The Brave browser: a monetary opportunity for libraries in the cryptoverse

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Brady Lund

Purpose This paper aims to describe the benefits of the Brave web browser and its native cryptocurrency, the Basic Attention Token (BAT), for use by library patrons to preserve privacy and as a potential fundraising platform for libraries. Design/methodology/approach The Brave browser and BAT are introduced, an analysis of trends in adoption of these technologies is discussed and an argument for libraries to adopt/promote these technologies is presented. Findings Libraries could support the online privacy of their patrons if they encourage them to adopt the Brave browser, which is designed with privacy and security in mind. Libraries could also benefit from participating in the Brave Rewards program, which allows Brave users to donate BAT, a cryptotoken that they earn by viewing Brave ads, which can be traded for cash. Originality/value To the best of the author’s knowledge, this paper is the first to discuss the applications of the Brave browser in libraries and the potentials of cryptocurrency adoption by libraries.

2015 ◽  
Vol 23 (3) ◽  
pp. 333-346 ◽  
Author(s):  
Swapan Purkait

Purpose – This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet. Design/methodology/approach – The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet. Findings – The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally. Originality/value – This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nikolaos Goumagias ◽  
Jason Whalley ◽  
Ozge Dilaver ◽  
James Cunningham

PurposeThis paper aims to study the evolution of definitions of internet of things (IoT) through time, critically assess the knowledge these definitions contain and facilitate sensemaking by providing those unfamiliar with IoT with a theoretical definition and an extended framework.Design/methodology/approach164 articles published between 2005 and 2019 are collected using snowball sampling. Further, 100 unique definitions are identified in the sample. Definitions are examined using content analysis and applying a theoretical framework of five knowledge dimensions.FindingsIn declarative/relational dimensions of knowledge, increasing levels of agreement are observed in the sample. Sources of tautological reasoning are identified. In conditional and causal dimensions, definitions of IoT remain underdeveloped. In the former, potential limitations of IoT related to resource scarcity, privacy and security are overlooked. In the latter, three main loci of agreement are identified.Research limitations/implicationsThis study does not cover all published definitions of IoT. Some narratives may be omitted by our selection criteria and process.Practical implicationsThis study supports sensemaking of IoT. Main loci of agreement in definitions of IoT are identified. Avenues for further clarification and consensus are explored. A new framework that can facilitate further investigation and agreement is introduced.Originality/valueThis is, to the authors’ knowledge, the first study that examines the historical evolution of definitions of IoT vis-à-vis its technological features. This study introduces an updated framework to critically assess and compare definitions, identify ambiguities and resolve conflicts among different interpretations. The framework can be used to compare past and future definitions and help actors unfamiliar with IoT to make sense of it in a way to reduce adoption costs. It can also support researchers in studying early discussions of IoT.


2020 ◽  
Vol 21 (2) ◽  
pp. 165-180 ◽  
Author(s):  
Nasser Mohammed Al-Fannah ◽  
Chris Mitchell

Purpose Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major negative impact on online privacy. Despite the availability of a range of fingerprinting countermeasures as well as some limited attempts by browser vendors to curb its effectiveness, it remains largely uncontrolled. The paper aims to discuss this issue. Design/methodology/approach This paper provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting, covering both user-based and browser-based techniques. Findings This study discusses the limitations of counter browser fingerprinting measures and the need for browser vendor support in controlling fingerprinting. Further, a somewhat counterintuitive possible new browser identifier is proposed which could make cookies and fingerprint-based tracking redundant; the need for, and possible effect of, this feature is discussed. Originality/value This study provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting. Also, it proposes a new browser identifier that could make cookies and fingerprint-based tracking redundant.


2016 ◽  
Vol 33 (6) ◽  
pp. 1642-1658 ◽  
Author(s):  
Siu-Tsen Shen

Purpose – The purpose of this paper is to investigate how a balanced study group consisting of 152 participants interact with, operate, customize, and control their smartphone applications. Design/methodology/approach – This work uses a qualitative research methodology involving an online user study questionnaire, supported by e-mailed user screenshots and online conversations. Findings – In terms of smartphone age, 72 per cent of the participants’ smartphones were less than two years old. This high level of churn rate was anticipated and will please retailers and marketers alike. This study found that the majority of smartphone users regularly arrange their app icons and that their categorization principle was based primarily on application associated functionality and frequency of use. This group of users seemed less concerned about the risks of privacy and security, and even when they had lost or had their smartphone stolen, few (5.2 per cent) had suffered from fraud, in contrast to the general perception of risk. Originality/value – This is one of the few studies to have investigated the area of smartphone use from the users’ perspective, leading to important insights into application user behaviour and icon arrangement, and as well as alternative possible implications for launcher design.


