Pub Date : 2023-12-11DOI: 10.1108/jices-06-2023-0076
Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai, Quynh-Chi Le
Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account. Findings The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting. Research limitations/implications This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances. Practical implications Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems. Originality/value The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.
目的研究数据收集意识对社交网站用户信息安全意识和信息共享行为的影响。基于通信隐私管理理论,运用结构方程模型分析和单因素方差分析,预测了信息共享行为与数据收集目的意识、数据收集策略和安全风险感知之间的关系。越南521名年龄在18岁至34岁之间的年轻社交媒体用户的样本量由26.7%的男性和73.3%的女性组成。在构建单源受访者的问卷调查方法时,考虑了个体使用在线社交网络(OSNs)的独特意识和体验。调查结果表明,信息共享与数据收集意识、信息安全威胁认知和行为之间存在显著关系。社交媒体用户由于担心数据收集,使用了OSN的隐私设置,并关注了共享限制。本研究是在越南年轻的社交媒体用户中进行的,反映了越南环境中普遍存在的特定特征,因此可能在其他国家的情况下无效。社交媒体平台提供商应该通过实施透明的隐私政策来改善用户连接,允许用户选择如何使用他们的数据;有明确的隐私声明和具体政策来规管社交媒体用户数据的使用,尊重用户使用其数据的同意;并彻底沟通他们如何收集和使用用户数据,同时及时检测系统中的任何潜在漏洞。原创性/价值作者确认本文中的材料不会侵犯任何法定版权,并且在接受Journal of Information, Communication and Ethics in Society评审期间不会将稿件提交到其他地方。
{"title":"Information security risks and sharing behavior on OSN: the impact of data collection awareness","authors":"Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai, Quynh-Chi Le","doi":"10.1108/jices-06-2023-0076","DOIUrl":"https://doi.org/10.1108/jices-06-2023-0076","url":null,"abstract":"\u0000Purpose\u0000This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.\u0000\u0000\u0000Design/methodology/approach\u0000Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.\u0000\u0000\u0000Findings\u0000The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.\u0000\u0000\u0000Research limitations/implications\u0000This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.\u0000\u0000\u0000Practical implications\u0000Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.\u0000\u0000\u0000Originality/value\u0000The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.\u0000","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"8 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138584454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-19DOI: 10.1108/jices-11-2022-0101
Ace Vo, Miloslava Plachkinova
Purpose The purpose of this study is to examine public perceptions and attitudes toward using artificial intelligence (AI) in the US criminal justice system. Design/methodology/approach The authors took a quantitative approach and administered an online survey using the Amazon Mechanical Turk platform. The instrument was developed by integrating prior literature to create multiple scales for measuring public perceptions and attitudes. Findings The findings suggest that despite the various attempts, there are still significant perceptions of sociodemographic bias in the criminal justice system and technology alone cannot alleviate them. However, AI can assist judges in making fairer and more objective decisions by using triangulation – offering additional data points to offset individual biases. Social implications Other scholars can build upon the findings and extend the work to shed more light on some problems of growing concern for society – bias and inequality in criminal sentencing. AI can be a valuable tool to assist judges in the decision-making process by offering diverse viewpoints. Furthermore, the authors bridge the gap between the fields of technology and criminal justice and demonstrate how the two can be successfully integrated for the benefit of society. Originality/value To the best of the authors’ knowledge, this is among the first studies to examine a complex societal problem like the introduction of technology in a high-stakes environment – the US criminal justice system. Understanding how AI is perceived by society is necessary to develop more transparent and unbiased algorithms for assisting judges in making fair and equitable sentencing decisions. In addition, the authors developed and validated a new scale that can be used to further examine this novel approach to criminal sentencing in the future.
