20 results on '"Online protection"'
Search Results
2. LA INFANCIA Y LA ADOLESCENCIA EN LA ERA DIGITAL: NUEVOS RETOS PARA LA GARANTÍA DE SUS DERECHOS.
- Author
-
GONÇALVES, RUBÉN MIRANDA
- Subjects
BEST interests of the child (Law) ,INTERNET security ,DIGITAL technology ,COGNITIVE development ,TEENAGERS ,MINORS - Abstract
Copyright of Brazilian Journal of Law & International Relations / Relações Internacionais no Mundo is the property of Relacoes Internacionais no Mundo and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
3. E-Commerce and Consumer Protection in India: The Emerging Trend.
- Author
-
Chawla, Neelam and Kumar, Basanta
- Subjects
ELECTRONIC commerce ,CONSUMER protection ,CONSUMER law ,ELECTRONIC commerce laws ,CONSUMER preferences ,ONLINE shopping - Abstract
Given the rapid growth and emerging trend of e-commerce have changed consumer preferences to buy online, this study analyzes the current Indian legal framework that protects online consumers' interests. A thorough analysis of the two newly enacted laws, i.e., the Consumer Protection Act, 2019 and Consumer Protection (E-commerce) Rules, 2020 and literature review support analysis of 290 online consumers answering the research questions and achieving research objectives. The significant findings are that a secure and reliable system is essential for e-business firms to work successfully; cash on delivery is the priority option for online shopping; website information and effective customer care services build a customer's trust. The new regulations are arguably strong enough to protect and safeguard online consumers' rights and boost India's e-commerce growth. Besides factors such as security, privacy, warranty, customer service, and website information, laws governing consumer rights protection in e-commerce influence customers' trust. Growing e-commerce looks promising with a robust legal framework and consumer protection measures. The findings contribute to the body of knowledge on e-commerce and consumer rights protection by elucidating the key factors that affect customer trust and loyalty and offering an informative perspective on e-consumer protection in the Indian context with broader implications. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Code Renewability for Native Software Protection.
- Author
-
ABRATH, BERT, COPPENS, BART, VAN DEN BROECK, JENS, WYSEUR, BRECHT, CABUTTO, ALESSANDRO, FALCARIN, PAOLO, and DE SUTTER, BJORN
- Subjects
COMPUTER software ,PRODUCT tampering ,DIVERSIFICATION in industry ,PROTOTYPES ,CYBERTERRORISM - Abstract
Software protection aims at safeguarding assets embedded in software by preventing and delaying reverse engineering and tampering attacks. This article presents an architecture and supporting tool flow to renew parts of native applications dynamically. Renewed and diversified code and data belonging to either the original application or to linked-in protections are delivered from a secure server to a client on demand. This results in frequent changes to the software components when they are under attack, thus making attacks harder. By supporting various forms of diversification and renewability, novel protection combinations become available and existing combinations become stronger. The prototype implementation is evaluated on several industrial use cases. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
5. Dynamic analysis of multi‐machine multi‐UPFC power systems experiencing transient asymmetrical faults.
- Author
-
Samanfar, Amin, Shakarami, Mahmoud Reza, Soltani, Jafar, and Rokrok, Esmaeel
- Abstract
A new method for studying the transient asymmetrical shunt and series faults in multi‐machine multi‐unified power flow controller (multi‐UPFC) power systems is proposed. Considering an arbitrary shunt or series fault in a power system, the method uses a combination of space phasors‐based sequence networks corresponding to the fault. Synchronous machines and UPFCs are modelled via injecting sequence current phasors. The quasi‐static Y‐matrix equations of the network are solved first, to obtain the sequence voltages of the terminal bus‐bars of synchronous machines. Then, these voltages are used to solve the non‐linear equations of the machines (in the rotors d‐q reference frames) in the subsequent step time (Δt). This procedure is repeated until a steady‐state condition is reached in the post‐fault condition. The proposed method for fault analysis has high processing speed and acceptable accuracy, which is very important for online protection and control computations. Based on the proposed method, a computer program has been developed that is applicable for the fault analysis of modern or conventional power systems with any size. The performance of the proposed method is studied by some simulation results and compared with other similar works. The simulation results very well support the accuracy and efficiency of the method. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
