Search results

1 – 10 of over 2000
Book part
Publication date: 11 December 2023

Antonio Davola and Gianclaudio Malgieri

The attempt to establish a common European framework for core platforms' duties and responsibilities toward other actors in the digital environment is at the core of the recent…

Abstract

The attempt to establish a common European framework for core platforms' duties and responsibilities toward other actors in the digital environment is at the core of the recent scholarly debate surrounding the Digital Markets Act (DMA) proposal. In particular, the everlasting juxtaposition between the “data power” – as emerging from recent cases (Section 2) – that dominant tech companies enjoy and the concept of consumer sovereignty (Section 3) lies at the core of the proposal's attempt to identify digital core platforms as market gatekeepers. Accordingly, this chapter critically investigates the divide between power imbalance and consumer sovereignty in light of the architecture designed by the DMA, with a specific focus on its effectiveness in identifying gatekeepers' power drivers (Section 4). After highlighting the main critical aspects of the pertinent rules, opportunities for fruitful developments are then identified through the reframing of some of the notions considered in the proposal, and namely the role of “lock-in” effects and “data accumulation” (Section 5). Lastly, this chapter suggests that the DMA advancements – while desirable – are bound to be fragmentary in the absence of a wider appraisal of the nature of data power imbalance dynamics in the modern digital markets (Section 6).

Details

The Economics and Regulation of Digital Markets
Type: Book
ISBN: 978-1-83797-643-0

Keywords

Book part
Publication date: 15 November 2023

Daniel J. Miori

A great concern regarding the use of data science in any field is privacy. Adequately protecting individuals from the negative effects of maliciously shared personal identifying…

Abstract

A great concern regarding the use of data science in any field is privacy. Adequately protecting individuals from the negative effects of maliciously shared personal identifying information is essential. It is however, also important to understand the positive role that protected and shared information can play. This chapter provides a basic understanding of how the concept of privacy has developed in the United States (US) and suggests that continued development of that understanding and the protections provided will occur.

Article
Publication date: 10 July 2023

Jawahitha Sarabdeen

The Regulatory Technology (RegTech) is said to be the use of information technology for regulatory monitoring, reporting and compliance. It is used to solve regulatory and…

Abstract

Purpose

The Regulatory Technology (RegTech) is said to be the use of information technology for regulatory monitoring, reporting and compliance. It is used to solve regulatory and compliance issues more effectively and efficiently. Regulators with the digitization of regulation and datafication of processes would get empowered to manage volumes of data. RegTech would assist them in understanding innovative products, transactions, risks, reporting and any market manipulation activities in real time. For successful use of RegTech, the regulatory framework of a country should be comprehensive to address issues that may arise in the use of RegTech. Thus, the purpose of this article is to analyze the adequacy of the Saudi Arabian legal framework to address RegTech adoption.

Design/methodology/approach

The researcher using logical analysis method analyzed the available laws and interpreted the law to see the applicability and the adequacy of laws to regulate the use of RegTech in Saudi Arabia. The content analysis was also used in this research to analyze the literature. This analysis helped to explain the available literature on the research topic and its relevancy and the gap in literature.

Findings

The analysis using the logical and content methodologies shows that Saudi Arabia has general law to address some of the issues that might arise in the adoption of RegTech. Nonetheless, amending some of the existing laws or introducing guidelines could help better uplift of RegTech and similar technologies in Saudi Arabia.

Originality/value

As businesses and regulatory authorities embrace technology for better and efficient delivery of services and products in Saudi Arabia, the research is timely to analyze the adequacy of the laws in Saudi Arabia for adoption of RegTech. In the use of RegTech, issues related to privacy, due diligence, accountability and transparency could arise, however, there is a dearth of literature in these areas relating to technology adoption.

Details

International Journal of Law and Management, vol. 65 no. 6
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 27 February 2024

Nofie Iman

Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the…

Abstract

Purpose

Personal data is a powerful tool. The more someone know about us, the more power they got over us. But who will control the most of our personal data? Does the government and the big tech really care about our personal data? This paper aims to look at data practices, data-related policy making as well as its economic consequences in the context of emerging economies.

Design/methodology/approach

Using qualitative methods such as literature review and analysis of numerous government documents, this paper inquires into the dynamics in the use of data by the business sectors, explains how data governance can add value to the business sectors while ensuring customers’ data privacy protection based on the data governance mechanism framework and details what it takes.

Findings

Using the case of Indonesian recent development on data privacy regulation, this paper describes the problems and threats to personal data protection. The advent of latest computing and mobile technology is shifting power relations between the governments, the big tech, as well as the end users. To conclude, the strategy and policy recommendations for implementing data privacy protection are also presented.

Originality/value

This paper provides a timely synthesis of data practices in the context of developing countries, particularly in relation to policy making and economic consequences. This paper also identifies and shares several promising future research ideas.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 27 September 2023

Emily Zoe Mann, Stephanie A. Jacobs, Kirsten M. Kinsley and Laura I. Spears

Building on past studies of library privacy policies, this review looks at how privacy information is shared at universities and colleges in the state of Florida. Beyond the…

Abstract

Purpose

Building on past studies of library privacy policies, this review looks at how privacy information is shared at universities and colleges in the state of Florida. Beyond the question of whether a library-specific privacy policy exists, this review evaluates what is covered in the policies – whether topics such as how student data is stored, retained, de-identified and disposed of are broached in the statements, and whether specific data sets covering instruction, reference and surveillance are mentioned. The purpose of this study is to open the door to directed exploration into student awareness of privacy policies and spark conversation about positionality of libraries regarding privacy.

