Search results

1 – 10 of 670
Article
Publication date: 18 July 2022

Gautam Srivastava, Surajit Bag, Muhammad Sabbir Rahman, Jan Harm Christiaan Pretorius and Mohammad Osman Gani

The negative influence of gamification on online communities has received little attention in the available literature. The study examines the adverse effects of gamification…

Abstract

Purpose

The negative influence of gamification on online communities has received little attention in the available literature. The study examines the adverse effects of gamification during engaging in online communities.

Design/methodology/approach

Gap-spotting methods were used to develop the research questions, followed by model development using the social exchange and social-network theories. Data were collected from 429 samples. The study applied partial least squares structural equation modeling to test the research hypotheses followed by ANN application.

Findings

The study identified five factors related to gamification that have a significant adverse effect on the mental and emotional well-being of the users. Furthermore, the results of PLS-SEM were then compared through an artificial neural network (ANN) analytic process, revealing consistency for the model. This research presents a theoretical contribution by providing critical insights into online gamers' mental and emotional health. It implies that gamification can even bring mental and emotional disturbance. The resulting situation might lead to undesirable social consequences.

Practical implications

The result highlights the managerial and social relevance from the perspective of a developing country. As respondents are becoming more engrossed in online gaming, managers and decision-makers need to take preventive measures to overcome the dark side of online gaming.

Originality/value

The present study shows that the dark side of gamification has some adverse effects on human mental and emotional health. The study's findings can be used to improve gamification strategies while engaging online communities.

Details

Benchmarking: An International Journal, vol. 30 no. 9
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 9 June 2023

Anuradha Yadav, Rajesh Kumar Singh, Ruchi Mishra and Surajit Bag

With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying…

Abstract

Purpose

With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying, etc. while engaging with online communities. Not only this, anonymity of the participants, stress and racism are also big challenges in online communities' interaction. Online harassers' attack tactics have changed over time. In addition, there are challenges like quality of discussion, inequality in participation of the users, etc. may scale online communities towards incitement and activism. Therefore, this study will try to analyse these challenges for overall benefit of the society.

Design/methodology/approach

The underlying fuzzy set theory is employed to handle the fuzziness of users' perceptions since the attributes are expressed in linguistic preferences. Through exhaustive literature review, the authors have identified 15 challenges. These challenges are further categorised as cause and effect by using DEMATEL (Decision-Making Trial and Evaluation Laboratory) approach.

Findings

Lack of strategic planning and uninspired discussions between users has emerged as a major challenge in cause category. This study further demonstrates how individual challenge can be managed and developed to navigate the online communities to maintain a healthy environment in society.

Research limitations/implications

Results are based on limited dataset. Therefore, findings cannot be generalised for all online communities.

Originality/value

The research findings offer a suitable direction to policymakers to formulate and design policies, laws and regulations to increase user engagement in the online community. The study is beneficial to firms and researchers in understanding the factors influencing effective management of online communities.

Details

Benchmarking: An International Journal, vol. 31 no. 4
Type: Research Article
ISSN: 1463-5771

Keywords

Open Access
Article
Publication date: 1 August 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1904

Abstract

Purpose

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.

Design/methodology/approach

This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.

Findings

This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.

Originality/value

The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 July 2023

Ruti Gafni and Yair Levy

While data breaches are reported daily, organizations are struggling with quantifying their cybersecurity posture. This paper aims to introduce the Universal Cybersecurity…

Abstract

Purpose

While data breaches are reported daily, organizations are struggling with quantifying their cybersecurity posture. This paper aims to introduce the Universal Cybersecurity Footprint Index (UCFI), an organizational measure of Cybersecurity Footprint. The UCFI helps organizations understand the challenges related to their overall cybersecurity posture and be able to assess it for their supply chain cybersecurity. The Theory of Cybersecurity Footprint states that the risk and damage that can be caused by an attacked organization are not related to the size of the organization but to a range of parameters that may affect the interconnected entities in their supply chain.

Design/methodology/approach

Based on the 26 elements found in prior research, a survey was conducted, using 27 subject matter experts to reveal the most relevant elements and then specify their importance level to calculate their relative weight.

Findings

Results indicated that 20 of the 26 elements were validated, and their weights were calculated. Finally, an equation representing the UCFI for an organization is introduced.

Practical implications

Organizations can choose their partners according to a minimum value of the UCFI to reduce their cybersecurity risks.

Social implications

Supply chain cybersecurity incidents have demonstrated in the past several years to provide a massive impact on society. Thus, further assisting in mitigation of cyberattacks to the supply chain is significant.

Originality/value

This research aims to provide further assistance for organizations in quantifying their cybersecurity footprint in effort to help reduce cyber incidents, especially those for small organizations.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 July 2023

Javier Gracia-Calandín and Leonardo Suárez-Montoya

The purpose of this paper is to present a quantitative and qualitative synthesis of the diverse academic proposals and initiatives for preventing and eliminating hate speech on…

Abstract

Purpose

The purpose of this paper is to present a quantitative and qualitative synthesis of the diverse academic proposals and initiatives for preventing and eliminating hate speech on the internet.

