Search results

1 – 10 of over 21000
Article
Publication date: 9 July 2018

Dirk P. Snyman, Hennie Kruger and Wayne D. Kearney

The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.

Abstract

Purpose

The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.

Design/methodology/approach

Behavioural threshold analysis is used to test for the presence of the lemming effect in information security behaviour. Paradoxical behaviour may be caused by the influential nature of the lemming effect. The lemming effect is presented as a possible cause of the privacy paradox.

Findings

The behavioural threshold analysis indicates that the lemming effect is indeed present in information security behaviour and may lead to paradoxical information security behaviour.

Practical implications

The analysis of the lemming effect can be used to assist companies in understanding the way employees influence each other in their behaviour in terms of security. By identifying possible problem areas, this approach can also assist in directing their information security education endeavours towards the most relevant topics.

Originality/value

This research describes the first investigation of the lemming effect in information security by means of behavioural threshold analysis in practice.

Details

Information & Computer Security, vol. 26 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 June 2017

Dirk Snyman and Hennie Kruger

The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.

Abstract

Purpose

The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.

Design/methodology/approach

Generic behavioural threshold analysis is presented and then applied in the domain of information security by collecting data on the behavioural thresholds of individuals in a group setting and how the individuals influence each other when it comes to security behaviour.

Findings

Initial experimental results show that behavioural threshold analysis is feasible in the context of information security and may provide useful guidelines on how to construct information security awareness programmes.

Practical implications

Threshold analysis may contribute in a number of ways to information security, e.g. identification of security issues that are susceptible to peer pressure and easily influenced by peer behaviour; serve as a countermeasure against security fatigue; contribute to the economics of information security awareness programmes; track progress of security awareness campaigns; and provide a new measure for determining the importance of security awareness issues.

Originality/value

This paper describes the very first experiment to test the behavioural threshold analysis concepts in the context of information security.

Details

Information & Computer Security, vol. 25 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 5 April 2021

Dirk P. Snyman and Hennie Kruger

This paper aims to present the development of a framework for evaluating group behaviour in information security in practice.

Abstract

Purpose

This paper aims to present the development of a framework for evaluating group behaviour in information security in practice.

Design/methodology/approach

Information security behavioural threshold analysis is used as the theoretical foundation for the proposed framework. The suitability of the proposed framework is evaluated based on two sets of qualitative measures (general frameworks and information security frameworks) which were identified from literature. The successful evaluation of the proposed framework, guided by the identified evaluation measures, is presented in terms of positive practical applications, as well as positive peer review and publication of the underlying theory.

Findings

A methodology to formalise a framework to analyse group behaviour in information security can successfully be applied in a practical environment. This application takes the framework from only a theoretical conceptualisation to an implementable solution to evaluate and positively influence information security group behaviour.

Practical implications

Behavioural threshold analysis is identified as a practical mechanism to evaluate information security group behaviour. The suggested framework, as implemented in a management decision support system (DSS), allows practitioners to assess the security behaviour and awareness in their organisation. The resulting information can be used to exert an influence for positive change in the information security of the organisation.

Originality/value

A novel conceptual mapping of two sets of qualitative evaluation measures is presented and used to evaluate the proposed framework. The resulting framework is made practical through its encapsulation in a DSS.

Details

Information & Computer Security, vol. 29 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 March 2024

Joshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam and Abubakar Gbambegu Umar

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Abstract

Purpose

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Design/methodology/approach

Through an exploratory study of both public and private Ghanaian organizations. The study relied on a research model based on the technology–organization–environment (TOE) framework and a survey instrument to collect data from 525 employees. The data was analyzed using partial least squares-structural equation modeling (PLS-SEM).

Findings

The findings confirm the role of the technological, organizational and environmental contexts as significant determinants in the implementation of information security in Ghanaian organizations. Results from PLS-SEM analysis demonstrated a positive correlation between the technology component of information security initiative, organization’s internal efforts toward its acceptance and a successful implementation of information security in Ghanaian firms. Top management support and fund allocation among others will result in positive information security initiatives and positive attitudes toward securing the organization’s information assets.

