Search results

1 – 10 of over 8000
Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1114

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 24 January 2022

Yu Xiang

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

1734

Abstract

Purpose

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

Design/methodology/approach

This paper conceptualises algorithmic systems as protocols – technological and social infrastructures that both facilitate and govern interactions between autonomous actors (Galloway and Thacker, 2004, 2007). It adopts a netnographic approach (Kozinets, 2002) to study not only the formal, technological systems of the platform but also the systems as they were made sense of, understood and enacted upon by actors. It relies both on information as revealed by the organisation itself, as well as discussions between lay users in online forums and press coverage.

Findings

The results of this study indicate that the ways in which platforms selectively facilitate interactions between users constitute a form of control. While maintaining the appearance of an open and neutral marketplace, interactions on the platform are in fact highly structured. The system relies on the surveillance of user interactions to rapidly identify and propagate marketable contents, so as to maximise user “engagement” and ad revenue. The systems place few demands or restrictions on individual users, instead control is effected in a probabilistic fashion, over the population of users as a whole, so as to, in aggregate, accomplish organisational goal.

Originality/value

This paper contributes to the literature on accounting and control practices in online spaces, by extending the notion of control beyond overt rankings and evaluations, to the underlying technical and social infrastructures that facilitate and shape interactions.

Details

Qualitative Research in Accounting & Management, vol. 19 no. 3
Type: Research Article
ISSN: 1176-6093

Keywords

Open Access
Article
Publication date: 15 August 2022

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…

6822

Abstract

Purpose

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.

Design/methodology/approach

This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.

Findings

The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.

Originality/value

Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 5 August 2019

Ahmed H. Al-Dmour, Masam Abood and Hani H. Al-Dmour

This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting…

6370

Abstract

Purpose

This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting information system (AIS) were being implemented in Jordanian business organizations.

Design/methodology/approach

The study is based on primary data collected through a structured questionnaire from 239 out of 328 shareholdings companies. The survey units were the shareholding companies in Jordan, and the single key respondents approach was adopted. The extents of SysTrust principles were also measured. Previously validated instruments were used where required. The data were analysed using t-test and ANOVA.

Findings

The results indicated that the extent of SysTrust being implemented could be considered to be moderate at this stage. This implies that there are some variations among business organizations in terms of their level of implementing of SysTrust principles and criteria. The results also showed that the extent of SysTrust principles being implemented was varied among business organizations based on their business sector. However, there were not found varied due to their size of business and a length of time in business (experience).

Research limitations/implications

This study is only conducted in Jordan as a developing country. Although Jordan is a valid indicator of prevalent factors in the wider MENA region and developing countries, the lack of external validity of this research means that any generalization of the research findings should be made with caution. Future research can be orientated to other national and cultural settings and compared with the results of this study.

Practical implications

The study provides evidence of the need for management to recognize the importance of the implementation of SysTrust principles and criteria as an internal control for assuring the reliability of AIS within their organizations and be aware which of these principles are appropriate to their size and industry sector.

Originality/value

The findings would be valuable for academic researchers, managers and professional accounting to acquire a better undemanding of the current status of the implementation of the SysTrust principles (i.e., availability, security, integrity processing, confidentiality, and privacy) as an internal control method for assuring the reliability of AIS by testing the phenomenon in Jordan as a developing country.

Details

International Journal of Accounting & Information Management, vol. 27 no. 3
Type: Research Article
ISSN: 1834-7649

Keywords

Open Access
Article
Publication date: 15 July 2021

Ahlam Ammar Sharif and Andrew Karvonen

Architectural theorists have a long tradition of acknowledging the centrality of building users to architectural production. This article contributes to the discourse on…

Abstract

Purpose

Architectural theorists have a long tradition of acknowledging the centrality of building users to architectural production. This article contributes to the discourse on architecture, actor–network theory (ANT), and users by proposing a typology of user translations ranging from supporting to tinkering to adjusting to resisting.

Design/methodology/approach

The research utilises an ANT-inspired ethnography of sustainable lighting scripts at the Masdar Institute of Science and Technology (MIST). It comprises semi-structured interviews with MIST designers and students, and site visits and participant observation to understand how the users interpret the scripts and how they interact and change them on a daily basis.

