Search results

1 – 10 of over 21000
Article
Publication date: 5 May 2020

Rashmi Gupta, Martin Crane and Cathal Gurrin

The continuous advancements in wearable sensing technologies enable the easy collection and publishing of visual lifelog data. The widespread adaptation of visual lifelog…

278

Abstract

Purpose

The continuous advancements in wearable sensing technologies enable the easy collection and publishing of visual lifelog data. The widespread adaptation of visual lifelog technologies would have the potential to pose challenges for ensuring the personal privacy of subjects and bystanders in lifelog data. This paper presents preliminary findings from a study of lifeloggers with the aim of better understanding their concerns regarding privacy in lifelog data.

Design/methodology/approach

In this study, we have collected a visual dataset of 64,837 images from 25 lifelogging participants over a period of two days each, and we conducted an interactive session (face to face conversation) with each participant in order to capture their concerns when sharing the lifelog data across three specified categories (i.e. Private (Only for Me), Semi-Private (Family/Friends) and Public).

Findings

In general, we found that participants tend to err on the side of conservative privacy settings and that there is a noticeable difference in what different participants are willing to share. In summary, we found that the categories of images that the participants wished to be kept private included personally identifiable information and professional information; categories of images that could be shared with family/friends include family moments or content related to daily routine lifestyle, and other visual lifelog data could potentially be made public).

Originality/value

We analysed the potential differences in the willingness of 25 participants to share data. In addition, reasons for being a volunteer to collect lifelog data and how the lifelogging device affected the lifestyle of the lifelogger are analysed. Based on the findings of this study, we propose a set of challenges for the anonymisation of lifelog data that should be solved when supporting lifelog data sharing.

Details

Online Information Review, vol. 45 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 13 November 2019

Brenda Groen, Theo van der Voordt, Bartele Hoekstra and Hester van Sprang

This paper aims to explore the relationship between satisfaction with buildings, facilities and services and perceived productivity support and to test whether the findings from a…

1481

Abstract

Purpose

This paper aims to explore the relationship between satisfaction with buildings, facilities and services and perceived productivity support and to test whether the findings from a similar study of Batenburg and Van der Voordt (2008) are confirmed in a repeat study after 10 years with more recent data.

Design/methodology/approach

Data were traced from a database with data on user satisfaction and perceived productivity support. These data were collected through the work environment diagnostic tool WODI light. The data include responses from 25,947 respondents and 191 organisations that have been analysed by stepwise multiple-regression analyses.

Findings

In total 38% of the variation of office employees’ satisfaction with support of productivity can be explained by employee satisfaction with facilities, the organisation, current work processes and personal- and job-related characteristics. The most important predictor of self-assessed support of productivity is employee satisfaction with facilities. In particular, psychological aspects, i.e. opportunities to concentrate and to communicate, privacy, level of openness, and functionality, comfort and diversity of the workplaces are very important. The findings confirm that employee satisfaction with facilities correlates significantly with perceived productivity support. Other factors that are not included in the data set, such as intrinsic motivation, labour circumstances and human resource management may have an impact as well.

Originality/value

This research provides a clear insight in the relation between employee satisfaction with facilities and the perceived support of productivity, based on survey data collected over almost 10 years in 191 organisations.

Details

Journal of Facilities Management , vol. 17 no. 5
Type: Research Article
ISSN: 1472-5967

Keywords

Article
Publication date: 1 June 2000

Keith G. Jeffery

The importance of grey literature is becoming increasingly recognised. For many organisations it encapsulates the knowledge and know‐how and thus is a vital business asset. It has…

Abstract

The importance of grey literature is becoming increasingly recognised. For many organisations it encapsulates the knowledge and know‐how and thus is a vital business asset. It has similar importance in quality of life aspects – healthcare, environment and culture. Grey literature in a R&D (research and development) environment represents the cutting edge of this knowledge and so its management is of utmost importance. Partly based on involvement in defining the datamodels for R&D information interchange across Europe, the author defines a content metadata datamodel for grey literature which is more expressive and has more flexibility than any previous proposal and which integrates seamlessly with the CERIF2000 definition which will soon replace the CERIF1991 European Union Recommendation to Member States on Exchange of R&D Information. The content metadata datamodel offers significant advantages over Dublin Core yet can generate Dublin Core if required.

