Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai, Quynh-Chi Le
{"title":"Information security risks and sharing behavior on OSN: the impact of data collection awareness","authors":"Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai, Quynh-Chi Le","doi":"10.1108/jices-06-2023-0076","DOIUrl":"https://doi.org/10.1108/jices-06-2023-0076","url":null,"abstract":"\u0000Purpose\u0000This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.\u0000\u0000\u0000Design/methodology/approach\u0000Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.\u0000\u0000\u0000Findings\u0000The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.\u0000\u0000\u0000Research limitations/implications\u0000This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.\u0000\u0000\u0000Practical implications\u0000Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.\u0000\u0000\u0000Originality/value\u0000The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.\u0000","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"8 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138584454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the role of artificial intelligence in the US criminal justice system","authors":"Ace Vo, Miloslava Plachkinova","doi":"10.1108/jices-11-2022-0101","DOIUrl":"https://doi.org/10.1108/jices-11-2022-0101","url":null,"abstract":"Purpose The purpose of this study is to examine public perceptions and attitudes toward using artificial intelligence (AI) in the US criminal justice system. Design/methodology/approach The authors took a quantitative approach and administered an online survey using the Amazon Mechanical Turk platform. The instrument was developed by integrating prior literature to create multiple scales for measuring public perceptions and attitudes. Findings The findings suggest that despite the various attempts, there are still significant perceptions of sociodemographic bias in the criminal justice system and technology alone cannot alleviate them. However, AI can assist judges in making fairer and more objective decisions by using triangulation – offering additional data points to offset individual biases. Social implications Other scholars can build upon the findings and extend the work to shed more light on some problems of growing concern for society – bias and inequality in criminal sentencing. AI can be a valuable tool to assist judges in the decision-making process by offering diverse viewpoints. Furthermore, the authors bridge the gap between the fields of technology and criminal justice and demonstrate how the two can be successfully integrated for the benefit of society. Originality/value To the best of the authors’ knowledge, this is among the first studies to examine a complex societal problem like the introduction of technology in a high-stakes environment – the US criminal justice system. Understanding how AI is perceived by society is necessary to develop more transparent and unbiased algorithms for assisting judges in making fair and equitable sentencing decisions. In addition, the authors developed and validated a new scale that can be used to further examine this novel approach to criminal sentencing in the future.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135666844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The dangerous use of genetic information","authors":"David Eugene Johnson, Debora Jane Shaw","doi":"10.1108/jices-06-2023-0089","DOIUrl":"https://doi.org/10.1108/jices-06-2023-0089","url":null,"abstract":"Purpose The purpose of this paper is to inform or alert readers to the extensive use and ready availability of genetic information that poses varying degrees of social and legal danger. The eugenics movement of the 1920s and the general acceptance of genetic essentialism provide context for considering contemporary examples of the problem. Design/methodology/approach This paper takes an argumentative approach, supporting proposals with ideas from historical and current research literature. Findings The limits of data protection, extensive use of direct-to-consumer genetic testing and use of genetic information in white nationalist circles portend a resurgence of eugenic beliefs from a century ago. Social implications Research-based recommendations may help to avoid extreme consequences by encouraging people to make informed decisions about the use of genetic information. Originality/value The paper counterposes contemporary understanding of genetic testing and data accessibility with the much older ideology of eugenics, leading to concerns about how white nationalists might further their aims with 21st century technology.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135044355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceived risk and digital piracy: a moderated-moderation model","authors":"Kian Yeik Koay","doi":"10.1108/jices-02-2023-0014","DOIUrl":"https://doi.org/10.1108/jices-02-2023-0014","url":null,"abstract":"Purpose This study aims to examine the joint moderating effects of privacy risk and time risk on the relationship between financial risk and intentions to pirate digital products. Design/methodology/approach The author collected data from 247 participants using a survey method. Subsequently, PROCESS macro was used to evaluate the proposed hypotheses. Findings This study found that financial risk does not have a significant relationship with the consumer intention to pirate digital products. However, privacy risk moderates the negative relationship between financial risk and consumers’ intention to pirate digital products, such that the negative relationship is stronger when privacy risk is high. Furthermore, time risk does not moderate the negative relationship between financial risk and consumers’ intention to pirate digital products. Lastly, it was found that privacy risk and time risk jointly moderate the negative relationship between financial risk and consumers’ intention to pirate digital products, such that the negative relationship is strongest when both privacy risk and time risk are high. Originality/value This study contributes to the digital piracy literature by understanding the extent of consumer predispositions when there are combined different types of perceived risks against their piracy decision.