Search results
1 – 10 of 277Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this paper is to…
Abstract
Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this paper is to introduce to the reader the threats that Internet computer viruses can cause and provide guidelines on how organizations or individuals can protect themselves against these viruses. Discusses the full set of virus types. Recommends the development of virus protection policy for organizations.
Details
Keywords
International Business, International Entrepreneurship, International Marketing.
Abstract
Subject area
International Business, International Entrepreneurship, International Marketing.
Study level/applicability
Advanced undergraduate and graduate students are the primary audience. The case can also be used in executive classes with emerging economies as a focus.
Case overview
Kaspersky Lab is a provider of information technology (IT) security products such as anti-virus, anti-spam and network security software. It is Russia's largest software company and the only Russian firm that ranked among the world's top 100 software companies. This case presents several interesting features of the company and its environment. The foci of the case are on potential barriers facing firms based in emerging economies in their internationalization initiatives and negative country of origin effects associated with emerging economies.
Expected learning outcomes
The learning objectives of this case include:
To identify internal and external sources of competitive advantage for a developing world originated successful entrepreneurial firm.
To assess the potential barriers facing an emerging economy-based firm in the internationalization process and analyse whether such barriers differ across economies of various characteristics.
To evaluate whether the natures of obstacles and challenges faced by an emerging economy-based firm is different in a newly evolving industry.
To analyze how an emerging economy-based firm can overcome some of the barriers to internationalization.
To identify internal and external sources of competitive advantage for a developing world originated successful entrepreneurial firm.
To assess the potential barriers facing an emerging economy-based firm in the internationalization process and analyse whether such barriers differ across economies of various characteristics.
To evaluate whether the natures of obstacles and challenges faced by an emerging economy-based firm is different in a newly evolving industry.
To analyze how an emerging economy-based firm can overcome some of the barriers to internationalization.
Details
Keywords
Preeti Narwal and Jogendra Kumar Nayak
The purpose of this paper is to explore the applicability of Pay-What-You-Want (PWYW) pricing multi-channel retailing. Specifically, the impact of PWYW endogenous price…
Abstract
Purpose
The purpose of this paper is to explore the applicability of Pay-What-You-Want (PWYW) pricing multi-channel retailing. Specifically, the impact of PWYW endogenous price discrimination on consumers’ price fairness perception of and reactions to PWYW is investigated.
Design/methodology/approach
Three empirical studies with different product categories were conducted through lab experiments with student sample using scenario-based experimental approach.
Findings
Results indicate the viability of PWYW with lower suggested external reference price. The impact of PWYW endogenous price discrimination is dependent upon the magnitude of price deviation from regular market price and product category. Consumers’ negative perceptions of price differentiation interacted with their underlying beliefs about the retailer’s cost of products across different channels. PWYW acceptance can be fostered in multi-channel by communication of additional-value generated in offline selling.
Originality/value
The current research is possibly the first to explore PWYW viability in the multi-channel context by exploring the consumer’s price perception process and critical consumer reactions through a well-structured research framework.
Details
Keywords
Joseph S. Sherif and David P. Gilliam
The growth of Inter‐ and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However, maintaining…
Abstract
The growth of Inter‐ and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However, maintaining virus protection software and pattern updates for any large organization is a monumental problem, especially when the organization supports multiple platforms and operating systems. The Jet Propulsion Laboratory (JPL) and other National Aeronautics and Space Administration (NASA) Centers have had problems maintaining current virus protection software and pattern files, and so NASA asked the JPL Network and Computer Security (NCS) Group to lead an effort to search for a comprehensive solution. This paper puts forward a study, analysis and recommendations concerning anti‐virus software solutions, problems encountered and their resolutions. One of the key issues was finding a single‐source anti‐virus software solution. Selection and deployment of single‐source anti‐virus software were successful. The lessons learned in the deployment of a software product site‐wide may benefit other organizations facing a similar situation.
Details
Keywords
This case discusses Qihoo 360's free business model, how it used this free model to overpower competitors, and how the model evolved over time. Qihoo 360 is a company that took…
Abstract
Synopsis
This case discusses Qihoo 360's free business model, how it used this free model to overpower competitors, and how the model evolved over time. Qihoo 360 is a company that took just six years to become a company listed on the New York Stock Exchange (with a market value of over US$ 2 billion). At Qihoo 360's Initial Public Offering (IPO) at the New York Stock Exchange (NYSE), Qihoo's founder Zhou Hongyi reflected on how Qihoo's free business model had brought its current success and speculates on its future challenges.
