Search results

1 – 10 of 920
Article
Publication date: 1 November 2006

N Ben Fairweather and S Rogerson

This paper looks at citizen‐facing e‐government. It considers how the non‐discretionary nature of the citizen’s relationshipwith government makes citizen‐facing e‐government…

575

Abstract

This paper looks at citizen‐facing e‐government. It considers how the non‐discretionary nature of the citizen’s relationship with government makes citizen‐facing e‐government different from business‐consumer e‐commerce. Combined with the moral basis of the state, the paper argues that there is an obligation for the state to set an example, which should affect the design of citizen‐facing e‐government, with design‐for‐all being an appropriate philosophy. Other consequences should include a preference for open standards and a wariness of unintentional endorsement of commercial products. E‐government should also offer a good level of data protection and security, and has a role in educating citizens in matters of computer security. Advantages and disadvantages that may come from e‐government adoption are considered, including a number of ways in which cost savings and increases in convenience may be achieved. There are brief discussions of questions of distribution of the benefits of e‐government adoption and of the relationship of e‐government to e‐democracy.

Details

Journal of Information, Communication and Ethics in Society, vol. 4 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 November 2006

Steve McRobb

During the period of growth of e‐commerce, e‐business and online life in general, trust has been identified by a number of authors as a key factor, the absence of which can act as…

Abstract

During the period of growth of e‐commerce, e‐business and online life in general, trust has been identified by a number of authors as a key factor, the absence of which can act as a powerful disincentive to an individual’s engagement in a transaction. This has encouraged a great deal of research into the various facets of trust in an online environment, both theoretical and empirical. One of the many recommendations for business practice that have emerged from this research is the suggestion that online businesses should publish on their website a privacy policy that explains clearly the use that will be made of any personal information collected on the site, the third parties to whom it may be disclosed, and the circumstances under which disclosure may occur. A number of surveys have been conducted that highlight the rather patchy adoption of this recommendation in various countries. We now know, for example, that by no means all online organisations publish an online privacy policy, and that many of those that do exist display a range of serious shortcomings, including poor visibility on the site, incomplete coverage of the main issues of concern and poor readability. However, previous discussion of privacy policies has tended to assume that any particular policy can provide value to its readers by informing them of the privacy practices of its host organisation, and thus also to its publishers through encouraging customers and clients to trust them more than they otherwise would. This assumption is expected to be valid where the policy meets certain criteria, which are either established on the basis of theoretical considerations, or are derived from a kind of best‐in‐breed comparative exercise. This paper seeks to address the question how far privacy policies can ever achieve the goal of providing clear information to website visitors about the privacy practices of an organisation. It reports on an empirical study that was conducted between November 2005 and April 2006 using two groups of University students as subjects. The subjects were asked to read three privacy policies, selected in advance by the author, and to complete a short questionnaire on what the subject thought each policy had to say about certain key privacy issues. The results reveal that there is surprisingly little agreement about what a policy actually means. This has significant implications both for policy writers and their managers, and also for those who are considering entering into a transaction with the host website. There is a need for further research to investigate this question in more detail, but it is clear from these findings that we know less than we thought we did about the ways in which people interpret the notices that they read on websites.

Details

Journal of Information, Communication and Ethics in Society, vol. 4 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Book part
Publication date: 22 January 2024

Samuel Uwem Umoh

The hotel sector in South Africa is also aware of the detrimental impact of its activities on the environment. As a result, it has taken steps to mitigate such effects, evidenced…

Abstract

The hotel sector in South Africa is also aware of the detrimental impact of its activities on the environment. As a result, it has taken steps to mitigate such effects, evidenced by implementing green hotel practices. ‘Green hotels’ refers to lodging establishments that try to consume less energy, water and materials while still offering high-quality services. Unfortunately, although the hotel sector contributes significantly to employment and economic growth globally, its activities harm the environment through pollution, overuse of natural resources and solid and liquid waste.

This chapter discusses the concepts of green hotels and green practices. This chapter also highlights the need for green practices and identifies a case study on green hotels and practices in a South African context. This chapter found that the green hotel sector implements green practices, such as water-saving practices due to the risk of water insecurity, the growing demand for sustainability and the necessity to boost revenues. Green hotels and practices are a step to actualise the objectives of Sustainable Development Goals (SDGs) 12 and 13, which focus on clean water and sanitation and climate change, respectively. The study underscores the importance of green practices and how South Africa responds to the challenge. It is believed that hotels contribute significantly to environmental degradation, but they can also help to preserve the environment through their activities through green practices. Strategies like adopting green practices would be a remedy to mitigate pollution and its effects on environmental sustainability.

