Search results

1 – 10 of 91
Open Access
Article
Publication date: 24 September 2021

Thuy Thi Nguyen, Tien Hanh Duong, My Tran Thanh Dinh, Tram Ho Ha Pham and Thu Mai Anh Truong

This study aims to empirically investigate how difference in social trust explains the heterogeneity of intellectual property right (IPR) protection (proxied by software piracy…

2006

Abstract

Purpose

This study aims to empirically investigate how difference in social trust explains the heterogeneity of intellectual property right (IPR) protection (proxied by software piracy rate) across countries. Specifically, the authors also examine whether this effect is complementary or substitute to legal and economic factors.

Design/methodology/approach

The authors use both ordinary least square and two-stage least square regressions to investigate this effect.

Findings

The authors find that there is also a complementary effect between trust and rule of law in reducing the violation of IPRs.

Originality/value

Although the literature by now has documented the solid relationship between trust and the quality of formal institutions, only few studies have explored more specific measures of institutional consequences. Thus, this study is the first study investigating the role of trust, a valuable social capital dimension, on IPR protection.

Details

Journal of Economics and Development, vol. 26 no. 1
Type: Research Article
ISSN: 1859-0020

Keywords

Article
Publication date: 27 May 2022

Dario Miocevic

Today, digital piracy remains a growing challenge for legislators and businesses operating in the entertainment industry. For these reasons, policymakers place significant efforts…

Abstract

Purpose

Today, digital piracy remains a growing challenge for legislators and businesses operating in the entertainment industry. For these reasons, policymakers place significant efforts in reducing piracy activities through copyright enforcement policies. Yet, the effectiveness of these frameworks remains questionable since empirical evidence offers countervailing insights. For these reasons, this study adopts a demand-side approach to investigate how users' emotional reactions to the copyright enforcement policy influence their digital piracy-related judgments and intention.

Design/methodology/approach

The author used a scenario-based approach to test the hypotheses and surveyed 262 users who actively stream movies and TV shows.

Findings

By drawing on the appraisal tendency framework, the author finds that among individuals experiencing fear due to the copyright enforcement policy, there is a decreasing intention to continue using illegal streaming services. On the contrary, individuals experiencing indignation are more likely to have increased intention to use illegal streaming services. On top of this, we reveal indirect effects by mediating individuals' vulnerability to sanctions (fear path) and subjective norms (indignation path) as judgments cues.

Originality/value

The author contributes to digital piracy literature in two ways with the study. First, the author unfolds the affective background that explains the emergence of deterrence or defiance effects when users respond to the copyright enforcement policy. Thus, the author shows that fear is a trigger for decreasing while indignation increases the usage of illegal streaming services. Second, through the appraisal tendency framework, the author enriches the literature by theorizing and providing empirical evidence on how previously established vulnerability to sanctions and subjective norms reinforce affective influences on encouraging or discouraging digital piracy intentions. Overall, the findings also provide policymakers with original insights on designing their copyright enforcement tools to combat digital piracy further.

Article
Publication date: 28 September 2023

Kian Yeik Koay

This study aims to examine the joint moderating effects of privacy risk and time risk on the relationship between financial risk and intentions to pirate digital products.

Abstract

Purpose

This study aims to examine the joint moderating effects of privacy risk and time risk on the relationship between financial risk and intentions to pirate digital products.

Design/methodology/approach

The author collected data from 247 participants using a survey method. Subsequently, PROCESS macro was used to evaluate the proposed hypotheses.

Findings

This study found that financial risk does not have a significant relationship with the consumer intention to pirate digital products. However, privacy risk moderates the negative relationship between financial risk and consumers’ intention to pirate digital products, such that the negative relationship is stronger when privacy risk is high. Furthermore, time risk does not moderate the negative relationship between financial risk and consumers’ intention to pirate digital products. Lastly, it was found that privacy risk and time risk jointly moderate the negative relationship between financial risk and consumers’ intention to pirate digital products, such that the negative relationship is strongest when both privacy risk and time risk are high.