6. Efectividad de los MOOC para docentes en el uso seguro de las TIC.
- Author
-
Gordillo, Aldo, López-Pernas, Sonsoles, and Barra, Enrique
- Abstract
Despite the efforts made, there is still an alarming difference between the digital competence that teachers have and the one they should have in order to develop their students' digital competence. The lack of teacher training in safe and responsible use of ICT is a special cause for concern. Online courses in MOOC format meet all the required conditions to offer a possible solution to the unavoidable and urgent need for initial and in-service teacher training in this area of digital competence. However, there is currently no evidence in the literature on the effectiveness of these courses for this purpose. This study examines the instructional effectiveness of courses in MOOC format for teacher training in the safe and responsible use of ICT by analysing three different official courses. The courses were analysed using three different methods: a questionnaire to measure participants' perceptions, pre-tests and post-tests to measure the knowledge acquired, and LORI (Learning Object Review Instrument) to measure the quality of digital educational resources created by the participants. The results suggest that online courses in MOOC format are an effective way to train teachers in the safe and responsible use of ICT, and that these courses can enable the development of digital competence in the area of content creation. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
7. HATE SPEECH – CAUSES AND CONSEQUENCES IN PUBLIC SPACE
- Author
-
MAREK GÓRKA
- Subjects
cyber bullying ,digital aggression ,Internet ,online bullying ,online protection ,young people ,Information technology ,T58.5-58.64 - Abstract
Due to the highly innovative technologies such as the smart phone, cyberbullying and on-line aggression have increasingly affected individuals across the world. Cyberbullying is defined as repeated unwanted, hurtful, harassing, and threatening interaction through electronic communication media. The anonymity and mobility afforded by the Internet has made harassment and expressions of hate effortless in a landscape that is abstract and beyond the realms of traditional law enforcement. Further, it argues that a broad coalition of government, schools, police and citizenry is likely to be most effective in reducing the harm caused by hate speech. The study discusses the targets of hate on the Internet, provides a framework within which problems can be identified and resolved by accentuating moral and social responsibility, and articulates possible solutions to combat this increasing problem.
- Published
- 2019
- Full Text
- View/download PDF
8. E-Commerce and Consumer Protection in India: The Emerging Trend
- Author
-
Neelam Chawla and Basanta Kumar
- Subjects
Online protection ,Original Paper ,Economics and Econometrics ,business.industry ,media_common.quotation_subject ,Warranty ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Context (language use) ,E-commerce ,Consumer protection ,E-Commerce ,General Business, Management and Accounting ,Consumer Bill of Rights ,Body of knowledge ,Arts and Humanities (miscellaneous) ,Loyalty ,Business ,Business and International Management ,Business ethics ,Marketing ,Law ,media_common - Abstract
Given the rapid growth and emerging trend of e-commerce have changed consumer preferences to buy online, this study analyzes the current Indian legal framework that protects online consumers’ interests. A thorough analysis of the two newly enacted laws, i.e., the Consumer Protection Act, 2019 and Consumer Protection (E-commerce) Rules, 2020 and literature review support analysis of 290 online consumers answering the research questions and achieving research objectives. The significant findings are that a secure and reliable system is essential for e-business firms to work successfully; cash on delivery is the priority option for online shopping; website information and effective customer care services build a customer's trust. The new regulations are arguably strong enough to protect and safeguard online consumers' rights and boost India’s e-commerce growth. Besides factors such as security, privacy, warranty, customer service, and website information, laws governing consumer rights protection in e-commerce influence customers’ trust. Growing e-commerce looks promising with a robust legal framework and consumer protection measures. The findings contribute to the body of knowledge on e-commerce and consumer rights protection by elucidating the key factors that affect customer trust and loyalty and offering an informative perspective on e-consumer protection in the Indian context with broader implications.
- Published
- 2021
9. Purdue University Students' Perceptions of Cybersecurity
- Author
-
Gonzalez, Ricardo
- Subjects
college students ,cybersecurity ,cyber terrorism ,online protection ,perception of safety ,unsafe web activities - Abstract
An investigation into Purdue University students’ attitudes about cybersecurity was conducted. Students were asked about their thoughts on cybersecurity, cyber-terrorism, and how they protect themselves. The data indicated that students were both aware of cyber-threats and participated in potentially unsafe internet activities. A variety of misconceptions regarding online security exposed, highlighting the need for greater education for college students regarding staying safe during online activities.