Details

Future Tourism Trends Volume 1
Type: Book
ISBN: 978-1-83753-245-2

Keywords

Content available
Article
Publication date: 21 December 2017

Simon Rogerson

421

Abstract

Details

Journal of Information, Communication and Ethics in Society, vol. 15 no. 4
Type: Research Article
ISSN: 1477-996X

Article
Publication date: 6 July 2015

Kuang-Ming Kuo, Paul C. Talley and Chen-Chung Ma

The purpose of this paper is to propose and empirically test a theoretical model that considers the predictors of an individual’s perceptions of information privacy, and also how…

Abstract

Purpose

The purpose of this paper is to propose and empirically test a theoretical model that considers the predictors of an individual’s perceptions of information privacy, and also how it relates to his/her behavioral intention toward approaching hospital web sites.

Design/methodology/approach

This paper collects data using survey methodology. A total of 331 usable participants are gathered and analyzed via structural equation modeling.

Findings

Significant predictors of information privacy concerns include a stated online privacy policy and a hospital’s reputation. Further, online privacy policy predicts a hospital’s reputation. Finally, hospital reputation and information privacy concerns significantly predict an individual’s behavioral intention toward approaching hospital web sites.

Research limitations/implications

The study confirmed that an online privacy policy and reputation can effectively alleviate specific information privacy concerns; therefore, this may indicate that these two factors should be considered whenever investigating individuals’ information privacy concerns.

Practical implications

To acquire a good reputation and to diminish individuals’ information privacy concerns toward hospital web sites, hospitals should pay attention to the posting of an online privacy policy and communicating such policies to given individuals.

Originality/value

This paper fulfils the gap of exploring the relationship among online privacy policy, organization reputation, and information privacy concerns. Further, the hypothesized model and its findings could also provide useful information for managers who are intent on boosting hospital web site usage frequency patterns.

Article
Publication date: 9 March 2018

Miftachul Huda

Because information technology (IT) can change the way we look at the world, some benefits for human communities, such as trust, care, friendship and commitment can be clearly…

1568

Abstract

Purpose

Because information technology (IT) can change the way we look at the world, some benefits for human communities, such as trust, care, friendship and commitment can be clearly noticed as contributors to society. Providing an innovative way to help human society, enabling the achievement of good lives by evaluating information related to the concept of wisdom, this paper aims to propose technical guidelines as a reference model, specifically for empowering both professional and ethical bases associated with the instructional application strategy for adopting technology.

Design/methodology/approach

This study attempts to investigate the professional and ethical engagements that can underlie technology adoption. To achieve this, a literature review of peer-reviewed journals, conferences and books was conducted to propose the framework model for strengthening moral engagement in the digital era. By using keywords derived from the professional and ethical skills involved with technology adoption, multiple research findings can be achieved using meta-synthesis alongside an integrating, evaluating and interpreting process. As a result, phenomenological and grounded theories and ideas, extracted to identify their common features, elements and functionalities, can be integrated and used to propose a theoretical guideline.

Findings

The findings reveal that to engage the professional and ethical bases associated with the instructional strategy and application in technology adoption demonstrates how humans, with all their potency, can contribute significantly to society at large by enhancing their abilities and improving their capacities for the wise and appropriate utilization of technological tools.

Practical implications

With regard to experiences in the digital era, across differing cultures and age groups, based on emerging technology, it is necessary to use technological tools properly and wisely. An effort to foster positive outcomes as a result of increased digital media use, and address potential issues raised by empowering applications and strategies associated with professionalism and ethics, plays a significant role in contouring the main foundations for how to use technological tools in all the comprehensive coverage concerning the theory and applications addressed by this work.

Social implications

What is significant and essential about the technological bases examined is their core element of enabling humans to enhance any benefits garnered for social and personal development. This paper intends to expand upon how professional and ethical aspects of technology adoption should involve a wide exchange of particular elements that underlie the wise and appropriate fostering of technological implementation.

Originality/value

Emerging technology with its distinct facilities could enhance individual performance by improving abilities and capacities for wise and appropriate operation of technological tools. By critically exploring the professional and ethical balance involved with technology-based tools in society and how they might underpin their users’ social and personal awareness, this paper gives feedback that provides insights about emerging technological trends. This is done with reference to particular guidelines, enabling a clearer understanding of the importance of the impact of technology on the human condition.

Details

Journal of Science and Technology Policy Management, vol. 10 no. 1
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 18 June 2020

Hanne Sørum and Wanda Presthus

This paper investigates the European Union's General Data Protection Regulation (GDPR) in information systems (ISs). The GDPR consists of 99 articles, and two articles are…

1262

Abstract

Purpose

This paper investigates the European Union's General Data Protection Regulation (GDPR) in information systems (ISs). The GDPR consists of 99 articles, and two articles are emphasised – namely Article 15, which deals with rights of access by the data subject, and Article 20, which deals with the right to data portability.

