Search results

1 – 10 of over 5000
Article
Publication date: 12 August 2022

Meenakshi Handa, Parul Ahuja and Swati Jain

Along with their immense benefit, online channels of communication and information-sharing also present a myriad set of challenges. The unauthorized downloading and sharing of…

Abstract

Purpose

Along with their immense benefit, online channels of communication and information-sharing also present a myriad set of challenges. The unauthorized downloading and sharing of copyrighted content such as music and movies is one such issue. This study aims to examine the factors related to the unauthorized downloading of content amongst young internet users in an emerging market.

Design/methodology/approach

An online structured questionnaire was used to collect primary data from 219 internet users between 17 and 24 years of age. The partial least squares structural equation modelling was used to analyse the primary data.

Findings

The study findings report that monetary savings and social influence are the main drivers underlying the propensity to engage in unauthorized downloading amongst young adults. Perceptions of harm caused to artists and producers appear to be a deterrent. Though the respondents perceive the quality of content downloaded from unauthorized sites to be less than desirable, and there is also a higher perceived threat from viruses, this does not appear to deter unauthorized downloading behaviour amongst this segment of consumers.

Research limitations/implications

Combating unauthorized downloading and other forms of questionable online behaviours is a challenge for multiple stakeholders. Consumption of unauthorized digital content is examined in the context of online consumers whose demographic profile is often associated with this category of questionable behaviour. The study adds to the extant understanding of the aetiology of what are often considered online unethical and illegal behaviours and makes both practical and theoretical contributions to the subject field.

Originality/value

The study examines an important aspect of rapidly evolving internet technologies. The internet provides a veil to individuals engaging in unethical online activities. Despite the existence of laws declaring these activities to be illegal, instances of copyright violations of music and movies abound. The insights regarding the drivers and deterrents of a form of online unauthorized activity are used to present a set of strategies aimed at addressing such behaviours.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 19 October 2021

Arūnas Gudinavičius and Vincas Grigas

The current study aims to identify and explore causes and consequences of unauthorized use of books from readers', publishers', and authors' points of view. The case of Lithuania…

Abstract

Purpose

The current study aims to identify and explore causes and consequences of unauthorized use of books from readers', publishers', and authors' points of view. The case of Lithuania also assessed, especially historical background (banned alphabet, book smuggling, theft as the social norm in Soviet times) of the country.

Design/methodology/approach

Aiming for more understanding why readers, authors and publishers are using or not using technology for unauthorized access of books, technology acceptance model approach was used, a total of 30 respondents (publishers, authors and readers) were interviewed in semi-structured face-to-face interviews and thematic analysis of collected qualitative data was conducted. Interviews were coded in English with coding software for further analysis.

Findings

Findings indicate that the main cause for the unauthorized use of books is a lack of legal e-book titles and acquisition options. This mainly points at publishers, however, instead of using unauthorized sources as opportunities for author promotion or marketing, they rather concentrate on the causes of unauthorized use of books which they are not in control of, including access to unauthorized sources, habits and economic causes. Some publishers believe that the lack of legal e-book titles is the consequence of unauthorized use of book rather than its cause.

Originality/value

This research contributed to the body of knowledge by investigating unauthorized use of books from readers', publishers' and authors' points of view which renders to have a better understanding of the causes and consequences of such behavior, as well as differences between these roles. The authors suggest that these causes lead to the intention to use and actual use of technology which is easier to use and which gives more perceived advantages – technology for unauthorized downloading and reading of books vs legal e-book acquisition options.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2021-0133.

Details

Online Information Review, vol. 46 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 8 May 2009

Habib Mahama and Chen Yu Ming

Recent failures and scandals in the banking and financial services industry have served as catalysts for anxiety about operational risk. In particular, the Basel II accord…

3071

Abstract

Purpose

Recent failures and scandals in the banking and financial services industry have served as catalysts for anxiety about operational risk. In particular, the Basel II accord emphasises the need to develop methodologies for assessing and managing this category of risk. However, operational risk is said to be an elusive and problematic concept. This paper aims to examine how certain events in the banking and financial services industry become enframed and constructed as operational risk and how such risk is managed.

Design/methodology/approach

The paper draws on the sociology of risk literature to analyse how an “unauthorised trading” event (and associated losses) that occurred in the currency options trading desk of the National Australia Bank (NAB) was enframed and constructed as operational risk. Data are gathered through metadiscourse analysis of textual materials relating to this event.

Findings

The analysis reveals the social and institutional mechanisms underlying the construction of risk and the contested nature of risk knowledge. In particular, it highlights the significant role of media discourse in articulating risk claims and dominating public discourse about risk. It also highlights the moral character of the concept of risk and how the moralising of risk discourse leads to the creation of particular forms of subjectivities and the operationalisation of certain risk management rationalities in NAB.

Originality/value

The paper will be helpful in improving researchers' and practitioners' understanding of how, in a given field of possibilities, particular events become constructed as operational risk.

Details

Accounting, Auditing & Accountability Journal, vol. 22 no. 4
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 1 June 2008

Talal H. Hayale and Husam A. Abu Khadra

The objective of this study is to investigate perceived security threats of Computerized Accounting Information Systems (CAIS) that face Jordanian domestic banks. An empirical…

Abstract

The objective of this study is to investigate perceived security threats of Computerized Accounting Information Systems (CAIS) that face Jordanian domestic banks. An empirical survey using self‐administrated questionnaire has been carried out to achieve the above‐mentioned objective. The study results reveal that accidental entry of “bad” data by employees, accidental destruction of data by employees; intentional entry of “bad” data by employees and employees’ sharing passwords are the top four security threats that face domestic banks. The paper concludes that most security threats that face domestic banks are internally generated and unintentional.

