Search results
1 – 10 of over 6000
Yong Jin Park, Yoonmo Sang, Hoon Lee and S. Mo Jones-Jang
The digitization of the life has brought complexities associated with addressing digital life after one’s death. This paper aims to investigate the two related issues of the…
Abstract
Purpose
The digitization of the life has brought complexities associated with addressing digital life after one’s death. This paper aims to investigate the two related issues of the privacy and property of postlife digital assets.
Design/methodology/approach
The understanding of digital assets has not been fully unpacked largely due to the current policy complexities in accessing and obtaining digital assets at death. This paper calls critical attention to the importance of respecting user rights in digital environments that currently favor service providers’ interests.
Findings
It is argued that there are ethical blind spots when protecting users’ rights, given no ontological difference between a person’s digital beings and physical existence. These derive from the restrictive corporate terms and ambiguous conditions drafted by digital service providers.
Originality/value
Fundamentally, the transition to the big data era, in which the collection, use and dissemination of digital activities became integral part of the ontology, poses new challenges to privacy and property rights after death.
Details
Keywords
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…
Abstract
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.
Details
Keywords
This chapter highlights how effective school and public libraries not only provide resources and information about human rights but also actually ensure people’s human rights are…
Abstract
Purpose
This chapter highlights how effective school and public libraries not only provide resources and information about human rights but also actually ensure people’s human rights are being met through their resources and programming.
Methodology/approach
In this chapter, both human rights documents and library policies are studied to see how effective libraries help children and adults reach their full potential as human beings. Findings by other researchers in this area are also discussed. Concrete examples of human rights projects through school and public libraries in Winnipeg, Canada are identified. The benefits of collaboration are also explored.
Findings
Knowledgeable and passionate librarians in schools and public libraries are essential in providing quality education and information rights to children and adults. Through effective collaboration with teachers, other libraries and relevant organizations, children and adults have more opportunities to reach their full potential. Canada’s newest school library document called Leading Learning is explored.
Originality/value
This chapter provides a current snapshot of how school and public libraries are collaborating together and with various organizations in Winnipeg, Canada, to promote and ensure human rights for children and adults. Libraries are consciously blending the UN Declaration of Human Rights, the Conventions on the Rights of the Child along with national and international library policy documents to ensure effective access to quality education and information rights for everyone. Dynamic and evolving libraries are also supporting human rights by incorporating innovative concepts, programs and resources such as Universal Design for Learning, Learning Commons, Makerspaces and prison libraries.
Details
Keywords
Karen A. Forcht, Robert G. Brookshire, Scott P. Stevens and Rodney Clarke
Compares attitudes regarding the ethical use of computers insamples of business students from universities in the United States andAustralia. Finds that the two groups are…
Abstract
Compares attitudes regarding the ethical use of computers in samples of business students from universities in the United States and Australia. Finds that the two groups are statistically significantly different on 17 of the 26 ethics questions. Results show that significant differences in attitudes towards property and privacy issues exist; attitudes toward ethics in employee‐employer relations were not significantly different. In general, students in Australia tend to take ethical positions supporting greater freedom of action for computer users, while students in the United States take more restrictive positions.
Details
Keywords
Privacy is a topic of major interest to the marketing community that has fuelled the development of legal and technical mechanisms to protect customers' anonymity and to prevent…
Abstract
Purpose
Privacy is a topic of major interest to the marketing community that has fuelled the development of legal and technical mechanisms to protect customers' anonymity and to prevent the misuse of customer data. Nevertheless, data breaches continue to occur. The purpose of this paper is to offer new insight into the causes of such breaches, thus paving the way for novel approaches to privacy protection.
Design/methodology/approach
The paper presents a semiotic framework identifying the data, task related and normative factors that influence behaviour. A qualitative study with branch and back office employees in a British financial institution illustrates the explanatory value of the framework.
Findings
The results show that the legal tools provide guidance only when they are clear, relevant and enforceable, that technology reduces idiosyncrasy but has limited application and, crucially, that employees' attitudes, group norms, preconceptions and mental processes dramatically condition behaviour.
Research limitations/implications
The study integrates the limited marketing literature available on the reasons for privacy breaches, and advances the understanding of the role of employees in safeguarding customer data. It is an exploratory, small‐scale study that simultaneously offers new insight and identifies areas where further research is needed.
Practical implications
The paper presents practical contributions to marketing managers concerning policy wording, job design and reward schemes.
Originality/value
The study delivers a holistic framework to assess how the various privacy related initiatives may interact with each other, and specifically focusing the researcher's attention on what is often the weakest link in privacy protection: staff.
