Search results

1 – 10 of 780
Book part
Publication date: 22 May 2015

Stephen Dobson, Arun Sukumar and Lucian Tipi

There is little doubt that the explosive growth of the cyberspace has provided a wealth of opportunities for a broad range of legal and illegal enterprises. One of the…

Abstract

Purpose

There is little doubt that the explosive growth of the cyberspace has provided a wealth of opportunities for a broad range of legal and illegal enterprises. One of the characteristics of the cyberspace is that it removes many barriers (e.g. geographical, accessing potential customers, cost of entry) from the path of savvy entrepreneurs. As such, a new particular brand of entrepreneurs has been born – these are entrepreneurs working at the limits of legality or plainly outside any legal frameworks. The purpose of this work is to explore the area of illegal cyber-entrepreneurship and to illustrate some of the factors that have contributed to its explosive growth over the last two decades.

Approach

The work is utilising case studies drawn from literature and news sources to illustrate the theoretical concepts that are being explored. The literature consulted in this work supports the discussion around the areas of entrepreneurship, cyberspace and various aspects related to illegal exploitation of the cyberspace.

Findings

The positioning of illegal enterprises within existing theoretical frameworks is explored and a modelling of the characteristics of such enterprises is being proposed. The duality of the opportunities available within the cyberspace is illustrated, with an emphasis on the fact that there will always be a ‘gap’ between the opportunities offered by the cyberspace and the possible illegal nature of some of the entrepreneurial activities that are taking place in this space.

Originality/value

This work explores and positions the illegal entrepreneurial activities taking place in the cyberspace. This contributes to the advancement of knowledge in this area. Given the fast moving nature of this area, there are opportunities for updating this work on a regular basis.

Details

Exploring Criminal and Illegal Enterprise: New Perspectives on Research, Policy & Practice
Type: Book
ISBN: 978-1-78441-551-8

Keywords

Book part
Publication date: 11 April 2013

Susan C. Morris

Purpose – To examine corporate social responsibility in cyberspace within the context of the experience of Google Corporation in China in order to provide greater understanding of…

Abstract

Purpose – To examine corporate social responsibility in cyberspace within the context of the experience of Google Corporation in China in order to provide greater understanding of the complexities that corporations encounter when operating across cyber borders.Design/methodology/approach – The research is grounded in the theoretical debate: The Internet as democratic and universal space versus the Internet as autocratic and sovereign space. Historical analysis is drawn from the case of Google Corporation in China.Findings – Freedom in cyberspace is more likely to be advanced universally with a collective commitment to corporate social responsibility in the information technology sector.Research limitations/implications – The study provides insights into the appropriate balance between the ethical responsibilities of the firm and its need to compete and survive in the highly competitive information age.Originality/value of chapter – The case of Google Corporation in China offers a venue for further discussion on the ethical role of transnational information technology corporations and their improvements in fostering human rights and free enterprise in cyberspace.

Details

Principles and Strategies to Balance Ethical, Social and Environmental Concerns with Corporate Requirements
Type: Book
ISBN: 978-1-78190-627-9

Keywords

Book part
Publication date: 3 November 2014

Martin Hand

To outline the current trajectories in digital social research and to highlight the roles of qualitative research in those trajectories.

Abstract

Purpose

To outline the current trajectories in digital social research and to highlight the roles of qualitative research in those trajectories.

Design/methodology/approach

A secondary analysis of the primary literature.

Findings

Qualitative research has shifted over time in relation to rapidly changing digital phenomena, but arguably finds itself in ‘crisis’ when faced with algorithms and ubiquitous digital data. However, there are many highly significant qualitative approaches that are being pursued and have the potential to contextualize, situate and critique narratives and practices of data.

Originality/value

To situate current debates around methods within longer trajectories of digital social research, recognizing their conceptual, disciplinary and empirical commitments.

Details

Big Data? Qualitative Approaches to Digital Research
Type: Book
ISBN: 978-1-78441-050-6

Keywords

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Book part
Publication date: 12 October 2012

Benjamin Gregg

Purpose – The main objective of the chapter is to map out some of the most significant possible political consequences of the Internet for the state, citizenship, human rights…

Abstract

Purpose – The main objective of the chapter is to map out some of the most significant possible political consequences of the Internet for the state, citizenship, human rights, and other areas.

Design/methodology/approach – The chapter analyzes the phenomena at the level of sociological theory. Its theoretical scope extends to political theory.