Details

Journal of Economic and Administrative Sciences, vol. 24 no. 1
Type: Research Article
ISSN: 1026-4116

Keywords

Article
Publication date: 1 February 1996

Stanley Lai

The withdrawal of charges against a reporter of the Independent, following the failed prosecution of a British Telecom employee illustrates the limitations of the carefully…

Abstract

The withdrawal of charges against a reporter of the Independent, following the failed prosecution of a British Telecom employee illustrates the limitations of the carefully defined offence of ‘unauthorised access’, as provided by s. 1 of the Computer Misuse Act 1990 (the 1990 Act). It remains an oddity that the 1990 Act does little to regulate ‘unauthorised use’, as opposed to ‘unauthorised access’.

Details

Journal of Financial Crime, vol. 3 no. 4
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 1 May 2001

Lawrence W.C. Lai and Daniel C.W. Ho

Extending the ground works of Ho (1993), Baldwin (1994), Walters and Hastings (1998a, 1998b) on property management in Hong Kong, this short paper documents the context[1] of…

1788

Abstract

Extending the ground works of Ho (1993), Baldwin (1994), Walters and Hastings (1998a, 1998b) on property management in Hong Kong, this short paper documents the context[1] of research on illegal structures, explains the incentive for building illegal structures on government land and private property and discusses the significance of illegal structures for the proprietor and the property manager, as well as the relevant legislative provisions and policies.

Details

Property Management, vol. 19 no. 2
Type: Research Article
ISSN: 0263-7472

Keywords

Book part
Publication date: 21 December 2013

Danwill D. Schwender

Purpose – This chapter explores the use of music and celebrity endorsements in political campaigns of the United States. It focuses on two aspects: (1) the…

Abstract

Purpose – This chapter explores the use of music and celebrity endorsements in political campaigns of the United States. It focuses on two aspects: (1) the legality of a political campaign’s use of music at rallies and in advertisements without authorization from the owner of the musical work and (2) a review of the literature on the potential effect of the use of music in political campaigns on voter behavior.

Design/methodology/approach – A brief history of the use of music in political campaigns precedes an examination of the expansion of copyright law protection for music and the legal claims musicians may raise against the unauthorized use of music by political campaigns. The chapter then reviews the potential effect of political campaigns’ use of music and celebrity endorsements on voter behavior.

Findings – A musician’s primary legal protection falls under copyright law, but the courts disagree on whether the unauthorized use of music at political rallies and in political campaign advertisements results in copyright infringement. Social research suggests music and celebrity endorsements affect voter behavior with a likely greater effect on first-time voters.

Originality/value of chapter – This chapter introduces the complicated application of copyright law to the unauthorized use of musical works by political campaigns. Additionally, it notes the limited research on the effect of music and celebrity endorsements on voter behavior even as political campaigns increasingly target niche demographics with specific music selections to motivate voters to vote.

Details

Music and Law
Type: Book
ISBN: 978-1-78350-036-9

Keywords

Abstract

Details

Using Subject Headings for Online Retrieval: Theory, Practice and Potential
Type: Book
ISBN: 978-0-12221-570-4

Article
Publication date: 27 February 2007

Ken Reid

The purpose of this paper is to analyse and evaluate Office for Standards in Education (Ofsted) reports on attendance issues within local education authorities' out‐of‐school…

951

Abstract

Purpose

The purpose of this paper is to analyse and evaluate Office for Standards in Education (Ofsted) reports on attendance issues within local education authorities' out‐of‐school provision.

Design/methodology/approach

A full cohort of Ofsted reports on inspections of out‐of‐school units, often known as pupil referral units (PRUs), undertaken in England in 2003 were scrutinised. The attendance data were then analysed statistically and geographically by region. The regions designated were the north of England, London and the Home Counties, the Midlands and the rest of England.

Findings

The findings indicate that unauthorised absence rates in PRUs are more than ten times those reported for primary and secondary schools and for local education authorities (LEAs). Overall, unauthorised absence rates exceed authorised rates throughout a majority of PRUs inspected in England in 2003; the exact opposite to schools. There are considerable variations in rates of authorised and unauthorised absence between PRUs within the same regions and within some LEAs.

Practical implications

Ofsted appear to give more latitude towards attendance issues within PRUs than they do in their inspection reports for schools and LEAs. The implications of these findings are considered along with the need for further research.

Originality/value

This is the first article of its kind to analyse and evaluate the implications of Ofsted reports on attendance issues within LEAs out‐of‐school units.

Details

International Journal of Educational Management, vol. 21 no. 2
Type: Research Article
ISSN: 0951-354X

Keywords

Book part
Publication date: 16 August 2010

Anne L. Christensen, Jane Cote and Claire K. Latham

Universities are expected to prepare accounting students to conduct themselves with integrity in all environments, including those that utilize information technology (IT). Our…

Abstract

Universities are expected to prepare accounting students to conduct themselves with integrity in all environments, including those that utilize information technology (IT). Our study investigates student integrity in an online environment to determine if students are honest about accessing unauthorized Internet solutions. We then evaluate student responsiveness to interventions designed to discourage unauthorized access using techniques suggested by the literature to foster ethical behavior. Our examination of such factors as moral development, moral identity, age, gender, and grade point average finds no significant relationship with student ethical behavior. More problematic, classroom interventions proved ineffective in preventing students from accessing unauthorized online solutions. We conclude with suggestions for developing and encouraging ethical behavior among accounting students in IT learning environments.

Details

Advances in Accounting Education
Type: Book
ISBN: 978-0-85724-292-1

1 – 10 of over 5000