Originality/value

This study contributes to the digital piracy literature by understanding the extent of consumer predispositions when there are combined different types of perceived risks against their piracy decision.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 6 July 2022

Xiuyan Shao, Hemin Jiang, Mikko Siponen, Cong Cao and Xiaohua Huang

Unauthorised file sharing (UFS) in online communities (OCs) is a major intellectual property concern. Researchers have traditionally viewed UFS as digital piracy and have…

Abstract

Purpose

Unauthorised file sharing (UFS) in online communities (OCs) is a major intellectual property concern. Researchers have traditionally viewed UFS as digital piracy and have suggested that deterrents, such as legal actions, should be in place. However, previous research has not considered the OC context and cannot explain why OC members share unauthorised files even when there is legislation against this in place. In OCs, UFS exhibits features of public goods contribution. Therefore, the authors claim that public goods contribution motivations can provide a compelling explanation for UFS in OCs.

Design/methodology/approach

The authors propose a theoretical model in which two egoistic public goods contribution motivations (namely, warm-glow giving and demand for resources) are tested alongside motivations informed by the sanctions described by deterrence theory, a theory widely used within the digital piracy perspective.

Findings

The authors find that warm glow and demand for resources are positively related to UFS in OCs; the effect of warm glow is moderated by users' attachment to OCs. Importantly, the results suggest that although sanctions significantly predict UFS, the effect of sanctions on UFS becomes insignificant in the presence of warm glow, demand for resources and attachment.

Originality/value

The study offers new insights into why users engage in UFS and highlights that public goods contribution should be taken into account in developing anti-piracy policies and practices.

Article
Publication date: 15 November 2022

Sally Raouf Ragheb Garas, Amira Fouad Ahmed Mahran and Hassan Mohamed Hussein Mohamed

This paper aims to investigate the impact of perceived risk, ethical judgement, value consciousness, susceptibility to social influence and neutralisation on counterfeit clothes…

1569

Abstract

Purpose

This paper aims to investigate the impact of perceived risk, ethical judgement, value consciousness, susceptibility to social influence and neutralisation on counterfeit clothes and accessories purchase intention in Egypt.

Design/methodology/approach

A single cross-sectional survey was conducted. Questionnaires were used to collect data from 361 counterfeit buyers in Egypt. To test the hypotheses, partial least squares-structural equation model was applied.

Findings

The results indicate that neutralisation, perceived risk and susceptibility to social influence significantly impact attitudes towards counterfeiting and purchase intentions, whereas value consciousness impacts counterfeit purchase intention. In addition, attitudes mediate the effects of perceived risk, susceptibility to social influence and neutralisation on purchase intention.

Practical implications

Brand producers/retailers and the government need to adhere to a number of practices to curb counterfeit demand, mainly by tackling the neutralisation’s impacts, demonstrating various risks of counterfeiting and developing a collective attitude against counterfeiting.

Originality/value

This study contributes to the ethical decision-making literature by empirically testing and quantifying the impact of neutralisation on shaping counterfeit buyers’ attitudes and purchase intention.

Details

Journal of Product & Brand Management, vol. 32 no. 4
Type: Research Article
ISSN: 1061-0421

Keywords

Open Access
Article
Publication date: 15 June 2023

Aderinola Ololade Dunmade and Adeyinka Tella

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

1156

Abstract

Purpose

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

Design/methodology/approach

Using content analysis and a review of relevant literature, this study examines the challenges that librarians face in enforcing cyberethics and highlights the strategies that libraries can adopt to promote responsible online behaviour.

Findings

This paper identifies the lack of awareness among postgraduate students regarding cybersecurity risks and the need for training and resources for librarians as key challenges in promoting cyberethics.

Originality/value

This study recommends that libraries provide access to training resources and develop policies and guidelines to promote cyberethics among postgraduate students. Overall, this paper argues that libraries and librarians can play a critical role in promoting responsible online behaviour and ensuring the safety and security of postgraduate students in Nigeria.

Article
Publication date: 5 May 2023

Shivangi Verma and Naval Garg

Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous…

Abstract

Purpose

Post-millennial youths are well equipped with internet technology and computers since birth and find it easier to operate computers and technologies than their previous generations. With the advancement of technology, the ethical dilemma associated with its use has evolved. This paper aims to develop and validate a measurement scale for the ethical orientation of post-millennial technology usage by capturing the key factors that best describe the behavior adopted by students.

Design/methodology/approach

A systematic scale development procedure was used, involving both reviews of the literature and focus group discussions to generate the items that specify the domain of this study. After generating items, exploratory factor analysis and confirmatory factor analysis were applied to identify latent constructs of techno-ethical orientation. Lastly, the scale was subjected to reliability and validity testing.

