Search results

1 – 10 of 277
Article
Publication date: 1 May 1998

H. Joseph Wen

Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this paper is to…

3274

Abstract

Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this paper is to introduce to the reader the threats that Internet computer viruses can cause and provide guidelines on how organizations or individuals can protect themselves against these viruses. Discusses the full set of virus types. Recommends the development of virus protection policy for organizations.

Details

Information Management & Computer Security, vol. 6 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Case study
Publication date: 1 July 2011

Nir Kshetri

International Business, International Entrepreneurship, International Marketing.

Abstract

Subject area

International Business, International Entrepreneurship, International Marketing.

Study level/applicability

Advanced undergraduate and graduate students are the primary audience. The case can also be used in executive classes with emerging economies as a focus.

Case overview

Kaspersky Lab is a provider of information technology (IT) security products such as anti-virus, anti-spam and network security software. It is Russia's largest software company and the only Russian firm that ranked among the world's top 100 software companies. This case presents several interesting features of the company and its environment. The foci of the case are on potential barriers facing firms based in emerging economies in their internationalization initiatives and negative country of origin effects associated with emerging economies.

Expected learning outcomes

The learning objectives of this case include:

  • To identify internal and external sources of competitive advantage for a developing world originated successful entrepreneurial firm.

  • To assess the potential barriers facing an emerging economy-based firm in the internationalization process and analyse whether such barriers differ across economies of various characteristics.

  • To evaluate whether the natures of obstacles and challenges faced by an emerging economy-based firm is different in a newly evolving industry.

  • To analyze how an emerging economy-based firm can overcome some of the barriers to internationalization.

To identify internal and external sources of competitive advantage for a developing world originated successful entrepreneurial firm.

To assess the potential barriers facing an emerging economy-based firm in the internationalization process and analyse whether such barriers differ across economies of various characteristics.

To evaluate whether the natures of obstacles and challenges faced by an emerging economy-based firm is different in a newly evolving industry.

To analyze how an emerging economy-based firm can overcome some of the barriers to internationalization.

Details

Emerald Emerging Markets Case Studies, vol. 1 no. 3
Type: Case Study
ISSN: 2045-0621

Keywords

Article
Publication date: 25 November 2019

Preeti Narwal and Jogendra Kumar Nayak

The purpose of this paper is to explore the applicability of Pay-What-You-Want (PWYW) pricing multi-channel retailing. Specifically, the impact of PWYW endogenous price…

Abstract

Purpose

The purpose of this paper is to explore the applicability of Pay-What-You-Want (PWYW) pricing multi-channel retailing. Specifically, the impact of PWYW endogenous price discrimination on consumers’ price fairness perception of and reactions to PWYW is investigated.

Design/methodology/approach

Three empirical studies with different product categories were conducted through lab experiments with student sample using scenario-based experimental approach.

Findings

Results indicate the viability of PWYW with lower suggested external reference price. The impact of PWYW endogenous price discrimination is dependent upon the magnitude of price deviation from regular market price and product category. Consumers’ negative perceptions of price differentiation interacted with their underlying beliefs about the retailer’s cost of products across different channels. PWYW acceptance can be fostered in multi-channel by communication of additional-value generated in offline selling.

Originality/value

The current research is possibly the first to explore PWYW viability in the multi-channel context by exploring the consumer’s price perception process and critical consumer reactions through a well-structured research framework.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 32 no. 4
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 1 March 2003

Joseph S. Sherif and David P. Gilliam

The growth of Inter‐ and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However, maintaining…

1854

Abstract

The growth of Inter‐ and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However, maintaining virus protection software and pattern updates for any large organization is a monumental problem, especially when the organization supports multiple platforms and operating systems. The Jet Propulsion Laboratory (JPL) and other National Aeronautics and Space Administration (NASA) Centers have had problems maintaining current virus protection software and pattern files, and so NASA asked the JPL Network and Computer Security (NCS) Group to lead an effort to search for a comprehensive solution. This paper puts forward a study, analysis and recommendations concerning anti‐virus software solutions, problems encountered and their resolutions. One of the key issues was finding a single‐source anti‐virus software solution. Selection and deployment of single‐source anti‐virus software were successful. The lessons learned in the deployment of a software product site‐wide may benefit other organizations facing a similar situation.

Details

Information Management & Computer Security, vol. 11 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Case study
Publication date: 2 April 2015

Sunny Li Sun and Yanli Zhang

This case discusses Qihoo 360's free business model, how it used this free model to overpower competitors, and how the model evolved over time. Qihoo 360 is a company that took…

Abstract

Synopsis

This case discusses Qihoo 360's free business model, how it used this free model to overpower competitors, and how the model evolved over time. Qihoo 360 is a company that took just six years to become a company listed on the New York Stock Exchange (with a market value of over US$ 2 billion). At Qihoo 360's Initial Public Offering (IPO) at the New York Stock Exchange (NYSE), Qihoo's founder Zhou Hongyi reflected on how Qihoo's free business model had brought its current success and speculates on its future challenges.

