Results for 'Digital piracy,Perceived risk theory,Financial risk,Privacy risk,Time risk,PLS-SEM'

1000+ found
Order:
  1.  12
    Perceived risk and digital piracy: a moderated-moderation model.Kian Yeik Koay - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):521-532.
    Purpose This study aims to examine the joint moderating effects of privacy risk and time risk on the relationship between financial risk and intentions to pirate digital products. Design/methodology/approach The author collected data from 247 participants using a survey method. Subsequently, PROCESS macro was used to evaluate the proposed hypotheses. Findings This study found that financial risk does not have a significant relationship with the consumer intention to pirate digital products. However, privacy risk (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model. [REVIEW]Cheolho Yoon - 2011 - Journal of Business Ethics 100 (3):405 - 417.
    Since digital piracy has posed a significant threat to the development of the software industry and the growth of the digital media industry, it has, for the last decade, held considerable interest for researchers and practitioners. This article will propose an integrated model that combines the theory of planned behavior (TPB) and ethics theory, the two theories that are most often used in digital piracy studies. Data were obtained from university students in China, and the model was (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  3.  7
    Factors Influencing the Behavioural Intention to Use Cryptocurrency in Emerging Economies During the COVID-19 Pandemic: Based on Technology Acceptance Model 3, Perceived Risk, and Financial Literacy. [REVIEW]Prapatchon Jariyapan, Suchira Mattayaphutron, Syeda Noorzahrah Gillani & Owais Shafique - 2022 - Frontiers in Psychology 12.
    Cryptocurrency could redefine the interplay of Internet-connected world markets by eliminating constraints set by traditional local currencies and exchange rates. It has the potential to revolutionise digital markets through the use of duty-free trading. This study investigates the factors which influence the behavioural intention to use cryptocurrency based on the Technology Acceptance Model 3 during the COVID-19 pandemic. Data were collected through a cross-sectional questionnaire from 357 Pakistani business-educated adults, including investors who had a rudimentary understanding of the technology (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  25
    The use of digital twins in healthcare: socio-ethical benefits and socio-ethical risks.Marc-Jeroen Bogaardt, Elsje Oosterkamp, Mireille van Hilten & Eugen Octav Popa - 2021 - Life Sciences, Society and Policy 17 (1):1-25.
    Anticipating the ethical impact of emerging technologies is an essential part of responsible innovation. One such emergent technology is the digital twin which we define here as a living replica of a physical system (human or non-human). A digital twin combines various emerging technologies such as AI, Internet of Things, big data and robotics, each component bringing its own socio-ethical issues to the resulting artefacts. The question thus arises which of these socio-ethical themes surface in the process and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  17
    Research on the Influence Mechanism of Consumers’ Perceived Risk on the Advertising Avoidance Behavior of Online Targeted Advertising.Hai Jian Wang, Xia Lei Yue, Aisha Rehman Ansari, Gui Qian Tang, Jian Yi Ding & Ya Qiong Jiang - 2022 - Frontiers in Psychology 13.
    In China, online sales continue to grow against the generally adverse effects of the COVID-19 pandemic on economic development. Although advertisers favor online targeted advertising for its precision, consumers may find it intrusive and avoid it. This study constructed a conceptual model based on Stimulus-Organism-Response theory, Approach-Avoidance Theory, and Brand Avoidance Theory to investigate the influence mechanism of consumers’ perceived risk on the avoidance behavior of online targeted advertising via an online survey. Collected 436 validated data was analyzed through (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  13
    Privacy at risk? Understanding the perceived privacy protection of health code apps in China.Wenhong Chen, An Hu & Gejun Huang - 2022 - Big Data and Society 9 (2).
    As a key constituent of China's approach to fighting COVID-19, Health Code apps (HCAs) not only serve the pandemic control imperatives but also exercise the agency of digital surveillance. As such, HCAs pave a new avenue for ongoing discussions on contact tracing solutions and privacy amid the global pandemic. This article attends to the perceived privacy protection among HCA users via the lens of the contextual integrity theory. Drawing on an online survey of adult HCA users in Wuhan and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  9
    Privacy, Propaganda, and Digital ID: Why Our Delicate Values Must Be Deliberately Defended.Matthew Tiessen - 2023 - Washington University Review of Philosophy 3:16-40.