Findings

The study found that the techno-ethical orientation scale has five dimensions: privacy concerns, classroom behavior, accessibility dilemma, social media usage and assignment ethics. Overall, a scale comprising 17 statements was derived.

Research limitations/implications

The findings of our study attempt to augment the growing efforts to explore all facets of techno-ethics. It is probably the first attempt to develop a valid and reliable scale for the techno-ethical orientation of post-millennial.

Practical implications

This scale could be used by academicians and practitioners to assess the techno-ethical orientation of post-millennial for positive interventions.

Originality/value

This study derives a new reliable and valid scale for measuring the techno-ethical orientation of post-millennial toward technology usage.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 17 March 2023

Imran Mehboob Shaikh and Hanudin Amin

This study aims to investigate the customer’s willingness to participate in family takaful using the theory of interpersonal behaviour (TIB) in Pakistan.

Abstract

Purpose

This study aims to investigate the customer’s willingness to participate in family takaful using the theory of interpersonal behaviour (TIB) in Pakistan.

Design/methodology/approach

For this study, purposive sampling was used, and 310 useable questionnaires were received from the respondents who were postgraduate students, non-users of family takaful. The respondents are residing in the largest city of Pakistan, which is Karachi. The software Analysis of Moments Structures (AMOS v.25) was used to analyse the data.

Findings

The findings of this study reveal that awareness, affect, facilitating conditions and religious obligation are pivotal in determining the customers’ intention to purchase family takaful products. In addition, perceived risk and social factors are found not to be significant predictors. Resultantly, it may also be necessary to look into the factors examined in this study and other factors that may have played a great role in the acceptance of family takaful in the case of Pakistan.

Research limitations/implications

This study is limited in terms of geographic coverage as it only covers part of Karachi city as a place of investigation, and therefore, the results cannot be generalised fully. On the same note, the sampling method can also be broadened to have the actual number of respondents for generalisability purposes. Future studies may focus on the random sampling method using cluster sampling to cover other regions and provinces for a clear picture and understanding.

Originality/value

To the best of the authors’ knowledge, this work is one of the first studies to be carried out on empirical grounds using the TIB in the context of family takaful products in Pakistan.

Details

Journal of Islamic Accounting and Business Research, vol. 15 no. 1
Type: Research Article
ISSN: 1759-0817

Keywords

Open Access
Article
Publication date: 18 April 2023

Keenan Cross

The purpose of this study is to survey the landscape of online collections of digital games.

Abstract

Purpose

The purpose of this study is to survey the landscape of online collections of digital games.

Design/methodology/approach

First, the study identifies existing sites hosting collections and criteria that make a collection valuable for research, then it reports on sites that fit the criteria and analyzes trends.

Findings

Most sites provide simple binary downloads, but some choose encapsulation. Common metadata terms consistently include genre, year of release and publisher. Most sites claim the right to provide their collections as “abandonware,” but remove games if they are asked to.

Research limitations/implications

This study was conducted using a very limited subcategory of digital games, which could be expanded in other studies. Future research may require a multilingual team to account for collections based in non–English-speaking countries. Direct communication with sites’ management may be valuable in the future as well, but was not conducted in this study.

Practical implications

The study identifies practices that have developed organically in this field without any guiding standards. Understanding these may aid in Humanities research into digital games, as well as potential collection development in the future.

Social implications

Digital games are increasingly important as cultural artifacts, and there is a growing effort to preserve them for the future, but there are no standards for collecting and providing them. Understanding how this is currently done can help in providing access into the future for both casual and analytical use.

Originality/value

While game preservation is a growing and active field of research, no study has been published in recent years on this particular subject. It will be valuable for the development of future collections and for research using current ones.

Details

Digital Transformation and Society, vol. 2 no. 2
Type: Research Article
ISSN: 2755-0761

Keywords

Article
Publication date: 12 February 2024

Kate-Riin Kont

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates…

Abstract

Purpose

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.

Design/methodology/approach

The data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.

Findings

The research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.

Originality/value

The cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.

Details

Library Management, vol. 45 no. 1/2
Type: Research Article
ISSN: 0143-5124

Keywords

1 – 10 of 91