What’s trending in libraries from the internet cybersphere – alternate technology use – 03 – 2016

2016 ◽  
Vol 33 (10) ◽  
pp. 15-16
Author(s):  
Adetoun A. Oyelude

Purpose This last edition of the column begins with the disadvantages of sleeping in the library and ends with 60-year-old overdue loans, but in between are alternate ways of using different technology to access information! Design/methodology/approach Sleeping in the library is trending on the internet, not because it is a nice pastime, but because it is one of the most viral trends of the year. Findings The real advice is that falling asleep in public places such as libraries is not good. A lot of wild reactions to the picture of a girl sleeping in a university library has caused all sorts, as “photo-shoppers”have had a field day, putting the sleeper in all sorts of situations – in Drake’s “Hotline Bling” music video, dancing with Michael Jackson and more. Social implications Derrick Lewis on 26th August reported that an Orange County library had made wi-fi devices available for rural internet users. Originality/value It is helping rural families make faster connections, and it is free to try the device which can be borrowed for 3 weeks and renewed twice if no one else has booked to use it.

2009 ◽  
Vol 19 (1) ◽  
pp. 60-77 ◽  
Author(s):  
Rami Puzis ◽  
Dana Yagil ◽  
Yuval Elovici ◽  
Dan Braha

PurposeThe purpose of this paper is to model and study the effectiveness of an attack on the anonymity of Internet users by a group of collaborating eavesdroppers.Design/methodology/approachThe paper is based on an analysis of the Internet topology. The study is based on two methods for choosing nodes that contribute the most to the detection of as many communicating Internet users as possible.FindingsThe paper illustrates that it is possible to compromise the anonymity of many Internet users when eavesdropping on a relatively small number of nodes, even when the most central ones are protected from eavesdropping.Research limitations/implicationsIt is assumed that the Internet users under attack are not using any anonymity enhancing technologies, but nodes can be protected from eavesdropping. It proposes a measure of the success of an attack on Internet users' anonymity, for a given deployment of collaborating eavesdroppers in the Internet.Practical implicationsThe paper shows that several, and not necessarily the most prominent, collaborating nodes can compromise the anonymity of a considerable portion of Internet users. This study also emphasizes that when trying to completely compromise the anonymity of Internet users, an eavesdroppers' deployment strategy that considers eavesdroppers' collaboration can result in substantial resource saving compared to choosing a set of the most prominent nodes.Originality/valueThe paper proposes a new measure of anonymity level in the network, based on the linkability of the Internet users. This paper is the first to present results of a non‐trivial Group Betweenness optimization strategy in large complex networks.


2018 ◽  
Vol 31 (3) ◽  
pp. 845-868 ◽  
Author(s):  
Serkan Celik

PurposeThe purpose of this paper is to elaborate the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.Design/methodology/approachA sectional research design and survey method was adopted throughout the study to examine the opinions and perceptions of internet users regarding cyberhate by descriptively exploring the existing situation from various perspectives. The participants of the study were determined by purposive sampling methods to attain maximum variety among internet users who are considered as highly literate in technology use. The data were collected through a personal data form and a survey (Cyberhate Perception Scale) from 372 internet users living in Turkey and the USA.FindingsThe findings of the study revealed that the majority of participants do not perceive cyberhate as a part of freedom of speech and they believe that online hate behaviors, which they also consider to be a violation of human rights, should be deemed illegal and be punished accordingly. The findings, which were discussed in line with the existing research, indicated some significant predictors of internet users’ perceptions on cyberhate.Originality/valueAs cyberhate is an understudied area that raises concerns in terms of internet user exposure, the objective of this research is to understand tendencies about the opinions and perceptions of internet users regarding online hate speech, and bring cyberhate to the attention of internet users and policy stakeholders.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Anjan Pal ◽  
Snehasish Banerjee

PurposeThe Internet is a breeding ground for rumors. A way to tackle the problem involves the use of counter-rumor messages that refute rumors. This paper analyzes users' intention to follow rumors and counter-rumors as a function of two factors: individuals' risk propensity and messages' prior endorsement.Design/methodology/approachThe paper conducted an online experiment. Complete responses from 134 participants were analyzed statistically.FindingsRisk-seeking users were keener to follow counter-rumors compared with risk-averse ones. No difference was detected in terms of their intention to follow rumors. Users' intention to follow rumors always exceeded their intention to follow counter-rumors regardless of whether prior endorsement was low or high.Research limitations/implicationsThis paper contributes to the scholarly understanding of people's behavioral responses when, unknowingly, exposed to rumors and counter-rumors on the Internet. Moreover, it dovetails the literature by examining how risk-averse and risk-seeking individuals differ in terms of intention to follow rumors and counter-rumors. It also shows how prior endorsement of such messages drives their likelihood to be followed.Originality/valueThe paper explores the hitherto elusive question: When users are unknowingly exposed to both a rumor and its counter-rumor, which entry is likely to be followed more than the other? It also takes into consideration the roles played by individuals' risk propensity and messages' prior endorsement.