- Published
- 2022
10. Education of young people and children as a way of fighting against Internet hate, a form of cyber violence.
- Author
-
GÓRKA, Marek
- Subjects
YOUNG adults ,CYBERBULLYING ,HATE ,TELECOMMUNICATION ,TECHNOLOGICAL innovations ,INTERNET ,SMARTPHONES ,CYBERTERRORISM ,COALITION governments - Abstract
Due to highly innovative technologies such as the smart phone, cyberbullying and on-line aggression have increasingly affected individuals across the world. Cyberbullying is defined as repeated unwanted, hurtful, harassing, and threatening interaction through electronic communication media. The anonymity and mobility afforded by the Internet has made harassment and expressions of hate effortless in a landscape that is abstract and beyond the realms of traditional law enforcement. Further, it argues that a broad coalition of government, schools, police and citizenry is likely to be most effective in reducing the harm caused by hate speech. The study discusses the targets of hate on the Internet, provides a framework within which problems can be identified and resolved by accentuating moral and social responsibility, and articulates possible solutions to combat this increasing problem. [ABSTRACT FROM AUTHOR]
- Published
- 2017
11. Code Renewability for Native Software Protection
- Author
-
Bjorn De Sutter, Alessandro Cabutto, Bert Abrath, Brecht Wyseur, Paolo Falcarin, Bart Coppens, and Jens Van den Broeck
- Subjects
FOS: Computer and information sciences ,diversification ,Man-at-the-end attacks ,online protection ,security server ,software updates ,Reverse engineering ,Computer Science - Cryptography and Security ,General Computer Science ,Computer science ,0211 other engineering and technologies ,02 engineering and technology ,Diversification (marketing strategy) ,computer.software_genre ,Computer security ,Original Application ,Software ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Use case ,Architecture ,Safety, Risk, Reliability and Quality ,021110 strategic, defence & security studies ,business.industry ,020207 software engineering ,Component-based software engineering ,Settore ING-INF/05 - Sistemi di Elaborazione delle Informazioni ,business ,Cryptography and Security (cs.CR) ,computer - Abstract
Software protection aims at safeguarding assets embedded in software by preventing and delaying reverse engineering and tampering attacks. This paper presents an architecture and supporting tool flow to renew parts of native applications dynamically. Renewed and diversified code and data belonging to either the original application or to linked-in protections are delivered from a secure server to a client on demand. This results in frequent changes to the software components when they are under attack, thus making attacks harder. By supporting various forms of diversification and renewability, novel protection combinations become available, and existing combinations become stronger. The prototype implementation is evaluated on a number of industrial use cases., 30 pages
- Published
- 2020
12. Harmonizing freedom and protection: Adolescents' voices on automatic monitoring of social networking sites.
- Author
-
Van Royen, Kathleen, Poels, Karolien, and Vandebosch, Heidi
- Abstract
Automatic monitoring of user-generated content on social networking sites (SNSs) aims at detecting potential harm for adolescents by means of text and image mining techniques and subsequent actions by the providers (e.g. blocking users, legal action). Evidently, current research is primarily focused on its technological development. However, involving adolescents' voices regarding the desirability of this monitoring is important; particularly because automatic monitoring might invade adolescents' privacy and freedom, and consequently evoke reactance. In this study, fourteen focus groups were conducted with adolescents (N = 66) between 12 and 18 years old. The goal was to obtain insights into adolescents' opinions on desirability and priorities for automatically detecting harmful content on SNSs. Opinions reflect the contention between a need for protection online versus the preservation of freedom. Most adolescents in this study are in favour of automatic monitoring for situations they perceive as uncontrollable or that they cannot solve themselves. Clear priorities for detection must be set in order to ensure the privacy and autonomy of adolescents. Moreover, monitoring actions aiming at the prevention of harm are required. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
