Search results

1 – 10 of 132
Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 2 January 2018

Nikos Passas

Response to suggestion that EU-wide cash payment limits would assist in the control of terrorism finance and money laundering.

6220

Abstract

Purpose

Response to suggestion that EU-wide cash payment limits would assist in the control of terrorism finance and money laundering.

Design/methodology/approach

Desk review and interviews

Findings

The inception impact assessment (IIA) is ill-conceived, not grounded on firm empirical evidence and harmful to both crime control and the legitimate interests and rights of the EU citizens. The action under discussion is presented as a measure against terrorism finance, serious crime and tax evasion. The problem is that these criminal acts correspond to very different methods, volumes, perpetrators, causes and control challenges. Cash payment limitations (CPLs) are nowhere near a panacea that can address all of them and cannot make any of them go away magically. Even when each of these crime challenges are considered on their own, the empirical linkage of CPLs to effective controls is not there. The evidence from EU countries with CPLs in place shows higher levels of informal economy, corruption, tax evasion and terrorism risks than those without. There is substantial evidence of non-cash, very serious and organized crime, while the amounts needed and used by terrorists in Europe are usually very small in cash transactions, way below the thresholds under consideration. In fact, determined offenders will shift to other methods and become more sophisticated, posing new problems to controllers. Displacement and incentives for better-organized crime may well be the main products of such measures.

Originality/value

It counters the argument that the cash payment limits can help reduce serious crime, while pointing to several adverse consequences on legitimate interests and human rights.

Details

Journal of Financial Crime, vol. 25 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 7 September 2021

Jeanette Carlsson Hauff and Jonas Nilsson

During 2020, governments around the world introduced contact-tracing apps to fight the COVID-19 pandemic. In order for contact-tracing apps to be efficient tools in combatting…

2186

Abstract

Purpose

During 2020, governments around the world introduced contact-tracing apps to fight the COVID-19 pandemic. In order for contact-tracing apps to be efficient tools in combatting pandemics, a significant proportion of the population has to install it. However, in many countries, the success of apps introduced during the COVID-19 pandemic has been limited due to lack of public support. This paper aims to better understand why consumers seem unwilling to install and use a contact-tracing app.

Design/methodology/approach

In this study, the authors test a number of determinants hypothesized to influence acceptance of contact-tracing apps based on the theory of privacy calculus (Dinev and Hart, 2006). Both perceived privacy concerns, as well as perceived hedonic, utilitarian and pro-social benefits are included. The hypotheses are tested through SEM analysis on a representative sample of 1,007 Swedish citizens.

Findings

The results indicate significant privacy concerns with using contact-tracing apps. However, this is to some extent offset by perceived hedonic and pro-social positive consequences of using the app. This study further shows that a general positive attitude towards innovation increases acceptance of the app.

Originality/value

The study contributes to research on consumer privacy, both in general in its application of the calculus model but also specifically in the context of contact-tracing apps. Moreover, as the results highlight which aspects that are important for consumers to accept and install an app of this kind, they also represent an important contribution to policymakers in countries around the world.

Details

Journal of Consumer Marketing, vol. 40 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

Open Access
Article
Publication date: 2 January 2024

Renata Monteiro Martins, Sofia Batista Ferraz and André Francisco Alcântara Fagundes

This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information…

Abstract

Purpose

This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information control on privacy concerns (PC) and, consequently, in consumers’ willingness to disclose personal information online. The authors also propose to test the mediation role of trust between PCs and willingness to disclose information. Trust is not a predictor of PC but a causal mechanism – considering that the focus is to understand consumers’ attitudes and behavior regarding the virtual environment (not context-specific) (Martin, 2018).

