Azi Lev-on, Nili Steinfeld, Hama Abu-Kishk, S. Naim
{"title":"The long-term effects of digital literacy programs for disadvantaged populations: analyzing participants' perceptions","authors":"Azi Lev-on, Nili Steinfeld, Hama Abu-Kishk, S. Naim","doi":"10.1108/jices-02-2020-0019","DOIUrl":"https://doi.org/10.1108/jices-02-2020-0019","url":null,"abstract":"\u0000Purpose\u0000This study aims to examine the long-term effects of an Israeli digital literacy government program for disadvantaged populations, as they are perceived by participants of the program one year after completing the course.\u0000\u0000\u0000Design/methodology/approach\u0000Participants in the program were interviewed about the effects of participating in the program, their experiences and satisfaction, in retrospect, a year after they completed the program.\u0000\u0000\u0000Findings\u0000The main reasons for joining the program included cognitive motivations, mainly interest to become familiar with internet applications, followed by employment aspiration. Positive benefits from participation included accumulated knowledge, confidence in using technology, empowerment and enhanced sense of self-efficacy. Interviewees also reported that as they could not practice or communicate with instructors once they completed the program, a significant portion of the accumulated gains faded.\u0000\u0000\u0000Social implications\u0000Social and practical implications: Digital technologies constitute key infrastructure to facilitate public participation, as well as for gaining social, political and economic capital. Therefore, there is a significant social value in reducing digital inequality by increasing digital literacy of disadvantaged populations, i.e. citizens with low socioeconomic status and low digital literacy. This study sheds light on the benefits gained from such programs, as perceived by past participants.\u0000\u0000\u0000Originality/value\u0000While previous studies evaluating digital literacy programs focus on specific technical improvements and short-term gains, this study investigates the long-term effects and shortcomings of the program as perceived by participants.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mediated democracy and internet shutdown in India","authors":"Md. Nurul Momen, S. Harsha, Debobrata Das","doi":"10.1108/JICES-07-2020-0075","DOIUrl":"https://doi.org/10.1108/JICES-07-2020-0075","url":null,"abstract":"\u0000Purpose\u0000This paper aims to highlight the very recent cases of internet shutdown during the creation of Union territory of Jammu and Kashmir and enactment of Citizenship Amendment Act and the detention under Section 66 (A) of Information Technology Act 2000.\u0000\u0000\u0000Design/methodology/approach\u0000This study takes up a broad explorative discussion of the challenges posed to the consolidation of democracy in India due to frequent internet shutdowns for online communication and social media usages.\u0000\u0000\u0000Findings\u0000As findings, it is narrated that due to politically motivated reasons, India compromises its commitment to the pluralism and diversity in views, in particular, individual rights to freedom of expression and opinion, enshrined in the constitution.\u0000\u0000\u0000Originality/value\u0000Right to freedom of speech and expression has now taken a new shape due to the emergence and availability of the internet that enriches the quality of democracy.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128708321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The delicate balance of communicational interests: A Bakhtinian view of social media in health care","authors":"Chukwuma Ukoha, A. Stranieri","doi":"10.1108/jices-06-2020-0071","DOIUrl":"https://doi.org/10.1108/jices-06-2020-0071","url":null,"abstract":"\u0000Purpose\u0000This paper aims to use the writings of Mikhail Bakhtin to reveal new insights into the role and impact of social media in health-care settings.\u0000\u0000\u0000Design/methodology/approach\u0000With the help of Bakhtin’s constructs of dialogism, polyphony, heteroglossia and carnival, the power and influences of the social media phenomenon in health-care settings, are explored.\u0000\u0000\u0000Findings\u0000It is apparent from the in-depth analysis conducted that there is a delicate balance between the need to increase dialogue and the need to safeguard public health, in the use of social media for health-related communication. Bakhtin‘s constructs elucidate this delicate balance and highlight the need for health-care providers that use social media to find the right balance between these competing communicational priorities.\u0000\u0000\u0000Originality/value\u0000This paper advances a nascent theoretical approach to social media research. By applying Bakhtinian ideas to consumer health informatics, this paper has the potential to open a new approach to theorizing the role of social software in health-care settings. Stakeholders in digital health will find this paper useful, as it opens up dialogue to further discuss the role of social media in health care.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131153446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An exploration of the impact of artificial intelligence (AI) and automation for communication professionals","authors":"E. A. Jiménez, Tania Ouariachi","doi":"10.1108/jices-03-2020-0034","DOIUrl":"https://doi.org/10.1108/jices-03-2020-0034","url":null,"abstract":"\u0000Purpose\u0000Artificial intelligence (AI) and automation are currently changing human life with a great implication in the communication field. This research focusses on understanding the current and growing impact of AI and automation in the role of communication professionals to identify what skills and training are needed to face its impacts leading to a recommendation.\u0000\u0000\u0000Design/methodology/approach\u0000The research involves methodological triangulation, analysing and comparing data gathered from consulting with experts using the Delphi method, focus group with communication students, and literature review.