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135343163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors influencing mobile phone usage awareness for accessing agricultural marketing information by grape smallholder farmers in Dodoma, Tanzania","authors":"Alex I. Nyagango, Alfred S. Sife, Isaac Kazungu","doi":"10.1108/jices-04-2023-0048","DOIUrl":"https://doi.org/10.1108/jices-04-2023-0048","url":null,"abstract":"Purpose There is a contradictive debate on factors influencing mobile phone usage awareness among scholars. This study aims to examine factors influencing mobile phone usage awareness for accessing agricultural marketing information. Design/methodology/approach A descriptive cross-sectional research design was used with 400 smallholder grape farmers. The use of structured questionnaires, focus group discussions and key informant interviews helped to collect primary data. Data analysis was subjected to descriptive, ordinal logistic regression and thematic approaches. Findings This study found that farmers were mostly aware of voice calls helping to access buyers and price information. Education, age and sex were the critical factors influencing mobile phone usage awareness among grape smallholder farmers. Originality/value This study contributes to scientific knowledge by providing an understanding of the perceived factors on mobile phone usage awareness within the grape subsector to inform policymakers.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136263728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Curtis C. Cain, Carlos D. Buskey, Gloria J. Washington
{"title":"Artificial intelligence and conversational agent evolution – a cautionary tale of the benefits and pitfalls of advanced technology in education, academic research, and practice","authors":"Curtis C. Cain, Carlos D. Buskey, Gloria J. Washington","doi":"10.1108/jices-02-2023-0019","DOIUrl":"https://doi.org/10.1108/jices-02-2023-0019","url":null,"abstract":"Purpose The purpose of this paper is to demonstrate the advancements in artificial intelligence (AI) and conversational agents, emphasizing their potential benefits while also highlighting the need for vigilant monitoring to prevent unethical applications. Design/methodology/approach As AI becomes more prevalent in academia and research, it is crucial to explore ways to ensure ethical usage of the technology and to identify potentially unethical usage. This manuscript uses a popular AI chatbot to write the introduction and parts of the body of a manuscript discussing conversational agents, the ethical usage of chatbots and ethical concerns for academic researchers. Findings The authors reveal which sections were written entirely by the AI using a conversational agent. This serves as a cautionary tale highlighting the importance of ethical considerations for researchers and students when using AI and how educators must be prepared for the increasing prevalence of AI in the academy and industry. Measures to mitigate potential unethical use of this evolving technology are also discussed in the manuscript. Originality/value As conversational agents and chatbots increase in society, it is crucial to understand how they will impact the community and how we can live with technology instead of fighting against it.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135353922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Richard Noel Canevez, Jenifer Sunrise Winter, Joseph G. Bock
{"title":"Social and digital media monitoring for nonviolence: a distributed cognition perspective of the precariousness of peace work","authors":"Richard Noel Canevez, Jenifer Sunrise Winter, Joseph G. Bock","doi":"10.1108/jices-03-2023-0029","DOIUrl":"https://doi.org/10.1108/jices-03-2023-0029","url":null,"abstract":"Purpose This paper aims to explore the technologization of peace work through “remote support monitors” that use social and digital media technologies like social media to alert local violence prevention actors to potentially violent situations during demonstrations. Design/methodology/approach Using a distributed cognition lens, the authors explore the information processing of monitors within peace organizations. The authors adopt a qualitative thematic analysis methodology composed of interviews with monitors and documents from their shared communication and discussion channels. The authors’ analysis seeks to highlight how information is transformed between social and technical actors through the process of monitoring. Findings The authors’ analysis identifies that the technologization of monitoring for violence prevention to assist nonviolent activists produces two principal and related forms of transformation: appropriation and hidden attributes. Monitors “appropriate” information from sources to fit new ends and modes of representation throughout the process of detection, verification and dissemination. The verification and dissemination processes likewise render latent supporting informational elements, hiding the aggregative nature of information flow in monitoring. The authors connect the ideas of appropriation and hidden attributes to broader discourses in surveillance and trust that challenge monitoring and its place in peace work going forward. Originality/value To the best of the authors’ knowledge, this study is the first to focus on the communicative and information processes of remote support monitors. The authors demonstrate that adoption of social and digital media information of incipient violence and response processes for its mitigation suggests both a social and technical precarity for the role of monitoring.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134914044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}