{"title":"Investigating the role of artificial intelligence in the US criminal justice system","authors":"Ace Vo, Miloslava Plachkinova","doi":"10.1108/jices-11-2022-0101","DOIUrl":"https://doi.org/10.1108/jices-11-2022-0101","url":null,"abstract":"Purpose The purpose of this study is to examine public perceptions and attitudes toward using artificial intelligence (AI) in the US criminal justice system. Design/methodology/approach The authors took a quantitative approach and administered an online survey using the Amazon Mechanical Turk platform. The instrument was developed by integrating prior literature to create multiple scales for measuring public perceptions and attitudes. Findings The findings suggest that despite the various attempts, there are still significant perceptions of sociodemographic bias in the criminal justice system and technology alone cannot alleviate them. However, AI can assist judges in making fairer and more objective decisions by using triangulation – offering additional data points to offset individual biases. Social implications Other scholars can build upon the findings and extend the work to shed more light on some problems of growing concern for society – bias and inequality in criminal sentencing. AI can be a valuable tool to assist judges in the decision-making process by offering diverse viewpoints. Furthermore, the authors bridge the gap between the fields of technology and criminal justice and demonstrate how the two can be successfully integrated for the benefit of society. Originality/value To the best of the authors’ knowledge, this is among the first studies to examine a complex societal problem like the introduction of technology in a high-stakes environment – the US criminal justice system. Understanding how AI is perceived by society is necessary to develop more transparent and unbiased algorithms for assisting judges in making fair and equitable sentencing decisions. In addition, the authors developed and validated a new scale that can be used to further examine this novel approach to criminal sentencing in the future.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135666844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-09DOI: 10.1108/jices-06-2023-0089
David Eugene Johnson, Debora Jane Shaw
Purpose The purpose of this paper is to inform or alert readers to the extensive use and ready availability of genetic information that poses varying degrees of social and legal danger. The eugenics movement of the 1920s and the general acceptance of genetic essentialism provide context for considering contemporary examples of the problem. Design/methodology/approach This paper takes an argumentative approach, supporting proposals with ideas from historical and current research literature. Findings The limits of data protection, extensive use of direct-to-consumer genetic testing and use of genetic information in white nationalist circles portend a resurgence of eugenic beliefs from a century ago. Social implications Research-based recommendations may help to avoid extreme consequences by encouraging people to make informed decisions about the use of genetic information. Originality/value The paper counterposes contemporary understanding of genetic testing and data accessibility with the much older ideology of eugenics, leading to concerns about how white nationalists might further their aims with 21st century technology.
{"title":"The dangerous use of genetic information","authors":"David Eugene Johnson, Debora Jane Shaw","doi":"10.1108/jices-06-2023-0089","DOIUrl":"https://doi.org/10.1108/jices-06-2023-0089","url":null,"abstract":"Purpose The purpose of this paper is to inform or alert readers to the extensive use and ready availability of genetic information that poses varying degrees of social and legal danger. The eugenics movement of the 1920s and the general acceptance of genetic essentialism provide context for considering contemporary examples of the problem. Design/methodology/approach This paper takes an argumentative approach, supporting proposals with ideas from historical and current research literature. Findings The limits of data protection, extensive use of direct-to-consumer genetic testing and use of genetic information in white nationalist circles portend a resurgence of eugenic beliefs from a century ago. Social implications Research-based recommendations may help to avoid extreme consequences by encouraging people to make informed decisions about the use of genetic information. Originality/value The paper counterposes contemporary understanding of genetic testing and data accessibility with the much older ideology of eugenics, leading to concerns about how white nationalists might further their aims with 21st century technology.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135044355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-28DOI: 10.1108/jices-02-2023-0014
Kian Yeik Koay
Purpose This study aims to examine the joint moderating effects of privacy risk and time risk on the relationship between financial risk and intentions to pirate digital products. Design/methodology/approach The author collected data from 247 participants using a survey method. Subsequently, PROCESS macro was used to evaluate the proposed hypotheses. Findings This study found that financial risk does not have a significant relationship with the consumer intention to pirate digital products. However, privacy risk moderates the negative relationship between financial risk and consumers’ intention to pirate digital products, such that the negative relationship is stronger when privacy risk is high. Furthermore, time risk does not moderate the negative relationship between financial risk and consumers’ intention to pirate digital products. Lastly, it was found that privacy risk and time risk jointly moderate the negative relationship between financial risk and consumers’ intention to pirate digital products, such that the negative relationship is strongest when both privacy risk and time risk are high. Originality/value This study contributes to the digital piracy literature by understanding the extent of consumer predispositions when there are combined different types of perceived risks against their piracy decision.
