2017
DOI: 10.1177/0007650317727540
|View full text |Cite
|
Sign up to set email alerts
|

The Governance of Digital Technology, Big Data, and the Internet: New Roles and Responsibilities for Business

Abstract: The importance of digital technologies for social and economic developments and a growing focus on data collection and privacy concerns have made the Internet a salient and visible issue in global politics. Recent developments have increased the awareness that the current approach of governments and business to the governance of the Internet and the adjacent technological spaces raises a host of ethical issues. The significance and challenges of the digital age have been further accentuated by a string of high… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
108
0
8

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 175 publications
(132 citation statements)
references
References 22 publications
1
108
0
8
Order By: Relevance
“…In past several decades, numerous studies have investigated the relationship between companies and users through the Internet [1][2][3]. This relationship, based on user-brand interaction on social networks, is a starting point for the study of the relationship between companies and their customers in digital environments [4].…”
Section: Introductionmentioning
confidence: 99%
“…In past several decades, numerous studies have investigated the relationship between companies and users through the Internet [1][2][3]. This relationship, based on user-brand interaction on social networks, is a starting point for the study of the relationship between companies and their customers in digital environments [4].…”
Section: Introductionmentioning
confidence: 99%
“…We have understood that typical hierarchy of successful cyber attacks allows for better preparation to prevent the current and future breaches. It is a concept related to the structure of an attack with the recent development of healthcare technology [16], consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target. Method kill chain has defending or preemptive action.…”
Section: Interrupting the Kill Chain And Advanced Health Care Tomentioning
confidence: 99%
“…Although the state unsurprisingly dominates IR literature as the main "referent object" for cyber-securitizations, other referent objects do exist. Liberal personhood, digital systems, and profitoriented organizations have all been proposed as alternatives (Deibert, 2018;Flyverbom, Deibert, & Matten, 2017;Shires, 2019). Overall, this literature demonstrates that cybersecurity consists of multiple overlapping, sometimes contradictory, and sometimes failed security discourses.…”
Section: Legitimate and Malicious Activity In Cyberspacementioning
confidence: 99%