Search results

1 – 10 of 61
Article
Publication date: 28 October 2009

Rajendran Sriramachandramurthy, Siva K. Balasubramanian and Monica Alexandra Hodis

The spread of broadband Internet has resulted in the increase of spyware and adware. This study highlights their damaging effects and proposes a model that captures defensive…

Abstract

The spread of broadband Internet has resulted in the increase of spyware and adware. This study highlights their damaging effects and proposes a model that captures defensive measures adopted by Internet users. Specifically, our model indicates that knowledge has a positive impact on self‐efficacy that, in turn, is presumed to trigger technical defensive measures. Moreover, concerns for privacy and previous experience with spyware and adware are likely to evoke both tactical and technical defense measures. Data collected by the PEW Internet and American Life research project are utilized to test the proposed model and the findings are discussed.

Details

American Journal of Business, vol. 24 no. 2
Type: Research Article
ISSN: 1935-5181

Keywords

Article
Publication date: 1 December 2003

Dennis A. Pitta, Frank Franzak and Michael Laric

There exists a vibrant literature dealing with one‐to‐one marketing and mass customization. The practice holds the promise of very satisfied customers, and profitable marketers…

4062

Abstract

There exists a vibrant literature dealing with one‐to‐one marketing and mass customization. The practice holds the promise of very satisfied customers, and profitable marketers who can create their own unassailable market positions. One of the building blocks of mass customization is knowledge of the customer and his/her complex set of preferences. There is a significant obstacle to gaining this information, namely the growing trend toward consumer privacy. Traditionally, businesses have collected massive amounts of information, hoping to identify responsive market segments. In the process, they have collected data on numerous individuals who would not realistically become customers. One solution to the problem is a strategic management approach involving an exchange of value between customers and marketers. Using a strategic approach, marketers can target the most attractive consumers, avoiding those whose lifetime value to the firm is low. By employing the relationship management processes of one‐to‐one marketing, marketers can avoid privacy issues altogether. This paper discusses the conceptual background of information based value exchange, proposes a new orientation toward customer relationship management and discusses several implications for marketers.

Details

Journal of Consumer Marketing, vol. 20 no. 7
Type: Research Article
ISSN: 0736-3761

Keywords

Content available
Article
Publication date: 1 February 2006

Dennis A. Pitta

162

Abstract

Details

Journal of Consumer Marketing, vol. 23 no. 2
Type: Research Article
ISSN: 0736-3761

Article
Publication date: 1 January 2008

Janice C. Sipior and Burke T. Ward

The purpose of this paper is to provide a research model and hypotheses that explores software users' perceptions of privacy, trust, and US legal protection in using application…

950

Abstract

Purpose

The purpose of this paper is to provide a research model and hypotheses that explores software users' perceptions of privacy, trust, and US legal protection in using application software with embedded spyware.

Design/methodology/approach

An experimental study was undertaken requiring subjects to use an online analytical processing software product. After use, the experimental group was told spyware was embedded in the software. Questionnaire responses for the experimental and control group were compared using independent samples t‐test. Multiple regression was used to determine significant predictors of overall trust in the software vendor.

Findings

Users of software with spyware, versus users of software without spyware, have lower trust perceptions of a software vendor. Further examination of trustworthiness as a multi‐dimensional construct, reveals trustworthiness‐ability and trustworthiness‐integrity are important influences of overall trust of a vendor.

Research limitations/implications

The main limitation of the findings is the use of a convenience sample, limiting the generalizability of the results.

Practical implications

The results may provide guidance to software vendors and government regulatory agencies in addressing the concerns associated with spyware.

Originality/value

Software vendors should rethink the practice of embedding spyware in software applications, unless user trust can be maintained.

Details

Journal of Enterprise Information Management, vol. 21 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 15 February 2011

Martin Zimerman

The purpose of this paper is to point out, to non‐technical library users, the hazards of using the library's public computers.

2488

Abstract

Purpose

The purpose of this paper is to point out, to non‐technical library users, the hazards of using the library's public computers.

Design/methodology/approach

The purpose of this paper is to articulate the dangers faced by library users, whether they be students, faculty, or staff. This paper is geared towards education and enlightenment of non‐technical users of public computers.

Findings

There are many hazards to computing, both online and off. Most public computers are not well prepared to cope with worms, Trojans and other malware. There are remedies for a lot of the malware, but as in an arms race it is a matter of catching up with the latest weapon to be presented.

