Search results

1 – 10 of 22
Open Access
Article
Publication date: 15 June 2023

Aderinola Ololade Dunmade and Adeyinka Tella

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

1205

Abstract

Purpose

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

Design/methodology/approach

Using content analysis and a review of relevant literature, this study examines the challenges that librarians face in enforcing cyberethics and highlights the strategies that libraries can adopt to promote responsible online behaviour.

Findings

This paper identifies the lack of awareness among postgraduate students regarding cybersecurity risks and the need for training and resources for librarians as key challenges in promoting cyberethics.

Originality/value

This study recommends that libraries provide access to training resources and develop policies and guidelines to promote cyberethics among postgraduate students. Overall, this paper argues that libraries and librarians can play a critical role in promoting responsible online behaviour and ensuring the safety and security of postgraduate students in Nigeria.

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1237

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 9 March 2021

Linda Hantrais

The relative success of East Asian countries in controlling the spread of COVID-19 at its onset was widely attributed to their capacity to learn from previous experience of…

Abstract

The relative success of East Asian countries in controlling the spread of COVID-19 at its onset was widely attributed to their capacity to learn from previous experience of epidemics, their preparedness to deal with new threats to health, and public acceptance of the need to comply unquestioningly with stringent measures to contain the virus. The conditions were very different when Europe was recognised as the epicentre of the pandemic in March 2020. In a climate of uncertainty, intensified by inconsistent scientific advice and intractable political dilemmas, European governments embarked on a steep learning curve. They experimented with packages of measures based on limited and often conflicting evidence about their effectiveness in preventing transmission of the disease and high excess death rates, amid growing concern about the collateral damage being caused to public health, and to social and economic life.

Drawing on a wide range of multi-disciplinary published materials and official statistics, research articles, reports, briefings and academic debates, as well as media headlines and commentary, this briefing assesses policy learning during the first wave of the pandemic in Europe and asks:

What lessons did European countries, individually and collectively, draw from their own experiences and from the policy responses of neighbouring countries when Europe was the epicentre of the COVID-19 pandemic?

Were decision-takers better prepared to contain further waves of the disease and to improve outcomes?

Details

Emerald Open Research, vol. 1 no. 13
Type: Research Article
ISSN: 2631-3952

Keywords

Open Access
Article
Publication date: 27 January 2023

Fiammetta Brandajs and Antonio Paolo Russo

The purpose of this paper is to introduce a critical framework to analyse how “smart” plays out in tourism places. Moving from a recognition of the strategies, expected impacts…

Abstract

Purpose

The purpose of this paper is to introduce a critical framework to analyse how “smart” plays out in tourism places. Moving from a recognition of the strategies, expected impacts and imageries of Smart City, the authors engage with the mobilities literature to identify pitfalls in the quest of “smartening up” cities for hypermobile populations.

Design/methodology/approach

The study adopted a set of geoanalytical techniques to establish the potential relationship between the territorial upgrade of mobility and the socio-economic change processes the city of Barcelona is experiencing.

Findings

The paper suggests the effect of “smart” in cities could indeed be one of economic recovery; however, one triggering fundamental transformation of the social fabric of the city, whose most evident facet is the creation of globalised functional enclaves that may be forcefields of exclusion for the most vulnerable populations.

Originality/value

This paper contributes to a new stream of critical research on “smart” with a strong focus on the power of mobilities and mobility systems, whose digital enhancement plays out as a leveraging agent of new place connections and negotiations for short-term populations, but at the same time, may exclude disadvantaged subjects in their capacity to access and afford the system network.

Details

Journal of Place Management and Development, vol. 16 no. 2
Type: Research Article
ISSN: 1753-8335

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Open Access
Article
Publication date: 6 July 2023

Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of…

Abstract

Purpose

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of such a warrant in South African criminal cases.

Design/methodology/approach

This paper provides a brief overview of international and local impediments, followed by a detailed discussion of the implications of these impediments and how it is approached in various jurisdictions. The methodology of this paper consists of a literature review.

