Search results

1 – 10 of 134
Article
Publication date: 23 November 2012

Noa Aharony

The study aims to explore WikiLeaks' worldwide impact amongst readers of three online newspapers, as expressed through reader comments. There are three primary research questions…

Abstract

Purpose

The study aims to explore WikiLeaks' worldwide impact amongst readers of three online newspapers, as expressed through reader comments. There are three primary research questions: are there differences between the three online newspapers concerning the factual information in the comments, the linguistic characteristics of the comments, and the rhetorical and style elements of the comments?

Design/methodology/approach

The study focused on three online newspapers: The New York Times in the USA, The Guardian in the UK and Ynet in Israel, all popular channels of communication in their countries. The researcher examined the comments relating to WikiLeaks and conducted a content analysis on a sample of the comments.

Findings

The main findings suggest that most of the comments were written in an emotional style and with pathos. However there are major differences between comments written to The New York Times and to Ynet.

Research limitations/implications

This research is limited by the extent to which it can be generalised, as it focuses only on WikiLeaks comments written before 1 December 2010.

Originality/value

This paper is the first known exhaustive study that concentrates on WikiLeaks comments. The research findings may encourage further exploration into the nature of the relationship between media texts and reactions to them.

Details

Online Information Review, vol. 36 no. 6
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 9 August 2011

Alex M. Andrew

The purpose of this paper is to review developments on the internet, especially those of general cybernetic interest.

264

Abstract

Purpose

The purpose of this paper is to review developments on the internet, especially those of general cybernetic interest.

Design/methodology/approach

The need to reduce carbon emissions on account of the atmospheric greenhouse effect has recently been queried, but observations of effects on the oceans confirm its continuing importance. A means of viewing new buildings in the Massachusetts Institute of Technology, the site of origin of much of cybernetics, is indicated, as is also a remarkable development of an advanced prosthetic device. Sources of information about the recent WikiLeaks or “Cablegate” events are reviewed.

Findings

Effects of acidification on ocean biota are serious. New buildings on the MIT campus are not following the example of the bizarre Stata Center. The robotic exoskeleton is a valuable development made under unusual conditions. No attempt is made to judge ethics or long‐term effects of WikiLeaks activity but it is shown to be wide ranging and to be defended eloquently by its main operative.

Practical implications

The need to reduce carbon emissions is confirmed by studies of the oceans, probably among other factors. The exoskeleton development is a valuable addition to prosthetic technology as well as an example of what can be done with limited resources.

Originality/value

It is hoped this is a valuable periodic review.

Details

Kybernetes, vol. 40 no. 7/8
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 25 May 2023

Emanuel G. Boussios

The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western…

Abstract

Purpose

The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western governments. This research primarily focuses on such practices of the US Government.

Design/methodology/approach

This work is designed as a case study research of cybersecurity whistleblowers or leakers on Western governments, involving data collection from primary and secondary sources. The method is a content analysis to determine the presence of certain themes within this primary and secondary data which this research can then make inferences about the messages within the texts.

Findings

The findings show a formation of a recent class of power brokers, with its own collective ethos, who will be known by a new term: the “New Knowledge Cyberclass” (NKC). The development of the NKC was revealed through the shocking data revelations by Edward Snowden, Julian Assange and Chelsea Manning. What separates the NKC from government “protectors” (i.e. President Obama, Central Intelligence Agency Director Mike Pompeo), who argue that these leakers stole and leaked classified documents that endangered lives, is their definitions of what it means to be defenders of democracy, which here pertains to the rights to citizens’ online privacy and the degree of secrecy in US Government.

Originality/value

To the best of the author’s knowledge, this is the first study directed toward connecting, Snowden, Assange and Manning, to the birth of a new class of power brokers designed to directly challenge Western government malpractices with citizens’ online privacy and secrecy in foreign operations. This research explores both the birth of this new class and a collective ethos that binds this group together despite the tensions and conflicts within this new class.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 4
Type: Research Article
ISSN: 2398-5038

Keywords

Content available
Article
Publication date: 20 September 2011

Steve Evans

1050

Abstract

Details

Accounting, Auditing & Accountability Journal, vol. 24 no. 7
Type: Research Article
ISSN: 0951-3574

Article
Publication date: 5 May 2015

Jeffrey Simser

This paper aims to explore the challenge posed by Bitcoin to regulators, particularly anti-money laundering regulators. Bitcoin is a crypto-currency based on open-source software…

4199

Abstract

Purpose

This paper aims to explore the challenge posed by Bitcoin to regulators, particularly anti-money laundering regulators. Bitcoin is a crypto-currency based on open-source software and protocols that operates in peer-to-peer networks as a private irreversible payment mechanism. The protocol allows cross-border payments, for large and small items, with little or no transactional costs.

Design/methodology/approach

Case studies and case law are examined as are relevant reports by regulators.

Findings

Bitcoin is based on complex computer code supported by a robust community in a peer-to-peer network. Unlike other virtual currencies, Bitcoin appears to have obtained purchase and as such poses unique challenges to regulators.

Research limitations/implications

Bitcoin is at a nascent stage and the evolution of the virtual currency is difficult to predict.

Practical implications

Those who study financial systems, anti-money laundering regimes and asset forfeiture laws will have an interest in this topic.