Details

International Journal on Grey Literature, vol. 1 no. 2
Type: Research Article
ISSN: 1466-6189

Keywords

Article
Publication date: 14 August 2009

Kristina A. Bourne and Paula J. Lentz

The purpose of this paper is to explore the rhetorical strategies women use as they debate the efficacy of maternity leave policies in the USA and how these strategies reify the…

1418

Abstract

Purpose

The purpose of this paper is to explore the rhetorical strategies women use as they debate the efficacy of maternity leave policies in the USA and how these strategies reify the public/private divide.

Design/methodology/approach

Using rhetorical analysis, the characteristics of women's discussion are examined in an online forum.

Findings

Participants rely on two primary strategies: “public” strategies (e.g. employing facts, logic, statistics) for most of their discussion; and “private” strategies (e.g. relating personal experiences) as a strategy of last resort when the public strategies fail. Further, their personal recountings lack detail and ultimately limit the ability to strengthen the posters' arguments.

Research limitations/implications

While this paper focuses on a US context, the approach lends itself well to examining the cultural assumptions underpinning specific policies and extending the study of the complexities of the assumed public/private divide in additional settings.

Practical implications

The paper suggests that in order to advance arguments for or against change in a cultural climate that so clearly divides the public and the private, women will need to invest more of their personal experiences to argue more effectively the impact of a social policy on their lives.

Originality/value

This study uses online texts as the focus of analysis and in doing so examines the rich, authentic interaction of women from a variety of organizational backgrounds.

Details

Equal Opportunities International, vol. 28 no. 6
Type: Research Article
ISSN: 0261-0159

Keywords

Case study
Publication date: 11 September 2023

Namrata Singh, Ishani Chakraborty and Aparna Khare

The learning outcomes of this study are as follows: this case deliberates the strategic design and business model that provides entrepreneurial opportunities to re-sellers and…

Abstract

Learning outcomes

The learning outcomes of this study are as follows: this case deliberates the strategic design and business model that provides entrepreneurial opportunities to re-sellers and small business owners; this case discusses the complexities and opportunities related to using social media (Facebook) as a selling platform; this case provides a thorough understanding of the direct-to-consumer model; this case helps students understand the concept of social commerce in emerging markets; and this case discusses brand-building tactics, particularly for online businesses.

Case overview/synopsis

This case is about the entrepreneurial venture of three women on Facebook. A venture that started with the simple thought of creating a trusted selling and buying platform with convenience has turned into an opportunity for thousands of other women to become entrepreneurs and start their businesses with minimum investment and low risk. Shoppers Darbar is an online shopping portal on Facebook that started in 2016. This is a private group exclusively for women with more than 165,000 registered members, which saw a boom during the pandemic and merged as a parallel platform of e-commerce retail sites and physical stores and exhibitions. Although social commerce in India is still in its growing stage, it is facing indirect competition and an identity crisis. Hence, to build Shoppers Darbar as a brand and retain vendors, founders need to find methods within Shoppers Darbar’s limited means to sustain and create a community of sellers and buyers for getting more and more business for the vendors associated with them.

Complexity academic level

Postgraduate level.

Supplementary materials

Teaching Notes Consent Letter Annexure 1.

Subject code

CCS 3: Entrepreneurship

Details

The Case For Women, vol. no.
Type: Case Study
ISSN: 2732-4443

Keywords

Book part
Publication date: 10 December 2015

Dekar Urumsah

The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is…

Abstract

The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is especially relevant in the context of Indonesian Airline companies. Therefore, many airline customers in Indonesia are still in doubt about it, or even do not use it. To fill this gap, this study attempts to develop a model for e-services adoption and empirically examines the factors influencing the airlines customers in Indonesia in using e-services offered by the Indonesian airline companies. Taking six Indonesian airline companies as a case example, the study investigated the antecedents of e-services usage of Indonesian airlines. This study further examined the impacts of motivation on customers in using e-services in the Indonesian context. Another important aim of this study was to investigate how ages, experiences and geographical areas moderate effects of e-services usage.