    In this paper I explore privacy as a concept that becomes relevant and sometimes necessary under specific circumstances, but unnecessary in others. Privacy, I suggest, can be thought of as the right to be left alone and is integral to related concepts such as freedom, liberty, and independence. In light of the ongoing expansion of data-mining technologies, business models, and emerging modes of governance, I suggest that privacy is simultaneously more necessary and more at risk than ever. Privacy, in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  15
    Predicting the Consequences of Perceived Data Privacy Risks on Consumer Behaviour: An Entropy-TOPSIS Approach.Gloria Amaka Olayemi & Sulaimon Olanrewaju Adebiyi - 2022 - Studia Humana 11 (2):25-48.
    Advancement in internet of things and proliferation in the use of smart devices have raised concerns about the data privacy of online users. This study predicts the consequences of perceived data privacy risks on consumer behaviours in Lagos State, Nigeria using the integrated Entropy-Technique for Order Preference by Similarity to Ideal Solution. We employed Entropy to assign weights to each criterion. Subsequently, responses were systematically ranked to arrive at an inference using TOPSIS. 84.8% agree that any perceived cyber security threat (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  84
    Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four perceived risk components (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  10.  12
    Prediction and Application of Computer Simulation in Time-Lagged Financial Risk Systems.Hui Wang, Runzhe Liu, Yang Zhao & Xiaohui Du - 2021 - Complexity 2021:1-10.
    Based on the existing financial system risk models, a set of time-lag financial system risk models is established considering the influence brought by time-lag factors on the financial risk system, and the dynamical behavior of this system is analyzed by using chaos theory. Through Matlab simulation, the bifurcation diagram and phase diagram of time-lag risk intensity and control intensity are plotted. The analysis shows that this kind of time-lag financial system risk model has complex dynamic (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  8
    Generalized Trust and Financial Risk-Taking in China – A Contextual and Individual Analysis.Yi Xu - 2018 - Frontiers in Psychology 9:346911.
    Previous evidence from developed nations has suggested that more trusting individuals are more likely to take financial risks, such as investing in the stock market. Previous studies have found that Chinese citizens have particularly high generalized trust and are more risk-seeking in investment compared with Americans, which makes China an interesting case. The current study examines the relation between generalized trust and stock market participation in China at both a contextual and individual level. Across provinces, a lower level of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  21
    The use of digital twins in healthcare : socio-ethical benefits and socio-ethical risks.Eugen Octav Popa, Mireille Hilten, Elsje Oosterkamp & Marc Jeroen Bogaardt - 2021 - Life Sciences, Society and Policy 17 (1).
    Anticipating the ethical impact of emerging technologies is an essential part of responsible innovation. One such emergent technology is the digital twin which we define here as a living replica of a physical system. A digital twin combines various emerging technologies such as AI, Internet of Things, big data and robotics, each component bringing its own socio-ethical issues to the resulting artefacts. The question thus arises which of these socio-ethical themes surface in the process and how they are (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  33
    Predicting Accounting Students’ Intentions to Engage in Software and Music Piracy.Philmore Alleyne, Sherlexis Soleyn & Terry Harris - 2015 - Journal of Academic Ethics 13 (4):291-309.
    The purpose of this study is to investigate the salient factors that influence accounting students to engage in software and music piracy. This study uses the theory of reasoned action and the theory of planned behavior, and extends these models to incorporate other variables to predict individuals’ behavioral intentions. Specifically, we hypothesize that attitudes toward the behavior, subjective norms, perceived behavioral control, moral obligation and perceived prosecution risk influence intentions to engage in software and music piracy. Data were obtained (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  24
    Do advisors perceive climate change as an agricultural risk? An in-depth examination of Midwestern U.S. Ag advisors’ views on drought, climate change, and risk management.Sarah P. Church, Michael Dunn, Nicholas Babin, Amber Saylor Mase, Tonya Haigh & Linda S. Prokopy - 2018 - Agriculture and Human Values 35 (2):349-365.
