Search results
1 – 10 of 35Malicious activities conducted by disgruntled employees via an email platform can cause profound damage to an organization such as financial and reputational losses. This threat…
Abstract
Purpose
Malicious activities conducted by disgruntled employees via an email platform can cause profound damage to an organization such as financial and reputational losses. This threat is known as an “Insider IT Sabotage” threat. This involves employees misusing their access rights to harm the organization. Events leading up to the attack are not technical but rather behavioural. The problem is that owing to the high volume and complexity of emails, the risk of insider IT sabotage cannot be diminished with rule-based approaches.
Design/methodology/approach
Malicious human behaviours that insiders within the insider IT sabotage category would possess are studied and mapped to phrases that would appear in email communications. A large email data set is classified according to behavioural characteristics of these employees. Machine learning algorithms are used to identify occurrences of this insider threat type. The accuracy of these approaches is measured.
Findings
It is shown in this paper that suspicious behaviour of disgruntled employees can be discovered, by means of machine intelligence techniques. The output of the machine learning classifier depends mainly on the depth and quality of the phrases and behaviour analysis, cleansing and number of email attributes examined. This process of labelling content in isolation could be improved if other attributes of the email data are included, such that a confidence score can be computed for each user.
Originality/value
This research presents a novel approach to show that the creation of a prototype that can automate the detection of insider IT sabotage within email systems to mitigate the risk within organizations.
Details
Keywords
Mike Cornford, Ruth Kerns, Terry Hanstock, Allan Bunch and Edwin Fleming
… Strange but true facts, number 7: Wandsworth is famous for more than its blue halo.
Abstract
Details
Keywords
Describes the history and activities of the Crime Writers′Association, highlighting various awards, and recent winners. Detailsthe CWA Spare Copy Catalogue Scheme, whereby…
Abstract
Describes the history and activities of the Crime Writers′ Association, highlighting various awards, and recent winners. Details the CWA Spare Copy Catalogue Scheme, whereby authors′ spare copies of their own books are made available for purchase by libraries when those books are out of print.
Details
Keywords
Abstract
Details
Keywords
Michael Alexander Kruesi and Luka Bazelmans
This paper reviews the past 20 years of empirical research, based on the resource-based view (RBV) of the firm, in hospitality and tourism literature. There has been a significant…
Abstract
Purpose
This paper reviews the past 20 years of empirical research, based on the resource-based view (RBV) of the firm, in hospitality and tourism literature. There has been a significant increase in empirical RBV-grounded management research throughout the 2000s. However, to date, there has been no systematic assessment of the RBV in both qualitative and quantitative empirical hospitality and tourism literature. The purpose of the present paper, therefore, is to review and analyse the approaches employed in empirical hospitality and tourism research founded on the RBV, provide an overview and suggest how to further advance the RBV as a framework for future research.
Design/methodology/approach
The present study systematically reviews empirical RBV-based hospitality and tourism studies, published between 2000 and 2019. Through a well-defined and replicable inclusion/exclusion criterion, a sample of 122 studies was identified and reviewed.
Findings
It was found that while the RBV has received support in both quantitative and qualitative studies, the way in which researchers have utilised it in quantitative and qualitative research varies considerably in terms of the types of resource examined, the measurement variables used and the terminology/theoretical sub-stream employed. To increase the effectiveness of the RBV as a theoretical foundation in future research, its application needs to become more consistent across different studies, allowing for the development of a unified theory. Several shortcomings of the extant literature are identified, including the practical utility of the RBV; the tautology inherent in RBV-based research; the limited amount of qualitative research and the limited focus on industry contexts other than hotels, not to mention the current abundance of research with a Western perspective. These shortcomings lead to the suggestions for future research.
Research limitations/implications
The implications raised in the present study are, firstly, the current body of hospitality and tourism literature founded on the RBV is lacking in certain areas, which highlights the need for further research. Secondly, the confusion arising from its tautologies have negatively impacted the usefulness of the RBV for researchers and practitioners alike. Finally, focusing on lower than firm-level competitive advantage will allow researchers to provide more meaningful recommendation to practitioners.
Originality/value
This is the first systematic review of both qualitative and quantitative hospitality and tourism research founded on the RBV. It provides an overview of this theory, with the aim of highlighting what has already been explored while aiding the further development of the theory in hospitality and tourism research.
Details
Keywords