Search results

1 – 10 of over 3000
Article
Publication date: 19 December 2019

Colin Michael Hall and Yael Ram

This paper aims to provide a perspective on privacy in tourism and hospitality.

543

Abstract

Purpose

This paper aims to provide a perspective on privacy in tourism and hospitality.

Design/methodology/approach

A systematic review of journals was undertaken in addition to thematic analysis.

Findings

Relatively little research has been undertaken on privacy in tourism and hospitality with privacy often regarded as synonymous with security.

Originality/value

One of the few commentaries on privacy in tourism.

Details

Tourism Review, vol. 75 no. 1
Type: Research Article
ISSN: 1660-5373

Keywords

Article
Publication date: 6 May 2014

Tobias Matzner

Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been…

3553

Abstract

Purpose

Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been suggested, the paper aims to argue that people acting in full conformity to those privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”.

Design/methodology/approach

New threats to privacy are described. Helen Nissenbaum's concept of “privacy as contextual integrity” is reviewed concerning its capability to grasp these problems. The argument is based on the assumption that the technologies work, persons are fully informed and capable of deciding according to advanced privacy considerations.

Findings

Big data and ubiquitous computing enable privacy threats for persons whose data are only indirectly involved and even for persons about whom no data have been collected and processed. Those new problems are intrinsic to the functionality of these new technologies and need to be addressed on a social and political level. Furthermore, a concept of data minimization in terms of the quality of the data is proposed.

Originality/value

The use of personal data as a threat to the privacy of others is established. This new perspective is used to reassess and recontextualize Helen Nissenbaum's concept of privacy. Data minimization in terms of quality of data is proposed as a new concept.

Details

Journal of Information, Communication and Ethics in Society, vol. 12 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 January 2004

Catharine M. Curran and Jef I. Richards

Invasion of privacy is a serious, and sometimes frightening, concept for many people. It can evoke images of big brother, in the form of big business, knowing your most intimate…

1123

Abstract

Invasion of privacy is a serious, and sometimes frightening, concept for many people. It can evoke images of big brother, in the form of big business, knowing your most intimate secrets and even selling those secrets to others. Laws to guard against these personal violations have been slow in coming from the US government. A combination of consumer fears and sluggish federal response is nothing particularly new, but as with other such situations it has provided state and local officials a lever with which to pry public attention out of the hands of their federal counterparts.

Details

Journal of Consumer Marketing, vol. 21 no. 1
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 1 July 2006

G. Arthur Mihram

To present highlights of the annual Library Legislative Day hosted by the American Library Association in Washington, DC.

125

Abstract

Purpose

To present highlights of the annual Library Legislative Day hosted by the American Library Association in Washington, DC.

Design/methodology/approach

A brief outline of the main events of the day.

Findings

The aim of this event is to promote advocacy for library services, literacy, resources with a better understanding of privacy and other related issues were commonly addressed themes. Since this is an annual event, it is critical for elected and federal officials, the press as well as the professional library community to share their agendas of common as well as different interests and figure out how to refine ways to address them. Originality/value ‐ Funding libraries is no easy feat, and getting legislators to provide funds and support for library services and resources is the challenge of this annual meeting and to determine better advocacy and effectiveness. Paper type Viewpoint

Details

Library Hi Tech News, vol. 23 no. 6
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 1 October 2003

Joris Claessens, Claudia Díaz, Caroline Goemans, Jos Dumortier, Bart Preneel and Joos Vandewalle

With the worldwide growth of open telecommunication networks and in particular the Internet, the privacy and security concerns of people using these networks have increased. On…

1338

Abstract

With the worldwide growth of open telecommunication networks and in particular the Internet, the privacy and security concerns of people using these networks have increased. On the one hand, users are concerned about their privacy, and desire to anonymously access the network. On the other hand, some organizations are concerned about how this anonymous access might be abused. This paper intends to bridge these conflicting interests, and proposes a solution for revocable anonymous access to the Internet. Moreover, the paper presents some legal background and motivation for such a solution. However, the paper also indicates some difficulties and disadvantages of the proposed solution, and suggests the need for further debate on the issue of online anonymity.

Details

Internet Research, vol. 13 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 August 2003

Rajiv C. Shah and Jay P. Kesan

Regulation through “code,” i.e. the hardware and software of communication technologies, is growing in importance. Policymakers are addressing societal concerns such as privacy…

376

Abstract

Regulation through “code,” i.e. the hardware and software of communication technologies, is growing in importance. Policymakers are addressing societal concerns such as privacy, freedom of speech, and intellectual property protection with code‐based solutions. While scholars have noted the role of code, there is little analysis of the various features or characteristics of code that have significance in regulating behavior. This paper examines three universal governance characteristics that policymakers may use to ensure code comports with societal concerns. The characteristics are transparency, defaults, and standards. For each characteristic, the paper discusses the salient regulatory issues for manipulating code. Additionally, the paper provides normative proposals for modifying some characteristics, such as defaults. In sum, our analysis should aid policymakers seeking to manipulate code to ensure that code comports with our societal values and addresses our societal concerns.

