Search results

1 – 10 of 163
Book part
Publication date: 20 May 2024

Farha Khan and Akansha Mer

Introduction: As Internet usage increases, so does widespread concern about surveillance and privacy. While most of the research primarily focuses on a particular digital setting…

Abstract

Introduction: As Internet usage increases, so does widespread concern about surveillance and privacy. While most of the research primarily focuses on a particular digital setting, these problems cut beyond national boundaries and impact economies everywhere.

Purpose: This study critically analyses the Data Protection Bill 2019’s effectiveness within the context of surveillance and privacy in India’s digital economy. Investigating critical provisions of the bill, comparing it to international privacy laws and standards, and identifying potential gaps and weaknesses, this study provides insights into the bill’s ability to protect personal data and limit surveillance practices.

Methodology: The chapter is based on secondary sources of data, including academic articles, government reports, and news articles on the topics of surveillance, privacy, and the Data Protection Bill 2019 in India, involving content and critical discourse analyses.

Findings: The Data Protection Bill 2019 evaluation reveals a set of provisions with the overarching intent to safeguard citizens’ privacy worldwide and curtail undue surveillance practices exercised by both governmental bodies and private enterprises. Intricately delineates the entitlements of individuals concerning their data, encompassing vital aspects such as the right to access, rectify, and erase their data, the bill mandates stringent adherence to the principle of explicit consent when collecting and processing personal data.

Nevertheless, a comprehensive analysis also reveals several gaps and constraints inherent in the bill’s framework. One such area is the inclusion of exemptions for governmental entities, an aspect that raises international concerns regarding potential disparities in data protection practices.

Details

Sustainable Development Goals: The Impact of Sustainability Measures on Wellbeing
Type: Book
ISBN: 978-1-83797-098-8

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1209

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 18 January 2024

Yelena Smirnova and Victoriano Travieso-Morales

The general data protection regulation (GDPR) was designed to address privacy challenges posed by globalisation and rapid technological advancements; however, its implementation…

Abstract

Purpose

The general data protection regulation (GDPR) was designed to address privacy challenges posed by globalisation and rapid technological advancements; however, its implementation has also introduced new hurdles for companies. This study aims to analyse and synthesise the existing literature that focuses on challenges of GDPR implementation in business enterprises, while also outlining the directions for future research.

Design/methodology/approach

The methodology of this review follows the preferred reporting items for systematic reviews and meta-analysis guidelines. It uses an extensive search strategy across Scopus and Web of Science databases, rigorously applying inclusion and exclusion criteria, yielding a detailed analysis of 16 selected studies that concentrate on GDPR implementation challenges in business organisations.

Findings

The findings indicate a predominant use of conceptual study methodologies in prior research, often limited to specific countries and technology-driven sectors. There is also an inclination towards exploring GDPR challenges within small and medium enterprises, while larger enterprises remain comparatively unexplored. Additionally, further investigation is needed to understand the implications of emerging technologies on GDPR compliance.

Research limitations/implications

This study’s limitations include reliance of the search strategy on two databases, potential exclusion of relevant research, limited existing literature on GDPR implementation challenges in business context and possible influence of diverse methodologies and contexts of previous studies on generalisability of the findings.

Originality/value

The originality of this review lies in its exclusive focus on analysing GDPR implementation challenges within the business context, coupled with a fresh categorisation of these challenges into technical, legal, organisational, and regulatory dimensions.

Details

International Journal of Law and Management, vol. 66 no. 3
Type: Research Article
ISSN: 1754-243X

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7163

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Book part
Publication date: 23 April 2024

Ali Makhlooq and Muneer Al Mubarak

It is important to implement artificial intelligence (AI) because it can simplify and solve complex problems faster than humans. Because AI learns about people and their behavior…

Abstract

It is important to implement artificial intelligence (AI) because it can simplify and solve complex problems faster than humans. Because AI learns about people and their behavior from the first purchase, AI marketing can boost marketing efforts by leveraging data to target extremely precise consumer groups. There is a debate about the efficacy of AI marketing due to the constraints and limits imposed by the system's nature. This chapter presents insights from published studies regarding the relationship of AI with marketing and how AI can affect marketing. A real-world example of Netflix's usage of AI in marketing has been demonstrated. Then, consumer attitudes regarding AI were revealed. Then, several ethical considerations concerning AI were highlighted. Finally, the anticipated future of AI marketing was addressed. This chapter demonstrated the significance of firms implementing AI marketing to get a competitive advantage. Although some of the difficulties mentioned in this study need to be resolved, AI marketing has a bright future. There are ethical concerns about bias and privacy that should be addressed further. This chapter will encourage firms to use AI systems in marketing, and it will open the door to concerns that will need to be investigated academically in the future.

Details

Technological Innovations for Business, Education and Sustainability
Type: Book
ISBN: 978-1-83753-106-6

Keywords

Article
Publication date: 30 April 2024

Hirusheekesan Selvanesan and Navodana Rodrigo

Despite the unique features and potential applications in various industries, widespread blockchain adoption is hindered for several reasons. One of them is the lack of government…

Abstract

Purpose

Despite the unique features and potential applications in various industries, widespread blockchain adoption is hindered for several reasons. One of them is the lack of government regulations regarding blockchain and cryptocurrencies. However, a deliberate preliminary analysis of the policy initiatives by various jurisdictions proved otherwise, and a lack of sound academic literature on the policy initiatives on blockchain worldwide was evident. Addressing this gap, this study aims to summarize the policy initiatives of jurisdictions around the world, assessing if governments do not enact many regulations.

