Search results

11 – 20 of over 7000
Open Access
Article
Publication date: 20 April 2023

Kristian Kannelønning and Sokratis K. Katsikas

Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this…

5733

Abstract

Purpose

Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown attacker. Whatever the reason, naïve-, unintentional- or intentional behavior of a member of an organization, the result of an incident can have a considerable impact. A security policy with guidelines for best practices and rules should guide the behavior of the organization’s members. However, this is often not the case. This paper aims to provide answers to how cybersecurity-related behavior is assessed.

Design/methodology/approach

Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. The SLR initially identified 2,153 articles, and the paper reviews and reports on 26 articles.

Findings

The assessment of cybersecurity-related behavior can be classified into three components, namely, data collection, measurement scale and analysis. The findings show that subjective measurements from self-assessment questionnaires are the most frequently used method. Measurement scales are often composed based on existing literature and adapted by the researchers. Partial least square analysis is the most frequently used analysis technique. Even though useful insight and noteworthy findings regarding possible differences between manager and employee behavior have appeared in some publications, conclusive answers to whether such differences exist cannot be drawn.

Research limitations/implications

Research gaps have been identified, that indicate areas of interest for future work. These include the development and employment of methods for reducing subjectivity in the assessment of cybersecurity-related behavior.

Originality/value

To the best of the authors’ knowledge, this is the first SLR on how cybersecurity-related behavior can be assessed. The SLR analyzes relevant publications and identifies current practices as well as their shortcomings, and outlines gaps that future research may bridge.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Book part
Publication date: 6 December 2021

Abstract

Details

The Quantification of Bodies in Health: Multidisciplinary Perspectives
Type: Book
ISBN: 978-1-80071-883-8

Content available
Book part
Publication date: 10 February 2023

Abstract

Details

The Adoption and Effect of Artificial Intelligence on Human Resources Management, Part A
Type: Book
ISBN: 978-1-80382-027-9

Article
Publication date: 7 June 2013

Kuan Cheng Lin, Tien‐Chi Huang, Jason C. Hung, Neil Y. Yen and Szu Ju Chen

This study aims to introduce an affective computing‐based method of identifying student understanding throughout a distance learning course.

1490

Abstract

Purpose

This study aims to introduce an affective computing‐based method of identifying student understanding throughout a distance learning course.

Design/methodology/approach

The study proposed a learning emotion recognition model that included three phases: feature extraction and generation, feature subset selection and emotion recognition. Features are extracted from facial images and transform a given measument of facial expressions to a new set of features defining and computing by eigenvectors. Feature subset selection uses the immune memory clone algorithms to optimize the feature selection. Emotion recognition uses a classifier to build the connection between facial expression and learning emotion.

Findings

Experimental results using the basic expression of facial expression recognition research database, JAFFE, show that the proposed facial expression recognition method has high classification performance. The experiment results also show that the recognition of spontaneous facial expressions is effective in the synchronous distance learning courses.

Originality/value

The study shows that identifying student comprehension based on facial expression recognition in synchronous distance learning courses is feasible. This can help instrutors understand the student comprehension real time. So instructors can adapt their teaching materials and strategy to fit with the learning status of students.

Article
Publication date: 19 October 2018

Dušan Vujošević, Ivana Kovačević and Milena Vujošević-Janičić

The purpose of this paper is to examine the usability of the dimensional view of data in the context of its presumed learnability.

2307

Abstract

Purpose

The purpose of this paper is to examine the usability of the dimensional view of data in the context of its presumed learnability.

Design/methodology/approach

In total, 303 participants were asked to solve 12 analytical problems in an experiment using the dimensional view of data for half of the problems and an operational view of data for the other half. Inferential statistics and structural equation modeling were performed with participants’ objective results and affective reactions.

Findings

Showing that the order of exposure to the two views of data impacts the overall usability of ad hoc querying, the study provided evidence for the learnability potential of the dimensional view of data. Furthermore, the study showed that affective reactions to the different views of data follow objective usability parameters in a way that can be explained using models from affective computing research.

Practical implications

The paper proposes a list of guidelines for use of the dimensional view of data in business analytics.

Originality/value

This study is the first to confirm the learnability of the dimensional view of data and the first to take a deeper look at affective reactions to an ad hoc business analytics solution. Also, it is one of few studies that examined the usability of different views of data directly on these views, rather than using paper representations of data models.

Details

Aslib Journal of Information Management, vol. 71 no. 1
Type: Research Article
ISSN: 2050-3806

Keywords

Abstract

Details

Designing XR: A Rhetorical Design Perspective for the Ecology of Human+Computer Systems
Type: Book
ISBN: 978-1-80262-366-6

Article
Publication date: 5 June 2017

Joaquín Pérez Marco, Francisco José Serón Arbeloa and Eva Cerezo Bagdasari

The paper aims to explain the limitations of existing cognitive architectures and affective models, and propose a new cognitive-affective architecture that can be integrated in…

Abstract

Purpose

The paper aims to explain the limitations of existing cognitive architectures and affective models, and propose a new cognitive-affective architecture that can be integrated in real intelligent agents to make them more realistic and believable.

