Search results

1 – 10 of over 3000
Open Access
Article
Publication date: 13 July 2023

Chong Guan, Ding Ding, Jiancang Guo and Yun Teng

This paper reviews the extant research on Web3.0 published between 2003 and 2022.

2165

Abstract

Purpose

This paper reviews the extant research on Web3.0 published between 2003 and 2022.

Design/methodology/approach

This study uses a topic modeling procedure latent Dirichlet allocation to uncover the research themes and the key phrases associated with each theme.

Findings

This study uncovers seven research themes that have been featured in the existing research. In particular, the study highlights the interaction among the research themes that contribute to the understanding of a number of solutions, applications and use cases, such as metaverse and non-fungible tokens.

Research limitations/implications

Despite the relatively small data size of the study, the results remain significant as they contribute to a more profound comprehension of the relevant field and offer guidance for future research directions. The previous analysis revealed that the current Web3.0 technology is still encountering several challenges. Building upon the pioneering research in the field of blockchain, decentralized networks, smart contracts and algorithms, the study proposes an exploratory agenda for future research from an ecosystem approach, targeting to enhance the current state of affairs.

Originality/value

Although topics around Web3.0 have been discussed intensively among the crypto community and technological enthusiasts, there is limited research that provides a comprehensive description of all the related issues and an in-depth analysis of their real-world implications from an ecosystem perspective.

Details

Journal of Electronic Business & Digital Economics, vol. 2 no. 1
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Book part
Publication date: 16 August 2023

Ian J. Warren and Emma Ryan

This chapter argues that the Americanisation of online policing has questionable impacts in Australian prosecutions involving drugs obtained and distributed through dark web

Abstract

This chapter argues that the Americanisation of online policing has questionable impacts in Australian prosecutions involving drugs obtained and distributed through dark web cryptomarkets. The authors describe several Australian prosecutions of mid- and low-level dealers who have accessed drugs through the dark web and contrast these with the United States (US) case against the cryptomarket, AlphaBay. The discussion in this study emphasises how Australian police and courts view the relative weight of dark web activity associated with the domestic and transnational supply of illicit drugs that result in formal prosecutions. The authors suggest that large-scale forms of online and dark web police surveillance undertaken by US enforcement agencies reflect Ethan Nadelmann’s (Cops across borders: the internationalization of US criminal law enforcement, University Park: Pennsylvania State University Press, 1993) thesis on the Americanisation of global policing through transnational communications networks. The authors then explain how key elements of transnational dark web drug supply appear to have a marginal bearing on criminal investigations into low- and mid-level traffickers in Australia, which rely on conventional surveillance tactics to identify clandestine mail pickups, physical distribution methods, and irregular money trails. However, the authors then illustrate how the Americanisation of online policing that targets high-level entrepreneurs and seeks to dismantle or eliminate dark web cryptomarkets has important implications on Australian reforms aimed at enhancing online surveillance powers to target a range of crimes that are often wrongly associated with illicit drug cryptomarkets. The authors conclude by demonstrating how intensive dark web surveillance has limited direct impact on routine drug policing in Australia, with dark web communications simply another medium for facilitating the physical detection of illicit transnational drug transactions.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Open Access
Book part
Publication date: 16 August 2023

Nicolae Craciunescu and Nigel South

Cryptomarkets or darknet marketplaces host multiple ‘vendors’ selling a variety of illicit products. The most sold and sought products on such markets are illegal drugs. These…

Abstract

Cryptomarkets or darknet marketplaces host multiple ‘vendors’ selling a variety of illicit products. The most sold and sought products on such markets are illegal drugs. These markets use cryptocurrencies as a payment system and provide participants with anonymity through their location on the dark web, and in recent years they have seen continuous growth in revenue and exchange. Existing literature has provided various explanations for this growth, but in 2017 the European Monitoring Centre for Drugs and Drug Addiction and Europol concluded in their 2017 ‘Drugs and the Darknet’ report that current interpretations of trends are not sufficient. This chapter will provide an alternative explanation for this phenomenon by considering web-based drug selling and purchasing in terms of trends towards ‘Uberisation’ and ‘McDonaldisation’ and applying Bourdieu’s concept of cultural capital to the discussion of the dynamic cultures of consumption and different subcultures of the drug world.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Open Access
Article
Publication date: 12 February 2018