Findings – The Internet offers immense potential toward improving the nation state in terms of human rights yet in a manner that may well be foiled by several cultural, political, and economic factors. By transforming national boundaries into nongeographic borders that operate transnationally and subnationally, and by abstracting from the cybernaut's physical body, the Internet may challenge prevailing notions of state, private property, bodily autonomy, and political personhood, all of which connect discrete bodies with bounded territories. It might free citizenship rights and protections from state capture and denationalize the connection between membership in a particular political community and the enjoyment of rights. It might advance human rights by changing civil society by generating, first, a space where subjugated groups and individuals could agitate for their interests online without putting their bodies on the line and, second, critical public opinion in place of merely mass opinion. It would contribute to a post-national identity where it multiplied local practices to generate global awareness and identified normatively universal human rights in local, particular communities while still recognizing individuals’ special obligations to those local communities.

Research limitations/implications – This speculative trajectory remains all too vulnerable to nondigital settings beholden to particular values, cultures, power systems, inequality, hierarchy, and institutional orders; to market forces and controls; to governmental authority and censorship; and to the global maldistribution of wealth and technology. Liberal democratic political communities should monitor and control the cultural, political, and economic factors that threaten to undermine the Internet's potential toward improving the nation state in terms of human rights. Those committed to promoting the Internet's potential have the task of specifying these factors at the various relevant empirical micro-levels of social organization.

Originality value – Most analyses of the Internet either overestimate or underestimate its potential. Here the analysis strives for a balance uncommon in the literature. That balance may be of value primarily to other scholars working in related areas and secondarily to persons involved in public policy and other forms of politics.

Book part
Publication date: 14 December 2023

Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…

Abstract

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.

In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.

In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.

Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.

Book part
Publication date: 7 October 2019

Saeed J. Roohani and Xiaochuan Zheng

With recent increases in cybersecurity incidents, it is imperative to supplement current accounting curriculum, equip accounting graduates with sufficient knowledge and skills to…

Abstract

With recent increases in cybersecurity incidents, it is imperative to supplement current accounting curriculum, equip accounting graduates with sufficient knowledge and skills to assess cybersecurity risk, and learn about controls to mitigate such risks. In this chapter, the authors describe 10 teaching modules, supported by 10 professionally produced video series. The authors developed these videos for educating students on cybersecurity and the videos are available free to instructors from other institutions who wish to use them. The videos are filled with insights and advice from our two experts – one a former hacker and the other an experienced cybersecurity professional. This dialogue between two different sides provides a rich discussion that leads to answering many questions that people often have about cybersecurity. Further, in Exhibit 1, this chapter offers a framework for characterizing and analyzing some recent publicized data-breach cases, which can supplement discussion on cybersecurity modules. Instructors can add more cases to this source overtime. Finally, the authors share the analysis of feedback from students who went through the series. The results suggest that the students show interest in the topic, and videos helped them better understand the complexity of cybersecurity risk and controls.

Details

Advances in Accounting Education: Teaching and Curriculum Innovations
Type: Book
ISBN: 978-1-78973-394-5

Keywords

Book part
Publication date: 15 September 2022

Caner Asbaş and Şule Tuzlukaya

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…

Abstract

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.

Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.

Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.

Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.

Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Keywords

Book part
Publication date: 14 October 2011

Chung-Yi Cheng and Kenneth C.C. Yang

The rise of the Internet has facilitated net activism among many virtual gay communities in Taiwan. The communication role that the Internet plays is in particular vital, because…

Abstract

The rise of the Internet has facilitated net activism among many virtual gay communities in Taiwan. The communication role that the Internet plays is in particular vital, because homosexuality is still considered a taboo in Taiwan's society. Cyberspace created by the Internet forms a unique “space” where local homosexuals can share their experience of being gays with each other. The purposes of this chapter are intended to examine how the Internet facilitated the formation, promotion, and success of gay rights movements among homosexual communities in Taiwan. This chapter uses the Chang-Der Street Police Harassment Incident as a case study to elaborate the Internet's communication role in mobilizing local gay populations to pursue their gay rights. It also investigates the Internet's strategic role as a communication medium in gay rights movements. The case analysis and in-depth interviews help identify several key functions that the Internet can play: to exchange and share information, to organize and coordinate gay rights movements, to record and store historical information, and to lead social and value changes in the future. This chapter explores the potential of the Internet in online community mobilization, an early look at virtual community and net activism.

Details

Human Rights and Media
Type: Book
ISBN: 978-0-76230-052-5

1 – 10 of 780