Search results
1 – 10 of 96Di Wang, Deborah Richards, Ayse Aysin Bilgin and Chuanfu Chen
The rising volume of open government data (OGD) contrasts with the limited acceptance and utilization of OGD among citizens. This study investigates the reasons for citizens’ not…
Abstract
Purpose
The rising volume of open government data (OGD) contrasts with the limited acceptance and utilization of OGD among citizens. This study investigates the reasons for citizens’ not using available OGD by comparing citizens’ attitudes towards OGD with the development of OGD portals. The comparison includes four OGD utilization processes derived from the literature, namely OGD awareness, needs, access and consumption.
Design/methodology/approach
A case study in China has been carried out. A sociological questionnaire was designed to collect data from Chinese citizens (demand), and personal visits were carried out to collect data from OGD portals (supply).
Findings
Results show that Chinese citizens have low awareness of OGD and OGD portals. Significant differences were recognized between citizens’ expectations and OGD portals development in OGD categories and features, data access services and support functions. Correlations were found between citizens’ OGD awareness, needs, access and consumption.
Originality/value
By linking the supply of OGD from the governments with each process of citizens’ OGD utilization, this paper proposes a framework for citizens’ OGD utilization lifecycle and provides a new tool to investigate reasons for citizens’ not making use of OGD.
Details
Keywords
Di Wang, Deborah Richards, Ayse Aysin Bilgin and Chuanfu Chen
To address the key problem of lack of use in the advancement of open government data (OGD) portals from the aspect of good usability, which is an essential prerequisite to the…
Abstract
Purpose
To address the key problem of lack of use in the advancement of open government data (OGD) portals from the aspect of good usability, which is an essential prerequisite to the acceptance and usage of a portal, this paper aims to develop a usability framework including design principles and criteria for OGD portals and to discover problems in the present usability design.
Design/methodology/approach
This study builds the usability framework by extending usability principles for general websites to address the specific needs of OGD portals. Criteria for each principle are developed accordingly based on the literature. A comparative heuristic evaluation involving five expert evaluators and 13 Chinese province-level OGD portals has been carried out to test the capability of the usability framework.
Findings
A usability framework with 24 principles and 63 criteria has been built. The heuristic evaluation shows OGD portals performed better in meeting general principles than the OGD portals specific ones. Insufficient help functions weakened OGD portals' usability. Similarities and differences were found of Chinese OGD portals compared with similar studies in the United States.
Originality/value
This paper proposed a usability framework for OGD portals and proved its capability in recognizing usability problems and its causes by carrying out a comparative heuristic evaluation in China. By comparing the evaluation results with other studies in the United States, the findings and lessons learnt in this study can thus be shared across international borders.
Details
Keywords
Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…
Abstract
Purpose
To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.
Design/methodology/approach
The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.
Findings
This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.
Research limitations/implications
The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.
Practical implications
Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.
Social implications
Shared awareness and protection of ICT resources.
Originality/value
Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.
Details
Keywords
Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens and Malcolm Ryan
Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity…
Abstract
Purpose
Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity professionals, the authors conducted a study to uncover profiles of human factors that influence which ethical principles are valued highest following exposure to ethical dilemmas presented in a cybersecurity game.
Design/methodology/approach
The authors’ game first sensitises players (cybersecurity trainees) to five cybersecurity ethical principles (beneficence, non-maleficence, justice, autonomy and explicability) and then allows the player to explore their application in multiple cybersecurity scenarios. After playing the game, players rank the five ethical principles in terms of importance. A total of 250 first-year cybersecurity students played the game. To develop profiles, the authors collected players' demographics, knowledge about ethics, personality, moral stance and values.
Findings
The authors built models to predict the importance of each of the five ethical principles. The analyses show that, generally, the main driver influencing the priority given to specific ethical principles is cultural background, followed by the personality traits of extraversion and conscientiousness. The importance of the ingroup was also a prominent factor.
Originality/value
Cybersecurity professionals need to understand the impact of users' ethical choices. To provide ethics training, the profiles uncovered will be used to build artificially intelligent (AI) non-player characters (NPCs) to expose the player to multiple viewpoints. The NPCs will adapt their training according to the predicted players’ viewpoint.
Details
Keywords
Di Wang, Deborah Richards, Ayse Aysin Bilgin and Chuanfu Chen
Di Wang, Deborah Richards, Ayse Aysin Bilgin and Chuanfu Chen
Di Wang, Deborah Richards, Ayse Aysin Bilgin and Chuanfu Chen
Di Wang, Deborah Richards, Ayse Aysin Bilgin and Chuanfu Chen
Di Wang, Deborah Richards, Ayse Aysin Bilgin and Chuanfu Chen
Di Wang, Deborah Richards, Ayse Aysin Bilgin and Chuanfu Chen