    Through the lens of the Health Belief Model and Protection Motivation Theory, we analyzed interviews of 36 agricultural advisors in Indiana and Nebraska to understand their appraisals of climate change risk, related decision making processes and subsequent risk management advice to producers. Most advisors interviewed accept that weather events are a risk for US Midwestern agriculture; however, they are more concerned about tangible threats such as crop prices. There is not much concern about climate change among agricultural (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  64
    The Effects of Artist Adoration and Perceived Risk of Getting Caught on Attitude and Intention to Pirate Music in the United States and Taiwan.Jyh-Shen Chiou, Hsiao-I. Cheng & Chien-Yi Huang - 2011 - Ethics and Behavior 21 (3):182 - 196.
    Piracy is the greatest threat facing the global music industry today. This study explores the effects of artist adoration and the perceived risk of being caught on the attitude and intention to engage in pirating a digital song among college students. The moderating effect of cultural environment factor is also examined. Experiments using between-group factorial designs were conducted in the United States and Taiwan. The results show that perceived risk of getting caught and cultural environment are important (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  7
    Farmers’ trust in government and participation intention toward rural tourism through TAM: The moderation effect of perceived risk.Xia Yu - 2022 - Frontiers in Psychology 13.
    At present, there are almost 700 million rural population in China, and the farm and farmers in China are highly associated with the steadiness and development of the country and even the world. Farmers are the main subjects in rural development and play a vital role in the reception, management, and benefit distribution in rural tourism activities during the development of rural tourism. Farmers’ perception and participation intention in rural tourism development are directly related to the sustainable development of rural (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  30
    Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers' privacy concerns relates (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  18.  23
    Liberalism in neoliberal times: dimensions, contradictions, limits.Alejandro Abraham-Hamanoiel (ed.) - 2017 - London: Goldsmiths Press.
    An exploration of the theories, histories, practices, and contradictions of liberalism today. What does it mean to be a liberal in neoliberal times? This collection of short essays attempts to show how liberals and the wider concept of liberalism remain relevant in what many perceive to be a highly illiberal age. Liberalism in the broader sense revolves around tolerance, progress, humanitarianism, objectivity, reason, democracy, and human rights. Liberalism's emphasis on individual rights opened a theoretical pathway to neoliberalism, through private property, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  2
    Digital Inclusion and Financial Inclusion: Evidence from Peer-to-Peer Lending.Xiaoran Jia & Kiridaran Kanagaretnam - forthcoming - Journal of Business Ethics:1-36.
    We explore whether digital inclusion, a public policy designed to provide high-speed internet infrastructure for historically digitally excluded populations, is associated with the social and ethical challenge of financial inclusion. Using evidence from a sizable P2P lender in the U.S., we document that digital inclusion is positively associated with P2P lending penetration and that this relation is more pronounced in counties with limited commercial bank loan penetration and higher minority populations. Our new evidence from cross-sectional tests suggests that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  97
    Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns. [REVIEW]Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107 - 123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers’ privacy concerns relates (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  21.  20
    Self-Service Technologies and e-Services Risks in Social Commerce Era.Mauricio S. Featherman & Nick Hajli - 2016 - Journal of Business Ethics 139 (2):251-269.
    Social commerce as a subset of e-commerce has been emerged in part due to the popularity of social networking sites. Social commerce brings new challenges to marketing activities. And social commerce transactions like e-commerce transactions can be dangerous and cause harmful losses to personal finances, time, and information privacy. This article examines ethical issues and consumer assessments of the risks of using an e-service and how risk affects consumer evaluations and usage of Internet-based services and self-service technologies. Results from (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  22. Money as Media: Gilson Schwartz on the Semiotics of Digital Currency.Renata Lemos-Morais - 2011 - Continent 1 (1):22-25.
    continent. 1.1 (2011): 22-25. The Author gratefully acknowledges the financial support of CAPES (Coordenação de Aperfeiçoamento do Ensino Superior), Brazil. From the multifarious subdivisions of semiotics, be they naturalistic or culturalistic, the realm of semiotics of value is a ?eld that is getting more and more attention these days. Our entire political and economic systems are based upon structures of symbolic representation that many times seem not only to embody monetary value but also to determine it. The connection between monetary (...)
     
    Export citation  
     
    Bookmark  
  23. Risk in a Simple Temporal Framework for Expected Utility Theory and for SKAT, the Stages of Knowledge Ahead Theory’, Risk and Decision Analysis, 2(1), 5-32. selten co-author.Robin Pope & Reinhard Selten - 2010/2011 - Risk and Decision Analysis 2 (1).