2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


2016 ◽  
Vol 45 (1) ◽  
pp. 29-50 ◽  
Author(s):  
Aristides Isidoro Ferreira ◽  
Joana Diniz Esteves

Purpose – Activities such as making personal phone calls, surfing on the internet, booking personal appointments or chatting with colleagues may or may not deviate attentions from work. With this in mind, the purpose of this paper is to examine gender differences and motivations behind personal activities employees do at work, as well as individuals’ perception of the time they spend doing these activities. Design/methodology/approach – Data were obtained from 35 individuals (M age=37.06 years; SD=7.80) from a Portuguese information technology company through an ethnographic method including a five-day non-participant direct observation (n=175 observations) and a questionnaire with open-ended questions. Findings – Results revealed that during a five-working-day period of eight hours per day, individuals spent around 58 minutes doing personal activities. During this time, individuals engaged mainly in socializing through conversation, internet use, smoking and taking coffee breaks. Results revealed that employees did not perceive the time they spent on non-work realted activities accurately, as the values of these perceptions were lower than the actual time. Moreover, through HLM, the findings showed that the time spent on conversation and internet use was moderated by the relationship between gender and the leisure vs home-related motivations associated with each personal activity developed at work. Originality/value – This study contributes to the literature on human resource management because it reveals how employees often perceive the time they spend on non-work related activities performed at work inaccurately. This study highlights the importance of including individual motivations when studying gender differences and personal activities performed at work. The current research discusses implications for practitioners and outlines suggestions for future studies.


2016 ◽  
Vol 44 (4) ◽  
pp. 18-25 ◽  
Author(s):  
Saul J. Berman ◽  
Peter J. Korsten ◽  
Anthony Marshall

Purpose Digital reinvention helps organizations create unique, compelling experiences for their customers, partners, employees and other stakeholders. Design/methodology/approach Digital reinvention combines the capabilities of multiple technologies, including cloud, cognitive, mobile and the Internet of Things (IoT) to rethink customer and partner relationships from a perspective of fundamental customer need, use or aspiration. Findings The most successful digitally reinvented businesses establish a platform of engagement for their customers, with the business acting as enabler, conduit and partner Practical implications For successful digital reinvention, organizations need to pursue a new strategic focus, build new expertise and establish new ways of working. Originality/value The article offers a blueprint for digital reinvention that involves rethinking customer and partner relationships from a perspective of fundamental customer need, use or aspiration.


2019 ◽  
Vol 35 (1) ◽  
pp. 19-21

Purpose This paper reviews the latest management developments across the globe and pinpoints practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings If you search images of the word “strategy” on the internet, three of the first seven images to appear on Google (other search engines are available) include chess pieces, while two of the top ten hits involve light bulbs. Aside from the obvious conclusions that any strategic discussion should either involve chess grand masters or well-lit rooms, it is clear that most people assume winning games with lots of moves are possible is the key to a successful strategy. But is this a valid analogy, even at a high level? Originality/value The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2019 ◽  
Vol 71 (1) ◽  
pp. 54-71 ◽  
Author(s):  
Artur Strzelecki

Purpose The purpose of this paper is to clarify how many removal requests are made, how often, and who makes these requests, as well as which websites are reported to search engines so they can be removed from the search results. Design/methodology/approach Undertakes a deep analysis of more than 3.2bn removed pages from Google’s search results requested by reporting organizations from 2011 to 2018 and over 460m removed pages from Bing’s search results requested by reporting organizations from 2015 to 2017. The paper focuses on pages that belong to the .pl country coded top-level domain (ccTLD). Findings Although the number of requests to remove data from search results has been growing year on year, fewer URLs have been reported in recent years. Some of the requests are, however, unjustified and are rejected by teams representing the search engines. In terms of reporting copyright violations, one company in particular stands out (AudioLock.Net), accounting for 28.1 percent of all reports sent to Google (the top ten companies combined were responsible for 61.3 percent of the total number of reports). Research limitations/implications As not every request can be published, the study is based only what is publicly available. Also, the data assigned to Poland is only based on the ccTLD domain name (.pl); other domain extensions for Polish internet users were not considered. Originality/value This is first global analysis of data from transparency reports published by search engine companies as prior research has been based on specific notices.


2019 ◽  
Vol 43 (5) ◽  
pp. 799-817 ◽  
Author(s):  
Ivan-Damir Anic ◽  
Jelena Budak ◽  
Edo Rajh ◽  
Vedran Recher ◽  
Vatroslav Skare ◽  
...  

Purpose The purpose of this paper is to investigate the relationship between individual and societal determinants of online privacy concern (OPC) and behavioral intention of internet users. The study also aims to assess the degree of reciprocity between consumers’ perceived benefits of using the internet and their OPC in the context of their decision-making process in the online environment. Design/methodology/approach The study proposes comprehensive model for analysis of antecedents and consequences of OPC. Empirical analysis is performed using the PLS–SEM approach on a representative sample of 2,060 internet users. Findings The findings show that computer anxiety and perceived quality of regulatory framework are significant antecedents of OPC, while traditional values and inclinations toward security, family and social order; and social trust are not. Furthermore, the study reveals that perceived benefits of using the internet are the predominant factor explaining the intention to share personal information and adopt new technologies, while OPC dominates in explanation of protective behavior. Research limitations/implications Although the authors tested an extended model, there might be other individual characteristics driving the level of OPC. This research covers just one country and further replications should be conducted to confirm findings in diverse socio-economic contexts. It is impossible to capture the real behavior with survey data, and experimental studies may be needed to verify the research model. Practical implications Managers should work toward maximizing perceived benefits of consumers’ online interaction with the company, while at the same time being transparent about the gathered data and their intended purpose. Considering the latter, companies should clearly communicate their compliance with the emerging new data protection regulation. Originality/value New extended model is developed and empirically tested, consolidating current different streams of research into one conceptual model.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


Sign in / Sign up

Export Citation Format

Share Document