Design/methodology/approach

The paper evaluates the state of the art, and describes the design and implementation of the cognitive-affective architecture in an agent. A brief evaluation of the agent is provided.

Findings

The paper clearly states that it is possible to use cognitive architectures to help, but there is a lack of architectures that address the problem of combining cognition and emotion in agents in a unified, simplified way. A cognitive-affective architecture is useful to make believable intelligent agents in an easier way.

Research limitations/implications

The paper does not explore a lot of possible future work that can be done to extend the emotional expressions of the agent, as well as including direct emotional-sensing capabilities in real time.

Practical implications

The paper argues about the need to include cognitive-affective architectures in modern intelligent agents. The architecture allows to influence and modify the behavior of the agent in real time, to achieve a more realistic and believable interaction with the user.

Social implications

The paper remarks the importance of a cognitive-affective architecture that makes intelligent agents able to help the users in different tasks and environments.

Originality/value

The paper describes a new cognitive-affective architecture and its utility for modern intelligent agents. This is proven by including it in a previous agent, which boosts its behavior and emotional expression possibilities and thus improves user experience.

Details

Kybernetes, vol. 46 no. 06
Type: Research Article
ISSN: 0368-492X

Keywords

Book part
Publication date: 6 September 2021

Stuti Thapa, Louis Tay and Daphne Hou

Experience sampling methods (ESM) have enabled researchers to capture intensive longitudinal data and how worker well-being changes over time. The conceptual advances in…

Abstract

Experience sampling methods (ESM) have enabled researchers to capture intensive longitudinal data and how worker well-being changes over time. The conceptual advances in understanding the variability of well-being are discussed. These emerging forms in the literature include affective inertia, affective variability, affective reactivity, and density distributions. While most ESM research has relied on the active provision of data by participants (i.e., self-reports), technological advances have enabled different forms of passive sensing that are useful for assessing and tracking well-being and its contextual factors. These include accelerometer data, location data, and physiological data. The strengths and weaknesses of passively sensed data and future ways forward are discussed, where the use of both active and passive forms of ESM data in the assessment and promotion of worker well-being is expected.

Details

Examining and Exploring the Shifting Nature of Occupational Stress and Well-Being
Type: Book
ISBN: 978-1-80117-422-0

Keywords

Book part
Publication date: 17 September 2014

Dania Bilal and Valerie Jopeck

To identify research work on Information and Communication Technology (ICT) in the context of young girls’ affective responses to access and use of ICT in developing countries.

Abstract

Purpose

To identify research work on Information and Communication Technology (ICT) in the context of young girls’ affective responses to access and use of ICT in developing countries.

Methodology/approach

A literature search covering the period from early 1990s to date in fields of information science, human–computer interaction, ICT, and educational technologies was performed using relevant databases and Google Scholar. Related literature in the context of specific theoretical frameworks was retrieved and analyzed.

Findings

Abundant research exists on ICT in developing countries. However, little empirical work was found on young girls’ affective responses to access and use of ICT. The gendered digital divide in relation to ICT showed differing perspectives on this issue. Generally, affective information behavior is much less observed in empirical research than the cognitive behavior, regardless of age, gender, or culture.

Practical implications

Young girls’ affective responses to access and use of ICT in these countries warrant additional research in this area of study. Findings from research on youth information behavior in Western countries may have little or no bearings on youth in developing countries. The study of young girls’ access and use of ICT in developing countries should account for cultural, socioeconomic, and institutional differences among countries and between societies or communities in a given developing country.

Originality/value

Minimal research exists on young girls’ affective responses to accessing and using ICT in developing countries. The literature review covered in this chapter is grounded in theoretical frameworks derived from varied disciplines, including the field of library and information science.

Details

New Directions in Children’s and Adolescents’ Information Behavior Research
Type: Book
ISBN: 978-1-78350-814-3

Keywords

Article
Publication date: 4 September 2019

Agnieszka Landowska

The purpose of this paper is to explore uncertainty inherent in emotion recognition technologies and the consequences resulting from that phenomenon.

Abstract

Purpose

The purpose of this paper is to explore uncertainty inherent in emotion recognition technologies and the consequences resulting from that phenomenon.

Design/methodology/approach

The paper is a general overview of the concept; however, it is based on a meta-analysis of multiple experimental and observational studies performed over the past couple of years.

Findings

The main finding of the paper might be summarized as follows: there is uncertainty inherent in emotion recognition technologies, and the phenomenon is not expressed enough, not addressed enough and unknown by the users of the technology.

Practical implications

Practical implications of the study are formulated as postulates for the developers, users and researchers dealing with the technologies of automatic emotion recognition.

Social implications

As technologies that recognize emotions are becoming more and more common, and perhaps more decisions influencing people lives are to come in the next decades, the trustworthiness of the technology is important from a scientific, practical and ethical point of view.

Originality/value

Studying uncertainty of emotion recognition technologies is a novel approach and is not explored from such a broad perspective before.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

11 – 20 of over 7000