The study adopts a positivist research paradigm with a two-phase sequential mixed method design involving qualitative and quantitative approaches. An initial research model was first developed based on an extensive literature review, by combining acceptance and use of information technology theories, expectancy theory and the inter-organizational system motivation models. A qualitative field study via semi-structured interviews was then conducted to explore the present state among 15 respondents. The results of the interviews were analysed using content analysis yielding the final model of e-services usage. Eighteen antecedent factors hypotheses and three moderating factors hypotheses and 52-item questionnaire were developed. A focus group discussion of five respondents and a pilot study of 59 respondents resulted in final version of the questionnaire.

In the second phase, the main survey was conducted nationally to collect the research data among Indonesian airline customers who had already used Indonesian airline e-services. A total of 819 valid questionnaires were obtained. The data was then analysed using a partial least square (PLS) based structural equation modelling (SEM) technique to produce the contributions of links in the e-services model (22% of all the variances in e-services usage, 37.8% in intention to use, 46.6% in motivation, 39.2% in outcome expectancy, and 37.7% in effort expectancy). Meanwhile, path coefficients and t-values demonstrated various different influences of antecedent factors towards e-services usage. Additionally, a multi-group analysis based on PLS is employed with mixed results. In the final findings, 14 hypotheses were supported and 7 hypotheses were not supported.

The major findings of this study have confirmed that motivation has the strongest contribution in e-services usage. In addition, motivation affects e-services usage both directly and indirectly through intention-to-use. This study provides contributions to the existing knowledge of e-services models, and practical applications of IT usage. Most importantly, an understanding of antecedents of e-services adoption will provide guidelines for stakeholders in developing better e-services and strategies in order to promote and encourage more customers to use e-services. Finally, the accomplishment of this study can be expanded through possible adaptations in other industries and other geographical contexts.

Details

E-services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-709-7

Keywords

Article
Publication date: 21 February 2022

Fatemeh Khozaei Ravari, Ahmad Sanusi Hassan, Muhammad Hafeez Abdul Nasir and Mohsen Mohammad Taheri

The study's main objective is to evaluate the morphological developments in the characteristics of the spatial configurations of the residential layouts in Kerman, Iran, in…

Abstract

Purpose

The study's main objective is to evaluate the morphological developments in the characteristics of the spatial configurations of the residential layouts in Kerman, Iran, in examining the impact on the level of visual privacy through the spectrum of permeability and wayfinding in space syntax analysis.

Design/methodology/approach

In this paper, plan graph analysis is used to measure the syntactic properties of seven topological residential architecture plans in Kerman, Iran, built from the 1970s to 2010s. The methodology involves the development of mathematical measurements to signify permeability and simulation of visibility graph analysis (VGA) to indicate wayfinding.

Findings

The findings reveal the residential layouts of Iranian houses tend to be less integrated over decades of design development from the 1970s to 2010s. Reduction in spatial integration corresponds to increase segregation allowing for enhanced visual privacy. The study underpins that, even with the constraints in the scale of the house and reduction in the number of nodes, as evident in the design of the modern residential layout, the efficient level of visual privacy is still achievable with regards to the standards demanded by the local culture.

Originality/value

The study examines the development in residential spatial configuration and building scale on visual privacy through a proposed methodology based on the level of permeability and wayfinding measured as a combined effect using the space syntax analysis and visual accessibility.

Details

International Journal of Building Pathology and Adaptation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-4708

Keywords

Article
Publication date: 21 November 2008

Barbara Carminati and Elena Ferrari

Web‐based social networks (WBSNs) are today one of the most relevant phenomena related to the advent of Web 2.0. The purpose of this paper is to discuss main security and privacy

1545

Abstract

Purpose

Web‐based social networks (WBSNs) are today one of the most relevant phenomena related to the advent of Web 2.0. The purpose of this paper is to discuss main security and privacy requirements arising in WBSNs, with a particular focus on access control, and to survey the main research activities carried out in the field. The social networking paradigm is today used not only for recreational purposes; it is also used at the enterprise level as a means to facilitate knowledge sharing and information dissemination both at the internet and at the intranet level. As a result of the widespread use of WBSN services, millions of individuals can today easily share personal and confidential information with an incredible amount of (possible unknown) other users. Clearly, this huge amount of information and the ease with which it can be shared and disseminated pose serious security and privacy concerns.