13. Telecommunications Industry Contributions to Child Online Protection.
- Author
-
Recalde-Viana, Mónica, Sádaba-Chalezquer, Charo, and Gutiérrez-García, Elena
- Subjects
- *
CHILD welfare , *MINORS , *INTERNET & children , *TELECOMMUNICATION research , *SOCIAL responsibility of business - Abstract
The technological landscape in relation to the minors presents numerous challenges facing the telecommunication industry, with families and schools. However, academic literature still remains silence in showing the strategic policies that the industry is managing in order to address these challenges. Therefore, this article has two aims: to provide an overview of the state of the art in order to present the main findings of the child protection policies in international telecom companies (17), stressing the analysis regarding their products and services and how they manage the collaboration with key stakeholders. Research was conducted using qualitative methodology: CSR reports and websites of the companies were analysed in order to define their strategic actions, as well as the individuals and institutions that collaborate. The findings show interesting insights, even with some differences by regions, among the most significant policies pursued by the sector are: self-regulation, product innovation regarding protection tools and a network of collaborations with stakeholders have been established, as an opportunity for facilitating new policies and strategies. In conclusion, telecom industry needs to integrate their policies regarding minor protection, promoting an integral management approach that comprises not only product development but also strengthen relationships with the main stakeholders as parents and institutions. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
14. Keeping Kids Safe From a Design Perspective: Ethical and Legal Guidelines for Designing a Video-Based App for Children.
- Author
-
Zydney, Janet and Hooper, Simon
- Subjects
- *
MOBILE app development , *INTERNET & children , *STREAMING video & television , *INTERNET in education , *MOBILE apps , *ETHICS , *SECURITY systems - Abstract
Educators can use video to gain invaluable information about their students. A concern is that collecting videos online can create an increased security risk for children. The purpose of this article is to provide ethical and legal guidelines for designing video-based apps for mobile devices and the web. By reviewing the literature, law, and code of ethics around designing sites that capture video of young children, we have developed a set of questions that can guide designers through the decisions that need to be considered in their plans. As an example, we describe how we applied these questions to the design of a Story Retell app, which enables students to share videos of themselves reading to gain feedback from their teachers. Although each design decision will vary across instructional contexts, these guidelines can serve as a framework for designing similar apps that collect video of children. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
15. Online protection of the child within Europe.
- Author
-
Reid, AlanS.
- Subjects
- *
INFORMATION technology laws , *INFORMATION retrieval , *ACCESS to information - Abstract
This article discusses the online protection available to children and young people within Europe. Children and young people are significant users of information technology and they must be able and comfortable to safely use this technology. The European Union and the Council of Europe have been at the vanguard of attempts to regulate the information society in order to protect young netizens. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
16. Novel approach based on microcontroller to online protection of induction motors
- Author
-
Bayindir, Ramazan and Sefa, İbrahim
- Subjects
- *
INDUCTION motors , *ELECTRONIC controllers , *ALTERNATING current electric motors , *PROCESS control systems - Abstract
Abstract: The study presents a combined protection approach for induction motors (IMs). To achieve this, the current, voltage, speed and temperature values of the IM were measured with sensors and processed automatically with the developed software in C. The processes were then inserted into a microcontroller. The experimental results have shown that the IM was protected against the possible problems encountered in online operation. The approach presented in this work provides flexibility, accuracy and reliability for smooth protection with the help of the combined protection approach. Moreover, the protection system can easily be applied to larger motors after small modifications in the software developed. It is also expected that the proposed system would provide faster and low cost protection. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
17. Comunicar : revista científica iberoamericana de comunicación y educación
- Author
-
Aldo Gordillo, Sonsoles López-Pernas, and Enrique Barra
- Subjects
profesor ,Alfabetización digital ,Teacher education ,Cursos en línea ,Online courses ,Contenidos digitales ,MOOC ,lcsh:Education (General) ,aprendizaje en línea ,lcsh:Communication. Mass media ,formación de profesores ,formación del profesorado ,contenidos digitales ,protección en línea ,enseñanza a distancia ,destreza ,nuevas tecnologías ,alfabetización digital ,competencia digital ,Protección en línea ,Online protection ,Internet ,Formación del profesorado ,Aprendizaje en línea ,Digital literacy ,Digital contents ,curso ,tecnología de la educación ,lcsh:P87-96 ,Competencia digital ,cursos en línea ,Online learning ,Digital competenc ,autoaprendizaje ,mooc ,lcsh:L ,lcsh:L7-991 ,lcsh:Education - Abstract
