Search results

1 – 10 of 204
Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 2 January 2018

Nikos Passas

Response to suggestion that EU-wide cash payment limits would assist in the control of terrorism finance and money laundering.

6220

Abstract

Purpose

Response to suggestion that EU-wide cash payment limits would assist in the control of terrorism finance and money laundering.

Design/methodology/approach

Desk review and interviews

Findings

The inception impact assessment (IIA) is ill-conceived, not grounded on firm empirical evidence and harmful to both crime control and the legitimate interests and rights of the EU citizens. The action under discussion is presented as a measure against terrorism finance, serious crime and tax evasion. The problem is that these criminal acts correspond to very different methods, volumes, perpetrators, causes and control challenges. Cash payment limitations (CPLs) are nowhere near a panacea that can address all of them and cannot make any of them go away magically. Even when each of these crime challenges are considered on their own, the empirical linkage of CPLs to effective controls is not there. The evidence from EU countries with CPLs in place shows higher levels of informal economy, corruption, tax evasion and terrorism risks than those without. There is substantial evidence of non-cash, very serious and organized crime, while the amounts needed and used by terrorists in Europe are usually very small in cash transactions, way below the thresholds under consideration. In fact, determined offenders will shift to other methods and become more sophisticated, posing new problems to controllers. Displacement and incentives for better-organized crime may well be the main products of such measures.

Originality/value

It counters the argument that the cash payment limits can help reduce serious crime, while pointing to several adverse consequences on legitimate interests and human rights.

Details

Journal of Financial Crime, vol. 25 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 7 September 2021

Jeanette Carlsson Hauff and Jonas Nilsson

During 2020, governments around the world introduced contact-tracing apps to fight the COVID-19 pandemic. In order for contact-tracing apps to be efficient tools in combatting…

2186

Abstract

Purpose

During 2020, governments around the world introduced contact-tracing apps to fight the COVID-19 pandemic. In order for contact-tracing apps to be efficient tools in combatting pandemics, a significant proportion of the population has to install it. However, in many countries, the success of apps introduced during the COVID-19 pandemic has been limited due to lack of public support. This paper aims to better understand why consumers seem unwilling to install and use a contact-tracing app.

Design/methodology/approach

In this study, the authors test a number of determinants hypothesized to influence acceptance of contact-tracing apps based on the theory of privacy calculus (Dinev and Hart, 2006). Both perceived privacy concerns, as well as perceived hedonic, utilitarian and pro-social benefits are included. The hypotheses are tested through SEM analysis on a representative sample of 1,007 Swedish citizens.

Findings

The results indicate significant privacy concerns with using contact-tracing apps. However, this is to some extent offset by perceived hedonic and pro-social positive consequences of using the app. This study further shows that a general positive attitude towards innovation increases acceptance of the app.

Originality/value

The study contributes to research on consumer privacy, both in general in its application of the calculus model but also specifically in the context of contact-tracing apps. Moreover, as the results highlight which aspects that are important for consumers to accept and install an app of this kind, they also represent an important contribution to policymakers in countries around the world.

Details

Journal of Consumer Marketing, vol. 40 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

Content available
Article
Publication date: 1 March 2006

Stefanos Gritzalis

316

Abstract

Details

Internet Research, vol. 16 no. 2
Type: Research Article
ISSN: 1066-2243

Open Access
Article
Publication date: 2 January 2024

Renata Monteiro Martins, Sofia Batista Ferraz and André Francisco Alcântara Fagundes

This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information…

Abstract

Purpose

This study aims to propose an innovative model that integrates variables and examines the influence of internet usage expertise, perceived risk and attitude toward information control on privacy concerns (PC) and, consequently, in consumers’ willingness to disclose personal information online. The authors also propose to test the mediation role of trust between PCs and willingness to disclose information. Trust is not a predictor of PC but a causal mechanism – considering that the focus is to understand consumers’ attitudes and behavior regarding the virtual environment (not context-specific) (Martin, 2018).

Design/methodology/approach

The authors developed a survey questionnaire based on the constructs that compose the proposed model to collect data from 864 respondents. The survey questionnaire included the following scales: internet usage expertise from Ohanian (1990); perceived risk, attitude toward information control, trust and willingness to disclose personal information online from Malhotra et al. (2004); and PC from Castañeda and Montoro (2007). All items were measured on a Likert seven-point scale (1 = totally disagree; 7 = totally agree). To obtain Westin’s attitudinal categories toward privacy, respondents answered Westin’s three-item privacy index. For data analysis, the authors applied covariance-based structural equation modeling.

Findings

First, the proposed model explains the drivers of consumers’ disposition to provide personal information at a level that surpasses specific contexts (Martin, 2018), bringing the analysis to consumers’ level and considering their general perceptions toward data privacy. Second, the findings provide inputs to propose a better definition of Westin’s attitudinal categories toward privacy, which used to be defined only by individuals’ information privacy perception. Consumers’ perceptions about their abilities in using the internet, the risks, their beliefs toward information control and trust also help to delimitate and distinguish the fundamentalists, the pragmatics and the unconcerned.

Research limitations/implications

Some limitations weigh the theoretical and practical implications of this study. The sample size of pragmatic and unconcerned respondents was substantially smaller than that of fundamentalists. It might be explained by applying Westin’s self-report index to classify the groups according to their score regarding PCs. Most individuals affirm having a great concern for their data privacy but still provide online information for the benefit of personalization – known as the privacy paradox (Zeng et al., 2021). It leads to another limitation of this research, given the lack of measures that classify respondents by considering their actual behavior toward privacy.