Research methodology

The authors used both secondary data and field interviews when preparing this case. After reading through various company reports, competitor information, and financial filings, the authors interviewed five top manager team (TMT) members of Qihoo 360, three TMT members of its competitors, and two partners of venture capital investors who have invested in these companies in Beijing or Shenzhen during the last three years. The authors collected 347 media reports related to these companies in Chinese covering seven years of history. This long span of data collection improves the interpretation of the company and helps construct the storyline of the case.

Relevant courses and levels

This case is suitable for an MBA course or an advanced undergraduate course in strategic management or a technology-oriented entrepreneurship course, focussing on the topic of the free business model, business model innovation, disruptive innovation, and evolution of the business model during the entrepreneurial process.

Details

The CASE Journal, vol. 11 no. 2
Type: Case Study
ISSN: 1544-9106

Keywords

Article
Publication date: 18 May 2010

Martin Zimerman

The purpose of this paper is to describe how malware can harm the library's computers, and how technology can be used to protect them, in a way that can be understood by the…

1373

Abstract

Purpose

The purpose of this paper is to describe how malware can harm the library's computers, and how technology can be used to protect them, in a way that can be understood by the non‐technical.

Design/methodology/approach

The searches encompassed articles and books on the issues of malware and technology‐based code organisms.

Findings

There were complex issues dealing with hackers and other malevolent and unscrupulous characters trying to break into computer systems for profit.

Research limitations/implications

Only small indicators of the overall problem have been addressed. Much more has to be investigated and learned.

Practical implications

It is advisable to learn to protect your computers more effectively when “online.”

Originality/value

Although much has been written about the problem, few articles offer concrete solutions to the problems.

Details

New Library World, vol. 111 no. 5/6
Type: Research Article
ISSN: 0307-4803

Keywords

Article
Publication date: 15 February 2011

Martin Zimerman

The purpose of this paper is to point out, to non‐technical library users, the hazards of using the library's public computers.

2488

Abstract

Purpose

The purpose of this paper is to point out, to non‐technical library users, the hazards of using the library's public computers.

Design/methodology/approach

The purpose of this paper is to articulate the dangers faced by library users, whether they be students, faculty, or staff. This paper is geared towards education and enlightenment of non‐technical users of public computers.

Findings

There are many hazards to computing, both online and off. Most public computers are not well prepared to cope with worms, Trojans and other malware. There are remedies for a lot of the malware, but as in an arms race it is a matter of catching up with the latest weapon to be presented.

Practical implications

Since public computers are so vulnerable to attack, library IT must be constantly vigilant for the menaces that are present. The paper shows how computers can be protected.

Originality/value

If this can help save one computer's workload by making people aware of the dangers involved, the information is well worthwhile.

Details

The Electronic Library, vol. 29 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 October 2002

Someswar Kesh, Sam Ramanujan and Sridhar Nerur

This paper presents a framework for analyzing e‐commerce security. The framework is developed by analyzing the relationships between e‐commerce security needs, threats…

7530

Abstract

This paper presents a framework for analyzing e‐commerce security. The framework is developed by analyzing the relationships between e‐commerce security needs, threats, technologies and tools. Organizations can use the framework to evaluate and select security for e‐commerce.

Details

Information Management & Computer Security, vol. 10 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 December 2002

W.J. Brooks, M.J. Warren and W. Hutchinson

Computer security is now recognised as an important consideration in modern business, with a variety of guidelines and standards currently available to enable different business…

2582

Abstract

Computer security is now recognised as an important consideration in modern business, with a variety of guidelines and standards currently available to enable different business environments to be properly protected. However, financial and operational constraints often exist which influence the practicality of these recommendations. New baseline security methods such as Australian and New Zealand Standard (AS/NZS) 4444 and British Standard (BS) 7799 represent minimal standards which organisations can use to improve their security. The aim of the paper is to look at the effectiveness of baseline security standards through the use of an evaluation criteria, which assesses their effectiveness.

Details

Logistics Information Management, vol. 15 no. 5/6
Type: Research Article
ISSN: 0957-6053

Keywords

Article
Publication date: 1 June 1991

Online education. Dialog. named the Eagle‐Union Community School Corp's project INSITE the First Place winner of its annual Excellence in Online Education Awards. The award was…

49

Abstract

Online education. Dialog. named the Eagle‐Union Community School Corp's project INSITE the First Place winner of its annual Excellence in Online Education Awards. The award was presented at the Databases in Schools conference held in conjunction with Online/CD‐ROM '91 in San Francisco. The recipients received a plaque and $2000 worth of online connect time for use in the Dialog Classroom Instruction Program of their choice.

Details

Online Review, vol. 15 no. 6
Type: Research Article
ISSN: 0309-314X

1 – 10 of 277