Design/methodology/approach

The authors developed a survey questionnaire based on the constructs that compose the proposed model to collect data from 864 respondents. The survey questionnaire included the following scales: internet usage expertise from Ohanian (1990); perceived risk, attitude toward information control, trust and willingness to disclose personal information online from Malhotra et al. (2004); and PC from Castañeda and Montoro (2007). All items were measured on a Likert seven-point scale (1 = totally disagree; 7 = totally agree). To obtain Westin’s attitudinal categories toward privacy, respondents answered Westin’s three-item privacy index. For data analysis, the authors applied covariance-based structural equation modeling.

Findings

First, the proposed model explains the drivers of consumers’ disposition to provide personal information at a level that surpasses specific contexts (Martin, 2018), bringing the analysis to consumers’ level and considering their general perceptions toward data privacy. Second, the findings provide inputs to propose a better definition of Westin’s attitudinal categories toward privacy, which used to be defined only by individuals’ information privacy perception. Consumers’ perceptions about their abilities in using the internet, the risks, their beliefs toward information control and trust also help to delimitate and distinguish the fundamentalists, the pragmatics and the unconcerned.

Research limitations/implications

Some limitations weigh the theoretical and practical implications of this study. The sample size of pragmatic and unconcerned respondents was substantially smaller than that of fundamentalists. It might be explained by applying Westin’s self-report index to classify the groups according to their score regarding PCs. Most individuals affirm having a great concern for their data privacy but still provide online information for the benefit of personalization – known as the privacy paradox (Zeng et al., 2021). It leads to another limitation of this research, given the lack of measures that classify respondents by considering their actual behavior toward privacy.

Practical implications

PC emerges as an important predictor of consumer trust and willingness to disclose their data online, and trust also influences this disposition. Managers need to implement actions that effectively reduce consumers’ concerns about privacy and increase their trust in the company – e.g. adopting a clear and transparent policy on how the data collected is stored, treated, protected and used to benefit the consumer. Regarding the perception of risk, if managers convince consumers that the data collected on the internet is protected, they tend to be less concerned about privacy.

Social implications

The results suggest different aspects influencing the willingness to disclose personal information online, including different responses considering consumers’ PCs. Through their policies and legislation, the authors understand that governments must be attentive to this aspect, establishing regulations that protect consumers’ data in the virtual environment. In addition to regulatory policies, education campaigns can be carried out for both consumers and managers to raise the discussion about privacy and the availability of information in the online environment, demonstrating the importance of protecting personal data to benefit the government, consumers and organizations.

Originality/value

Although there is increasing research on consumers’ privacy, studies have not considered their attitudinal classifications – high, moderate and low concern – as moderators of willingness to disclose information online. Researchers have also increased attention to the antecedents of PCs and disclosure of information but overlooked possible mechanisms that explain the relationship between them.

Details

RAUSP Management Journal, vol. 59 no. 1
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 23 September 2021

Damian Gordon, Ioannis Stavrakakis, J. Paul Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O’Mahony and Dympna O’Sullivan

Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of…

3716

Abstract

Purpose

Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they consider to be crucial computing ethics concerns. The overlap between these stakeholder groups are explored, as well as whether their concerns are reflected in the existing literature.

Design/methodology/approach

Data collection was performed using focus groups, and the data was analysed using a thematic analysis. The data was also analysed to determine if there were overlaps between the literature and the stakeholders’ concerns and attitudes towards computing ethics.

Findings

The results of the focus group analysis show a mixture of overlapping concerns between the different groups, as well as some concerns that are unique to each of the specific groups. All groups stressed the importance of data as a key topic in computing ethics. This includes concerns around the accuracy, completeness and representativeness of data sets used to develop computing applications. Academics were concerned with the best ways to teach computing ethics to university students. Industry professionals believed that a lack of diversity in software teams resulted in important questions not being asked during design and development. Citizens discussed at length the negative and unexpected impacts of social media applications. These are all topics that have gained broad coverage in the literature.

Social implications

In recent years, the impact of ICT on society and the environment at large has grown tremendously. From this fast-paced growth, a myriad of ethical concerns have arisen. The analysis aims to shed light on what a diverse group of stakeholders consider the most important social impacts of technology and whether these concerns are reflected in the literature on computing ethics. The outcomes of this analysis will form the basis for new teaching content that will be developed in future to help illuminate and address these concerns.

