Search results

1 – 10 of 98
Open Access
Book part
Publication date: 4 June 2021

Elizabeth Coombs

This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated…

Abstract

This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated violence and then highlights the international human rights instruments that are triggered by the various forms of such violence. Ultimately, it focuses upon international human rights to privacy and to freedom from violence (especially gender-based violence) and the obligations on State and Nonstate actors to address violations of these rights. It argues that adoption of a human rights perspective on technology-facilitated violence better enables us to hold State and Nonstate actors to account in finding meaningful ways to address violence in all of its forms.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 12 December 2017

Abstract

Details

The Ethics of Online Research
Type: Book
ISBN: 978-1-78714-486-6

Open Access
Article
Publication date: 20 October 2022

Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…

Abstract

Purpose

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.

Design/methodology/approach

The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.

Findings

This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.

Research limitations/implications

The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.

Practical implications

Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.

Social implications

Shared awareness and protection of ICT resources.

Originality/value

Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 4 August 2020

Mark Ryan

The media has even been very critical of some East Asian countries’ use of digital contact-tracing to control Covid-19. For example, South Korea has been criticised for its use of…

13128

Abstract

Purpose

The media has even been very critical of some East Asian countries’ use of digital contact-tracing to control Covid-19. For example, South Korea has been criticised for its use of privacy-infringing digital contact-tracing. However, whether their type of digital contact-tracing was unnecessarily harmful to the human rights of Korean citizens is open for debate. The purpose of this paper is to examine this criticism to see if Korea’s digital contact-tracing is ethically justifiable.

Design/methodology/approach

This paper will evaluate Korea’s digital contact-tracing through the lens of the four human rights principles to determine if their response is ethically justifiable. These four principles were originally outlined in the European Court of Human Rights, namely, necessary, proportional, scientifically valid and time-bounded (European Court of Human Rights 1950).

Findings

The paper will propose that while the use of Korea’s digital contact-tracing was scientifically valid and proportionate (albeit, in need for improvements), it meets the necessity requirement, but is too vague to meet the time-boundedness requirement.

Originality/value

The Covid-19 pandemic has proven to be one of the worst threats to human health and the global economy in the past century. There have been many different strategies to tackle the pandemic, from somewhat laissez-faire approaches, herd immunity, to strict draconian measures. Analysis of the approaches taken in the response to the pandemic is of high scientific value and this paper is one of the first to critically engage with one of these methods – digital contact-tracing in South Korea.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 15 June 2023

Aderinola Ololade Dunmade and Adeyinka Tella

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

1162

Abstract

Purpose

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

Design/methodology/approach

Using content analysis and a review of relevant literature, this study examines the challenges that librarians face in enforcing cyberethics and highlights the strategies that libraries can adopt to promote responsible online behaviour.

Findings

This paper identifies the lack of awareness among postgraduate students regarding cybersecurity risks and the need for training and resources for librarians as key challenges in promoting cyberethics.

Originality/value

This study recommends that libraries provide access to training resources and develop policies and guidelines to promote cyberethics among postgraduate students. Overall, this paper argues that libraries and librarians can play a critical role in promoting responsible online behaviour and ensuring the safety and security of postgraduate students in Nigeria.

Open Access
Article
Publication date: 2 May 2023

Puneett Bhatnagr and Anupama Rajesh

The authors aim to study a conceptual model based on behavioural theories (UTAUT-3 model) to evaluate the adoption, usage and recommendation for neobanking services in India.

3847

Abstract

Purpose

The authors aim to study a conceptual model based on behavioural theories (UTAUT-3 model) to evaluate the adoption, usage and recommendation for neobanking services in India.

Design/methodology/approach

The authors propose this model based on the UTAUT-3 integrated with perceived risk constructs. Hypotheses were developed to determine the relationships and empirically validated using the PLSs-SEM method. Using the survey method, 680 Delhi NCR respondents participated in the survey.

Findings

Empirical results suggested that behavioural intention (BI) to usage, adoption and recommendation affects neobanking adoption positively. The research observed that performance expectancy (PE), effort expectancy (EE), perceived privacy risk (PYR) and perceived performance risk (PPR) are the essential constructs influencing the adoption of neobanking services.

Research limitations/implications

Limited by geographic and Covid-19 constraints, a cross-sectional study was conducted. It highlights the BI of neobanking users tested using the UTAUT-3 model during the Covid-19 period.

Originality/value

The study's outcome offers valuable insights into Indian Neobanking services that researchers have not studied earlier. These insights will help bank managers, risk professionals, IT Developers, regulators, financial intermediaries and Fintech companies planning to invest or develop similar neobanking services. Additionally, this research provides significant insight into how perceived risk determinants may impact adoption independently for the neobanking service.

Details

South Asian Journal of Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2719-2377

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1114

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Content available
Article
Publication date: 1 June 2003

Paul Sturges

199

Abstract

Details

Online Information Review, vol. 27 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Content available
Article
Publication date: 6 September 2021

Charles M. Ess

Abstract

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 3
Type: Research Article
ISSN: 1477-996X

Content available
Article
Publication date: 1 February 2016

Philip Calvert

594

Abstract

Details

The Electronic Library, vol. 34 no. 1
Type: Research Article
ISSN: 0264-0473

1 – 10 of 98