Salvatore Monaco

The purpose of this paper is to outline the profile of Italian tourists belonging to the new generations: Millennials or Generation Y (approximately people born in the 1980-1995…

27648

Abstract

Purpose

The purpose of this paper is to outline the profile of Italian tourists belonging to the new generations: Millennials or Generation Y (approximately people born in the 1980-1995 period) and post-Millennials or Generation Z (approximately people born in the 1996-2010 period).

Design/methodology/approach

After reviewing some of the more interesting research on Millennials and post-Millennials, the paper will present the results of an unpublished online empirical survey conducted on a sample of 200 Italian web users who agreed to participate. The questionnaire, administered via computer-assisted web interviewing system, consists of structured questions concerning the practices, attitudes, emerging needs and use of new technologies that characterize Millennials and post-Millennials, with a special focus on tourism.

Findings

The research will consider the differences between the two groups, as well as possible differences within each group linked to other socio-demographic variables (such as gender and area of residence).

Originality/value

The paper addresses a series of innovative questions: what are the practices of Millennials and Post-Millennials as tourists? What are the needs of these generations that the tourist industry must respond to? How do new technologies support Millennials and post-Millennials in their tourism choices? What are the main differences between Millennials and post-Millennials?

Details

Journal of Tourism Futures, vol. 4 no. 1
Type: Research Article
ISSN: 2055-5911

Keywords

Open Access
Article
Publication date: 4 August 2020

Samantha Fritz, Ian Milligan, Nick Ruest and Jimmy Lin

This paper aims to use the experience of an in-person event that was forced to go virtual in the wake of COVID-19 as an entryway into a discussion on the broader implications…

4414

Abstract

Purpose

This paper aims to use the experience of an in-person event that was forced to go virtual in the wake of COVID-19 as an entryway into a discussion on the broader implications around transitioning events online. It gives both practical recommendation to event organizers as well as broader reflections on the role of digital libraries during the COVID-19 pandemic and beyond.

Design/methodology/approach

The authors draw on their personal experiences with the datathon, as well as a comprehensive review of literature. The authors provide a candid assessment of what approaches worked and which ones did not.

Findings

A series of best practices are provided, including factors for assessing whether an event can be run online; the mixture of synchronous versus asynchronous content; and important technical questions around delivery. Focusing on a detailed case study of the shift of the physical team-building exercise, the authors note how cloud-based platforms were able to successfully assemble teams and jumpstart online collaboration. The existing decision to use cloud-based infrastructure facilitated the event’s transition as well. The authors use these examples to provide some broader insights on meaningful content delivery during the COVID-19 pandemic.

Originality/value

Moving an event online during a novel pandemic is part of a broader shift within the digital libraries’ community. This paper thus provides a useful professional resource for others exploring this shift, as well as those exploring new program delivery in the post-pandemic period (both due to an emphasis on climate reduction as well as reduced travel budgets in a potential period of financial austerity).

Details

Digital Library Perspectives, vol. 36 no. 4
Type: Research Article
ISSN: 2059-5816

Keywords

Open Access
Article
Publication date: 20 June 2019

Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li and Guttorm Sindre

Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing…

4310

Abstract

Purpose

Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing digitalisation and coupling between the cyber and physical world, security has become an additional concern in these industries. The purpose of this paper is to evaluate how well bow-tie analysis performs in the context of security, and the study’s hypothesis is that the bow-tie notation has a suitable expressiveness for security and safety.