    The paper re-expresses arguments against the normative validity of expected utility theory in Robin Pope (1983, 1991a, 1991b, 1985, 1995, 2000, 2001, 2005, 2006, 2007). These concern the neglect of the evolving stages of knowledge ahead (stages of what the future will bring). Such evolution is fundamental to an experience of risk, yet not consistently incorporated even in axiomatised temporal versions of expected utility. Its neglect entails a disregard of emotional and financial effects on well-being before a particular (...) is resolved. These arguments are complemented with an analysis of the essential uniqueness property in the context of temporal and atemporal expected utility theory and a proof of the absence of a limit property natural in an axiomatised approach to temporal expected utility theory. Problems of the time structure of risk are investigated in a simple temporal framework restricted to a subclass of temporal lotteries in the sense of David Kreps and Evan Porteus (1978). This subclass is narrow but wide enough to discuss basic issues. It will be shown that there are serious objections against the modification of expected utility theory axiomatised by Kreps and Porteus (1978, 1979). By contrast the umbrella theory proffered by Pope that she has now termed SKAT, the Stages of Knowledge Ahead Theory, offers an epistemically consistent framework within which to construct particular models to deal with particular decision situations. A model by Caplin and Leahy (2001) will also be discussed and contrasted with the modelling within SKAT (Pope, Leopold and Leitner 2007). (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  13
    Openness and privacy in born-digital archives: reflecting the role of AI development.Angeliki Tzouganatou - 2022 - AI and Society 37 (3):991-999.
    Galleries, libraries, archives and museums are striving to retain audience attention to issues related to cultural heritage, by implementing various novel opportunities for audience engagement through technological means online. Although born-digital assets for cultural heritage may have inundated the Internet in some areas, most of the time they are stored in “digital warehouses,” and the questions of the digital ecosystem’s sustainability, meaningful public participation and creative reuse of data still remain. Emerging technologies, such as artificial intelligence, are (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  54
    From privacy to anti-discrimination in times of machine learning.Thilo Hagendorff - 2019 - Ethics and Information Technology 21 (4):331-343.
    Due to the technology of machine learning, new breakthroughs are currently being achieved with constant regularity. By using machine learning techniques, computer applications can be developed and used to solve tasks that have hitherto been assumed not to be solvable by computers. If these achievements consider applications that collect and process personal data, this is typically perceived as a threat to information privacy. This paper aims to discuss applications from both fields of personality and image analysis. These applications are often (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  13
    Trust and digital privacy in healthcare: a cross-sectional descriptive study of trust and attitudes towards uses of electronic health data among the general public in Sweden.Niels Lynøe, Gert Helgesson & Sara Belfrage - 2022 - BMC Medical Ethics 23 (1):1-8.
    BackgroundThe ability of healthcare to protect sensitive personal data in medical records and registers might influence public trust, which in turn might influence willingness to allow healthcare to use such data. The aim of this study was to examine how the general public’s trust relates to their attitudes towards uses of health data.MethodsA stratified sample from the general Swedish population received a questionnaire about their willingness to share health data. Respondents were also asked about their trust in the management and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27. Digital Piracy: Factors that Influence Attitude Toward Behavior.Sulaiman Al-Rafee & Timothy Paul Cronan - 2006 - Journal of Business Ethics 63 (3):237-259.
    A new form of software piracy known as digital piracy has taken the spotlight. Lost revenues due to digital piracy could reach $5 billion by the end of 2005.Preventives and deterrents do not seem to be working – losses are increasing. This study examines factors that influence an individual’s attitude toward pirating digital material. The results of this study suggest that attitude toward digital pirating is influenced by beliefs about the outcome of behavior (cognitive beliefs), happiness (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   32 citations  
  28.  22
    E-textbook piracy behavior.Sri Rahayu Hijrah Hati, Rahma Fitriasih & Anya Safira - 2019 - Journal of Information, Communication and Ethics in Society 18 (1):105-123.
