Search results
1 – 10 of over 3000Chong Guan, Ding Ding, Jiancang Guo and Yun Teng
This paper reviews the extant research on Web3.0 published between 2003 and 2022.
Abstract
Purpose
This paper reviews the extant research on Web3.0 published between 2003 and 2022.
Design/methodology/approach
This study uses a topic modeling procedure latent Dirichlet allocation to uncover the research themes and the key phrases associated with each theme.
Findings
This study uncovers seven research themes that have been featured in the existing research. In particular, the study highlights the interaction among the research themes that contribute to the understanding of a number of solutions, applications and use cases, such as metaverse and non-fungible tokens.
Research limitations/implications
Despite the relatively small data size of the study, the results remain significant as they contribute to a more profound comprehension of the relevant field and offer guidance for future research directions. The previous analysis revealed that the current Web3.0 technology is still encountering several challenges. Building upon the pioneering research in the field of blockchain, decentralized networks, smart contracts and algorithms, the study proposes an exploratory agenda for future research from an ecosystem approach, targeting to enhance the current state of affairs.
Originality/value
Although topics around Web3.0 have been discussed intensively among the crypto community and technological enthusiasts, there is limited research that provides a comprehensive description of all the related issues and an in-depth analysis of their real-world implications from an ecosystem perspective.
Details
Keywords
This chapter argues that the Americanisation of online policing has questionable impacts in Australian prosecutions involving drugs obtained and distributed through dark web…
Abstract
This chapter argues that the Americanisation of online policing has questionable impacts in Australian prosecutions involving drugs obtained and distributed through dark web cryptomarkets. The authors describe several Australian prosecutions of mid- and low-level dealers who have accessed drugs through the dark web and contrast these with the United States (US) case against the cryptomarket, AlphaBay. The discussion in this study emphasises how Australian police and courts view the relative weight of dark web activity associated with the domestic and transnational supply of illicit drugs that result in formal prosecutions. The authors suggest that large-scale forms of online and dark web police surveillance undertaken by US enforcement agencies reflect Ethan Nadelmann’s (Cops across borders: the internationalization of US criminal law enforcement, University Park: Pennsylvania State University Press, 1993) thesis on the Americanisation of global policing through transnational communications networks. The authors then explain how key elements of transnational dark web drug supply appear to have a marginal bearing on criminal investigations into low- and mid-level traffickers in Australia, which rely on conventional surveillance tactics to identify clandestine mail pickups, physical distribution methods, and irregular money trails. However, the authors then illustrate how the Americanisation of online policing that targets high-level entrepreneurs and seeks to dismantle or eliminate dark web cryptomarkets has important implications on Australian reforms aimed at enhancing online surveillance powers to target a range of crimes that are often wrongly associated with illicit drug cryptomarkets. The authors conclude by demonstrating how intensive dark web surveillance has limited direct impact on routine drug policing in Australia, with dark web communications simply another medium for facilitating the physical detection of illicit transnational drug transactions.
Details
Keywords
Nicolae Craciunescu and Nigel South
Cryptomarkets or darknet marketplaces host multiple ‘vendors’ selling a variety of illicit products. The most sold and sought products on such markets are illegal drugs. These…
Abstract
Cryptomarkets or darknet marketplaces host multiple ‘vendors’ selling a variety of illicit products. The most sold and sought products on such markets are illegal drugs. These markets use cryptocurrencies as a payment system and provide participants with anonymity through their location on the dark web, and in recent years they have seen continuous growth in revenue and exchange. Existing literature has provided various explanations for this growth, but in 2017 the European Monitoring Centre for Drugs and Drug Addiction and Europol concluded in their 2017 ‘Drugs and the Darknet’ report that current interpretations of trends are not sufficient. This chapter will provide an alternative explanation for this phenomenon by considering web-based drug selling and purchasing in terms of trends towards ‘Uberisation’ and ‘McDonaldisation’ and applying Bourdieu’s concept of cultural capital to the discussion of the dynamic cultures of consumption and different subcultures of the drug world.
Details
Keywords
The purpose of this paper is to outline the profile of Italian tourists belonging to the new generations: Millennials or Generation Y (approximately people born in the 1980-1995…
Abstract
Purpose
The purpose of this paper is to outline the profile of Italian tourists belonging to the new generations: Millennials or Generation Y (approximately people born in the 1980-1995 period) and post-Millennials or Generation Z (approximately people born in the 1996-2010 period).
Design/methodology/approach
After reviewing some of the more interesting research on Millennials and post-Millennials, the paper will present the results of an unpublished online empirical survey conducted on a sample of 200 Italian web users who agreed to participate. The questionnaire, administered via computer-assisted web interviewing system, consists of structured questions concerning the practices, attitudes, emerging needs and use of new technologies that characterize Millennials and post-Millennials, with a special focus on tourism.
