Search results
1 – 10 of over 8000Christine Prince, Nessrine Omrani and Francesco Schiavone
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…
Abstract
Purpose
Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.
Design/methodology/approach
An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.
Findings
The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.
Originality/value
While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.
Details
Keywords
This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.
Abstract
Purpose
This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.
Design/methodology/approach
This paper conceptualises algorithmic systems as protocols – technological and social infrastructures that both facilitate and govern interactions between autonomous actors (Galloway and Thacker, 2004, 2007). It adopts a netnographic approach (Kozinets, 2002) to study not only the formal, technological systems of the platform but also the systems as they were made sense of, understood and enacted upon by actors. It relies both on information as revealed by the organisation itself, as well as discussions between lay users in online forums and press coverage.
Findings
The results of this study indicate that the ways in which platforms selectively facilitate interactions between users constitute a form of control. While maintaining the appearance of an open and neutral marketplace, interactions on the platform are in fact highly structured. The system relies on the surveillance of user interactions to rapidly identify and propagate marketable contents, so as to maximise user “engagement” and ad revenue. The systems place few demands or restrictions on individual users, instead control is effected in a probabilistic fashion, over the population of users as a whole, so as to, in aggregate, accomplish organisational goal.
Originality/value
This paper contributes to the literature on accounting and control practices in online spaces, by extending the notion of control beyond overt rankings and evaluations, to the underlying technical and social infrastructures that facilitate and shape interactions.
Details
Keywords
Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng
Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…
Abstract
Purpose
Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.
Design/methodology/approach
This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.
Findings
The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.
Originality/value
Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.
Details
Keywords
Ahmed H. Al-Dmour, Masam Abood and Hani H. Al-Dmour
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting…
Abstract
Purpose
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting information system (AIS) were being implemented in Jordanian business organizations.
Design/methodology/approach
The study is based on primary data collected through a structured questionnaire from 239 out of 328 shareholdings companies. The survey units were the shareholding companies in Jordan, and the single key respondents approach was adopted. The extents of SysTrust principles were also measured. Previously validated instruments were used where required. The data were analysed using t-test and ANOVA.
Findings
The results indicated that the extent of SysTrust being implemented could be considered to be moderate at this stage. This implies that there are some variations among business organizations in terms of their level of implementing of SysTrust principles and criteria. The results also showed that the extent of SysTrust principles being implemented was varied among business organizations based on their business sector. However, there were not found varied due to their size of business and a length of time in business (experience).
Research limitations/implications
This study is only conducted in Jordan as a developing country. Although Jordan is a valid indicator of prevalent factors in the wider MENA region and developing countries, the lack of external validity of this research means that any generalization of the research findings should be made with caution. Future research can be orientated to other national and cultural settings and compared with the results of this study.
Practical implications
The study provides evidence of the need for management to recognize the importance of the implementation of SysTrust principles and criteria as an internal control for assuring the reliability of AIS within their organizations and be aware which of these principles are appropriate to their size and industry sector.
Originality/value
The findings would be valuable for academic researchers, managers and professional accounting to acquire a better undemanding of the current status of the implementation of the SysTrust principles (i.e., availability, security, integrity processing, confidentiality, and privacy) as an internal control method for assuring the reliability of AIS by testing the phenomenon in Jordan as a developing country.
Details
Keywords
Ahlam Ammar Sharif and Andrew Karvonen
Architectural theorists have a long tradition of acknowledging the centrality of building users to architectural production. This article contributes to the discourse on…
Abstract
Purpose
Architectural theorists have a long tradition of acknowledging the centrality of building users to architectural production. This article contributes to the discourse on architecture, actor–network theory (ANT), and users by proposing a typology of user translations ranging from supporting to tinkering to adjusting to resisting.
Design/methodology/approach
The research utilises an ANT-inspired ethnography of sustainable lighting scripts at the Masdar Institute of Science and Technology (MIST). It comprises semi-structured interviews with MIST designers and students, and site visits and participant observation to understand how the users interpret the scripts and how they interact and change them on a daily basis.
Findings
There is a shared understanding that users do not simply receive architectural designs but interpret and change them to suit their preferences. The findings reveal the multiple ways that users interpret and respond to the assumptions of designers and in the process, recast the relations between themselves and their material surroundings.
Originality/value
The research contributes to acknowledging the centrality of users to architectural design processes and the interpretation of design scripts, addressing the limitation in current literature in demonstrating the diversity of ways that users react to such scripts. The research suggests that user actions have significant implications on long-term building performance. It accordingly points to the need for devising multiple means of user involvement in the design process and allowing greater flexibility in design scripts to improve the alignment with user preferences.
Details
Keywords
Minyoung Kwon, Hilde Remøy and Andy Van Den Dobbelsteen
This paper highlights the importance of user satisfaction in office renovation. A user-focussed renovation approach can enhance user satisfaction in offices and their functional…
Abstract
Purpose
This paper highlights the importance of user satisfaction in office renovation. A user-focussed renovation approach can enhance user satisfaction in offices and their functional quality while meeting energy performance goals. The purpose of this paper is to investigate users’ needs and the physical and psychological factors affecting user satisfaction, as input to office renovation projects.
Design/methodology/approach
The selected articles are collected from Scopus, ScienceDirect and Google Scholar. Searching was limited to the main key terms of office, work environment, and user satisfaction and comfort. The important factors were searched through empirical-based international literature mainly. Based hereupon, a guide will be developed for the analysis and evaluation of user satisfaction in office renovations.
Findings
From a comprehensive overview, the findings present ten main factors to increase user satisfaction in office renovation. These are associated with physical and psychological satisfaction and comfort. In addition, the influential factors were categorised into three levels based on needs theories to organise the hierarchy of priorities.