2014 ◽  
Vol 6 (3) ◽  
pp. 190-212 ◽  
Author(s):  
Purva Kansal

Purpose – The present study aims to identify and study the online privacy concerns, its explanatory variables and their affect on reactions and online purchasing behavior of Indian consumers. Globalization means that companies are setting manufacturing units where their cost dynamics are most attractive and then servicing the customers in different markets. Therefore, today, most of the globalized firms are using technology to overcome physical barriers with the customer. The value chains are being reorganized to come up with innovative strategies for sales, delivery and service channels. These strategies use Internet as a competitive tool, thereby providing marketers with a completely new landscape to work with. This channel means that now even the tangibles (products) are being sold on the basis of intangibles (services). In this landscape, the success of an online business depends on its capability to think globally and act locally. Sensitivity displayed by a company to effects of cultural nuances on a consumer’s psychological constructs will determine the success of a company and its strategy. It is in this backdrop that the current study was undertaken. Design/methodology/approach – To establish a relationship of the consumer privacy concerns and consumers’ reactions and their online purchase behavior, data were collected on the basis of a self-administered structured questionnaire. Data were collected from 150 respondents. Confirmatory factor analysis in LISREL (8.70) was done to check the validity of the scale. Incremental fit indices and parsimonious fit indices were used to interpret whether the model fit the data. Further, data were analyzed using factor analysis, correlation and chi-square tests. Findings – The study found several significant correlations between consumer’s online privacy and their behavior. The study made attempt to study only linkages and not a causal relationship. This study found that there was a correlation between online privacy concerns and consumer behavior. Indian consumers opted to voice and complain about privacy concerns, and hence, companies need to invest in recovery strategies. Furthermore, Indian consumers exhibited more of a refrained behavior rather than hedonic purchase behavior. However, refrained behavior was a first step toward the latter. To promote refrained behavior, marketers need to work with a model which provides Indian consumers with an assurance of procedural fairness and fair information practices. These companies need to invest in software, rewards, detailed privacy notices and tangibles to motivate customers into transacting online. Armed with this information a marketer can also invest into the right kind of privacy and security tools. Research limitations/implications – Due to the limited sample size, the results of the study can be generalized to a limited extent. Practical implications – The results would help online marketers maneuver the target consumer’s behavior in the desired direction. The results would help companies design and invest in the right kind of privacy and security tools, for the target segments matching the sample. Originality/value – The manuscript is based on a unique data set collected for this study. The references have been cited as per American Psychological Association (APA) rules. The work is original.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Eneko Bidegain ◽  
Amaia Arroyo Sagasta ◽  
Koldo Diaz Bizkarguenaga ◽  
Aitor Zuberogoitia ◽  
Eneko Antón ◽  
...  

Purpose This study aims to explore the main concerns and attitudes Basque adolescents have regarding online privacy. It analyzes their motivations for sharing private information and the kind of information they share. Likewise, it examines whether they consider the potential consequences of revealing certain information online and analyzes if there are any differences between the motivations and attitudes of young people from Gipuzkoa and Labourd. Design/methodology/approach For this study, three methods were combined to collect the data in 17 schools in the Basque provinces of Gipuzkoa and Labourd: a survey carried out among 1,133 students, out of which 242 also completed a diary and 482 took part in discussion groups. Findings The data from this research does not fully support the “youth cultures of disclosure” (James, 2009) in the Basque Country; however, some of these practices have been observed. Originality/value Time spent online by adolescents has increased sharply in recent years. This increase has brought with it concerns about youth’s level of awareness regarding online privacy. This is the first cross-border study conducted in the Basque Country addressing this topic (in the Basque Autonomous Community, administratively belonging to Spanish territory, and in the Northern Basque Country, administratively in French territory).


2019 ◽  
Vol 22 (1) ◽  
pp. 5-8
Author(s):  
Ian Cummins

Purpose The purpose of this paper is to discuss the recent National Appropriate Adult Network (NAAN) report on the role of the appropriate adult. Design/methodology/approach This paper is based on the NAAN report and a review of relevant policy and research literature. Findings There to Help 2 highlights that there are still significant gaps in the provision of appropriate adult schemes across England and Wales. These gaps potentially place vulnerable adults at increased risk. Originality/value This paper is a review of recent research.