Practical implications

PC emerges as an important predictor of consumer trust and willingness to disclose their data online, and trust also influences this disposition. Managers need to implement actions that effectively reduce consumers’ concerns about privacy and increase their trust in the company – e.g. adopting a clear and transparent policy on how the data collected is stored, treated, protected and used to benefit the consumer. Regarding the perception of risk, if managers convince consumers that the data collected on the internet is protected, they tend to be less concerned about privacy.

Social implications

The results suggest different aspects influencing the willingness to disclose personal information online, including different responses considering consumers’ PCs. Through their policies and legislation, the authors understand that governments must be attentive to this aspect, establishing regulations that protect consumers’ data in the virtual environment. In addition to regulatory policies, education campaigns can be carried out for both consumers and managers to raise the discussion about privacy and the availability of information in the online environment, demonstrating the importance of protecting personal data to benefit the government, consumers and organizations.

Originality/value

Although there is increasing research on consumers’ privacy, studies have not considered their attitudinal classifications – high, moderate and low concern – as moderators of willingness to disclose information online. Researchers have also increased attention to the antecedents of PCs and disclosure of information but overlooked possible mechanisms that explain the relationship between them.

Details

RAUSP Management Journal, vol. 59 no. 1
Type: Research Article
ISSN: 2531-0488

Keywords

Content available
Article
Publication date: 8 August 2008

Jenny Fry

531

Abstract

Details

Online Information Review, vol. 32 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Article
Publication date: 23 September 2021

Damian Gordon, Ioannis Stavrakakis, J. Paul Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O’Mahony and Dympna O’Sullivan

Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of…

3716

Abstract

Purpose

Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they consider to be crucial computing ethics concerns. The overlap between these stakeholder groups are explored, as well as whether their concerns are reflected in the existing literature.

Design/methodology/approach

Data collection was performed using focus groups, and the data was analysed using a thematic analysis. The data was also analysed to determine if there were overlaps between the literature and the stakeholders’ concerns and attitudes towards computing ethics.

Findings

The results of the focus group analysis show a mixture of overlapping concerns between the different groups, as well as some concerns that are unique to each of the specific groups. All groups stressed the importance of data as a key topic in computing ethics. This includes concerns around the accuracy, completeness and representativeness of data sets used to develop computing applications. Academics were concerned with the best ways to teach computing ethics to university students. Industry professionals believed that a lack of diversity in software teams resulted in important questions not being asked during design and development. Citizens discussed at length the negative and unexpected impacts of social media applications. These are all topics that have gained broad coverage in the literature.

Social implications

In recent years, the impact of ICT on society and the environment at large has grown tremendously. From this fast-paced growth, a myriad of ethical concerns have arisen. The analysis aims to shed light on what a diverse group of stakeholders consider the most important social impacts of technology and whether these concerns are reflected in the literature on computing ethics. The outcomes of this analysis will form the basis for new teaching content that will be developed in future to help illuminate and address these concerns.

Originality/value

The multi-stakeholder analysis provides individual and differing perspectives on the issues related to the rapidly evolving discipline of computing ethics.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Content available
Book part
Publication date: 31 August 2018

Elisa Serafinelli

Abstract

Details

Digital Life on Instagram
Type: Book
ISBN: 978-1-78756-495-4

Content available
Book part
Publication date: 17 March 2017

Abstract

Details

From Categories to Categorization: Studies in Sociology, Organizations and Strategy at the Crossroads
Type: Book
ISBN: 978-1-78714-238-1

Open Access
Article
Publication date: 3 October 2022

Igor Perko

Artificial intelligence (AI) reasoning is fuelled by high-quality, detailed behavioural data. These can usually be obtained by the biometrical sensors embedded in smart devices…

Abstract

Purpose

Artificial intelligence (AI) reasoning is fuelled by high-quality, detailed behavioural data. These can usually be obtained by the biometrical sensors embedded in smart devices. The currently used data collecting approach, where data ownership and property rights are taken by the data scientists, designers of a device or a related application, delivers multiple ethical, sociological and governance concerns. In this paper, the author is opening a systemic examination of a data sharing concept in which data producers execute their data property rights.

Design/methodology/approach

Since data sharing concept delivers a substantially different alternative, it needs to be thoroughly examined from multiple perspectives, among them: the ethical, social and feasibility. At this stage, theoretical examination modes in the form of literature analysis and mental model development are being performed.

Findings

Data sharing concepts, framework, mechanisms and swift viability are examined. The author determined that data sharing could lead to virtuous data science by augmenting data producers' capacity to govern their data and regulators' capacity to interact in the process. Truly interdisciplinary research is proposed to follow up on this research.

Research limitations/implications

Since the research proposal is theoretical, the proposal may not provide direct applicative value but is largely focussed on fuelling the research directions.

Practical implications

For the researchers, data sharing concepts will provide an alternative approach and help resolve multiple ethical considerations related to the internet of things (IoT) data collecting approach. For the practitioners in data science, it will provide numerous new challenges, such as distributed data storing, distributed data analysis and intelligent data sharing protocols.

Social implications

Data sharing may post significant implications in research and development. Since ethical, legislative moral and trust-related issues are managed in the negotiation process, data can be shared freely, which in a practical sense expands the data pool for virtuous research in social sciences.

Originality/value

The paper opens new research directions of data sharing concepts and space for a new field of research.

Details

Kybernetes, vol. 52 no. 9
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 204