Findings

There is a shared understanding that users do not simply receive architectural designs but interpret and change them to suit their preferences. The findings reveal the multiple ways that users interpret and respond to the assumptions of designers and in the process, recast the relations between themselves and their material surroundings.

Originality/value

The research contributes to acknowledging the centrality of users to architectural design processes and the interpretation of design scripts, addressing the limitation in current literature in demonstrating the diversity of ways that users react to such scripts. The research suggests that user actions have significant implications on long-term building performance. It accordingly points to the need for devising multiple means of user involvement in the design process and allowing greater flexibility in design scripts to improve the alignment with user preferences.

Details

Open House International, vol. 46 no. 2
Type: Research Article
ISSN: 0168-2601

Keywords

Open Access
Article
Publication date: 2 May 2019

Minyoung Kwon, Hilde Remøy and Andy Van Den Dobbelsteen

This paper highlights the importance of user satisfaction in office renovation. A user-focussed renovation approach can enhance user satisfaction in offices and their functional…

4693

Abstract

Purpose

This paper highlights the importance of user satisfaction in office renovation. A user-focussed renovation approach can enhance user satisfaction in offices and their functional quality while meeting energy performance goals. The purpose of this paper is to investigate users’ needs and the physical and psychological factors affecting user satisfaction, as input to office renovation projects.

Design/methodology/approach

The selected articles are collected from Scopus, ScienceDirect and Google Scholar. Searching was limited to the main key terms of office, work environment, and user satisfaction and comfort. The important factors were searched through empirical-based international literature mainly. Based hereupon, a guide will be developed for the analysis and evaluation of user satisfaction in office renovations.

Findings

From a comprehensive overview, the findings present ten main factors to increase user satisfaction in office renovation. These are associated with physical and psychological satisfaction and comfort. In addition, the influential factors were categorised into three levels based on needs theories to organise the hierarchy of priorities.

Practical implications

This research adds to the body of knowledge about which factors are important for user satisfaction, based on what previous research has found in that field. This is important to improve the sustainability in use.

Originality/value

User satisfaction is often studied through separate aspects: health and indoor climate vs functionality and productivity. This paper examines overall user satisfaction of workplaces by integrating the perspectives of physical and psychological conditions, and by providing insight into the priority of satisfaction factors.

Details

Property Management, vol. 37 no. 4
Type: Research Article
ISSN: 0263-7472

Keywords

Open Access
Article
Publication date: 16 January 2023

Antaine Stíobhairt, David Staunton and Suzanne Guerin

This paper aims to explore the extent to which principles of recovery-oriented practice are evident in the published perspectives and experiences of health professionals and…

Abstract

Purpose

This paper aims to explore the extent to which principles of recovery-oriented practice are evident in the published perspectives and experiences of health professionals and service users on seclusion in adult mental health services.

Design/methodology/approach

A systematic review informed by PRISMA guidelines was conducted, drawing from four databases, which were searched in August 2018 and August 2022. Only original empirical studies rated as having “major” relevance were included. Data were extracted from 31 studies and qualitatively synthesised through deductive analysis using recovery principles as themes.

Findings

There was limited evidence of perceptions of seclusion being being consistent with recovery principles, with greater evidence of perceptions that directly opposed them. Studies of service user perspectives highlighted this more often than staff perspectives. The findings highlight paradoxical relationships between care and control and conflicting rights and emphasise the need to openly acknowledge the complexity of seclusion and its interface with recovery.

Research limitations/implications

This review was developed in line with international best practice and the protocol was registered. Using a search string with only three components maximised sensitivity during searches and minimised the risk of relevant literature being missed. Limitations include the focus on studies where the full text was published in English.

Originality/value

This review makes a unique contribution, highlighting that, to the best of the authors’ knowledge, no studies to date have explicitly explored the perspectives and experiences of staff and service users on the use of seclusion in the context of recovery-oriented practice. The findings are relevant to clinical practice, policy and future research, including amending procedures and practices to partially reconcile seclusion and recovery where the seclusion is deemed necessary.