Originality/value

This is a new and emerging currency; there is limited literature on the implications of this currency to anti-money laundering systems.

Details

Journal of Financial Crime, vol. 22 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 26 April 2018

Jan Michael Nolin

A multitude of transparency movements have been developed and grown strong in recent decades. Despite their growing influence, scholarly studies have focused on individual…

Abstract

Purpose

A multitude of transparency movements have been developed and grown strong in recent decades. Despite their growing influence, scholarly studies have focused on individual movements. The purpose of this paper is to make a pioneering contribution in defining transparency movements.

Design/methodology/approach

An exploratory approach has been used utilizing movement-specific professional and scholarly documents concerning 18 transparency movements.

Findings

Different traditions, ideologies of openness and aspects involving connections between movements have been identified as well as forms of organization.

Originality/value

This is the first attempt at identifying and defining transparency movements as a contemporary phenomenon.

Article
Publication date: 29 July 2014

Miguel Goede and Rostam J. Neuwirth

– The purpose of this article is to discuss the concepts confidentiality and transparency in the context of good governance.

1262

Abstract

Purpose

The purpose of this article is to discuss the concepts confidentiality and transparency in the context of good governance.

Design/methodology/approach

After exploring the concepts of confidentiality, good governance and other relevant concepts, they are related to each other.

Findings

When it comes to good governance, transparency is overrated and confidentiality is taken for granted. For good governance, there must be a balance between the two to preserve the public sphere.

Originality/value

The paper contributes to the understanding of good governance and the evolution of the public sphere.

Details

Corporate Governance, vol. 14 no. 4
Type: Research Article
ISSN: 1472-0701

Keywords

Article
Publication date: 13 April 2015

Bernd Hamm

This paper aims to summarize the major theoretical elements in the definition of a global ruling class. It then examines how neoconservatives in the USA took power and used regime…

1703

Abstract

Purpose

This paper aims to summarize the major theoretical elements in the definition of a global ruling class. It then examines how neoconservatives in the USA took power and used regime change to install US-friendly governments in other regions. A strategy of tension is used to press the American population into conformity. But the real revolution is to what extent factual politics escape any attempt to democratic control.

Design/methodology/approach

The research relies on case studies of material already published and provides a synthesis.

Findings

Three case studies show how far the Deep State already goes. Democracy is on the brink of survival.

Originality/value

This paper is an original hypothesis of the potential end of democracy as we know it, supported by empirical data.

Article
Publication date: 22 March 2013

Frank Upward, Barbara Reed, Gillian Oliver and Joanne Evans

The purpose of this paper is to highlight the widespread crisis facing the archives and records management professions, and to propose recordkeeping informatics, a single minded

4790

Abstract

Purpose

The purpose of this paper is to highlight the widespread crisis facing the archives and records management professions, and to propose recordkeeping informatics, a single minded disciplinary approach, as a way forward.

Design/methodology/approach

This paper reflects an Australasian perspective on the nature of the crisis besetting archives and records management professions as people struggle to adjust to digitally converged information ecologies. It suggests recordkeeping informatics as an approach for refiguring thinking, systems, processes and practices as people confront ever increasing information convergence, chaos and complexity. It discusses continuum thinking and recordkeeping metadata as two key building blocks of the approach, along with three facets of recordkeeping analysis involving the understanding of organisational culture, business process analysis and archival access.

Findings

Discussion of information and communication technologies as a “wild frontier” highlights the breaking down of recordkeeping processes within them. The causes for this chaos are complex and there is an urgent need to develop more coherent frameworks to identify and address the issues. Such frameworks need to grow from, and be conversant with, strong symbiotic relationships between social formations, recordkeeping processes, and archives, so that they may be applicable in an increasingly diverse range of organisational and community contexts. Embracing complexity is a must if the wild frontier is not to grow wilder.

Originality/value

The paper outlines a new disciplinary base from which new and old recordkeeping methods can be launched that are appropriate for this era.

Details

Records Management Journal, vol. 23 no. 1
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 13 February 2017

John Michael Weaver

There should be one standard for those with access to classified data. Leadership by example should be required by all managers, supervisors and department heads. The paper aims…

Abstract

Purpose

There should be one standard for those with access to classified data. Leadership by example should be required by all managers, supervisors and department heads. The paper aims to discuss this issue.

Design/methodology/approach

This paper is a viewpoint and does not have a methodology.

Findings

Leaders who work in the public sector have an inherent responsibility to earn and maintain the trust of the public for whom they serve. Regardless of whether one is a career government employee, a politician or a political appointee, all who have access to classified material should respect the necessity of safeguards to keep one’s nation’s secrets – secret.

Research limitations/implications

If leaders fail to set the example, then nations risk further breaches of their classified information.

Practical implications

This viewpoint applies to anyone who works in an environment dealing with classified material.

Social implications

This viewpoint serves to educate the public on maintaining a single standard for those who handle classified material.

Originality/value

The author has yet to see much covered in peer-reviewed publications on this topic and believe that the subject is particularly relevant at this time.

Details

International Journal of Public Leadership, vol. 13 no. 1
Type: Research Article
ISSN: 2056-4929

Keywords

1 – 10 of 134