Design/methodology/approach

A systematic literature review was adopted in this study, in which the authors shortlisted a set of research papers and policy reports using several selection criteria and a screening process.

Findings

It was found that numerous policy initiatives have been enacted by governments worldwide, and blockchain applications are also being piloted or practiced successfully in several nations. It was also evident that governments are reluctant to accept cryptocurrencies as legal tender while embracing their underlying technology, blockchain.

Originality/value

To the best of the authors’ knowledge, this paper appears to be one of the first attempts to summarize the blockchain policy initiatives contributing to the body of knowledge on blockchain adoption.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Open Access
Article
Publication date: 23 January 2024

Inger James, Annica Kihlgren, Margaretha Norell Pejner and Sofia Tavemark

The purpose of this paper is to describe how first-line managers (FLMs) in home care (HC) reason about the opportunities and obstacles to lead the work according to the…

Abstract

Purpose

The purpose of this paper is to describe how first-line managers (FLMs) in home care (HC) reason about the opportunities and obstacles to lead the work according to the individual’s needs and goals.

Design/methodology/approach

In this participatory appreciative action reflection project, eight managers within one Swedish municipality were interviewed. The data were analysed using a thematic analysis.

Findings

The results showed a polarization between two different systems that FLMs struggle to balance when attempting to lead HC that adapts to the needs and goals of individuals. One system was represented by the possibilities of a humane system, with human capital in the form of the individual, older persons and the co-workers in HC. The second system was represented by obstacles in the form of the economic needs of the organization in which the individual receiving HC often felt forgotten. In this system, the organization’s needs and goals governed, with FLMs needing to adapt to the cost-effectiveness principle and keep a balanced budget. The managers had to balance an ethical conflict of values between the human value and needs-solidarity principles, with that of the cost-effectiveness principle.

Originality/value

The FLMs lack the opportunity to lead HC according to the needs and goals of the individuals receiving HC. There is a need for consensus and a value-based leadership model based on ethical principles such as the principles of human value and needs-solidarity to lead the HC according to the individual’s needs and goals.

Book part
Publication date: 29 May 2024

Jingxian Wang

This research aims at explaining the phenomenon of the “black children” (heihaizi), a very little-known generation who lived with concealment under the one-child policy in China…

Abstract

This research aims at explaining the phenomenon of the “black children” (heihaizi), a very little-known generation who lived with concealment under the one-child policy in China. The one-child policy was officially introduced to nationwide at the end of 1979 by permitting per couple to have one child only, later modified to a second child allowed if the first was a girl in rural China in 1984. It was officially replaced by a nation-wide two-child policy and most existing research focused on the parents’ sufferings and policy changes. The term “black children” has been mainly used to describe their absence from their family hukou registration and education. However, this research aims at expanding the meaning of being “black” to explain the children who were concealed more than at the level of family formal registration, but also physical freedom and emotional bond. What we do not yet know are the details of their lived experiences from a day-to-day base: where did they live? How were they raised up? Who were involved? Who benefited from it and who did not? In this way, this research challenges the existing scholarship on the one-child policy and repositions the “black children” as primary victims, and reveals the family as a key figure in co-producing their diminished status with the support of state power. It is very important to understand these children’s loss of citizenship and human freedom from the inside of the family because they were concealed in so many ways away from public view and interventions. This research focuses on illustrating how their lack of access to continued, stabilized, and reciprocally recognized family interactions framed their very idea of self-worth and identity.

Details

More than Just a ‘Home’: Understanding the Living Spaces of Families
Type: Book
ISBN: 978-1-83797-652-2

Keywords

Book part
Publication date: 19 April 2024

Lars Mjøset, Roel Meijer, Nils Butenschøn and Kristian Berg Harpviken

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial…

Abstract

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial, populist and democratic pacts, suitable for analysis of state formation and nation-building through to the present period. The framework relies on historical institutionalism. The methodology, however, is Rokkan's. The initial conceptual analysis also specifies differences between European and the Middle Eastern state formation processes. It is followed by a brief and selective discussion of historical preconditions. Next, the method of plotting singular cases into conceptual-typological maps is applied to 20 cases in the Greater Middle East (including Afghanistan, Iran and Turkey). For reasons of space, the empirical analysis is limited to the colonial period (1870s to the end of World War 1). Three typologies are combined into one conceptual-typological map of this period. The vertical left-hand axis provides a composite typology that clarifies cultural-territorial preconditions. The horizontal axis specifies transformations of the region's agrarian class structures since the mid-19th century reforms. The right-hand vertical axis provides a four-layered typology of processes of external intervention. A final section presents selected comparative case reconstructions. To the authors' knowledge, this is the first time such a Rokkan-style conceptual-typological map has been constructed for a non-European region.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

1 – 10 of 163