Search results
1 – 10 of 98This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated…
Abstract
This chapter examines technology-facilitated violence from the perspective of international human rights law. It explores current research relating to technology-facilitated violence and then highlights the international human rights instruments that are triggered by the various forms of such violence. Ultimately, it focuses upon international human rights to privacy and to freedom from violence (especially gender-based violence) and the obligations on State and Nonstate actors to address violations of these rights. It argues that adoption of a human rights perspective on technology-facilitated violence better enables us to hold State and Nonstate actors to account in finding meaningful ways to address violence in all of its forms.
Details
Keywords
Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…
Abstract
Purpose
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.
Design/methodology/approach
The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.
Findings
This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.
Research limitations/implications
The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.
Practical implications
Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.
Social implications
Shared awareness and protection of ICT resources.
Originality/value
Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.
Details
Keywords
The media has even been very critical of some East Asian countries’ use of digital contact-tracing to control Covid-19. For example, South Korea has been criticised for its use of…
Abstract
Purpose
The media has even been very critical of some East Asian countries’ use of digital contact-tracing to control Covid-19. For example, South Korea has been criticised for its use of privacy-infringing digital contact-tracing. However, whether their type of digital contact-tracing was unnecessarily harmful to the human rights of Korean citizens is open for debate. The purpose of this paper is to examine this criticism to see if Korea’s digital contact-tracing is ethically justifiable.
Design/methodology/approach
This paper will evaluate Korea’s digital contact-tracing through the lens of the four human rights principles to determine if their response is ethically justifiable. These four principles were originally outlined in the European Court of Human Rights, namely, necessary, proportional, scientifically valid and time-bounded (European Court of Human Rights 1950).
Findings
The paper will propose that while the use of Korea’s digital contact-tracing was scientifically valid and proportionate (albeit, in need for improvements), it meets the necessity requirement, but is too vague to meet the time-boundedness requirement.
Originality/value
The Covid-19 pandemic has proven to be one of the worst threats to human health and the global economy in the past century. There have been many different strategies to tackle the pandemic, from somewhat laissez-faire approaches, herd immunity, to strict draconian measures. Analysis of the approaches taken in the response to the pandemic is of high scientific value and this paper is one of the first to critically engage with one of these methods – digital contact-tracing in South Korea.
Details
Keywords
Aderinola Ololade Dunmade and Adeyinka Tella
This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.
Abstract
Purpose
This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.
Design/methodology/approach
Using content analysis and a review of relevant literature, this study examines the challenges that librarians face in enforcing cyberethics and highlights the strategies that libraries can adopt to promote responsible online behaviour.
Findings
This paper identifies the lack of awareness among postgraduate students regarding cybersecurity risks and the need for training and resources for librarians as key challenges in promoting cyberethics.
Originality/value
This study recommends that libraries provide access to training resources and develop policies and guidelines to promote cyberethics among postgraduate students. Overall, this paper argues that libraries and librarians can play a critical role in promoting responsible online behaviour and ensuring the safety and security of postgraduate students in Nigeria.
Details
Keywords
Puneett Bhatnagr and Anupama Rajesh
The authors aim to study a conceptual model based on behavioural theories (UTAUT-3 model) to evaluate the adoption, usage and recommendation for neobanking services in India.
Abstract
Purpose
The authors aim to study a conceptual model based on behavioural theories (UTAUT-3 model) to evaluate the adoption, usage and recommendation for neobanking services in India.
Design/methodology/approach
The authors propose this model based on the UTAUT-3 integrated with perceived risk constructs. Hypotheses were developed to determine the relationships and empirically validated using the PLSs-SEM method. Using the survey method, 680 Delhi NCR respondents participated in the survey.
Findings
Empirical results suggested that behavioural intention (BI) to usage, adoption and recommendation affects neobanking adoption positively. The research observed that performance expectancy (PE), effort expectancy (EE), perceived privacy risk (PYR) and perceived performance risk (PPR) are the essential constructs influencing the adoption of neobanking services.
Research limitations/implications
Limited by geographic and Covid-19 constraints, a cross-sectional study was conducted. It highlights the BI of neobanking users tested using the UTAUT-3 model during the Covid-19 period.
Originality/value
The study's outcome offers valuable insights into Indian Neobanking services that researchers have not studied earlier. These insights will help bank managers, risk professionals, IT Developers, regulators, financial intermediaries and Fintech companies planning to invest or develop similar neobanking services. Additionally, this research provides significant insight into how perceived risk determinants may impact adoption independently for the neobanking service.
Details
Keywords
Christine Prince, Nessrine Omrani and Francesco Schiavone
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…
Abstract
Purpose
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.
Design/methodology/approach
An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.
Findings
The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.
Originality/value
While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.
Details
Keywords
Abstract
Details
Keywords