Search results

1 – 3 of 3
Open Access
Article
Publication date: 24 January 2022

Yu Xiang

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

1739

Abstract

Purpose

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

Design/methodology/approach

This paper conceptualises algorithmic systems as protocols – technological and social infrastructures that both facilitate and govern interactions between autonomous actors (Galloway and Thacker, 2004, 2007). It adopts a netnographic approach (Kozinets, 2002) to study not only the formal, technological systems of the platform but also the systems as they were made sense of, understood and enacted upon by actors. It relies both on information as revealed by the organisation itself, as well as discussions between lay users in online forums and press coverage.

Findings

The results of this study indicate that the ways in which platforms selectively facilitate interactions between users constitute a form of control. While maintaining the appearance of an open and neutral marketplace, interactions on the platform are in fact highly structured. The system relies on the surveillance of user interactions to rapidly identify and propagate marketable contents, so as to maximise user “engagement” and ad revenue. The systems place few demands or restrictions on individual users, instead control is effected in a probabilistic fashion, over the population of users as a whole, so as to, in aggregate, accomplish organisational goal.

Originality/value

This paper contributes to the literature on accounting and control practices in online spaces, by extending the notion of control beyond overt rankings and evaluations, to the underlying technical and social infrastructures that facilitate and shape interactions.

Details

Qualitative Research in Accounting & Management, vol. 19 no. 3
Type: Research Article
ISSN: 1176-6093

Keywords

Open Access
Article
Publication date: 11 September 2017

Michel van Eeten

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…

5210

Abstract

Purpose

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.

Design/methodology/approach

This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.

Findings

While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.

Originality/value

This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 27 February 2024

Ghadi Saad

The purpose of this study is to investigate the impact of terrorist attacks on the volatility and returns of the stock market in Tunisia.

Abstract

Purpose

The purpose of this study is to investigate the impact of terrorist attacks on the volatility and returns of the stock market in Tunisia.

Design/methodology/approach

The employed sample comprises 1250 trading day from the Tunisian stock index (Tunindex) and stock closing prices of 64 firms listed on the Tunisian stock market (TSM) from January 2011 to October 2015. The research opts for the general autoregressive conditional heteroscedasticity (GARCH) and exponential generalized conditional heteroscedasticity (EGARCH) models framework in addition to the event study method to further assess the effect of terrorism on the Tunisian equity market.

Findings

The baseline results document a substantive impact of terrorism on the returns and volatility of the TSM index. In more details, the findings of the event study method show negative significant effects on mean abnormal returns with different magnitudes over the events dates. The outcomes propose that terrorism profoundly altered the behavior of the stock market and must receive sufficient attention in order to protect the financial market in Tunisia.

Originality/value

Very few evidence is found on the financial effects of terrorism over transition to democracy cases. This paper determines the salient reaction of the stock market to terrorism during democratic transition. The findings of this study shall have relevant implications for stock market participants and policymakers.

Details

LBS Journal of Management & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0972-8031

Keywords

1 – 3 of 3