{"title":"Perceived risk and digital piracy: a moderated-moderation model","authors":"Kian Yeik Koay","doi":"10.1108/jices-02-2023-0014","DOIUrl":"https://doi.org/10.1108/jices-02-2023-0014","url":null,"abstract":"Purpose This study aims to examine the joint moderating effects of privacy risk and time risk on the relationship between financial risk and intentions to pirate digital products. Design/methodology/approach The author collected data from 247 participants using a survey method. Subsequently, PROCESS macro was used to evaluate the proposed hypotheses. Findings This study found that financial risk does not have a significant relationship with the consumer intention to pirate digital products. However, privacy risk moderates the negative relationship between financial risk and consumers’ intention to pirate digital products, such that the negative relationship is stronger when privacy risk is high. Furthermore, time risk does not moderate the negative relationship between financial risk and consumers’ intention to pirate digital products. Lastly, it was found that privacy risk and time risk jointly moderate the negative relationship between financial risk and consumers’ intention to pirate digital products, such that the negative relationship is strongest when both privacy risk and time risk are high. Originality/value This study contributes to the digital piracy literature by understanding the extent of consumer predispositions when there are combined different types of perceived risks against their piracy decision.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135343163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-20DOI: 10.1108/jices-04-2023-0048
Alex I. Nyagango, Alfred S. Sife, Isaac Kazungu
Purpose There is a contradictive debate on factors influencing mobile phone usage awareness among scholars. This study aims to examine factors influencing mobile phone usage awareness for accessing agricultural marketing information. Design/methodology/approach A descriptive cross-sectional research design was used with 400 smallholder grape farmers. The use of structured questionnaires, focus group discussions and key informant interviews helped to collect primary data. Data analysis was subjected to descriptive, ordinal logistic regression and thematic approaches. Findings This study found that farmers were mostly aware of voice calls helping to access buyers and price information. Education, age and sex were the critical factors influencing mobile phone usage awareness among grape smallholder farmers. Originality/value This study contributes to scientific knowledge by providing an understanding of the perceived factors on mobile phone usage awareness within the grape subsector to inform policymakers.
{"title":"Factors influencing mobile phone usage awareness for accessing agricultural marketing information by grape smallholder farmers in Dodoma, Tanzania","authors":"Alex I. Nyagango, Alfred S. Sife, Isaac Kazungu","doi":"10.1108/jices-04-2023-0048","DOIUrl":"https://doi.org/10.1108/jices-04-2023-0048","url":null,"abstract":"Purpose There is a contradictive debate on factors influencing mobile phone usage awareness among scholars. This study aims to examine factors influencing mobile phone usage awareness for accessing agricultural marketing information. Design/methodology/approach A descriptive cross-sectional research design was used with 400 smallholder grape farmers. The use of structured questionnaires, focus group discussions and key informant interviews helped to collect primary data. Data analysis was subjected to descriptive, ordinal logistic regression and thematic approaches. Findings This study found that farmers were mostly aware of voice calls helping to access buyers and price information. Education, age and sex were the critical factors influencing mobile phone usage awareness among grape smallholder farmers. Originality/value This study contributes to scientific knowledge by providing an understanding of the perceived factors on mobile phone usage awareness within the grape subsector to inform policymakers.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136263728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-15DOI: 10.1108/jices-02-2023-0019
Curtis C. Cain, Carlos D. Buskey, Gloria J. Washington
Purpose The purpose of this paper is to demonstrate the advancements in artificial intelligence (AI) and conversational agents, emphasizing their potential benefits while also highlighting the need for vigilant monitoring to prevent unethical applications. Design/methodology/approach As AI becomes more prevalent in academia and research, it is crucial to explore ways to ensure ethical usage of the technology and to identify potentially unethical usage. This manuscript uses a popular AI chatbot to write the introduction and parts of the body of a manuscript discussing conversational agents, the ethical usage of chatbots and ethical concerns for academic researchers. Findings The authors reveal which sections were written entirely by the AI using a conversational agent. This serves as a cautionary tale highlighting the importance of ethical considerations for researchers and students when using AI and how educators must be prepared for the increasing prevalence of AI in the academy and industry. Measures to mitigate potential unethical use of this evolving technology are also discussed in the manuscript. Originality/value As conversational agents and chatbots increase in society, it is crucial to understand how they will impact the community and how we can live with technology instead of fighting against it.