Practical implications
This research adds to the body of knowledge about which factors are important for user satisfaction, based on what previous research has found in that field. This is important to improve the sustainability in use.
Originality/value
User satisfaction is often studied through separate aspects: health and indoor climate vs functionality and productivity. This paper examines overall user satisfaction of workplaces by integrating the perspectives of physical and psychological conditions, and by providing insight into the priority of satisfaction factors.
Details
Keywords
Antaine Stíobhairt, David Staunton and Suzanne Guerin
This paper aims to explore the extent to which principles of recovery-oriented practice are evident in the published perspectives and experiences of health professionals and…
Abstract
Purpose
This paper aims to explore the extent to which principles of recovery-oriented practice are evident in the published perspectives and experiences of health professionals and service users on seclusion in adult mental health services.
Design/methodology/approach
A systematic review informed by PRISMA guidelines was conducted, drawing from four databases, which were searched in August 2018 and August 2022. Only original empirical studies rated as having “major” relevance were included. Data were extracted from 31 studies and qualitatively synthesised through deductive analysis using recovery principles as themes.
Findings
There was limited evidence of perceptions of seclusion being being consistent with recovery principles, with greater evidence of perceptions that directly opposed them. Studies of service user perspectives highlighted this more often than staff perspectives. The findings highlight paradoxical relationships between care and control and conflicting rights and emphasise the need to openly acknowledge the complexity of seclusion and its interface with recovery.
Research limitations/implications
This review was developed in line with international best practice and the protocol was registered. Using a search string with only three components maximised sensitivity during searches and minimised the risk of relevant literature being missed. Limitations include the focus on studies where the full text was published in English.
Originality/value
This review makes a unique contribution, highlighting that, to the best of the authors’ knowledge, no studies to date have explicitly explored the perspectives and experiences of staff and service users on the use of seclusion in the context of recovery-oriented practice. The findings are relevant to clinical practice, policy and future research, including amending procedures and practices to partially reconcile seclusion and recovery where the seclusion is deemed necessary.
Details
Keywords
Daria Arkhipova, Marco Montemari, Chiara Mio and Stefano Marasca
This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The…
Abstract
Purpose
This paper aims to critically examine the accounting and information systems literature to understand the changes that are occurring in the management accounting profession. The changes the authors are interested in are linked to technology-driven innovations in managerial decision-making and in organizational structures. In addition, the paper highlights research gaps and opportunities for future research.
Design/methodology/approach
The authors adopted a grounded theory literature review method (Wolfswinkel et al., 2013) to achieve the study’s aims.
Findings
The authors identified four research themes that describe the changes in the management accounting profession due to technology-driven innovations: structured vs unstructured data, human vs algorithm-driven decision-making, delineated vs blurred functional boundaries and hierarchical vs platform-based organizations. The authors also identified tensions mentioned in the literature for each research theme.
Originality/value
Previous studies display a rather narrow focus on the role of digital technologies in accounting work and new competences that management accountants require in the digital era. By contrast, the authors focus on the broader technology-driven shifts in organizational processes and structures, which vastly change how accounting information is collected, processed and analyzed internally to support managerial decision-making. Hence, the paper focuses on how management accountants can adapt and evolve as their organizations transition toward a digital environment.
Details
Keywords
Chong Guan, Ding Ding, Jiancang Guo and Yun Teng
This paper reviews the extant research on Web3.0 published between 2003 and 2022.
Abstract
Purpose
This paper reviews the extant research on Web3.0 published between 2003 and 2022.
Design/methodology/approach
This study uses a topic modeling procedure latent Dirichlet allocation to uncover the research themes and the key phrases associated with each theme.
Findings
This study uncovers seven research themes that have been featured in the existing research. In particular, the study highlights the interaction among the research themes that contribute to the understanding of a number of solutions, applications and use cases, such as metaverse and non-fungible tokens.
Research limitations/implications
Despite the relatively small data size of the study, the results remain significant as they contribute to a more profound comprehension of the relevant field and offer guidance for future research directions. The previous analysis revealed that the current Web3.0 technology is still encountering several challenges. Building upon the pioneering research in the field of blockchain, decentralized networks, smart contracts and algorithms, the study proposes an exploratory agenda for future research from an ecosystem approach, targeting to enhance the current state of affairs.
Originality/value
Although topics around Web3.0 have been discussed intensively among the crypto community and technological enthusiasts, there is limited research that provides a comprehensive description of all the related issues and an in-depth analysis of their real-world implications from an ecosystem perspective.
Details
Keywords
Marcia Combs, Casey Hazelwood and Randall Joyce
Digital voice assistants use wake word engines (WWEs) to monitor surrounding audio for detection of the voice assistant's name. There are two failed conditions for a WWE, false…
Abstract
Purpose
Digital voice assistants use wake word engines (WWEs) to monitor surrounding audio for detection of the voice assistant's name. There are two failed conditions for a WWE, false negative and false positive. Wake word false positives threaten a loss of personal privacy because, upon activation, the digital assistant records audio to the voice cloud service for processing.
Design/methodology/approach
This observational study attempted to identify which Amazon Alexa wake word and Amazon Echo smart speaker resulted in the fewest number of human voice false positives. During an eight-week period, false-positive data were collected from four different Amazon Echo smart speakers located in a small apartment with three female roommates.
Findings
Results from this study suggest the number of human voice false positives are related to wake word selection and Amazon Echo hardware. Results from this observational study determined that the wake word Alexa resulted in the fewest number of false positives.
Originality/value
This study suggests Amazon Alexa users can better protect their privacy by selecting Alexa as their wake word and selecting smart speakers with the highest number of microphones in the far-field array with 360-degree geometry.
Details