Search results
1 – 10 of over 13000Chao Lu and Xiaohai Xin
The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…
Abstract
Purpose
The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.
Design/methodology/approach
For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.
Findings
The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.
Research limitations/implications
This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.
Originality/value
The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.
Details
Keywords
Matteo Cristofaro, Frank Butler, Christopher Neck, Satyanarayana Parayitam and Chanchai Tangpong
The purpose of this paper is to assess the plausibility of four different mid-term paths of development of the European Union (EU): first, a political union or a European state;…
Abstract
Purpose
The purpose of this paper is to assess the plausibility of four different mid-term paths of development of the European Union (EU): first, a political union or a European state; second, a differentiated and flexible integration of the polity; third, a covert and deepening integration of the polity outside of the political arenas; fourth, the disintegration and/or dissolution of the EU through the exit of individual members or a joint decision to terminate the union.
Design/methodology/approach
The paper uses strategic interaction analysis to identify the plausibility of each of these four possible outcomes. By systematically varying the relevant actors’, i.e. European Council’s and member states’, the European Parliament’s, the Commission’s, preferences over outcomes while holding constant institutional rules of decision making on the one hand, and systematically varying institutional rules on the other while holdings actors’ preferences constant, the paper comes to the conclusion that differentiated and flexible integration and covert integration are the most plausible mid-term paths of development.
Findings
The paper finds that neither a European state or deep political union nor a disintegration or even dissolution of the EU is the most plausible path of development. Rather, it concludes that flexible and differentiated integration as well as covert integration outside the political arenas are the most likely developments. However, it also draws attention to the political costs of flexible and differentiated integration which does not allow for an overall view of political and policy issues negotiated at one political table, limiting the scope of compromise formation and even leading to a fragmented polity. Covert integration consisting of mechanisms of hidden integration “invisible” to the wider public may lead to a democratic backlash, once citizens realize that integration has considerably deepened without their being aware of it.
Originality/value
Most publications regarding the future development of the EU are normatively driven, either conjuring an imminent disintegration, or invoking the necessity of a deepening integration leading to a political union. This paper, by contrast, seeks to assess the likely further development based on empirically identified factors and a logical argument.
Details
Keywords
Purpose: The study elaborates the contextual conditions of the academic workplace in which gender, age, and nationality considerably influence the likelihood of…
Abstract
Purpose: The study elaborates the contextual conditions of the academic workplace in which gender, age, and nationality considerably influence the likelihood of self-categorization as being affected by workplace bullying. Furthermore, the intersectionality of these sociodemographic characteristics is examined.
Basic Design: The hypotheses underlying the study were mainly derived from the social role, social identity, and cultural distance theory, as well as from role congruity and relative deprivation theory. A survey data set of a large German research organization, the Max Planck Society, was used. A total of 3,272 cases of researchers and 2,995 cases of non-scientific employees were included in the analyses performed. For both groups of employees, binary logistic regression equations were constructed. the outcome of each equation is the estimated percentage of individuals who reported themselves as having experienced bullying at work occasionally or more frequently in the 12 months prior to the survey. The predictors are the demographic and organization-specific characteristics (hierarchical position, scientific field, administrative unit) of the respondents and selected interaction terms. Using regression equations, hypothetically relevant conditional marginal means and differences in regression parameters were calculated and compared by means of t-tests.
Results: In particular, the gender-related hypotheses of the study could be completely or conditionally verified. Accordingly, female scientific and non-scientific employees showed a higher bullying vulnerability in (almost) all contexts of the academic workplace. An increased bullying vulnerability was also found for foreign researchers. However, the patterns found here contradicted those that were hypothesized. Concerning the effect of age analyzed for non-scientific personnel, especially the age group 45–59 years showed a higher bullying probability, with the gender gap in bullying vulnerability being greatest for the youngest and oldest age groups in the sample.
Interpre4tation and Relevance: The results of the study especially support the social identity theory regarding gender. In the sample studied, women in minority positions have a higher vulnerability to bullying in their work fields, which is not the case for men. However, the influence of nationality on bullying vulnerability is more complex. The study points to the further development of cultural distance theory, whose hypotheses are only partly able to explain the results. The evidence for social role theory is primarily seen in the interaction of gender with age and hierarchical level. Accordingly, female early career researchers and young women (and women in the oldest age group) on the non-scientific staff presumably experience a masculine workplace. Thus, the results of the study contradict the role congruity theory.
Details
Keywords
There are five factors acting as a barrier to the effective evaluation of educational technology (edtech), which are as follows: premature timing, inappropriate techniques, rapid…
Abstract
Purpose
There are five factors acting as a barrier to the effective evaluation of educational technology (edtech), which are as follows: premature timing, inappropriate techniques, rapid change, complexity of context and inconsistent terminology. The purpose of this paper is to identify new evaluation approaches that will address these and reflect on the evaluation imperative for complex technology initiatives.
Approach
An initial investigation of traditional evaluative approaches used within the technology domain was broadened to investigate the evaluation practices within social and public policy domains. Realist evaluation, a branch of theory-based evaluation, was identified and reviewed in detail. The realist approach was then refined, proposing two additional necessary steps to support mapping the technical complexity of initiatives.
Findings
A refined illustrative example of a realist evaluation framework is presented, including two novel architectural edtech domain reference models to support mapping.
Practical implications
Recommendations include building individual evaluator capacity; adopting the realist framework; the use of architectural edtech domain reference models; phased evaluation to first build theories in technology “context” and then iteratively during complex implementation chains; and community contribution to a shared map of technical and organisational complexity.
Originality
This paper makes a novel contribution by arguing the imperative for a theory-based realist approach to help redefine evaluative thinking within the IT and complex system domain. It becomes an innovative proposal with the addition of two domain reference models that tailor the approach for edtech. Its widespread adoption will help build a shared evidence base that synthesizes and surfaces “what works, for whom, in which contexts and why”, benefiting educators, IT managers, funders, policymakers and future learners.
Details
Keywords
In this article, the ideas and methods behind the “patent-paper citation” are scrutinised by following the intellectual and technical development of approaches and ideas in early…
Abstract
Purpose
In this article, the ideas and methods behind the “patent-paper citation” are scrutinised by following the intellectual and technical development of approaches and ideas in early work on patentometrics. The aim is to study how references from patents to papers came to play a crucial role in establishing a link between science and technology.
Design/methodology/approach
The study comprises a conceptual history of the “patent paper citation” and its emergence as an important indicator of science and technology interaction. By tracing key references in the field, it analyses the overarching frameworks and ideas, the conceptual “hinterland”, in which the approach of studying patent references emerged.
Findings
The analysis explains how interest in patents – not only as legal and economic artefacts but also as scientific documents – became evident in the 1980s. The focus on patent citations was sparked by a need for relevant and objective indicators and by the greater availability of databases and methods. Yet, the development of patentometrics also relied on earlier research, and established theories, on the relation between science and technology.
Originality/value
This is the first attempt at situating patentometrics in a larger societal and scientific context. The paper offers a reflexive and nuanced analysis of the “patent-paper citation” as a theoretical and historical construct, and it calls for a broader and contextualised understanding of patent references, including their social, legal and rhetorical function.
Details