Practical implications

Since public computers are so vulnerable to attack, library IT must be constantly vigilant for the menaces that are present. The paper shows how computers can be protected.

Originality/value

If this can help save one computer's workload by making people aware of the dangers involved, the information is well worthwhile.

Details

The Electronic Library, vol. 29 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 October 2018

Richard G. Brody, Harold U. Chang and Erich S. Schoenberg

Most people are probably aware of malware, but they may not be aware of malware in what may be its most dangerous form, i.e. causing physical harm, even death, to individuals…

Abstract

Purpose

Most people are probably aware of malware, but they may not be aware of malware in what may be its most dangerous form, i.e. causing physical harm, even death, to individuals. This paper aims to document how software can cause malicious harm to individuals by attacking modern systems that appear to be neglected and under-researched.

Design/methodology/approach

This paper will review some of the most significant areas of concern with respect to end of days malware, i.e. malware that has a dangerous intent. The areas included are automobiles, medical devices and air traffic control systems.

Findings

The potential harmful effects of malware are often not well known by consumers and businesses around the world. These issues are not limited to just financial harm. Lives can actually be in danger. Underestimating the importance of cybersecurity and understanding the dangers that are associated with advancing technology are global issues that will continue unless there is enough awareness to force businesses and governments to address these issues. It is critical that safeguards are established.

Originality/value

While many papers have been written about malware and the implications of having malicious software infect a computer or a network, little attention has been paid to “end of days” malware. With advancing technology, malware now has the ability to cause serious injury or death to individuals who have minimal or no knowledge of the potential consequences of, for example, driving in an automobile, wearing or having an internal medical device or flying on an airplane. It is up to businesses and governments to address these issues.

Details

International Journal of Accounting & Information Management, vol. 26 no. 4
Type: Research Article
ISSN: 1834-7649

Keywords

Content available
Article
Publication date: 7 August 2007

277

Abstract

Details

Journal of Consumer Marketing, vol. 24 no. 5
Type: Research Article
ISSN: 0736-3761

Article
Publication date: 5 October 2015

Bradford W. Reyns

The purpose of this study is to test a comprehensive routine activity framework on three types of online victimization. Prior research has utilized routine activity theory to…

1883

Abstract

Purpose

The purpose of this study is to test a comprehensive routine activity framework on three types of online victimization. Prior research has utilized routine activity theory to explain varied online forms of victimization, but most have focused on its person-based forms. The present study, therefore, expands upon this research to examine the effects of online exposure, online target suitability and online guardianship upon phishing, hacking and malware infection victimization.

Design/methodology/approach

Secondary data from the 23rd Cycle of the Canadian GSS were used to address the study’s research questions using binary logistic regression analyses.

Findings

Particular online behaviors were consistently and positively related to all three types of online victimization, including booking/making reservations, social networking and having one’s information posted online. Other online routines exhibited unique effects on online victimization risk.

Originality/value

In support of the theory, the results suggest that online exposure and target suitability increase risks for phishing, hacking and malware victimization. Online guardianship was also positively related to victimization, a finding that runs counter to theoretical expectations.

Details

Journal of Financial Crime, vol. 22 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 March 2005

Jason Vaughan

To relate challenges associated with maintaining the technology involved in a modern, major academic research library.

2538

Abstract

Purpose

To relate challenges associated with maintaining the technology involved in a modern, major academic research library.

Design/methodology/approach

Experiences from the past four years are categorized and discussed as they relate to information technology maintenance, enhancement, and future development. The narrative includes specific detailed examples, while maintaining a wide overall view, given the vast scope of what constitutes “information technology”.

Findings

Looking back at knowledge gained from four years of operating a new academic library, one can understand that technology is constantly evolving, creating numerous challenges. Such challenges include maintaining and enhancing existing systems and services, as well as introducing new systems and services. Associated with all such activities are a myriad challenges such as technology, funding, security, and overall resource management.

Practical implications

The findings serve to remind practitioners and administrators of the varied, complex, and expensive nature of maintaining a comprehensive information technology environment. Several concrete examples offer ideas that may aid with topics such as facility design planning and major project management.

Originality/value

This paper serves as a current case study useful for institutions considering a major library expansion or planning construction of a new major library, and also serves as a useful executive summary (with supporting specific examples) detailing the complex tasks associated with maintaining and enhancing information technology resources.

Details

Library Hi Tech, vol. 23 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

1 – 10 of 61