thoughts quickly and fast. The authors' research aim is to get the perceptions of people about the CE. After collecting more than 100,000 tweets over 16 weeks, the authors analyse those tweets to understand the public discussion about the CE. The authors conduct a frequency analysis of the most recurring words, including the words' association with other words in the same context and categorise them into a set of topics.

Findings

The authors show that the discussion focuses on the usage of resources and materials that heavily endanger sustainability, i.e. carbon and plastic and the harmful habit of wasting. On the other hand, the two most common good practices associated with the CE and sustainability emerge as recycling and reuse (the latter being mentioned far less). Also, the business side of the CE appears to be relevant.

Research limitations/implications

The outcome of this analysis can drive suitable communication strategies by which companies and governments interested in the development of the CE can understand what is actually discussed on social media and call for the attention.

Originality/value

This paper addresses the lack of a standard definition the authors highlighted in the Introduction. The results confirm that people understand CE by looking both at CE's constituent activities and CE's expected consequences, namely the reduction of waste, the transition to a green economy free of plastic and other pollutants and the improvement of the world climate.

Details

Management Decision, vol. 61 no. 13
Type: Research Article
ISSN: 0025-1747

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1182

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 14 February 2023

Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper and Matthieu Brinkhuis

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected…

Abstract

Purpose

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected 119.810 publications and over 3 million references to perform a bibliometric domain analysis as a quantitative approach to uncover the structures within the privacy research field.

Design/methodology/approach

The bibliometric domain analysis consists of a combined directed network and topic model of published privacy research. The network contains 83,159 publications and 462,633 internal references. A Latent Dirichlet allocation (LDA) topic model from the same dataset offers an additional lens on structure by classifying each publication on 36 topics with the network data. The combined outcomes of these methods are used to investigate the structural position and topical make-up of the privacy research communities.

Findings

The authors identified the research communities as well as categorised their structural positioning. Four communities form the core of privacy research: individual privacy and law, cloud computing, location data and privacy-preserving data publishing. The latter is a macro-community of data mining, anonymity metrics and differential privacy. Surrounding the core are applied communities. Further removed are communities with little influence, most notably the medical communities that make up 14.4% of the network. The topic model shows system design as a potentially latent community. Noteworthy is the absence of a centralised body of knowledge on organisational privacy management.

Originality/value

This is the first in-depth, quantitative mapping study of all privacy research.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 29 December 2023

Priya C. Kumar

This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing…

Abstract

Purpose

This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing institutional, rather than community, goals.

Design/methodology/approach

This article analyzes theory and prior work on datafication, privacy, data literacy, privacy literacy and critical literacy to provide a vision for future privacy literacy research and praxis.

Findings

This article (1) explains why privacy is a valuable rallying point around which people can resist datafication, (2) locates privacy literacy within data literacy, (3) identifies three ways that current research and praxis have conceptualized privacy literacy (i.e. as knowledge, as a process of critical thinking and as a practice of enacting information flows) and offers a shared purpose to animate privacy literacy research and praxis toward social change and (4) explains how critical literacy can help privacy literacy scholars and practitioners orient their research and praxis toward changing the conditions that create privacy concerns.

Originality/value

This article uniquely synthesizes existing scholarship on data literacy, privacy literacy and critical literacy to provide a vision for how privacy literacy research and praxis can go beyond improving individual understanding and toward enacting social change.

Details

Information and Learning Sciences, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5348

Keywords

Open Access
Article
Publication date: 27 March 2023

Annye Braca and Pierpaolo Dondio

Prediction is a critical task in targeted online advertising, where predictions better than random guessing can translate to real economic return. This study aims to use machine…

2281

Abstract

Purpose

Prediction is a critical task in targeted online advertising, where predictions better than random guessing can translate to real economic return. This study aims to use machine learning (ML) methods to identify individuals who respond well to certain linguistic styles/persuasion techniques based on Aristotle’s means of persuasion, rhetorical devices, cognitive theories and Cialdini’s principles, given their psychometric profile.

Design/methodology/approach

A total of 1,022 individuals took part in the survey; participants were asked to fill out the ten item personality measure questionnaire to capture personality traits and the dysfunctional attitude scale (DAS) to measure dysfunctional beliefs and cognitive vulnerabilities. ML classification models using participant profiling information as input were developed to predict the extent to which an individual was influenced by statements that contained different linguistic styles/persuasion techniques. Several ML algorithms were used including support vector machine, LightGBM and Auto-Sklearn to predict the effect of each technique given each individual’s profile (personality, belief system and demographic data).

Findings

The findings highlight the importance of incorporating emotion-based variables as model input in predicting the influence of textual statements with embedded persuasion techniques. Across all investigated models, the influence effect could be predicted with an accuracy ranging 53%–70%, indicating the importance of testing multiple ML algorithms in the development of a persuasive communication (PC) system. The classification ability of models was highest when predicting the response to statements using rhetorical devices and flattery persuasion techniques. Contrastingly, techniques such as authority or social proof were less predictable. Adding DAS scale features improved model performance, suggesting they may be important in modelling persuasion.