    Purpose The purpose of this paper is to examine the factors that influence the intention of students to pirate academic e-books by integrating three main theories: ethics theory, deterrence theory, and the theory of planned behavior. The study also examines the moderating role of past piracy behavior on the relationship between the factors in the previously mentioned theories and students’ piracy intention. Design/methodology/approach The data were collected using a convenience sample of 662 university students. Based on their past behaviors, the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  21
    Exploring Factors of the Willingness to Accept AI-Assisted Learning Environments: An Empirical Investigation Based on the UTAUT Model and Perceived Risk Theory.Wentao Wu, Ben Zhang, Shuting Li & Hehai Liu - 2022 - Frontiers in Psychology 13.
    Artificial intelligence technology has been widely applied in many fields. AI-assisted learning environments have been implemented in classrooms to facilitate the innovation of pedagogical models. However, college students' willingness to accept AI-assisted learning environments has been ignored. Exploring the factors that influence college students' willingness to use AI can promote AI technology application in higher education. Based on the Unified Theory of Acceptance and Use of Technology and the theory of perceived risk, this study identified six factors that influence (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  26
    What do you know about me? Digital privacy and online data sharing in the UK insurance sector.Ian R. Blakesley & Anca C. Yallop - 2019 - Journal of Information, Communication and Ethics in Society 18 (2):281-303.
    PurposeIn addition to data transforming the insurance sector from within, insurance consumers and their behaviour has transformed significantly over the past 20 years from traditional retail to, predominantly, online trading. Data are a fundamental part of how the sector operates, and the use of data in insurance is constantly evolving. This paper aims to explore consumer perceptions about digital privacy and their subsequent motivations to disclose personal data for insurance purposes.Design/methodology/approachThe study uses an exploratory research approach based on in-depth (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31. Rebellious youth and ineffective advice: A study of Vietnamese adolescents’ capability to deal with digital threats.Quan-Hoang Vuong, Quang-Loc Nguyen, Trung Tran, Hoang Phuoc-Hien Le, Viet-Phuong La, Tam-Tri Le & Minh-Hoang Nguyen - manuscript
    The digital era brings various benefits to adolescents. However, operating on the digital environment without sufficient knowledge and skills will expose them to multiple types of risks, especially in the country with low digital safety education rate like Vietnam. The current study examines factors that can contribute to cultivating adolescents’ digital resilience using the information-processing reasoning of the Mindsponge Theory. A UNESCO dataset of 1061 Vietnamese high school students was analyzed using the Bayesian Mindsponge Framework analytics. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  27
    Online Purchase Intention of Fruits: Antecedents in an Integrated Model Based on Technology Acceptance Model and Perceived Risk Theory.Yongchang Wei, Can Wang, Song Zhu, Hailong Xue & Fangyu Chen - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  33.  46
    Reimagining Digital Well-Being. Report for Designers & Policymakers.Daan Annemans, Matthew Dennis, , Gunter Bombaerts, Lily E. Frank, Tom Hannes, Laura Moradbakhti, Anna Puzio, Lyanne Uhlhorn, Titiksha Vashist, , Anastasia Dedyukhina, Ellen Gilbert, Iliana Grosse-Buening & Kenneth Schlenker - 2024 - Report for Designers and Policymakers.
    This report aims to offer insights into cutting-edge research on digital well-being. Many of these insights come from a 2-day academic-impact event, The Future of Digital Well-Being, hosted by a team of researchers working with the Royal Netherlands Academy of Arts and Sciences (KNAW) in February 2024. Today, achieving and maintaining well-being in the face of online technologies is a multifaceted challenge that we believe requires using theoretical resources of different research disciplines. This report explores diverse perspectives on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  13
    Digital contact tracing in the pandemic cities: Problematizing the regime of traceability in South Korea.Chamee Yang - 2022 - Big Data and Society 9 (1).
    Since 2020, many countries worldwide have deployed digital contact tracing programs that rely on a range of digital sensors in the city to locate and map the routes of viral spread. Many critical commentaries have raised concerns about the privacy risks and trustworthiness of these programs. Extending these analyses, this paper opens up a different line of questioning that goes beyond privacy-centered single-axis critique of surveillance by considering digital contact tracing symptomatic of the broader changes in modes (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  28
    The Digital Stressors Scale: Development and Validation of a New Survey Instrument to Measure Digital Stress Perceptions in the Workplace Context.Thomas Fischer, Martin Reuter & René Riedl - 2021 - Frontiers in Psychology 12.
