2,724 research outputs found

    Technology, privacy and identity: a Hong Kong perspective

    Get PDF
    This article explores the concepts of privacy and identity in Hong Kong in relation to the law relating to data protection. It first considers the notions of privacy and identity in the light of Hong Kong's socioeconomic situation and recent postcolonial heritage. It then highlights the importance of identity management and considers the distinctions and overlaps between identity management and privacy protection. With this conceptual framework in mind, the article then considers the various laws in Hong Kong pertaining to data protection, with a focus on the aspects relating to identity management. It observes that while there is some legal protection in respect of the data relating to an individual's identity, there are other priorities which may take precedence in determining the extent of identity management under the legal system in Hong Kong. Finally, recommendations are made as to how to improve identity management within the context of data protection in Hong Kong

    The contexts and contours of British economic literature, 1660-1760

    Get PDF
    This article explores some of the main bibliographical dimensions of economic literature at a time when there was much interest in economic matters but no discipline of economics. By looking at what was published in the round much economic literature is shown to be short, ephemeral, unacknowledged, polemical, and legistlatively orientated. This fluidity is underscored by the uncertainties about what constituted key works of economic literature and by the failure of attempts to make sense of that literature through dictionaries and histories. Economic literature in the period was, consequently, more unstable and uncertain than has often been acknowledged. It cannot, therefore, be simply characterized as either 'mercantilist' or nascent 'political economy'

    Emergent Global Information Infrastructure/Global Information Society: Regime Formation and the Impact on Africa

    Get PDF
    This paper combines a theoretical perspective on globalization and the information society with a critical usage of international regime theory in order to contribute to a better understanding of the current historical period of transition from an international telecommunications regime to a new and complex regime aimed at providing governance for the global information infrastructure and global information society. The paper employs a case-study approach to explore some of the specific national responses (i.e. South Africa) to this regime transition, with an analysis of potential best practices and lessons learned for other emerging economies.public finance, macroeconomic policy, policy design, international economic order, economic integration

    The Role of Pseudonymity in Mobile e-Participation

    Get PDF
    In addition to lack of knowledge and trust in official authorities, privacy concerns are among the reasons for non-participation in public discourse. Mitigating these barriers is important when aiming to promote and ultimately increase public participation. Through the lens of a long-term field study with a mobile participation prototype, this research investigated citizens\u27 participation patterns in relation to their choice in username (real name vs. pseudonym). Our data suggests that while engagement served less socializing purposes, social appreciation was not affected by pseudonymity. Interestingly, those participating with their real-name lost trust in the local government. Overall, we found no evidence that pseudonymity impacts the level of participation, but participants indicated to favor using a pseudonym in the future

    EXPLORING TECHNOLOGY TRUST IN BITCOIN: THE BLOCKCHAIN EXEMPLAR

    Get PDF
    The acceptance of Bitcoin as an electronic currency is steadily on the rise. This implies there is a surge in the diffusion and adoption of the blockchain technology introduced by Bitcoin as well. Moreover, the potential of this novel disruptive technology has been acknowledged by academic researchers and practitioners alike. IS research has shown that trust is a significant antecedent enabling the adoption of a novel technology and attenuating the apprehensions of risk and uncertainty among consumers. Trust in a technology is formed by the trusting beliefs of a trustor regarding the trustworthiness of the IT artifact. The blockchain technology, the trustee, has features like cryptography, decentralization, hash functions, digital signature, consensus mechanism, which embody trust in the technology. We present an extensive description of Bitcoin as an instantiation of the blockchain technology, while offering a detailed account of the literature on trust in a technology. We conceptually present, through the use of knowledge mapping, how blockchain ensures trust in the technology. We propose future research directions for trust research in the blockchain context and urge IS academics to explore trust in this novel context
    • 

    corecore