\u0000\u0000\u0000Findings\u0000Findings show that the likely impacts are on the one hand the enhancing of efficiency and productivity, as well as freeing communication professionals to focus on the creative side, strategy and analytical thinking, on the other hand, repetitive and low-level jobs could be lost, being higher position jobs or those involving creativity and decision making harder to automate. Two types of training are needed: to gather experience with the current AI and automated tools, and to focus on developing human qualities that AI cannot replicate.\u0000\u0000\u0000Originality/value\u0000The outcomes of this research are valuable to help current and future communication practitioners, as well as organisations, to be one step ahead and survive the age AI and automation, being aware of its current and near-future impacts. The paper offers a list of recommended soft and technical skills, as well as training needed, categorizing them in low, medium and high priority.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126008622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empowering employees: the other side of electronic performance monitoring","authors":"K. Sherif, Omolola Jewisimi, Mazen El-Masri","doi":"10.1108/jices-04-2020-0038","DOIUrl":"https://doi.org/10.1108/jices-04-2020-0038","url":null,"abstract":"Purpose Advances in electronic performance monitoring (EPM) have raised employees’ concerns regarding the invasion of privacy and erosion of trust. On the other hand, EPM promises to improve performance and processes. This paper aims to focus on how the alignment of EPM design and organizational culture through effective organizational mechanisms can address privacy concerns, and, hence, positively affect employees’ perception toward technology. Design/methodology/approach Based on a theoretical lens extending two conceptual frameworks, a qualitative approach was used to analyze interview data collected from a comparative case study of two organizations in the USA and Qatar within the oil and gas sector. These two contexts were selected to emphasize the cross-cultural and organizational differences in employees’ acceptance of EPM. Findings The study revealed that national and corporate cultures affected employees’ perception and acceptance of monitoring in both countries. Because of diversity, though EPM was better accepted in Qatar, as they are an easy way to enforce standardization and to push employees to adapt to a dominating corporate culture. Conversely, in the USA where culture is more innovation-oriented, organizational mechanisms shifted the perceptions of EPM to being mean to obtain feedback rather than to impose standards. Research limitations/implications This qualitative study is based on a descriptive comparative case study of two organizations with two cultural contexts. The limited sample size and cross-sectional nature of data may need to be extended to a larger cultural scope that is observed over a longer period to safely generalize the findings. Practical implications Decision-makers in multinational corporations with different cultural backgrounds may benefit of this study’s outcomes, as it emphasizes the importance of the fit between EPM designs and the cultural settings. Furthermore, organizations aiming to conduct analytics on EPM data have to justify and prove its benefits to employees to facilitate acceptance. Social implications The study shows that employees in Qatar have a different cultural frame of reference in their perception of fairness and ethics than their counterparts in the USA because of changes in the meaning of social relations, personal goals and behavioral norms. Originality/value The originality of this study lays in its empirical validation of a composite framework examining both national and corporate cultures on employees’ reactions to EPM systems. It also proves the critical importance of organizational mechanisms to align the EPM design with the organization cultural settings.","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131630766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adopting social media as an information system - a case study of an internet service company in Abuja, Nigeria","authors":"Otobong Inieke, Babatunde Mustapha Raimi-Lawal","doi":"10.1108/jices-10-2019-0111","DOIUrl":"https://doi.org/10.1108/jices-10-2019-0111","url":null,"abstract":"\u0000Purpose\u0000In considering the ubiquity of information systems (ISs) and the increasingly important role served in modern business and service delivery, social media if properly leveraged gives potential competitive advantage to a company in its respective industry. With Paramount Web Nigeria Ltd. as a case study, this paper aims to focus on the important aspects of adopting social media as an IS such as data privacy principles and the role of social media in the context of a small internet service company.\u0000\u0000\u0000Design/methodology/approach\u0000Relevant research information was relied upon to highlight the various factors involved with adopting social media as an IS.\u0000\u0000\u0000Findings\u0000Data handling and privacy policies must also be considered and properly devised if the concerned company is to effectively adopt social media as an IS. Decision-making tools such as SWOT analysis and the quality triangle are vital during the planning stages of deploying an IS.\u0000\u0000\u0000Research limitations/implications\u0000Research papers on aspects of social media as an IS especially in West African academia has been lacking. The challenge is in contextual information related to similar topics.\u0000\u0000\u0000Practical implications\u0000Findings detailed in this paper will serve to provide a better understanding of the important factors to be considered when adapting a new IS to an existing business.\u0000\u0000\u0000Originality/value\u0000This paper serves to highlight the potential factors to be considered when dealing with business ISs with a strong focus on social media and internet related services.