Details
Keywords
Anastasia Dikopoulou and Athanassios Mihiotis
The purpose of this paper is to present the relationship between records management (RM) and accountable and efficient governance.
Abstract
Purpose
The purpose of this paper is to present the relationship between records management (RM) and accountable and efficient governance.
Design/methodology/approach
In this paper, the required framework and the prerequisites for planning and implementing an effective and efficient RM system are presented and a literature review and empirical studies are used to depict the interaction between good governance and RM.
Findings
The following conclusions are derived from the bibliographic data analysis. Specific training by RM professionals for recordkeeping is useful for public servants. All levels of the administrative chain should be trained and involved in RM processes. Good governance, information security and RM are all deeply connected. The tendency of regarding archives only as cultural thesaurus or valuable historical resources and not also as products and assets of their originating organizations has to be abandoned. Electronic RM and preservation is a complex matter that requires interdisciplinary action in order to be resolved. Technology and computers are not the panacea of records keeping and information management problems in governmental institutions. Institutional capacity and top‐level support are two elements, plus technology that enhances change management, work flow, standardization and interoperability.
Practical implications
Top management of the public (and private sector) has to be persuaded that there is cost reduction and effectiveness through the implementation of RMS. Public administration needs to turn to records and archives management professionals and involve them in the legislative, planning and operating work regarding the information management and its influence on good governance in public organizations.
Social implications
Governments have to set and apply a comprehensive strategy for records and archives management, meaning the physical and intellectual control over all records created and held in public administration. Citizens should be always informed on their rights to access and use of governmental information. Only responsible and informed citizens can demand transparency and accountability by governments.
Originality/value
Through this work one can identify the major key issues and problems in planning and implementing a strategy for the creation and management of public records in governments. The most important goal is to raise awareness amongst all participants for emerging legal, fiscal and administrative issues involved with managing governmental information.
Details
Keywords
Florian Saurwein, Natascha Just and Michael Latzer
The purpose of this paper is to contribute to a better understanding of governance choice in the area of algorithmic selection. Algorithms on the Internet shape our daily lives and…
Abstract
Purpose
The purpose of this paper is to contribute to a better understanding of governance choice in the area of algorithmic selection. Algorithms on the Internet shape our daily lives and realities. They select information, automatically assign relevance to them and keep people from drowning in an information flood. The benefits of algorithms are accompanied by risks and governance challenges.
Design/methodology/approach
Based on empirical case analyses and a review of the literature, the paper chooses a risk-based governance approach. It identifies and categorizes applications of algorithmic selection and attendant risks. Then, it explores the range of institutional governance options and discusses applied and proposed governance measures for algorithmic selection and the limitations of governance options.
Findings
Analyses reveal that there are no one-size-fits-all solutions for the governance of algorithms. Attention has to shift to multi-dimensional solutions and combinations of governance measures that mutually enable and complement each other. Limited knowledge about the developments of markets, risks and the effects of governance interventions hampers the choice of an adequate governance mix. Uncertainties call for risk and technology assessment to strengthen the foundations for evidence-based governance.
Originality/value
The paper furthers the understanding of governance choice in the area of algorithmic selection with a structured synopsis on rationales, options and limitations for the governance of algorithms. It provides a functional typology of applications of algorithmic selection, a comprehensive overview of the risks of algorithmic selection and a systematic discussion of governance options and its limitations.
Details
Keywords
Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…
Abstract
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.
In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.
In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.
Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.
Details
Keywords
Nils O.E. Olsson and Heidi Bull-Berg
– The purpose of this paper is to investigate how Big Data can be used in project evaluations.
Abstract
Purpose
The purpose of this paper is to investigate how Big Data can be used in project evaluations.
Design/methodology/approach
The study is based on literature research and interviews with 15 professionals in IT, project and asset management and government agencies. The authors discuss and illustrate what data that can be used for project evaluations and discuss potential obstacles.
Findings
New data is creating new opportunities to analyse a phenomenon based on different types of data. Interesting data categories include: internet traffic, movement-related data, physical environment data and data in organisational internal systems. The authors show how these data categories can be applied in project evaluations.
Research limitations/implications
Big Data gives an opportunity to add quantitative data in ex post evaluations. Use of Big Data can serve as a step towards a stronger technology focus in evaluations of projects.
Practical implications
There are major advantages in using Big Data, increasing the opportunities to find indicators that are relevant when a project is evaluated.
Social implications
Possible problematic issues related to use of Big Data that are addressed in the study include: availability, applicability, relevance, privacy policy, ownership, cost and competence. The study indicates that none of the challenges need to hinder use of Big Data when evaluating projects, provided that the issues are properly managed.
Originality/value
The study illustrates how Big Data can be applied in project management research.
Details