Details

Mental Health Review Journal, vol. 28 no. 2
Type: Research Article
ISSN: 1361-9322

Keywords

Open Access
Article
Publication date: 16 April 2024

Daria Arkhipova, Marco Montemari, Chiara Mio and Stefano Marasca

This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The…

Abstract

Purpose

This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The changes the authors are interested in are linked to technology-driven innovations in managerial decision-making and in organizational structures. In addition, the paper highlights research gaps and opportunities for future research.

Design/methodology/approach

The authors adopted a grounded theory literature review method (Wolfswinkel et al., 2013) to achieve the study’s aims.

Findings

The authors identified four research themes that describe the changes in the management accounting profession due to technology-driven innovations: structured vs unstructured data, human vs algorithm-driven decision-making, delineated vs blurred functional boundaries and hierarchical vs platform-based organizations. The authors also identified tensions mentioned in the literature for each research theme.

Originality/value

Previous studies display a rather narrow focus on the role of digital technologies in accounting work and new competences that management accountants require in the digital era. By contrast, the authors focus on the broader technology-driven shifts in organizational processes and structures, which vastly change how accounting information is collected, processed and analyzed internally to support managerial decision-making. Hence, the paper focuses on how management accountants can adapt and evolve as their organizations transition toward a digital environment.

Details

Meditari Accountancy Research, vol. 32 no. 7
Type: Research Article
ISSN: 2049-372X

Keywords

Open Access
Article
Publication date: 13 July 2023

Chong Guan, Ding Ding, Jiancang Guo and Yun Teng

This paper reviews the extant research on Web3.0 published between 2003 and 2022.

2165

Abstract

Purpose

This paper reviews the extant research on Web3.0 published between 2003 and 2022.

Design/methodology/approach

This study uses a topic modeling procedure latent Dirichlet allocation to uncover the research themes and the key phrases associated with each theme.

Findings

This study uncovers seven research themes that have been featured in the existing research. In particular, the study highlights the interaction among the research themes that contribute to the understanding of a number of solutions, applications and use cases, such as metaverse and non-fungible tokens.

Research limitations/implications

Despite the relatively small data size of the study, the results remain significant as they contribute to a more profound comprehension of the relevant field and offer guidance for future research directions. The previous analysis revealed that the current Web3.0 technology is still encountering several challenges. Building upon the pioneering research in the field of blockchain, decentralized networks, smart contracts and algorithms, the study proposes an exploratory agenda for future research from an ecosystem approach, targeting to enhance the current state of affairs.

Originality/value

Although topics around Web3.0 have been discussed intensively among the crypto community and technological enthusiasts, there is limited research that provides a comprehensive description of all the related issues and an in-depth analysis of their real-world implications from an ecosystem perspective.

Details

Journal of Electronic Business & Digital Economics, vol. 2 no. 1
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Article
Publication date: 6 June 2022

Marcia Combs, Casey Hazelwood and Randall Joyce

Digital voice assistants use wake word engines (WWEs) to monitor surrounding audio for detection of the voice assistant's name. There are two failed conditions for a WWE, false…

1055

Abstract

Purpose

Digital voice assistants use wake word engines (WWEs) to monitor surrounding audio for detection of the voice assistant's name. There are two failed conditions for a WWE, false negative and false positive. Wake word false positives threaten a loss of personal privacy because, upon activation, the digital assistant records audio to the voice cloud service for processing.

Design/methodology/approach

This observational study attempted to identify which Amazon Alexa wake word and Amazon Echo smart speaker resulted in the fewest number of human voice false positives. During an eight-week period, false-positive data were collected from four different Amazon Echo smart speakers located in a small apartment with three female roommates.

Findings

Results from this study suggest the number of human voice false positives are related to wake word selection and Amazon Echo hardware. Results from this observational study determined that the wake word Alexa resulted in the fewest number of false positives.

Originality/value

This study suggests Amazon Alexa users can better protect their privacy by selecting Alexa as their wake word and selecting smart speakers with the highest number of microphones in the far-field array with 360-degree geometry.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

1 – 10 of over 8000