2019 ◽  
Vol 41 (4) ◽  
pp. 740-757 ◽  
Author(s):  
Sophie Hennekam ◽  
Subramaniam Ananthram ◽  
Steve McKenna

Purpose The purpose of this paper is to investigate how individuals perceive and react to the involuntary demotion of a co-worker in their organisation. Design/methodology/approach The authors draw on 46 semi-structured in-depth interviews (23 dyads) with co-workers of demoted individuals. Findings The findings suggest that an individual’s observation of the demotion of a co-worker has three stages: their perception of fairness, their emotional reaction and their behavioural reaction. The perception of fairness concerned issues of distributive, procedural, interpersonal and informational justice. The emotional responses identified were feelings of disappointment/disillusion, uncertainty, vulnerability and anger. Finally, the behavioural reactions triggered by their emotional responses included expressions of voice, loyalty, exit and adaptation. Originality/value Perceptions of (in)justice perpetrated on others stimulate emotional and behavioural responses, which impacts organisational functioning. Managers should therefore pay attention to the way a demotion is perceived, not only by those directly concerned, but also by co-workers as observers.


2019 ◽  
Vol 32 (4) ◽  
pp. 455-471
Author(s):  
Jorge Cruz-Cárdenas ◽  
Jorge Guadalupe-Lanas ◽  
Ekaterina Zabelina ◽  
Andrés Palacio-Fierro ◽  
Margarita Velín-Fárez ◽  
...  

Purpose The purpose of this paper is to understand in-depth how consumers create value in their lives using WhatsApp, the leading mobile instant messaging (MIM) application. Design/methodology/approach The study adopts the perspective of customer-dominant logic (CDL) and uses a qualitative multimethod design involving 3 focus groups and 25 subsequent in-depth interviews. The research setting was Ecuador, a Latin American country. Findings Analysis and interpretation of the participants’ stories made it possible to identify and understand the creation of four types of value: maintaining and strengthening relationships; improving role performance; emotional support; and entertainment and fun. In addition, the present study proposes a conceptual model of consumer value creation as it applies to MIM. Practical implications Understanding the way consumers create value in their lives using MIM is important not only for organizations that offer MIM applications, but also for those companies that develop other applications for mobile phones or for those who wish to use MIM as an electronic word-of-mouth vehicle. Originality/value The current study is one of the first to address the topic of consumer behavior in the use of technologies from the perspective of CDL; this perspective enables an integrated qualitative vision of value creation in which the consumer is the protagonist.


2019 ◽  
Vol 25 (3) ◽  
pp. 378-396 ◽  
Author(s):  
Arian Razmi-Farooji ◽  
Hanna Kropsu-Vehkaperä ◽  
Janne Härkönen ◽  
Harri Haapasalo

Purpose The purpose of this paper is twofold: first, to understand data management challenges in e-maintenance systems from a holistically viewpoint through summarizing the earlier scattered research in the field, and second, to present a conceptual approach for addressing these challenges in practice. Design/methodology/approach The study is realized as a combination of a literature review and by the means of analyzing the practices on an industry leader in manufacturing and maintenance services. Findings This research provides a general understanding over data management challenges in e-maintenance and summarizes their associated proposed solutions. In addition, this paper lists and exemplifies different types and sources of data which can be collected in e-maintenance, across different organizational levels. Analyzing the data management practices of an e-maintenance industry leader provides a conceptual approach to address identified challenges in practice. Research limitations/implications Since this paper is based on studying the practices of a single company, it might be limited to generalize the results. Future research topics can focus on each of mentioned data management challenges and also validate the applicability of presented model in other companies and industries. Practical implications Understanding the e-maintenance-related challenges helps maintenance managers and other involved stakeholders in e-maintenance systems to better solve the challenges. Originality/value The so-far literature on e-maintenance has been studied with narrow focus to data and data management in e-maintenance appears as one of the less studied topics in the literature. This research paper contributes to e-maintenance by highlighting the deficiencies of the discussion surrounding the perspectives of data management in e-maintenance by studying all common data management challenges and listing different types of data which need to be acquired in e-maintenance systems.


Sign in / Sign up

Export Citation Format

Share Document