Findings

Addressing the impediments in the compilation of the application and the warrant will be beneficial for forensic investigators, the South African Police Service (SAPS) and the administration of justice in South Africa.

Research limitations/implications

Search and seizures for digital evidence form part of civil, regulatory and criminal search and seizures. This study focuses on the search and seizure of digital evidence in criminal matters pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.

Originality/value

The originality of this paper lies in the approach to the drafting of applications for search and seizure warrants for digital information in South Africa. The contribution of the study is that, by using this approach, the SAPS can address the impediments during the application and compilation of the warrants, which would enhance the quality of investigations and contribute to the successful investigation and prosecution of crime in South Africa.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7191

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 10 May 2021

Olusola Joshua Olujobi

This study aims to investigate why anti-corruption statutes are not efficient in Nigeria’s upstream petroleum industry.

6119

Abstract

Purpose

This study aims to investigate why anti-corruption statutes are not efficient in Nigeria’s upstream petroleum industry.

Design/methodology/approach

This study is a doctrinal legal research that embraces a point-by-point comparative methodology with a library research technique.

Findings

This study reveals that corruption strives on feeble implementation of anti-corruption legal regime and the absence of political will in offering efficient regulatory intervention. Finally, this study finds that anti-corruption organisations in Nigeria are not efficient due to non-existence of the Federal Government’s political will to fight corruption, insufficient funds and absence of stringent implementation of the anti-corruption legal regime in the country.

Research limitations/implications

Investigations reveal during this study that Nigerian National Petroleum Corporation (NNPC) operations are characterised with poor record-keeping, lack of accountability as well as secrecy in the award of oil contracts, oil licence, leases and other financial transactions due to non-disclosure or confidentiality clauses contained in most of these contracts. Also, an arbitration proceeding limit access to their records and some of these agreements under contentions. This has also limited the success of this research work and generalising its findings.

Practical implications

This study recommends, among other reforms, soft law technique and stringent execution of anti-corruption statutes. This study also recommends increment in financial appropriation to Nigeria’s anti-corruption institutions, taking into consideration the finding that a meagre budget is a drawback.

Social implications

This study reveals that corruption strives on feeble implementation of anti-corruption legal regime and the absence of political will in offering efficient regulatory intervention. Corruption flourishes due to poor enforcement of anti-corruption laws and the absence of political will in offering efficient regulatory intervention by the government.

Originality/value

The study advocates the need for enhancement of anti-corruption agencies' budgets taking into consideration the finding that meagres budgets are challenge of the agencies.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 3 May 2022

Elissavet-Anna Valvi

The aim of the present study is to shed light on the role of legal practitioners, namely, lawyers and notaries, in the fight against money laundering: Are they considered as…

3256

Abstract

Purpose

The aim of the present study is to shed light on the role of legal practitioners, namely, lawyers and notaries, in the fight against money laundering: Are they considered as facilitators or obstacles against money laundering? How does the global and the EU legal framework deal with the legal professionals?

Design/methodology/approach

The research follows a deductive approach attempting to respond to questions such as: How do the lawyers’ and notaries’ societies react in front of the anti-money laundering measures that concern them and why? What are the discrepancies between the lawyers’ professional secrecy and the obligations that EU anti-money laundering legislation assigns them?

Findings

This study disclosures the response of the European union and international legal and regulatory framework as well as the reflexes of the international and European legal professionals’ associations to this danger. It also demonstrates the reaction of lawyers against European union anti-money laundering legislation, to the point that it limits not only the confidentiality principle but also the position of the European judicial systems to the contradiction between this principle and the lawyers’ obligation to report their suspicions to the authorities.

Research limitations/implications

To fulfil the study goals, it was necessary to overcome some obstacles, like the limitation of existing sources. Indeed, transnational empirical research considering the professionals who facilitate money laundering is narrow. Besides, policymakers and academics only recently expressed more interest in money laundering and its facilitators.

Originality/value

This paper fulfils an identified need to study the legal professionals’ role not only in money laundering practices but also in anti-money laundering policies.

Access

Only content I have access to

Year

Last 12 months (22)

Content type

1 – 10 of 22