Research limitations/implications

The authors discussed the implications of the authors’ findings for research, practice and policy.

Social implications

The results of this study will be useful for both governmental and non-governmental organizations in terms of best practices for increasing information security. Results from this study will aid organizations in developing countries to better understand their information security needs and identify the necessary procedures to address them.

Originality/value

This study contributes to filling the knowledge gap in organizational information security research and the TOE framework. Despite the TOE framework being one of the most influential theories in contemporary research of information system domains in an organizational context, there is not enough research linking the domains of information security and the TOE model.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 28 September 2015

Md Shah Azam

Information and communications technology (ICT) offers enormous opportunities for individuals, businesses and society. The application of ICT is equally important to economic and…

Abstract

Information and communications technology (ICT) offers enormous opportunities for individuals, businesses and society. The application of ICT is equally important to economic and non-economic activities. Researchers have increasingly focused on the adoption and use of ICT by small and medium enterprises (SMEs) as the economic development of a country is largely dependent on them. Following the success of ICT utilisation in SMEs in developed countries, many developing countries are looking to utilise the potential of the technology to develop SMEs. Past studies have shown that the contribution of ICT to the performance of SMEs is not clear and certain. Thus, it is crucial to determine the effectiveness of ICT in generating firm performance since this has implications for SMEs’ expenditure on the technology. This research examines the diffusion of ICT among SMEs with respect to the typical stages from innovation adoption to post-adoption, by analysing the actual usage of ICT and value creation. The mediating effects of integration and utilisation on SME performance are also studied. Grounded in the innovation diffusion literature, institutional theory and resource-based theory, this study has developed a comprehensive integrated research model focused on the research objectives. Following a positivist research paradigm, this study employs a mixed-method research approach. A preliminary conceptual framework is developed through an extensive literature review and is refined by results from an in-depth field study. During the field study, a total of 11 SME owners or decision-makers were interviewed. The recorded interviews were transcribed and analysed using NVivo 10 to refine the model to develop the research hypotheses. The final research model is composed of 30 first-order and five higher-order constructs which involve both reflective and formative measures. Partial least squares-based structural equation modelling (PLS-SEM) is employed to test the theoretical model with a cross-sectional data set of 282 SMEs in Bangladesh. Survey data were collected using a structured questionnaire issued to SMEs selected by applying a stratified random sampling technique. The structural equation modelling utilises a two-step procedure of data analysis. Prior to estimating the structural model, the measurement model is examined for construct validity of the study variables (i.e. convergent and discriminant validity).

The estimates show cognitive evaluation as an important antecedent for expectation which is shaped primarily by the entrepreneurs’ beliefs (perception) and also influenced by the owners’ innovativeness and culture. Culture further influences expectation. The study finds that facilitating condition, environmental pressure and country readiness are important antecedents of expectation and ICT use. The results also reveal that integration and the degree of ICT utilisation significantly affect SMEs’ performance. Surprisingly, the findings do not reveal any significant impact of ICT usage on performance which apparently suggests the possibility of the ICT productivity paradox. However, the analysis finally proves the non-existence of the paradox by demonstrating the mediating role of ICT integration and degree of utilisation explain the influence of information technology (IT) usage on firm performance which is consistent with the resource-based theory. The results suggest that the use of ICT can enhance SMEs’ performance if the technology is integrated and properly utilised. SME owners or managers, interested stakeholders and policy makers may follow the study’s outcomes and focus on ICT integration and degree of utilisation with a view to attaining superior organisational performance.