    This article reports on the development of an instrument to measure the perceived stress that results from the use and ubiquity of digital technology in the workplace. Based upon a contemporary understanding of stress and a set of stressors that is a substantial update to existing scales, the Digital Stressors Scale advances the measurement of digital stress. Initially, 138 items were constructed for the instrument and grouped into a set of 15 digital stressors. Based on a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Digital psychiatry: ethical risks and opportunities for public health and well-being.Christopher Burr, Jessica Morley, Mariarosaria Taddeo & Luciano Floridi - 2020 - IEEE Transactions on Technology and Society 1 (1):21–33.
    Common mental health disorders are rising globally, creating a strain on public healthcare systems. This has led to a renewed interest in the role that digital technologies may have for improving mental health outcomes. One result of this interest is the development and use of artificial intelligence for assessing, diagnosing, and treating mental health issues, which we refer to as ‘digital psychiatry’. This article focuses on the increasing use of digital psychiatry outside of clinical settings, in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  37.  23
    Business strategy, enterprise risk management, organisational innovation performance and organisational performance: comparing fsQCA with PLS-SEM.Huynh Le Hoang Nhi, Pham Van Nguyen, Nguyen Le Ngoc Hang, Le Thi Thuan An, Luong Ho Quynh Giang, Le Huu Tuan Anh & Nguyen Vinh Khuong - 2023 - International Journal of Business Governance and Ethics 1 (1).
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  69
    Risk aversion elicitation: reconciling tractability and bias minimization. [REVIEW]Mohammed Abdellaoui, Ahmed Driouchi & Olivier L’Haridon - 2011 - Theory and Decision 71 (1):63-80.
    Risk attitude is known to be a key determinant of various economic and financial choices. Behavioral studies that aim to evaluate the role of risk attitudes in contexts of this type, therefore, require tools for measuring individual risk tolerance. Recent developments in decision theory provide such tools. However, the methods available can be time consuming. As a result, some practitioners might have an incentive to prefer “fast and frugal” methods to clean but more costly methods. In this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  33
    Conceptualizing data‐deliberation: The starry sky beetle, environmental system risk, and Habermasian CSR in the digital age.Mario D. Schultz & Peter Seele - 2020 - Business Ethics 29 (2):303-313.
    Building on an illustrative case of a systemic environmental threat and its multi‐stakeholder response, this paper draws attention to the changing political impacts of corporations in the digital age. Political Corporate Social Responsibility (PCSR) theory suggests an expanded sense of politics and corporations, including impacts that may range from voluntary initiatives to overcome governance gaps, to avoiding state regulation via corporate political activity. Considering digitalization as a stimulus, we explore potential responsibilities of corporations toward public goods in contexts with (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  40.  24
    Sisyphus and the Present: Time in Modern and Digital Legalities.Kieran Tranter - 2023 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 36 (2):373-384.
    Albert Camus’ reflection in _The Myth of Sisyphus_ presents the absurd, the intrusion of the meaningless and irrational universe into the order and future focus of modern life. Central to Camus’ reading of Sisyphus and his dammed eternal labour, was time. Camus clearly saw that modernity and modern life was predicated on tensions in time. Moderns perceived, and lived, in the timescale of past-present-future. A commitment to chronology that promised an allusion of meaning within a world of essential meaninglessness. Modern (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  17
    Sexual Boundary Violations via Digital Media Among Students.Juergen Budde, Christina Witz & Maika Böhm - 2022 - Frontiers in Psychology 12.
    As digital media becomes more central to the lives of adolescents, it also becomes increasingly relevant for their sexual communication. Sexting as an important image-based digital medium provides opportunities for self-determined digital communication, but also carries specific risks for boundary violations. Accordingly, sexting is understood either as an everyday, or as risky and deviant behavior among adolescents. In the affectedness of boundary violations gender plays an important role. However, it is still unclear to what extent digital (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  9
    Development and Supervision of Robo-Advisors under Digital Financial Inclusion in Complex Systems.Wensheng Dai - 2021 - Complexity 2021:1-12.