A pesar de los esfuerzos realizados, aún existe una alarmante diferencia entre la competencia digital que tienen los profesores y la que deberían tener para desarrollar la competencia digital en sus alumnos. De especial preocupación es la carencia de formación del profesorado en uso seguro y responsable de las TIC. Los cursos en línea con formato MOOC reúnen todas las condiciones necesarias para ofrecer una posible solución a la ineludible y apremiante necesidad de formación inicial y continua del profesorado en esta área de la competencia digital. Sin embargo, no existe actualmente evidencia en la literatura sobre la efectividad de estos cursos para tal cometido. Este estudio examina la efectividad instruccional de los cursos con formato MOOC para la formación del profesorado en el uso seguro y responsable de las TIC mediante el análisis de tres cursos oficiales diferentes. Estos se analizaron empleando tres instrumentos diferentes: un cuestionario para medir la percepción de los participantes, pretests y pos-tests para medir los conocimientos adquiridos y el instrumento LORI (Learning Object Review Instrument) para medir la calidad de recursos educativos digitales creados por los participantes. Los resultados sugieren que los cursos en línea con formato MOOC constituyen una forma efectiva de formar al profesorado en el uso seguro y responsable de las TIC, y que estos cursos pueden ayudar al desarrollo de la competencia digital en el área de creación de contenidos Despite the efforts made, there is still an alarming difference between the digital competence that teachers have and the one they should have in order to develop their students’ digital competence. The lack of teacher training in safe and responsible use of ICT is a special cause for concern. Online courses in MOOC format meet all the required conditions to offer a possible solution to the unavoidable and urgent need for initial and in-service teacher training in this area of digital competence. However, there is currently no evidence in the literature on the effectiveness of these courses for this purpose. This study examines the instructional effectiveness of courses in MOOC format for teacher training in the safe and responsible use of ICT by analysing three different official courses. The courses were analysed using three different methods: a questionnaire to measure participants’ perceptions, pre-tests and post-tests to measure the knowledge acquired, and LORI (Learning Object Review Instrument) to measure the quality of digital educational resources created by the participants. The results suggest that online courses in MOOC format are an effective way to train teachers in the safe and responsible use of ICT, and that these courses can enable the development of digital competence in the area of content creation
- Published
- 2019
- Full Text
- View/download PDF
18. Efectividad de los MOOC para docentes en el uso seguro de las TIC
- Author
-
Enrique Barra, Sonsoles López-Pernas, and Aldo Gordillo
- Subjects
Cultural Studies ,Alfabetización digital ,Teacher education ,media_common.quotation_subject ,Cursos en línea ,Learning object ,Online courses ,Contenidos digitales ,MOOC ,Education ,Quality (business) ,Digital competence ,media_common ,Protección en línea ,Online protection ,Medical education ,Formación del profesorado ,Aprendizaje en línea ,Communication ,Digital literacy ,Digital contents ,Content creation ,Competencia digital ,Information and Communications Technology ,Online learning ,Digital competenc ,Educational resources ,Psychology - Abstract
A pesar de los esfuerzos realizados, aún existe una alarmante diferencia entre la competencia digital que tienen los profesores y la que deberían tener para desarrollar la competencia digital en sus alumnos. De especial preocupación es la carencia de formación del profesorado en uso seguro y responsable de las TIC. Los cursos en línea con formato MOOC reúnen todas las condiciones necesarias para ofrecer una posible solución a la ineludible y apremiante necesidad de formación inicial y continua del profesorado en esta área de la competencia digital. Sin embargo, no existe actualmente evidencia en la literatura sobre la efectividad de estos cursos para tal cometido. Este estudio examina la efectividad instruccional de los cursos con formato MOOC para la formación del profesorado en el uso seguro y responsable de las TIC mediante el análisis de tres cursos oficiales diferentes. Estos se analizaron empleando tres instrumentos diferentes: un cuestionario para medir la percepción de los participantes, pretests y pos-tests para medir los conocimientos adquiridos y el instrumento LORI (Learning Object Review Instrument) para medir la calidad de recursos educativos digitales creados por los participantes. Los resultados sugieren que los cursos en línea con formato MOOC constituyen una forma efectiva de formar al profesorado en el uso seguro y responsable de las TIC, y que estos cursos pueden ayudar al desarrollo de la competencia digital en el área de creación de contenidos, Despite the efforts made, there is still an alarming difference between the digital competence that teachers have and the one they should have in order to develop their students’ digital competence. The lack of teacher training in safe and responsible use of ICT is a special cause for concern. Online courses in MOOC format meet all the required conditions to offer a possible solution to the unavoidable and urgent need for initial and in-service teacher training in this area of