This study urges concerned business enterprises and government to look at the environmental and cultural factors with a view to achieving ICT usage success in terms of enhanced firm performance. In particular, improving organisational practices and procedures by eliminating the traditional power distance inside organisations and implementing necessary rules and regulations are important actions for managing environmental and cultural uncertainties. The application of a Bengali user interface may help to ensure the productivity of ICT use by SMEs in Bangladesh. Establishing a favourable national technology infrastructure and legal environment may contribute positively to improving the overall situation. This study also suggests some changes and modifications in the country’s existing policies and strategies. The government and policy makers should undertake mass promotional programs to disseminate information about the various uses of computers and their contribution in developing better organisational performance. Organising specialised training programs for SME capacity building may succeed in attaining the motivation for SMEs to use ICT. Ensuring easy access to the technology by providing loans, grants and subsidies is important. Various stakeholders, partners and related organisations should come forward to support government policies and priorities in order to ensure the productive use of ICT among SMEs which finally will help to foster Bangladesh’s economic development.

Details

E-Services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-325-9

Keywords

Article
Publication date: 19 May 2020

Jui-Long Hung, Kerry Rice, Jennifer Kepka and Juan Yang

For studies in educational data mining or learning Analytics, the prediction of student’s performance or early warning is one of the most popular research topics. However…

Abstract

Purpose

For studies in educational data mining or learning Analytics, the prediction of student’s performance or early warning is one of the most popular research topics. However, research gaps indicate a paucity of research using machine learning and deep learning (DL) models in predictive analytics that include both behaviors and text analysis.

Design/methodology/approach

This study combined behavioral data and discussion board content to construct early warning models with machine learning and DL algorithms. In total, 680 course sections, 12,869 students and 14,951,368 logs were collected from a K-12 virtual school in the USA. Three rounds of experiments were conducted to demonstrate the effectiveness of the proposed approach.

Findings

The DL model performed better than machine learning models and was able to capture 51% of at-risk students in the eighth week with 86.8% overall accuracy. The combination of behavioral and textual data further improved the model’s performance in both recall and accuracy rates. The total word count is a more general indicator than the textual content feature. Successful students showed more words in analytic, and at-risk students showed more words in authentic when text was imported into a linguistic function word analysis tool. The balanced threshold was 0.315, which can capture up to 59% of at-risk students.

Originality/value

The results of this exploratory study indicate that the use of student behaviors and text in a DL approach may improve the predictive power of identifying at-risk learners early enough in the learning process to allow for interventions that can change the course of their trajectory.

Details

Information Discovery and Delivery, vol. 48 no. 4
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 23 July 2020

Serena Davidson and Wayne Petherick

Case linkage theory and practice have received growing empirical support; however, they have yet to be examined fully within Australia. For sexual assault case linkage to be…

Abstract

Purpose

Case linkage theory and practice have received growing empirical support; however, they have yet to be examined fully within Australia. For sexual assault case linkage to be successful, it is assumed that a serial rapist will behave relatively consistently across offences yet distinctively compared to other offenders. The purpose of this paper is to test the underlying principles of case linkage, behavioural consistency and distinctiveness, as well as distinguishing accuracy.

Design/methodology/approach

In total, 250 solved stranger rapes by 171 offenders (46 serial rapists, 125 one-off rapists) were taken from Queensland Police Service (QPS) crime records. All possible crime pairings were created and cross-crime similarity was assessed using Jaccard’s coefficient. Receiver operating characteristics (ROC) analysis was used to examine the ability to distinguish between linked and unlinked offence pairs.

Findings

Serial linked pairs had the highest Jaccard’s coefficient (0.456), followed by non-serial unlinked (0.253) and finally, serial unlinked pairs (0.247). Within the ROC analysis, an area under the curve value was found of 0.913, indicating excellent distinguishing accuracy. Both the underlying principles of behavioural consistency and distinctiveness were supported through theoretical and practical methods. This paper provides the first analysis of serial rape case linkage in Australia, adding validity to this practice.

Research limitations/implications

The authors wish to acknowledge the support and assistance from the QPS in undertaking this research. The views expressed in this publication are not necessarily those of the QPS and any errors of omission or commission are the responsibility of the authors.