Originality/value

The multi-stakeholder analysis provides individual and differing perspectives on the issues related to the rapidly evolving discipline of computing ethics.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 3 October 2022

Igor Perko

Artificial intelligence (AI) reasoning is fuelled by high-quality, detailed behavioural data. These can usually be obtained by the biometrical sensors embedded in smart devices…

Abstract

Purpose

Artificial intelligence (AI) reasoning is fuelled by high-quality, detailed behavioural data. These can usually be obtained by the biometrical sensors embedded in smart devices. The currently used data collecting approach, where data ownership and property rights are taken by the data scientists, designers of a device or a related application, delivers multiple ethical, sociological and governance concerns. In this paper, the author is opening a systemic examination of a data sharing concept in which data producers execute their data property rights.

Design/methodology/approach

Since data sharing concept delivers a substantially different alternative, it needs to be thoroughly examined from multiple perspectives, among them: the ethical, social and feasibility. At this stage, theoretical examination modes in the form of literature analysis and mental model development are being performed.

Findings

Data sharing concepts, framework, mechanisms and swift viability are examined. The author determined that data sharing could lead to virtuous data science by augmenting data producers' capacity to govern their data and regulators' capacity to interact in the process. Truly interdisciplinary research is proposed to follow up on this research.

Research limitations/implications

Since the research proposal is theoretical, the proposal may not provide direct applicative value but is largely focussed on fuelling the research directions.

Practical implications

For the researchers, data sharing concepts will provide an alternative approach and help resolve multiple ethical considerations related to the internet of things (IoT) data collecting approach. For the practitioners in data science, it will provide numerous new challenges, such as distributed data storing, distributed data analysis and intelligent data sharing protocols.

Social implications

Data sharing may post significant implications in research and development. Since ethical, legislative moral and trust-related issues are managed in the negotiation process, data can be shared freely, which in a practical sense expands the data pool for virtuous research in social sciences.

Originality/value

The paper opens new research directions of data sharing concepts and space for a new field of research.

Details

Kybernetes, vol. 52 no. 9
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 20 July 2020

Amina El murabet, Anouar Abtoy, Abdellah Touhafi and Abderahim Tahiri

AAL (Ambient Assisted Living) is lacking a RM (Reference Model) to serve as an abstraction of the domain. Therefore, to help implement new architectures established on the prior…

Abstract

AAL (Ambient Assisted Living) is lacking a RM (Reference Model) to serve as an abstraction of the domain. Therefore, to help implement new architectures established on the prior experiences of the designer’s expertise and former competences, in this paper, we propose a novel approach of an AAL RM. Our objective is to handle the resolution of conflicts that appear between the developers, and give an overview of the basis for implementing concrete software architectures for different families of AAL applications. Our proposed RM is a standardized clarification for developers to apply in the process of the design and implementation. We illuminate the AAL domain fundamental dimensions and we established a formal RM with an infrastructure that could survive the domain’s progression. To achieve integrated system-of-systems composed of systems, subsystems and components, our RM describes a standard and regulated structure to be established. High-level elements, essential properties and characteristics that must appear in the application’s design are described and illustrated in this work.

Details

Applied Computing and Informatics, vol. 17 no. 2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 29 March 2022

Stefano Calzati

This study advances a reconceptualization of data and information which overcomes normative understandings often contained in data policies at national and international levels…

Abstract

Purpose

This study advances a reconceptualization of data and information which overcomes normative understandings often contained in data policies at national and international levels. This study aims to propose a conceptual framework that moves beyond subject- and collective-centric normative understandings.

Design/methodology/approach

To do so, this study discusses the European Union (EU) and China’s approaches to data-driven technologies highlighting their similarities and differences when it comes to the vision underpinning how tech innovation is shaped.