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"eWOM, what are we suspecting? Motivation, truthfulness or identity","authors":"Xiao Zhang, Yun Wu, Wendy Wang","doi":"10.1108/jices-12-2019-0135","DOIUrl":"https://doi.org/10.1108/jices-12-2019-0135","url":null,"abstract":"\u0000Purpose\u0000As fake information has become the norm on the internet, it is important to investigate how skepticism impacts an individual’s attitude toward word-of-mouth (eWOM). This study examines eWOM skepticism via three dimensions: suspicion of motivation, suspicion of truthfulness and suspicion of identity. It investigates not only which of the three dimensions is more influential in eWOM situations but also the variations and relationships among these three. Furthermore, this study evaluates how an individual’s dispositional trust and perceptions regarding structural assurance can impact each dimension, which in turn affects the assessment of the eWOM messages’ credibility.\u0000\u0000\u0000Design/methodology/approach\u0000Using an online scenario-based survey, data were collected via Amazon Mechanical Turk from 195 participants in the U.S. PLS and cluster analysis were used to analyze the data.\u0000\u0000\u0000Findings\u0000The results reveal that the suspicion of identity play a major role in message credibility assessment and that people who are naturally less likely to trust others also hold higher suspicion of motivation and truthfulness. Further, structural assurance has significant negative effects on all three dimensions.\u0000\u0000\u0000Practical implications\u0000The findings highlight the importance of enhancing the protective measures on eWOM platforms and call for stricter regulations to prevent organizations from adopting deceptive eWOM propagandas.\u0000\u0000\u0000Originality/value\u0000This research contributes to the literature by exploring the impact of skepticism on eWOM message credibility assessment and helping to validate this newly created construct by considering eWOM skepticism as a formative construct.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134301713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital inequalities: contextualizing problems and solutions","authors":"Laura Robinson, Massimo Ragnedda, J. Schulz","doi":"10.1108/jices-05-2020-0064","DOIUrl":"https://doi.org/10.1108/jices-05-2020-0064","url":null,"abstract":"This issue of JICES is devoted to an increasingly important social problem that has been called the digital divide, digital inequalities and digital inclusion. No matter the name, the social problem remains the same: individuals, groups and collectivities are disenfranchised from the benefits of digital technologies. We open this issue of JICES with an editorial commentary by Simon Rogerson who reminds us that digital divides are not sui generis but are part of larger inequalities. Rogerson pinpoints the crucial linkage between digital divides and larger social divides: “There have always been social divides predicated upon, for example, poverty, education, gender and status”. At the same time, Rogerson reminds us of the importance of those fighting the good fight to create a more just and humane society for all, especially for ordinary people who are “digital outcasts”. The terminology outcast is telling – as much for those suffering from it as for those responsible for it. Indeed, these individuals and groups have been cast out and cast aside by powerful actors, governmental and private, who are unwilling or unable to create digital inclusion for these ordinary people. These ordinary people are worthy of empathy and inclusion simply by virtue of their membership in the greatest collectivity: humanity. With this in mind, we have assembled scholars working to bring the excluded into the fold and problematize the social problem with an eye to solutions across several foci: emergent forms of inequality, health and disability, causes and consequences and finally solutions and responses. We begin our examination with emergent forms of inequality with “Risking Identity: A Case Study of Jamaica’s Short-lived National ID System” by Hopeton S. Dunn. Dunn walks us through how Jamaica was the first country to legislate the use of AI and modern data science to create a national database of the identities of all Jamaican citizens. In 2019, AI and biometric data were being used to reestablish a national identification system. The move was deemed unconstitutional by the Jamaican Supreme Court because of its violation of citizens’ privacy, as well as Jamaica’s Charter of Rights within its constitution. Significantly, Dunn warns that this case study offers insight into new forms of inequality created by the use of biometric data and faulty AI in tandem with inadequate privacy measures to protect sensitive personal data: “The highly intrusive level of biometric data being demanded, the compulsory nature of the plan, criminal sanctions for non-compliance and the absence of adequate technical or legislative safeguards for data protection”. Dunn’s work is an indicator of emergent forms of digital inequality that are complex and increasingly driven by institutions, governments and corporations, whose power is so great that it threatens the autonomy of individuals. The next article also draws our attention to the new power dynamics animating the frontier of digital in","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126013877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The digital divide is a multi-dimensional complex","authors":"S. Rogerson","doi":"10.1108/jices-05-2020-0060","DOIUrl":"https://doi.org/10.1108/jices-05-2020-0060","url":null,"abstract":"","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115017913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rogue people: on adversarial crowdsourcing in the context of cyber security","authors":"Mohammad Moradi, Qi Li","doi":"10.1108/jices-08-2019-0100","DOIUrl":"https://doi.org/10.1108/jices-08-2019-0100","url":null,"abstract":"\u0000Purpose\u0000Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects.\u0000\u0000\u0000Design/methodology/approach\u0000To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced.\u0000\u0000\u0000Findings\u0000Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies (and addressed scenarios) for such human-mediated attacks can shed light on the way of identifying and confronting such threats.\u0000\u0000\u0000Originality/value\u0000To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.\u0000","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}