Design/methodology/approach

The paper discusses the main requirements related to access control and privacy enforcement in WBSNs. It presents the protection functionalities provided by today WBSNs and examines the main research proposals defined so far, in view of the identified requirements.

Findings

The area of access control and privacy for WBSNs is new and, therefore, many research issues still remain open. The paper provides an overview of some of these new issues.

Originality/value

The paper provides a useful discussion of the main security and privacy requirements arising in WBSNs, with a particular focus on access control. It also surveys the main research activities carried out in the field.

Details

International Journal of Web Information Systems, vol. 4 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 14 February 2019

David Lewis Coss and Gurpreet Dhillon

To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their…

1158

Abstract

Purpose

To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their organization. It is argued that it is important to understand individuals’ privacy values with respect to cloud computing to define cloud privacy objectives.

Design/methodology/approach

For the purpose of this study, the authors adopted Keeney’s (1994) value-focused thinking approach to identify privacy objectives with respect to cloud computing.

Findings

The results of this study identified the following six fundamental cloud privacy objectives: to increase trust with cloud provider, to maximize identity management controls, to maximize responsibility of information stewardship, to maximize individual’s understanding of cloud service functionality, to maximize protection of rights to privacy, and to maintain the integrity of data.

Research limitations/implications

One limitation is generalizability of the cloud privacy objectives, and the second is research bias. As this study focused on cloud privacy, the authors felt that the research participants’ increased knowledge of technology usage, including that of cloud technology, was a benefit that outweighed risks associated with not having a random selection of the general population. The newness and unique qualities of privacy issues in cloud computing are better fitted to a qualitative study where issues can emerge naturally through a holistic approach opposed to trying to force fit an existing set of variables or constructs into the context of privacy and cloud computing.

Practical implications

The findings of this research study can be used to assist management in the process of formulating a cloud privacy policy, develop cloud privacy evaluation criteria as well as assist auditors in developing their privacy audit work plans.

Originality/value

Currently, there is little to no guidance in the literature or in practice as to what organizations need to do to ensure they protect their stakeholders privacy in a cloud computing environment. This study works at closing this knowledge gap by identifying cloud privacy objectives.

Details

Information & Computer Security, vol. 27 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 8 January 2021

Dillip Kumar Rath and Ajit Kumar

In today’s digitized environment, information privacy has become a prime concern for everybody. The purpose of this paper is to provide an understanding of information privacy

17926

Abstract

Purpose

In today’s digitized environment, information privacy has become a prime concern for everybody. The purpose of this paper is to provide an understanding of information privacy concern arising because of the application of computer-based information system in the various domains (E-Governance, E-Commerce, E-Health, E-Banking and E-Finance), and at different levels, i.e. individual, group, organizational and societal.

Design/methodology/approach

The authors performed an in-depth analysis of different research articles related to information privacy concerns and elements affecting those at certain level of applications. The primary sources of literature were articles retrieved from online databases. Various online journal and scholarly articles were searched in detail to locate information privacy-related articles.

Findings

The authors have carried out a detailed literature review to identify the different levels where the privacy is a big challenging task. This paper provides insights whether information privacy concern may obstruct in the successful dispersal and adoption of different applications in various application domains. Consumers’ attitude towards information privacy concerns have enlightened and addressed at individual levels in numerous domains. Privacy concerns at the individual level, as suggested by our analysis, seem to have been sufficiently addressed or addressed. However, information privacy concerns at other levels – group, organizational and societal levels – need the attention of researchers.

Originality/value

In this paper, the authors have posited that it will help the researchers to more focus at group level privacy perspective in the information privacy era.

Details

Vilakshan - XIMB Journal of Management, vol. 18 no. 2
Type: Research Article
ISSN: 0973-1954

Keywords

1 – 10 of over 21000