    With the rapid development of the market economy, there are more and more projects in the financial industry, and their complexity and technical requirements are getting higher and higher. The development of computer technology has promoted the birth of robot consultants, and it is of great significance to use robot consultants to manage and supervise financial industry projects. In order to further analyze the development and supervision of robo-advisors under the digital inclusive financial system, this paper uses complex systems (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  7
    A Taxonomy of user-perceived privacy risks to foster accountability of data-based services.Timo Jakobi, Maximilian von Grafenstein, Patrick Smieskol & Gunnar Stevens - 2022 - Journal of Responsible Technology 10 (C):100029.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  15
    Online accounting courses: digital loyalty for an inclusive and open society.Ashish Varma, Daniela Mancini, Ashwin Anupam Dalela & Aradhya Varma - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):221-242.
    Purpose Online education can facilitate inclusive societal development. In emerging countries with low investment per capita in school and universities, it helps students overcome infrastructure constraints to continue their learning and reach their full potential, and it helps educational institutes to save costs and improve quality of learning. This study aims to develop and empirically evaluate a conceptual model for predicting digital loyalty (DL) among participants in online accounting courses, as a key lever to execute an inclusive societal development (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  7
    Exploring the antecedents of trust in electronic word-of-mouth platform: The perspective on gratification and positive emotion.Xuemei Xie & Luyao Liu - 2022 - Frontiers in Psychology 13.
    Frequent human-media interaction via the electronic word-of-mouth platform, trust is acknowledged as an ongoing challenge. This study aimed to understand users' trust in the e-wom platform based on uses and gratifications theory and stimulus-organism-response paradigm. Utilitarian gratification was regarded as stimulus, social gratification and positive emotion as organism, and platform trust as response. Data was acquired from 268 users in China using a questionnaire survey, and the PLS-SEM was used to further analyze the results. The results indicated that there is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  6
    Sustaining eSports Industry and Regulatory Focus: Empirical Evidence From Chinese Universities.Gongyan Zhao, Yue Cheng, Xinggue Liu & Wentao Meng - 2022 - Frontiers in Psychology 13.
    This study examined the factors that affect the attitude and behavioral intentions toward electronic sports among students of higher education institutions based on the technology acceptance model. The conditional impact of preventive regulatory focus was analyzed in various aspects developed on the regulatory focus theory. These aspects comprised of perceived usefulness, perceived ease of use, and perceived risk on the attitude toward eSports. Accordingly, data were collected from 293 students of higher education institutions in China's Henan Province, presenting a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  31
    Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture.Godwin Udo, Kallol Bagchi & Moutusy Maity - 2016 - Journal of Business Ethics 135 (3):517-541.
    We develop and use an integrated individual-level model to explain the driving forces behind digital piracy practice in two nations. The proposed model combines the Norm Activation model and Unified Theory of Acceptance and Use of Technology models. This study also explores the effect of culture on intention to practice DP in two nations: US and India. A survey instrument was used to collect data from 231 US and 331 Indian participants. Use of the integrated model proves to be (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  48. Expanding the Duty to Rescue to Climate Migration.David N. Hoffman, Anne Zimmerman, Camille Castelyn & Srajana Kaikini - 2022 - Voices in Bioethics 8.
    Photo by Jonathan Ford on Unsplash ABSTRACT Since 2008, an average of twenty million people per year have been displaced by weather events. Climate migration creates a special setting for a duty to rescue. A duty to rescue is a moral rather than legal duty and imposes on a bystander to take an active role in preventing serious harm to someone else. This paper analyzes the idea of expanding a duty to rescue to climate migration. We address who should have (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  15
    Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights.Ana Beduschi - 2019 - Big Data and Society 6 (2).
    The World Bank estimates that over one billion people currently lack official identity documents. To tackle this crucial issue, the United Nations included the aim to provide legal identity for all by 2030 among the Sustainable Development Goals. Technology can be a powerful tool to reach this target. In the digital age, new technologies increasingly mediate identity verification and identification of individuals. Currently, State-led and public–private initiatives use technology to provide official identification, to control and secure external borders, and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  13
    Cryptocurrency Financial Risk Analysis Based on Deep Machine Learning.Si Chen - 2022 - Complexity 2022:1-8.
    Digital currency is considered a form of currency which is used in the digital world such as digital forms or electronic devices. Several terms are synonyms for digital currency like digital money, electronic money, and cyber cash. Accurate prediction of the digital currency is an urgent necessity due to its impacts on the economic community. The electronic economy is very dangerous and must be approached with great caution, so as to avoid or minimize the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000