Design/methodology/approach

This study uses a formal, controlled quasi-experiment on two sample populations – security experts and security graduate students – working on the same case. As a basis for comparison, the authors used a similar experiment with misuse case analysis, a well-known technique for graphical security modelling.

Findings

The results show that the collective group of graduate students, inexperienced in security modelling, perform similarly as security experts in a well-defined scope and familiar target system/situation. The students showed great creativity, covering most of the same threats and consequences as the experts identified and discovering additional ones. One notable difference was that these naïve professionals tend to focus on preventive barriers, leading to requirements for risk mitigation or avoidance, while experienced professionals seem to balance this more with reactive barriers and requirements for incident management.

Originality/value

Our results are useful in areas where we need to evaluate safety and security concerns together, especially for domains that have experience in health, safety and environmental hazards, but now need to expand this with cybersecurity as well.

Details

Information & Computer Security, vol. 27 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 23 November 2023

Chetana Balakrishna Maddodi and Pallavi Upadhyaya

The purpose of this study is to review and synthesize the literature on in-app advertising, identify gaps and propose future research directions.

Abstract

Purpose

The purpose of this study is to review and synthesize the literature on in-app advertising, identify gaps and propose future research directions.

Design/methodology/approach

The authors use a systematic literature review (SLR) approach, following the PRISMA guidelines, to investigate the current state of research in in-app advertising. The study uses 44 shortlisted articles from the Scopus and Web of Science databases. Using the Theory-Context-Characteristics-Methodology (TCCM) framework, the authors analyze the gaps in theory, context, characteristics and methods.

Findings

Using thematic analysis, the authors identify five main themes in the in-app advertising literature, namely, ad platform optimization; mobile app user psychology and behavior; ad effectiveness; ad fraud; and security, privacy and other user concerns. The findings show the need for empirical research, with a strong theoretical foundation in emerging ad formats of in-app advertising, user behavior and buy-side of in-app advertising.

Originality/value

This is a maiden study to conduct a domain-based SLR in the emerging field of in-app advertising using the TCCM framework. The authors highlight the key differences between in-app advertising and mobile web advertising. The authors propose theories in the advertising field that could be used in future empirical studies of in-app advertising.

Propósito

El propósito de esta investigación es revisar y sintetizar la literatura sobre la publicidad en Apps, identificar lagunas y proponer futuras direcciones de investigación.

Diseño

Utilizamos un enfoque de revisión sistemática de la literatura, siguiendo las directrices PRISMA, para investigar el estado actual de la investigación en publicidad en aplicaciones. El estudio utiliza 44 artículos preseleccionados de las bases de datos Scopus y Web of Science (WoS). Utilizando el marco Teoría-Contexto-Características-Metodología (TCCM), analizamos las lagunas en teoría, contexto, características y métodos.

Conclusiones

Mediante un análisis temático, identificamos cinco temas principales en la literatura sobre publicidad en aplicaciones, a saber: optimización de plataformas publicitarias; psicología y comportamiento de los usuarios de aplicaciones móviles; eficacia publicitaria; fraude publicitario; seguridad, privacidad y otras preocupaciones de los usuarios. Nuestros hallazgos muestran la necesidad de investigación empírica, con una sólida base teórica en los formatos publicitarios emergentes de la publicidad en Apps, el comportamiento del usuario y el buy-side de la publicidad en Apps.

Originalidad

Se trata de un estudio pionero para realizar una revisión sistemática de la literatura basada en el dominio en el campo emergente de la publicidad en Apps utilizando el marco TCCM. Destacamos las principales diferencias entre la publicidad en aplicaciones y la publicidad en la web para móviles. Proponemos teorías en el campo de la publicidad que podrían utilizarse en futuros estudios empíricos sobre la publicidad en Apps.