Research methodology
The authors used both secondary data and field interviews when preparing this case. After reading through various company reports, competitor information, and financial filings, the authors interviewed five top manager team (TMT) members of Qihoo 360, three TMT members of its competitors, and two partners of venture capital investors who have invested in these companies in Beijing or Shenzhen during the last three years. The authors collected 347 media reports related to these companies in Chinese covering seven years of history. This long span of data collection improves the interpretation of the company and helps construct the storyline of the case.
Relevant courses and levels
This case is suitable for an MBA course or an advanced undergraduate course in strategic management or a technology-oriented entrepreneurship course, focussing on the topic of the free business model, business model innovation, disruptive innovation, and evolution of the business model during the entrepreneurial process.
Details
Keywords
The purpose of this paper is to describe how malware can harm the library's computers, and how technology can be used to protect them, in a way that can be understood by the…
Abstract
Purpose
The purpose of this paper is to describe how malware can harm the library's computers, and how technology can be used to protect them, in a way that can be understood by the non‐technical.
Design/methodology/approach
The searches encompassed articles and books on the issues of malware and technology‐based code organisms.
Findings
There were complex issues dealing with hackers and other malevolent and unscrupulous characters trying to break into computer systems for profit.
Research limitations/implications
Only small indicators of the overall problem have been addressed. Much more has to be investigated and learned.
Practical implications
It is advisable to learn to protect your computers more effectively when “online.”
Originality/value
Although much has been written about the problem, few articles offer concrete solutions to the problems.
Details
Keywords
The purpose of this paper is to point out, to non‐technical library users, the hazards of using the library's public computers.
Abstract
Purpose
The purpose of this paper is to point out, to non‐technical library users, the hazards of using the library's public computers.
Design/methodology/approach
The purpose of this paper is to articulate the dangers faced by library users, whether they be students, faculty, or staff. This paper is geared towards education and enlightenment of non‐technical users of public computers.
Findings
There are many hazards to computing, both online and off. Most public computers are not well prepared to cope with worms, Trojans and other malware. There are remedies for a lot of the malware, but as in an arms race it is a matter of catching up with the latest weapon to be presented.
Practical implications
Since public computers are so vulnerable to attack, library IT must be constantly vigilant for the menaces that are present. The paper shows how computers can be protected.
Originality/value
If this can help save one computer's workload by making people aware of the dangers involved, the information is well worthwhile.
Details
Keywords
Someswar Kesh, Sam Ramanujan and Sridhar Nerur
This paper presents a framework for analyzing e‐commerce security. The framework is developed by analyzing the relationships between e‐commerce security needs, threats…
Abstract
This paper presents a framework for analyzing e‐commerce security. The framework is developed by analyzing the relationships between e‐commerce security needs, threats, technologies and tools. Organizations can use the framework to evaluate and select security for e‐commerce.
Details
Keywords
W.J. Brooks, M.J. Warren and W. Hutchinson
Computer security is now recognised as an important consideration in modern business, with a variety of guidelines and standards currently available to enable different business…
Abstract
Computer security is now recognised as an important consideration in modern business, with a variety of guidelines and standards currently available to enable different business environments to be properly protected. However, financial and operational constraints often exist which influence the practicality of these recommendations. New baseline security methods such as Australian and New Zealand Standard (AS/NZS) 4444 and British Standard (BS) 7799 represent minimal standards which organisations can use to improve their security. The aim of the paper is to look at the effectiveness of baseline security standards through the use of an evaluation criteria, which assesses their effectiveness.
Details
Keywords
Online education. Dialog. named the Eagle‐Union Community School Corp's project INSITE the First Place winner of its annual Excellence in Online Education Awards. The award was…
Abstract
Online education. Dialog. named the Eagle‐Union Community School Corp's project INSITE the First Place winner of its annual Excellence in Online Education Awards. The award was presented at the Databases in Schools conference held in conjunction with Online/CD‐ROM '91 in San Francisco. The recipients received a plaque and $2000 worth of online connect time for use in the Dialog Classroom Instruction Program of their choice.