Search results
1 – 10 of 61Rajendran Sriramachandramurthy, Siva K. Balasubramanian and Monica Alexandra Hodis
The spread of broadband Internet has resulted in the increase of spyware and adware. This study highlights their damaging effects and proposes a model that captures defensive…
Abstract
The spread of broadband Internet has resulted in the increase of spyware and adware. This study highlights their damaging effects and proposes a model that captures defensive measures adopted by Internet users. Specifically, our model indicates that knowledge has a positive impact on self‐efficacy that, in turn, is presumed to trigger technical defensive measures. Moreover, concerns for privacy and previous experience with spyware and adware are likely to evoke both tactical and technical defense measures. Data collected by the PEW Internet and American Life research project are utilized to test the proposed model and the findings are discussed.
Details
Keywords
Dennis A. Pitta, Frank Franzak and Michael Laric
There exists a vibrant literature dealing with one‐to‐one marketing and mass customization. The practice holds the promise of very satisfied customers, and profitable marketers…
Abstract
There exists a vibrant literature dealing with one‐to‐one marketing and mass customization. The practice holds the promise of very satisfied customers, and profitable marketers who can create their own unassailable market positions. One of the building blocks of mass customization is knowledge of the customer and his/her complex set of preferences. There is a significant obstacle to gaining this information, namely the growing trend toward consumer privacy. Traditionally, businesses have collected massive amounts of information, hoping to identify responsive market segments. In the process, they have collected data on numerous individuals who would not realistically become customers. One solution to the problem is a strategic management approach involving an exchange of value between customers and marketers. Using a strategic approach, marketers can target the most attractive consumers, avoiding those whose lifetime value to the firm is low. By employing the relationship management processes of one‐to‐one marketing, marketers can avoid privacy issues altogether. This paper discusses the conceptual background of information based value exchange, proposes a new orientation toward customer relationship management and discusses several implications for marketers.
Details
Keywords
Janice C. Sipior and Burke T. Ward
The purpose of this paper is to provide a research model and hypotheses that explores software users' perceptions of privacy, trust, and US legal protection in using application…
Abstract
Purpose
The purpose of this paper is to provide a research model and hypotheses that explores software users' perceptions of privacy, trust, and US legal protection in using application software with embedded spyware.
Design/methodology/approach
An experimental study was undertaken requiring subjects to use an online analytical processing software product. After use, the experimental group was told spyware was embedded in the software. Questionnaire responses for the experimental and control group were compared using independent samples t‐test. Multiple regression was used to determine significant predictors of overall trust in the software vendor.
Findings
Users of software with spyware, versus users of software without spyware, have lower trust perceptions of a software vendor. Further examination of trustworthiness as a multi‐dimensional construct, reveals trustworthiness‐ability and trustworthiness‐integrity are important influences of overall trust of a vendor.
Research limitations/implications
The main limitation of the findings is the use of a convenience sample, limiting the generalizability of the results.
Practical implications
The results may provide guidance to software vendors and government regulatory agencies in addressing the concerns associated with spyware.
Originality/value
Software vendors should rethink the practice of embedding spyware in software applications, unless user trust can be maintained.
Details
Keywords
The purpose of this paper is to point out, to non‐technical library users, the hazards of using the library's public computers.
Abstract
Purpose
The purpose of this paper is to point out, to non‐technical library users, the hazards of using the library's public computers.
Design/methodology/approach
The purpose of this paper is to articulate the dangers faced by library users, whether they be students, faculty, or staff. This paper is geared towards education and enlightenment of non‐technical users of public computers.
Findings
There are many hazards to computing, both online and off. Most public computers are not well prepared to cope with worms, Trojans and other malware. There are remedies for a lot of the malware, but as in an arms race it is a matter of catching up with the latest weapon to be presented.
Practical implications
Since public computers are so vulnerable to attack, library IT must be constantly vigilant for the menaces that are present. The paper shows how computers can be protected.
Originality/value
If this can help save one computer's workload by making people aware of the dangers involved, the information is well worthwhile.
Details
Keywords
Richard G. Brody, Harold U. Chang and Erich S. Schoenberg
Most people are probably aware of malware, but they may not be aware of malware in what may be its most dangerous form, i.e. causing physical harm, even death, to individuals…
Abstract
Purpose
Most people are probably aware of malware, but they may not be aware of malware in what may be its most dangerous form, i.e. causing physical harm, even death, to individuals. This paper aims to document how software can cause malicious harm to individuals by attacking modern systems that appear to be neglected and under-researched.
Design/methodology/approach
This paper will review some of the most significant areas of concern with respect to end of days malware, i.e. malware that has a dangerous intent. The areas included are automobiles, medical devices and air traffic control systems.
Findings
The potential harmful effects of malware are often not well known by consumers and businesses around the world. These issues are not limited to just financial harm. Lives can actually be in danger. Underestimating the importance of cybersecurity and understanding the dangers that are associated with advancing technology are global issues that will continue unless there is enough awareness to force businesses and governments to address these issues. It is critical that safeguards are established.
Originality/value
While many papers have been written about malware and the implications of having malicious software infect a computer or a network, little attention has been paid to “end of days” malware. With advancing technology, malware now has the ability to cause serious injury or death to individuals who have minimal or no knowledge of the potential consequences of, for example, driving in an automobile, wearing or having an internal medical device or flying on an airplane. It is up to businesses and governments to address these issues.
Details
Keywords
The purpose of this study is to test a comprehensive routine activity framework on three types of online victimization. Prior research has utilized routine activity theory to…
Abstract
Purpose
The purpose of this study is to test a comprehensive routine activity framework on three types of online victimization. Prior research has utilized routine activity theory to explain varied online forms of victimization, but most have focused on its person-based forms. The present study, therefore, expands upon this research to examine the effects of online exposure, online target suitability and online guardianship upon phishing, hacking and malware infection victimization.
Design/methodology/approach
Secondary data from the 23rd Cycle of the Canadian GSS were used to address the study’s research questions using binary logistic regression analyses.
Findings
Particular online behaviors were consistently and positively related to all three types of online victimization, including booking/making reservations, social networking and having one’s information posted online. Other online routines exhibited unique effects on online victimization risk.
Originality/value
In support of the theory, the results suggest that online exposure and target suitability increase risks for phishing, hacking and malware victimization. Online guardianship was also positively related to victimization, a finding that runs counter to theoretical expectations.
Details
Keywords
To relate challenges associated with maintaining the technology involved in a modern, major academic research library.
Abstract
Purpose
To relate challenges associated with maintaining the technology involved in a modern, major academic research library.
Design/methodology/approach
Experiences from the past four years are categorized and discussed as they relate to information technology maintenance, enhancement, and future development. The narrative includes specific detailed examples, while maintaining a wide overall view, given the vast scope of what constitutes “information technology”.
Findings
Looking back at knowledge gained from four years of operating a new academic library, one can understand that technology is constantly evolving, creating numerous challenges. Such challenges include maintaining and enhancing existing systems and services, as well as introducing new systems and services. Associated with all such activities are a myriad challenges such as technology, funding, security, and overall resource management.
Practical implications
The findings serve to remind practitioners and administrators of the varied, complex, and expensive nature of maintaining a comprehensive information technology environment. Several concrete examples offer ideas that may aid with topics such as facility design planning and major project management.
Originality/value
This paper serves as a current case study useful for institutions considering a major library expansion or planning construction of a new major library, and also serves as a useful executive summary (with supporting specific examples) detailing the complex tasks associated with maintaining and enhancing information technology resources.
Details