Practical implications

This paper provides validity to the practice of case linkage using a database within Australia. The results of this paper can be used to inform investigators of serial offender behaviours. The theories of offender consistency and distinctiveness are supported, highlighting the importance of behavioural evidence for practitioners. This paper provided a practical increase of the quantity and quality of offences uploaded on the Australian violent and sexual crimes database, which will assist further linkage efforts.

Originality/value

This paper is the first in Australia to examine consistency, distinctiveness and case linkage of serial stranger rape. Thus is contributes significantly not only to an increased understanding of serial rape and case linkage in Australia but also brings Australia closer to modern research practices in this field.

Details

Journal of Criminological Research, Policy and Practice, vol. 7 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 5 September 2019

Saloni Firasta Vastani and Kent Bourdon Monroe

This paper aims to examine how customer heterogeneity influences absolute price thresholds in a service industry.

Abstract

Purpose

This paper aims to examine how customer heterogeneity influences absolute price thresholds in a service industry.

Design/methodology/approach

Customer purchase behavior is studied in the context of a firm’s and competitor’s price changes. Customer purchase behavior is further examined in the context of specific customer attributes such as loyalty, motivation, online purchase channel, gender and frequency of purchase. The study uses a longitudinal data set spanning over 44 months and tracks over 13,000 of a firm’s customers, totaling over 200,000 transactions from a parking services provider.

Findings

Results show that absolute price thresholds affect purchasing decisions. Customers are willing to pay a range of prices for a considered purchase, and when a price is within customers’ acceptable price range, it does not induce a change in their purchase behavior. However, specific identifiable customer attributes influence the propensity to continue buying and influence the acceptable price range.

Practical implications

Knowledge from this study can be applied to developing a deeper understanding of customers and their price thresholds to improve customer retention and firm performance after a price change.

Originality/value

For a better understanding of the consumer choice process, it is essential to understand what factors affect price thresholds. Additionally, very few studies are using transaction-level data to empirically validate concepts from behavioral price research in the service industry, and none that do it at an individual customer level over three years.

Details

Journal of Services Marketing, vol. 33 no. 5
Type: Research Article
ISSN: 0887-6045

Keywords

Abstract

Details

Progress in Psychobiology and Physiological Psychology
Type: Book
ISBN: 978-0-12-542118-8

Article
Publication date: 12 October 2017

Ryan W. Tang

To address three issues of survey-based methods (i.e. the absence of behaviors, the reference inequivalence, and the lack of cross-cultural interaction), the purpose of this paper…

Abstract

Purpose

To address three issues of survey-based methods (i.e. the absence of behaviors, the reference inequivalence, and the lack of cross-cultural interaction), the purpose of this paper is to explore the potential of using the behavioral experiment method to collect cross-cultural data as well as the possibility of measuring culture with the experimental data. Moreover, challenges to this method and possible solutions are elaborated for intriguing further discussion on the use of behavioral experiments in international business/international management (IB/IM) research.

Design/methodology/approach

This paper illustrates the merits and downside of the proposed method with an ultimate-game experiment conducted in a behavioral laboratory. The procedure of designing, implementing, and analyzing the behavioral experiment is delineated in detail.

Findings

The exploratory findings show that the ultimate-game experiment may observe participants’ behaviors with comparable references and allow for cross-cultural interaction. The findings also suggest that the fairness-related cultural value may be calibrated with the horizontal and vertical convergence of cross-cultural behaviors (i.e. people’s deed), and this calibration may be strengthened by incorporating complementary methods such as a background survey to include people’s words.

Originality/value

The behavioral experiment method illustrated and discussed in this study contributes to the IB/IM literature by addressing three methodological issues that are not widely recognized in the IB/IM literature.

Details

Cross Cultural & Strategic Management, vol. 24 no. 4
Type: Research Article
ISSN: 2059-5794

Keywords

1 – 10 of over 21000