Details

info, vol. 5 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 25 November 2013

Hamed Khiabani, Norbik Bashah Idris and Jamalul-lail Ab Manan

Ambient service provisioning with the least human participation in a pervasive computing environment, which is composed of interconnected devices and sensors, raises several trust…

Abstract

Purpose

Ambient service provisioning with the least human participation in a pervasive computing environment, which is composed of interconnected devices and sensors, raises several trust and security issues. Accurate measuring of the integrity of the nodes that are willing to interact in this intimate environment can boost the trust evolution process, particularly in the uncertainty state and initiation phase. The paper aims to discuss these issues.

Design/methodology/approach

The paper presents a unified approach in calculating the trust value among the nodes by leveraging some trusted computing functionalities. The approach aggregates different trust metrics like context, recommendation, and history to compute the trust index of each party more accurately. The paper also describes several existing remote attestation techniques including the chosen attestation technique for the model. The paper simulated the behaviour of the model in different scenarios and evaluates its responsiveness when the trustworthiness among peer nodes can be attested.

Findings

The results obtained from different simulated scenarios demonstrate the usefulness of the proposed model. It is shown that trust evaluation process in the proposed model is very granular and also can be fine-tuned according to the application and context. The model strength in solving the uncertain situations and assigning appropriate initial trust values is shown, as well. Finally, the paper describes the future research plan to evaluate the accuracy of the model.

Originality/value

The novel idea of applying remote attestation in trust determination may open up new avenues of research in the study of trust management and trust models.

Details

Information Management & Computer Security, vol. 21 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Content available
Article
Publication date: 1 June 1998

Olaf Boettger

112

Abstract

Details

Information Technology & People, vol. 11 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 17 July 2009

Nares Damrongchai and Evan S. Michelson

The purpose of this paper is to highlight the overall lack of focus of existing foresight analysis concerning the future of science and technology on the issue of poverty. The

1034

Abstract

Purpose

The purpose of this paper is to highlight the overall lack of focus of existing foresight analysis concerning the future of science and technology on the issue of poverty. The paper looks to re‐orient the technology foresight community to adopting an explicit pro‐poor perspective when considering future developments in science and technology (S&T).

Design/methodology/approach

The paper presents a general overview of existing technology foresight studies from organizations located in North America, Europe, and Asia. By describing the key points made in a selection of foresight studies, the paper emphasizes the conceptual links between forward‐looking analysis related to S&T and poverty‐related issues.

Findings

The paper reaches two main conclusions about the role of S&T foresight and development. The first is that the foresight research community needs to interact more closely with the development community in order to enhance the value of the findings in each field to the other. Second, the pressing matter of poverty alleviation requires that the foresight community should come together and create a sense of urgency in issues that have long‐term implications but need immediate action and attention.

Research limitations/implications

This paper is limited to an approach that provides an overview of existing work in technology foresight. While no such review could be comprehensive, this paper provides examples of technology foresight analysis from a range of geographies, sectors, and perspectives to help mitigate this gap.

Practical implications

The argument suggests that technology foresight practitioners should make issues of poverty an explicit topic or category of analysis in future technology foresight activities. Including poverty issues in future scenario activities would go a long way to closing this gap.

Originality/value

This paper synthesizes ideas from a variety of forward‐looking studies addressing the future of science and technology and identifies the need to include poverty as a dimension for analysis in future studies. In addition, the paper provides an introduction to technology foresight work being conducted in Asia by the APEC Center for Technology Foresight.

Details

Foresight, vol. 11 no. 4
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 16 June 2021

Tolulope Balogun and Trywell Kalusopa

The purpose of this study is to assess the digital preservation policies and plans for long-term digital preservation in selected repositories in South Africa, with a view to…

1461

Abstract

Purpose

The purpose of this study is to assess the digital preservation policies and plans for long-term digital preservation in selected repositories in South Africa, with a view to develop a digital preservation framework for the preservation of Indigenous knowledge system (IKS) in South Africa.

Design/methodology/approach

Through the multiple case study research design, data was obtained from eight respondents in four Indigenous Knowledge Systems Documentation Centers (IKSDCs) in institutions that are part of the National Recordal Systems (NRS) initiative across four provinces in South Africa using in-depth face-to-face interviews. Data collected was also supplemented with the content analysis of several policy documents in South Africa.

Findings

The findings reveal that there are no digital preservation policies in place in the institutions, especially long-term digital preservation for IKS. However, some of the institutions are formulating policies that will include the management of IKS collected in the institutions. This study also reveals that digital curation, policy formulation and disaster preparedness plans to some extent are measures said to be in place for the digital preservation of IKS.

Research limitations/implications

This study focuses mainly on the NRS initiative in South Africa. Indigenous Knowledge (IK) related to traditional medicine, traditional plants and food are currently being digitized at the IKSDCs by IK recorders. This study will help in ensuring that the South African Government’s effort and investment in digitizing IKS and making them accessible online is not wasted. This study will help mitigate the risk of damage and alteration over time, either deliberately or in error.

Originality/value

This study fills a gap in the literature on the digitization and digital preservation of IKS from the context of the NRS project in South Africa. Very few studies have been carried out on the digital preservation of IKS in Africa. This study also proposed a framework for the digital preservation of IKS in South Africa.

Details

Records Management Journal, vol. 31 no. 2
Type: Research Article
ISSN: 0956-5698

Keywords

1 – 10 of over 3000