Design/methodology/approach

15 companies operating in the Norwegian consumer market were randomly selected. Each company received an inquiry pertaining to rights of access by the data subject (Article 15) and the right to data portability (Article 20). The research team carefully analysed the answers received and categorised the responses according to the two articles emphasised.

Findings

The findings show extensive variations among the companies in terms of response time, quality of feedback and how companies handle requests concerning rights of access by the data subject (Article 15) and the right to data portability (Article 20). Differences are also pertaining to the types of files, along with the content of these files. It should be noted, however, that most of the companies replied to the inquiry before the deadline. The findings show that companies comply better with Article 20 than Article 15. However, it appears that they do not differentiate between the two articles.

Originality/value

This study explores a research topic that is relatively new. It addresses a gap in the extant research by highlighting how the GDPR works in practice from a consumer's perspective. In addition, guidelines are offered to the consumers and companies affected by the GDPR.

Details

Information Technology & People, vol. 34 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 13 February 2024

Rosie Allen and Chathurika Kannangara

The aim of this chapter is to provide an overview of the student mental health crisis in Higher Education (HE), and how resilience and grit, two important positive psychological…

Abstract

The aim of this chapter is to provide an overview of the student mental health crisis in Higher Education (HE), and how resilience and grit, two important positive psychological constructs, can be beneficial for university students’ success and wellbeing. As part of a discussion around some of the current approaches to intervening in wellbeing in universities, the chapter provides evidence for the use of PPIs for wellbeing in university students, alongside some of the challenges of implementing these in HE. It also provides an overview of the Thriving Students Framework and presents a case for a multicomponent approach to monitoring and improving educational success. In particular, a wellbeing framework that, alongside resilience, also recognises the importance of strengths, persistence in the face of difficulty, a growth mindset, self-control and mental wellbeing; Academic Tenacity. The implications of utilising this framework for educational attainment in university students are discussed. The Bolton Uni-Stride Scale (BUSS), a single short measure of academic tenacity that combines the attributes enabling measurement and intervention to support university students to thrive, is also presented for educators to use.

Details

Positive Education at All Levels: Learning to Flourish
Type: Book
ISBN: 978-1-83753-156-1

Keywords

Article
Publication date: 1 April 2006

Robert Willison

While a number of IS security researchers consider the threat posed by employees who perpetrate computer crime, there is currently a lack of insight into how the offender…

2149

Abstract

Purpose

While a number of IS security researchers consider the threat posed by employees who perpetrate computer crime, there is currently a lack of insight into how the offender interacts with the criminal context both prior to and during commission. A greater understanding of this relationship may complement existing security practices by possibly highlighting new areas for safeguard implementation. To help facilitate a greater understanding of the offender/environment dynamic, this paper, therefore, aims to assess the feasibility of applying three criminological theories to the IS security context. Rather than focusing on why people become criminals, these theories entitled routine activity theory, environmental criminology and the rational choice perspective, focus on the criminal act.

Design/methodology/approach

Drawing on an account of the Barings Bank collapse, events highlighted in the case study are used to assess whether concepts central to the theories are supported by the data.

Findings

Analysis indicates support for the concepts central to environmental criminology and the rational choice perspective. While case study evidence supports two of the concepts advanced by routine activity theory, as a whole the theory is found wanting, as the “guardianship” and “handled offender” concepts appear to lack the necessary sophistication to theoretically accommodate and explain supervisory and control failings cited in the case study.

Research limitations/implications

While future research could encompass continued application of the theories to further assess their suitability for the IS domain, consideration could also be given to the application of the preventive tools and methods which have been developed in tandem with the three criminological approaches. Another stream of future research may involve the application of the theories in conjunction with existing security practices.

Practical implications

Greater knowledge of the offender/context dynamic may feasibly enhance existing security practices by possibly highlighting new areas for safeguard implementation.

Originality/value

From an IS security perspective, there is currently a lack of insight into the offender/context dynamic. The paper presents a group of criminological theories, which have previously not been considered for application in the IS context. The theories may feasibly throw light on the behaviour of offenders in the criminal context, both prior to and during commission.

Details

Information Technology & People, vol. 19 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 March 1994

Simon Rogerson and Christine Fidler

Advances in information provision have led organizations to attempt todevelop IS/IT strategies which interrelate with their businessstrategies and which together support corporate…

5829

Abstract

Advances in information provision have led organizations to attempt to develop IS/IT strategies which interrelate with their business strategies and which together support corporate missions. Strategic information systems planning (SISP) has become an accepted part of the overall corporate strategic planning process. The proliferation of methods and the variations in satisfaction indicate a need to provide a framework for classifying and comparing SISP approaches which will provide guidance on use and to explain why certain approaches are more commonly used than others. Develops a classification framework based on complexity and describes tools for using the framework. Provides indication as to the nature of a complete classification and comparison method for SISP based on complexity, scope and fit.

Details

Information Management & Computer Security, vol. 2 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of 920