Findings

Regardless of the different attention to the subject (the EU) and the collective (China), the normative understandings of technology by both actors remain trapped into a positivist approach that overlooks all that is not and cannot be turned into data, thus hindering the elaboration of a more holistic ecological thinking merging humans and technologies.

Originality/value

Revising the philosophical and political debate on data and data-driven technologies, a third way is elaborated, i.e. federated data as commons. This third way puts the subject as part by default of a collective at the centre of discussion. This framing can serve as the basis for elaborating sociotechnical alternatives when it comes to define and regulate the mash-up of humans and technology.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 15 January 2024

Christine Prince, Nessrine Omrani and Francesco Schiavone

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper…

1182

Abstract

Purpose

Research on online user privacy shows that empirical evidence on how privacy literacy relates to users' information privacy empowerment is missing. To fill this gap, this paper investigated the respective influence of two primary dimensions of online privacy literacy – namely declarative and procedural knowledge – on online users' information privacy empowerment.

Design/methodology/approach

An empirical analysis is conducted using a dataset collected in Europe. This survey was conducted in 2019 among 27,524 representative respondents of the European population.

Findings

The main results show that users' procedural knowledge is positively linked to users' privacy empowerment. The relationship between users' declarative knowledge and users' privacy empowerment is partially supported. While greater awareness about firms and organizations practices in terms of data collections and further uses conditions was found to be significantly associated with increased users' privacy empowerment, unpredictably, results revealed that the awareness about the GDPR and user’s privacy empowerment are negatively associated. The empirical findings reveal also that greater online privacy literacy is associated with heightened users' information privacy empowerment.

Originality/value

While few advanced studies made systematic efforts to measure changes occurred on websites since the GDPR enforcement, it remains unclear, however, how individuals perceive, understand and apply the GDPR rights/guarantees and their likelihood to strengthen users' information privacy control. Therefore, this paper contributes empirically to understanding how online users' privacy literacy shaped by both users' declarative and procedural knowledge is likely to affect users' information privacy empowerment. The study empirically investigates the effectiveness of the GDPR in raising users' information privacy empowerment from user-based perspective. Results stress the importance of greater transparency of data tracking and processing decisions made by online businesses and services to strengthen users' control over information privacy. Study findings also put emphasis on the crucial need for more educational efforts to raise users' awareness about the GDPR rights/guarantees related to data protection. Empirical findings also show that users who are more likely to adopt self-protective approaches to reinforce personal data privacy are more likely to perceive greater control over personal data. A broad implication of this finding for practitioners and E-businesses stresses the need for empowering users with adequate privacy protection tools to ensure more confidential transactions.

Details

Information Technology & People, vol. 37 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 17 June 2021

Chenglong Li, Hongxiu Li and Reima Suomi

An empirical study investigated the antecedents to perceived usefulness (PU) and its consequences in the context of smoking cessation online health communities (OHCs).

2436

Abstract

Purpose

An empirical study investigated the antecedents to perceived usefulness (PU) and its consequences in the context of smoking cessation online health communities (OHCs).

Design/methodology/approach

To validate a research model for perceived informational support, perceived emotional support and perceived esteem support, the authors conducted a partial-least-squares analysis of empirical data from an online survey (N = 173) of users of two smoking cessation OHCs. The proposed model articulates these as antecedents to PU from a social support perspective, and knowledge sharing and continuance intention are expressed as consequences of PU.

Findings

The empirical study identified that the PU of smoking cessation OHCs is influenced by perceived emotional support and perceived esteem support, and perceived informational support indirectly affects PU via these factors. In turn, PU exerts a positive influence on both knowledge sharing and continuance intention. Also, knowledge sharing positively affects continuance intention.

Originality/value

The study contributes to scholarship on users' postadoption behavior in the context of smoking cessation OHCs by disentangling the antecedents to PU from a social support perspective and pinpointing some important consequences of PU. The research also has practical implications for managing smoking cessation OHCs.

Details

Internet Research, vol. 32 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 132