Findings
The research will consider the differences between the two groups, as well as possible differences within each group linked to other socio-demographic variables (such as gender and area of residence).
Originality/value
The paper addresses a series of innovative questions: what are the practices of Millennials and Post-Millennials as tourists? What are the needs of these generations that the tourist industry must respond to? How do new technologies support Millennials and post-Millennials in their tourism choices? What are the main differences between Millennials and post-Millennials?
Details
Keywords
Samantha Fritz, Ian Milligan, Nick Ruest and Jimmy Lin
This paper aims to use the experience of an in-person event that was forced to go virtual in the wake of COVID-19 as an entryway into a discussion on the broader implications…
Abstract
Purpose
This paper aims to use the experience of an in-person event that was forced to go virtual in the wake of COVID-19 as an entryway into a discussion on the broader implications around transitioning events online. It gives both practical recommendation to event organizers as well as broader reflections on the role of digital libraries during the COVID-19 pandemic and beyond.
Design/methodology/approach
The authors draw on their personal experiences with the datathon, as well as a comprehensive review of literature. The authors provide a candid assessment of what approaches worked and which ones did not.
Findings
A series of best practices are provided, including factors for assessing whether an event can be run online; the mixture of synchronous versus asynchronous content; and important technical questions around delivery. Focusing on a detailed case study of the shift of the physical team-building exercise, the authors note how cloud-based platforms were able to successfully assemble teams and jumpstart online collaboration. The existing decision to use cloud-based infrastructure facilitated the event’s transition as well. The authors use these examples to provide some broader insights on meaningful content delivery during the COVID-19 pandemic.
Originality/value
Moving an event online during a novel pandemic is part of a broader shift within the digital libraries’ community. This paper thus provides a useful professional resource for others exploring this shift, as well as those exploring new program delivery in the post-pandemic period (both due to an emphasis on climate reduction as well as reduced travel budgets in a potential period of financial austerity).
Details
Keywords
Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li and Guttorm Sindre
Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing…
Abstract
Purpose
Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing digitalisation and coupling between the cyber and physical world, security has become an additional concern in these industries. The purpose of this paper is to evaluate how well bow-tie analysis performs in the context of security, and the study’s hypothesis is that the bow-tie notation has a suitable expressiveness for security and safety.
Design/methodology/approach
This study uses a formal, controlled quasi-experiment on two sample populations – security experts and security graduate students – working on the same case. As a basis for comparison, the authors used a similar experiment with misuse case analysis, a well-known technique for graphical security modelling.
Findings
The results show that the collective group of graduate students, inexperienced in security modelling, perform similarly as security experts in a well-defined scope and familiar target system/situation. The students showed great creativity, covering most of the same threats and consequences as the experts identified and discovering additional ones. One notable difference was that these naïve professionals tend to focus on preventive barriers, leading to requirements for risk mitigation or avoidance, while experienced professionals seem to balance this more with reactive barriers and requirements for incident management.
Originality/value
Our results are useful in areas where we need to evaluate safety and security concerns together, especially for domains that have experience in health, safety and environmental hazards, but now need to expand this with cybersecurity as well.
Details
Keywords
Chetana Balakrishna Maddodi and Pallavi Upadhyaya
The purpose of this study is to review and synthesize the literature on in-app advertising, identify gaps and propose future research directions.
Abstract
Purpose
The purpose of this study is to review and synthesize the literature on in-app advertising, identify gaps and propose future research directions.
Design/methodology/approach
The authors use a systematic literature review (SLR) approach, following the PRISMA guidelines, to investigate the current state of research in in-app advertising. The study uses 44 shortlisted articles from the Scopus and Web of Science databases. Using the Theory-Context-Characteristics-Methodology (TCCM) framework, the authors analyze the gaps in theory, context, characteristics and methods.
Findings
Using thematic analysis, the authors identify five main themes in the in-app advertising literature, namely, ad platform optimization; mobile app user psychology and behavior; ad effectiveness; ad fraud; and security, privacy and other user concerns. The findings show the need for empirical research, with a strong theoretical foundation in emerging ad formats of in-app advertising, user behavior and buy-side of in-app advertising.
Originality/value
This is a maiden study to conduct a domain-based SLR in the emerging field of in-app advertising using the TCCM framework. The authors highlight the key differences between in-app advertising and mobile web advertising. The authors propose theories in the advertising field that could be used in future empirical studies of in-app advertising.
Propósito
El propósito de esta investigación es revisar y sintetizar la literatura sobre la publicidad en Apps, identificar lagunas y proponer futuras direcciones de investigación.
Diseño
Utilizamos un enfoque de revisión sistemática de la literatura, siguiendo las directrices PRISMA, para investigar el estado actual de la investigación en publicidad en aplicaciones. El estudio utiliza 44 artículos preseleccionados de las bases de datos Scopus y Web of Science (WoS). Utilizando el marco Teoría-Contexto-Características-Metodología (TCCM), analizamos las lagunas en teoría, contexto, características y métodos.