Design/methodology/approach

This review was done using a cross-sectional study design through observation of public-facing library privacy policies of higher education institutions in Florida.

Findings

Findings include that the majority of Florida academic libraries do not have a public-facing privacy policy. Only 15 out of the 70 schools reviewed had one. A large portion of those came from doctoral universities with associate’s colleges having none, and baccalaureate/associate’s colleges having only two. The policies that were in place tended to be institution-centered rather than patron-centered. Most categories of listed data collected were in the area of collections, website or computer usage.

Originality/value

The value of this review is that it adds to the literature studying privacy policies in academic libraries. Going forward, this research could address statewide practice in privacy policies as well as helping to lay pathways for working with students and other library patrons to gauge their interests and concerns about privacy.

Details

Information and Learning Sciences, vol. 124 no. 9/10
Type: Research Article
ISSN: 2398-5348

Keywords

Open Access
Article
Publication date: 29 December 2023

Priya C. Kumar

This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing…

Abstract

Purpose

This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing institutional, rather than community, goals.

Design/methodology/approach

This article analyzes theory and prior work on datafication, privacy, data literacy, privacy literacy and critical literacy to provide a vision for future privacy literacy research and praxis.

Findings

This article (1) explains why privacy is a valuable rallying point around which people can resist datafication, (2) locates privacy literacy within data literacy, (3) identifies three ways that current research and praxis have conceptualized privacy literacy (i.e. as knowledge, as a process of critical thinking and as a practice of enacting information flows) and offers a shared purpose to animate privacy literacy research and praxis toward social change and (4) explains how critical literacy can help privacy literacy scholars and practitioners orient their research and praxis toward changing the conditions that create privacy concerns.

Originality/value

This article uniquely synthesizes existing scholarship on data literacy, privacy literacy and critical literacy to provide a vision for how privacy literacy research and praxis can go beyond improving individual understanding and toward enacting social change.

Details

Information and Learning Sciences, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5348

Keywords

Article
Publication date: 15 July 2021

Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Abstract

Purpose

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Design/methodology/approach

The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.

Findings

The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.

Originality/value

The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 20 July 2023

Douglas Cumming, Sofia Johan and Robert Reardon

This paper aims to provide an in-depth examination of the emergent state of financial technology (fintech), particularly emphasizing capital-raising innovations and their…

1300

Abstract

Purpose

This paper aims to provide an in-depth examination of the emergent state of financial technology (fintech), particularly emphasizing capital-raising innovations and their implications for international business.

Design/methodology/approach

Using the highly influential articles published in fintech, the authors identify the advantages and disadvantages of each significant fintech in the credit, deposit and capital-raising services sector. The authors assess the adoption of these services and the international firm-level implications of their use.

Findings

This study highlights fintech’s role in fostering entrepreneurial internationalization, with a particular focus on the impact of crowdfunding, peer-to-peer lending and online banking. A thorough analysis of Google Scholar citations uncovers research gaps and unveils emerging trends bridging international business and fintech. Furthermore, the examination of regulatory efforts presents evidence of a robust positive relationship between global e-commerce legislation and fintech adoption, demonstrating the interconnected nature of these elements in the world of international business.

Research limitations/implications

Fintech research in international business has only taken off in the last five years. Innovations and regulatory developments are continuously evolving.

Originality/value

This study emphasizes the significance of fintech in international business research, addressing its implications on regulatory environments, entrepreneurial internationalization and multinational corporations’ global strategies. By investigating the synergies and applications of various fintech types, the research provides valuable insights for scholars and practitioners, contributing to the advancement of knowledge in the field of international finance.

Details

Multinational Business Review, vol. 31 no. 3
Type: Research Article
ISSN: 1525-383X

Keywords

Article
Publication date: 2 May 2023

Norliza Katuk, Norazlina Abd Wahab and Nur Syaedah Kamis

This paper aims to collect evidence on the issues and challenges in cryptocurrency estate planning and the possible approaches or methods to address them. Then, this paper also…

Abstract

Purpose

This paper aims to collect evidence on the issues and challenges in cryptocurrency estate planning and the possible approaches or methods to address them. Then, this paper also aims to understand Malaysia’s situation compared to global situations and determine how the country could address those challenges.

Design/methodology/approach

This study adapted a standard systematic review protocol named preferred reporting items for systematic reviews and meta-analyses, guided by three research questions: what are the challenges of cryptocurrency estate planning, how do researchers and practitioners address the issues or challenges and how could Malaysians move towards sustainable cryptocurrency estate planning? Relevant documents reported on cryptocurrency estate planning were analysed using thematic analysis.

Findings

The results of this review suggested that the issues and challenges in cryptocurrency estate planning can be described from six aspects: awareness, financial aspects, law, process, security and taxation. On the other hand, the approaches or methods to address these challenges may be categorised into laws, processes and technology. Further, a framework for cryptocurrency estate planning in Malaysia is proposed as an initial step towards a sustainable economy and society in Malaysia.

Research limitations/implications

The state and the use of cryptocurrency are still considered new in most countries globally. Hence, people are yet to be aware of the issues that may arise from it. Nevertheless, cryptocurrency estate planning will soon become an area of interest in which this study could enhance the literature and contribute knowledge to understanding the situation.

Originality/value

This study collected evidence on the issues and the approaches to address cryptocurrency estate planning. This study then focused on the Malaysian perspective by proposing a framework that was not covered by existing studies.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 4
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 10 of over 2000