digital competence. However, there is currently no evidence in the literature on the effectiveness of these courses for this purpose. This study examines the instructional effectiveness of courses in MOOC format for teacher training in the safe and responsible use of ICT by analysing three different official courses. The courses were analysed using three different methods: a questionnaire to measure participants’ perceptions, pre-tests and post-tests to measure the knowledge acquired, and LORI (Learning Object Review Instrument) to measure the quality of digital educational resources created by the participants. The results suggest that online courses in MOOC format are an effective way to train teachers in the safe and responsible use of ICT, and that these courses can enable the development of digital competence in the area of content creation
- Published
- 2019
19. EDUCATION OF YOUNG PEOPLE AND CHILDREN AS A WAY OF FIGHTING AGAINST INTERNET HATE, A FORM OF CYBER VIOLENCE
- Author
-
Marek Górka
- Subjects
Government ,Internet ,Aggression ,business.industry ,online protection ,Internet privacy ,Law enforcement ,cyber-bullying ,young people ,online bullying ,Harm ,Political science ,medicine ,Harassment ,The Internet ,medicine.symptom ,digital aggression ,business ,Social responsibility ,Anonymity - Abstract
Due to highly innovative technologies such as the smartphone, cyber- bullying and on-line, aggression has increasingly affected individuals across the world. Cyber-bullying is defined as repeated unwanted, hurtful, harassing, and threatening interaction through electronic communication media. Anonymity and mobility afforded by the Internet have made harassment and expressions of hate effortless in a landscape that is abstract and beyond the realms of traditional law enforcement. Further, it argues that a broad coalition of government, schools, police and citizenry is likely to be most effective in reducing the harm caused by hate speech. The study discusses the targets of hate on the Internet, provides a framework within which problems can be identified and resolved by accentuating moral and social responsibility, and articulates possible solutions to combat with this increasing problem.
- Published
- 2018
20. Aportaciones del sector de telecomunicaciones a la protección en línea del menor
- Author
-
Recalde Viana, Mónica, Sádaba Chalezquer, Charo, and Gutiérrez García, Elena
- Subjects
Protección en línea ,Online protection ,Telecomunicaciones ,Technology ,Responsibility ,Servicios ,Strategy ,Services ,Tecnología ,Estrategia ,Minors ,Menores ,Telecommunication ,Productos ,Responsabilidad ,Products - Abstract
El paisaje tecnológico de las pantallas en relación al menor apunta a numerosos desafíos que la industria afronta junto a las familias y al sector educativo. Sin embargo, hay poca bibliografía que ahonde en las políticas estratégicas que está implantando el sector para hacer frente a estos retos. Por ello, este artículo tiene dos objetivos: en primer lugar, realizar una síntesis del estado de la cuestión para, seguidamente, presentar los principales hallazgos sobre cómo están afrontando este panorama las 17 principales empresas internacionales en su política comercial y en su relación con grupos de interés. La metodología aplicada es de carácter cualitativo, y analiza los informes de responsabilidad social y webs de las compañías, con el fin de identificar las líneas estratégicas y acciones empresariales, así como las personas e instituciones con quienes colaboran. Los resultados muestran que, pese a algunas diferencias entre regiones, el sector se atiene a un interés por la autorregulación, la innovación en los productos, en las herramientas de protección, así como en el mantenimiento de una estrecha red de colaboraciones con grupos de interés, que permite retroalimentar las políticas y estrategias. De este análisis se concluye que el sector necesita integrar las políticas de protección al menor no solo con el desarrollo de productos responsables, sino estrechando aún más los vínculos con grupos de interés clave como padres e instituciones, The technological landscape in relation to the minors presents numerous challenges facing the telecommunication industry, with families and schools. However, academic literature still remains silence in showing the strategic policies that the industry is managing in order to address these challenges. Therefore, this article has two aims: to provide an overview of the state of the art in order to present the main findings of the child protection policies in international telecom companies (17), stressing the analysis regarding their products and services and how they manage the collaboration with key stakeholders. Research was conducted using qualitative methodology: CSR reports and websites of the companies were analysed in order to define their strategic actions, as well as the individuals and institutions that collaborate. The findings show interesting insights, even with some differences by regions, among the most significant policies pursued by the sector are: self-regulation, product innovation regarding protection tools and a network of collaborations with stakeholders have been established, as an opportunity for facilitating new policies and strategies. In conclusion, telecom industry needs to integrate their policies regarding minor protection, promoting an integral management approach that comprises not only product development but also strengthen relationships with the main stakeholders as parents and institutions
- Published
- 2015
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.