Conclusiones
Mediante un análisis temático, identificamos cinco temas principales en la literatura sobre publicidad en aplicaciones, a saber: optimización de plataformas publicitarias; psicología y comportamiento de los usuarios de aplicaciones móviles; eficacia publicitaria; fraude publicitario; seguridad, privacidad y otras preocupaciones de los usuarios. Nuestros hallazgos muestran la necesidad de investigación empírica, con una sólida base teórica en los formatos publicitarios emergentes de la publicidad en Apps, el comportamiento del usuario y el buy-side de la publicidad en Apps.
Originalidad
Se trata de un estudio pionero para realizar una revisión sistemática de la literatura basada en el dominio en el campo emergente de la publicidad en Apps utilizando el marco TCCM. Destacamos las principales diferencias entre la publicidad en aplicaciones y la publicidad en la web para móviles. Proponemos teorías en el campo de la publicidad que podrían utilizarse en futuros estudios empíricos sobre la publicidad en Apps.
目的
本研究旨在回顾和总结有关应用内广告的文献, 找出差距并提出未来的研究方向。
设计
我们采用系统性文献综述方法, 遵循 PRISMA 指南, 调查应用内广告的研究现状。研究使用了 Scopus 和 Web of Science (WoS) 数据库中的 44 篇入围文章。利用理论-背景-特征-方法(TCCM)框架, 我们分析了理论、背景、特征和方法方面的差距。
研究结果
通过主题分析, 我们确定了应用内广告文献的五大主题, 即广告平台优化; 移动应用用户心理和行为; 广告效果; 广告欺诈; 安全、隐私和其他用户关注点。我们的研究结果表明, 有必要在应用内广告的新兴广告形式、用户行为和应用内广告买方等方面开展实证研究, 并奠定坚实的理论基础。
独创性
这是一项首次使用 TCCM 框架对新兴的应用内广告领域进行基于领域的系统性文献综述的研究。我们强调了应用内广告与移动网络广告的主要区别。我们提出了广告领域的理论, 可用于未来的应用内广告实证研究。
Details
Keywords
The aim of this study was threefold: to examine companies' e-mail handling performance, to ascertain whether companies' view corporate websites and respond to e-mail requests as…
Abstract
Purpose
The aim of this study was threefold: to examine companies' e-mail handling performance, to ascertain whether companies' view corporate websites and respond to e-mail requests as mutually exclusive or complementary, and finally to gauge the strategic importance of retail investors.
Design/methodology/approach
The findings are based on an analysis of the corporate websites and e-mail handling performance of the 77 smallest companies listed on a South African stock exchange. A “mystery investor” approach was employed to measure companies' e-mail handling performance in terms of responsiveness, timeliness and relevance of responses. A disclosure score was calculated for each company based on a content analysis of corporate websites.
Findings
The opportunity for improvement exists, as evidenced in the fact that only 53% of companies responded to an e-mail request from a retail investor. The results suggest that corporate websites and the e-mail functionality are not used in isolation but as complementary. Although the results suggest that companies neglect retail investors, companies that provided a dedicated investor relations (IR) contact address prioritised both their corporate websites aimed to a wide range of stakeholders, as well as responding to an e-mail request received from a retail investor.
Originality/value
This study contributes to research on the association between one-way and two-way communication channels, aimed at retail investors. It is the first study to explore these relationships using data from the smallest companies listed on the stock exchange of an emerging economy.
Details
Keywords
With the progress of new technologies of information and communication, more and more producers of data exist. On the other hand, the web forms a huge support of all these kinds…
Abstract
With the progress of new technologies of information and communication, more and more producers of data exist. On the other hand, the web forms a huge support of all these kinds of data. Unfortunately, existing data is not proper due to the existence of the same information in different sources, as well as erroneous and incomplete data. The aim of data integration systems is to offer to a user a unique interface to query a number of sources. A key challenge of such systems is to deal with conflicting information from the same source or from different sources. We present, in this paper, the resolution of conflict at the instance level into two stages: references reconciliation and data fusion. The reference reconciliation methods seek to decide if two data descriptions are references to the same entity in reality. We define the principles of reconciliation method then we distinguish the methods of reference reconciliation, first on how to use the descriptions of references, then the way to acquire knowledge. We finish this section by discussing some current data reconciliation issues that are the subject of current research. Data fusion in turn, has the objective to merge duplicates into a single representation while resolving conflicts between the data. We define first the conflicts classification, the strategies for dealing with conflicts and the implementing conflict management strategies. We present then, the relational operators and data fusion techniques. Likewise, we finish this section by discussing some current data fusion issues that are the subject of current research.
Details