目的

本研究旨在回顾和总结有关应用内广告的文献, 找出差距并提出未来的研究方向。

设计

我们采用系统性文献综述方法, 遵循 PRISMA 指南, 调查应用内广告的研究现状。研究使用了 Scopus 和 Web of Science (WoS) 数据库中的 44 篇入围文章。利用理论-背景-特征-方法(TCCM)框架, 我们分析了理论、背景、特征和方法方面的差距。

研究结果

通过主题分析, 我们确定了应用内广告文献的五大主题, 即广告平台优化; 移动应用用户心理和行为; 广告效果; 广告欺诈; 安全、隐私和其他用户关注点。我们的研究结果表明, 有必要在应用内广告的新兴广告形式、用户行为和应用内广告买方等方面开展实证研究, 并奠定坚实的理论基础。

独创性

这是一项首次使用 TCCM 框架对新兴的应用内广告领域进行基于领域的系统性文献综述的研究。我们强调了应用内广告与移动网络广告的主要区别。我们提出了广告领域的理论, 可用于未来的应用内广告实证研究。

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Open Access
Article
Publication date: 21 April 2022

George Nel and Roelof Baard

The aim of this study was threefold: to examine companies' e-mail handling performance, to ascertain whether companies' view corporate websites and respond to e-mail requests as…

Abstract

Purpose

The aim of this study was threefold: to examine companies' e-mail handling performance, to ascertain whether companies' view corporate websites and respond to e-mail requests as mutually exclusive or complementary, and finally to gauge the strategic importance of retail investors.

Design/methodology/approach

The findings are based on an analysis of the corporate websites and e-mail handling performance of the 77 smallest companies listed on a South African stock exchange. A “mystery investor” approach was employed to measure companies' e-mail handling performance in terms of responsiveness, timeliness and relevance of responses. A disclosure score was calculated for each company based on a content analysis of corporate websites.

Findings

The opportunity for improvement exists, as evidenced in the fact that only 53% of companies responded to an e-mail request from a retail investor. The results suggest that corporate websites and the e-mail functionality are not used in isolation but as complementary. Although the results suggest that companies neglect retail investors, companies that provided a dedicated investor relations (IR) contact address prioritised both their corporate websites aimed to a wide range of stakeholders, as well as responding to an e-mail request received from a retail investor.

Originality/value

This study contributes to research on the association between one-way and two-way communication channels, aimed at retail investors. It is the first study to explore these relationships using data from the smallest companies listed on the stock exchange of an emerging economy.

Details

Corporate Communications: An International Journal, vol. 27 no. 5
Type: Research Article
ISSN: 1356-3289

Keywords

Open Access
Article
Publication date: 20 July 2020

Abdelghani Bakhtouchi

With the progress of new technologies of information and communication, more and more producers of data exist. On the other hand, the web forms a huge support of all these kinds…

1847

Abstract

With the progress of new technologies of information and communication, more and more producers of data exist. On the other hand, the web forms a huge support of all these kinds of data. Unfortunately, existing data is not proper due to the existence of the same information in different sources, as well as erroneous and incomplete data. The aim of data integration systems is to offer to a user a unique interface to query a number of sources. A key challenge of such systems is to deal with conflicting information from the same source or from different sources. We present, in this paper, the resolution of conflict at the instance level into two stages: references reconciliation and data fusion. The reference reconciliation methods seek to decide if two data descriptions are references to the same entity in reality. We define the principles of reconciliation method then we distinguish the methods of reference reconciliation, first on how to use the descriptions of references, then the way to acquire knowledge. We finish this section by discussing some current data reconciliation issues that are the subject of current research. Data fusion in turn, has the objective to merge duplicates into a single representation while resolving conflicts between the data. We define first the conflicts classification, the strategies for dealing with conflicts and the implementing conflict management strategies. We present then, the relational operators and data fusion techniques. Likewise, we finish this section by discussing some current data fusion issues that are the subject of current research.

Details

Applied Computing and Informatics, vol. 18 no. 3/4
Type: Research Article
ISSN: 2634-1964

Keywords

1 – 10 of over 3000