Research limitations/implications

In this study, the survey was limited to English-speaking countries and largely Western society values. More work is needed to ascertain the efficacy of models for other populations, cultures and languages. Most PC efforts are targeted at groups such as users, clients, shoppers and voters with this study in the communication context of education – further research is required to explore the capability of predictive ML models in other contexts. Finally, long self-reported psychological questionnaires may not be suitable for real-world deployment and could be subject to bias, thus a simpler method needs to be devised to gather user profile data such as using a subset of the most predictive features.

Practical implications

The findings of this study indicate that leveraging richer profiling data in conjunction with ML approaches may assist in the development of enhanced persuasive systems. There are many applications such as online apps, digital advertising, recommendation systems, chatbots and e-commerce platforms which can benefit from integrating persuasion communication systems that tailor messaging to the individual – potentially translating into higher economic returns.

Originality/value

This study integrates sets of features that have heretofore not been used together in developing ML-based predictive models of PC. DAS scale data, which relate to dysfunctional beliefs and cognitive vulnerabilities, were assessed for their importance in identifying effective persuasion techniques. Additionally, the work compares a range of persuasion techniques that thus far have only been studied separately. This study also demonstrates the application of various ML methods in predicting the influence of linguistic styles/persuasion techniques within textual statements and show that a robust methodology comparing a range of ML algorithms is important in the discovery of a performant model.

Details

Journal of Systems and Information Technology, vol. 25 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Open Access
Article
Publication date: 18 April 2023

Solomon Hopewell Kembo, Patience Mpofu, Saulo Jacques, Nevil Chitiyo and Brighton Mukorera

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before…

Abstract

Purpose

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before visiting health institutions. Do-It-Yourself wearable devices allow for the collection of health data leading to the detection and/or prediction of the prevalence of the disease. The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. The previous work utilized Hyperledger Fabric to verify transmitted data within Smart Homes, allowing for the possible implementation of legal restrictions through smart contracts in the future. This study aims to explore privacy-enhancing authentication schemes that are operated by multiple credential issuers and capable of integration into the Hyperledger ecosystem.

Design/methodology/approach

Design Science Research is the methodology that was used in this study. An architecture for ABC-privacy was developed and evaluated.

Findings

While the privacy-by-design architecture enhances data privacy through edge and fog computing architecture, there is a need to provide an additional privacy layer that limits the amount of data that patients disclose. Selective disclosure of credentials limits the number of information patients or devices divulge.

Originality/value

The evaluation of this study identified Coconut as the most suitable attribute-based credentials scheme for the Smart Homes Patients and Health Wearables use case Coconut user-centric architecture Hyperledger integration multi-party threshold authorities public and private attributes re-randomization and unlinkable revelation of selective attribute revelations.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 3 January 2024

Eloy Gil-Cordero, Pablo Ledesma-Chaves, Rocío Arteaga Sánchez and Ari Melo Mariano

The aim of this study is to examine the behavioral intention (BI) to adopt the Coinbase Wallet by Spanish users.

10686

Abstract

Purpose

The aim of this study is to examine the behavioral intention (BI) to adopt the Coinbase Wallet by Spanish users.

Design/methodology/approach

A survey was administered to individuals residing in Spain between March and April 2021. There were 301 questionnaires analyzed. This research applies a new predictive model based on technology acceptance model (TAM) 2, the unified theory of acceptance and use of technology (UTAUT) model, the theory of perceived risk and the commitment trust theory. A mixed partial least squares structural equation modeling (PLS-SEM)/fuzzy-set qualitative comparative analysis (fsQCA) methodology was employed for the modeling and data analysis.

Findings

The results showed that all the variables proposed have a direct and positive influence on the intention to use a Coinbase Wallet. The findings present clear directions for traders, investors and academics focused on improving their understanding of the characteristics of these markets.

Originality/value

First, this study addresses important concerns relating to the adoption of crypto-wallets during the global pandemic. Second, this research contributes to the existing literature by adding electronic word of mouth (e-WOM), trust, web quality and perceived risk as new drivers of the intention to use the Coinbase Wallet, providing unique and innovative insights. Finally, the study offers a solid methodological contribution by integrating linear (PLS) and nonlinear (fsQCA) techniques, showing that both methodologies provide a better understanding of the problem and a more detailed awareness of the patterns of antecedent factors.

Details

International Journal of Bank Marketing, vol. 42 no. 3
Type: Research Article
ISSN: 0265-2323

Keywords

Abstract

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Access

Only content I have access to

Year

Last 12 months (10)

Content type

1 – 10 of 10