{"title":"Artificial intelligence and conversational agent evolution – a cautionary tale of the benefits and pitfalls of advanced technology in education, academic research, and practice","authors":"Curtis C. Cain, Carlos D. Buskey, Gloria J. Washington","doi":"10.1108/jices-02-2023-0019","DOIUrl":"https://doi.org/10.1108/jices-02-2023-0019","url":null,"abstract":"Purpose The purpose of this paper is to demonstrate the advancements in artificial intelligence (AI) and conversational agents, emphasizing their potential benefits while also highlighting the need for vigilant monitoring to prevent unethical applications. Design/methodology/approach As AI becomes more prevalent in academia and research, it is crucial to explore ways to ensure ethical usage of the technology and to identify potentially unethical usage. This manuscript uses a popular AI chatbot to write the introduction and parts of the body of a manuscript discussing conversational agents, the ethical usage of chatbots and ethical concerns for academic researchers. Findings The authors reveal which sections were written entirely by the AI using a conversational agent. This serves as a cautionary tale highlighting the importance of ethical considerations for researchers and students when using AI and how educators must be prepared for the increasing prevalence of AI in the academy and industry. Measures to mitigate potential unethical use of this evolving technology are also discussed in the manuscript. Originality/value As conversational agents and chatbots increase in society, it is crucial to understand how they will impact the community and how we can live with technology instead of fighting against it.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135353922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-14DOI: 10.1108/jices-03-2023-0029
Richard Noel Canevez, Jenifer Sunrise Winter, Joseph G. Bock
Purpose This paper aims to explore the technologization of peace work through “remote support monitors” that use social and digital media technologies like social media to alert local violence prevention actors to potentially violent situations during demonstrations. Design/methodology/approach Using a distributed cognition lens, the authors explore the information processing of monitors within peace organizations. The authors adopt a qualitative thematic analysis methodology composed of interviews with monitors and documents from their shared communication and discussion channels. The authors’ analysis seeks to highlight how information is transformed between social and technical actors through the process of monitoring. Findings The authors’ analysis identifies that the technologization of monitoring for violence prevention to assist nonviolent activists produces two principal and related forms of transformation: appropriation and hidden attributes. Monitors “appropriate” information from sources to fit new ends and modes of representation throughout the process of detection, verification and dissemination. The verification and dissemination processes likewise render latent supporting informational elements, hiding the aggregative nature of information flow in monitoring. The authors connect the ideas of appropriation and hidden attributes to broader discourses in surveillance and trust that challenge monitoring and its place in peace work going forward. Originality/value To the best of the authors’ knowledge, this study is the first to focus on the communicative and information processes of remote support monitors. The authors demonstrate that adoption of social and digital media information of incipient violence and response processes for its mitigation suggests both a social and technical precarity for the role of monitoring.
{"title":"Social and digital media monitoring for nonviolence: a distributed cognition perspective of the precariousness of peace work","authors":"Richard Noel Canevez, Jenifer Sunrise Winter, Joseph G. Bock","doi":"10.1108/jices-03-2023-0029","DOIUrl":"https://doi.org/10.1108/jices-03-2023-0029","url":null,"abstract":"Purpose This paper aims to explore the technologization of peace work through “remote support monitors” that use social and digital media technologies like social media to alert local violence prevention actors to potentially violent situations during demonstrations. Design/methodology/approach Using a distributed cognition lens, the authors explore the information processing of monitors within peace organizations. The authors adopt a qualitative thematic analysis methodology composed of interviews with monitors and documents from their shared communication and discussion channels. The authors’ analysis seeks to highlight how information is transformed between social and technical actors through the process of monitoring. Findings The authors’ analysis identifies that the technologization of monitoring for violence prevention to assist nonviolent activists produces two principal and related forms of transformation: appropriation and hidden attributes. Monitors “appropriate” information from sources to fit new ends and modes of representation throughout the process of detection, verification and dissemination. The verification and dissemination processes likewise render latent supporting informational elements, hiding the aggregative nature of information flow in monitoring. The authors connect the ideas of appropriation and hidden attributes to broader discourses in surveillance and trust that challenge monitoring and its place in peace work going forward. Originality/value To the best of the authors’ knowledge, this study is the first to focus on the communicative and information processes of remote support monitors. The authors demonstrate that adoption of social and digital media information of incipient violence and response processes for its mitigation suggests both a social and technical precarity for the role of monitoring.","PeriodicalId":186016,"journal":{"name":"Journal of Information, Communication and Ethics in Society","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134914044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}