Design/methodology/approach

The foundation for this study is a systematic review of papers devoted to the analysis of hate speech. It has been conducted using the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) protocol and applied to an initial corpus of 436 academic texts. Having implemented the suitability, screening and inclusion criteria, this corpus was refined to a sample of 74 articles.

Findings

The main subject categories studied in this corpus of academic research are legal issues and social media. In the majority of the articles, the use of hate speech via social media is associated with five typologies: religion, cyber racism, political slurs, misogyny and attacks on the LGTBI community. The absence of ethical reflection is one of the major shortcomings of IT-focused research and analysis devoted to online hate speech.

Practical implications

To date various systematic reviews have been presented, and they focus on detecting or describing hate speech. These have used either the search appraisal synthesis analysis framework or the Cochrane network. The PRISMA protocol was applied for this study, and both Scopus and texts in German were included. To date no major, rigorous systematic review has been undertaken of proposals to combat hate speech.

Originality/value

The link between hate speech and poverty has not been studied in depth within the academic sphere. Tolerance and ethical compassion are not granted the attention they merit when it comes to analysing the phenomenon of hate speech.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 8 May 2023

Sabreena Nawaz Baba, Zubair Ahmad Dada and Reyaz A. Qureshi

This study explores the tourists' behavioral intention toward tasting ethnic food by proposing 'enjoyment’ as an indirect mechanism in improvising the model of Wang. In other…

223

Abstract

Purpose

This study explores the tourists' behavioral intention toward tasting ethnic food by proposing 'enjoyment’ as an indirect mechanism in improvising the model of Wang. In other words, when affective and cognitive components are triggered positively while reading online gastronomy reviews on social media platforms, enjoyment is aroused, subsequently enhancing the desire to taste ethnic foods displayed online.

Design/methodology/approach

Data from 385 visitors from Kashmir, India, were gathered using a purposive sample technique. The research model was put to the test using PLS-SEM.

Findings

Direct and indirect mechanisms influence Behavioral Intention. Enjoyment acts as a mediator. Overall, the results validated the presence of three direct and full mediation paths.

Practical implications

This study will help tourism practitioners justify their promotional activities on social networking sites, particularly in endorsing regional ethnic dishes. For example, tourism authorities could collaborate with bloggers on social media and offer incentives to promote attractive images of ethnic food. Similarly, ethnic food outlets can improve online exposure and interactivity by encouraging travelers to leave feedback after visits.

Originality/value

Unlike other studies, this research broadens our understanding by focusing on direct and indirect mechanisms. The inclusion of a mediator enhanced the total variance of the dependent variable.

Details

Journal of Hospitality and Tourism Insights, vol. 7 no. 2
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 7 February 2023

Riju Bhattacharya, Naresh Kumar Nagwani and Sarsij Tripathi

A community demonstrates the unique qualities and relationships between its members that distinguish it from other communities within a network. Network analysis relies heavily on…

Abstract

Purpose

A community demonstrates the unique qualities and relationships between its members that distinguish it from other communities within a network. Network analysis relies heavily on community detection. Despite the traditional spectral clustering and statistical inference methods, deep learning techniques for community detection have grown in popularity due to their ease of processing high-dimensional network data. Graph convolutional neural networks (GCNNs) have received much attention recently and have developed into a potential and ubiquitous method for directly detecting communities on graphs. Inspired by the promising results of graph convolutional networks (GCNs) in analyzing graph structure data, a novel community graph convolutional network (CommunityGCN) as a semi-supervised node classification model has been proposed and compared with recent baseline methods graph attention network (GAT), GCN-based technique for unsupervised community detection and Markov random fields combined with graph convolutional network (MRFasGCN).

Design/methodology/approach

This work presents the method for identifying communities that combines the notion of node classification via message passing with the architecture of a semi-supervised graph neural network. Six benchmark datasets, namely, Cora, CiteSeer, ACM, Karate, IMDB and Facebook, have been used in the experimentation.

Findings

In the first set of experiments, the scaled normalized average matrix of all neighbor's features including the node itself was obtained, followed by obtaining the weighted average matrix of low-dimensional nodes. In the second set of experiments, the average weighted matrix was forwarded to the GCN with two layers and the activation function for predicting the node class was applied. The results demonstrate that node classification with GCN can improve the performance of identifying communities on graph datasets.

Originality/value

The experiment reveals that the CommunityGCN approach has given better results with accuracy, normalized mutual information, F1 and modularity scores of 91.26, 79.9, 92.58 and 70.5 per cent, respectively, for detecting communities in the graph network, which is much greater than the range of 55.7–87.07 per cent reported in previous literature. Thus, it has been concluded that the GCN with node classification models has improved the accuracy.

Details

Data Technologies and Applications, vol. 57 no. 4
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 15 September 2023

Richard G. Mathieu and Alan E. Turovlin

Cyber risk has significantly increased over the past twenty years. In many organizations, data and operations are managed through a complex technology stack underpinned by an…

Abstract

Purpose

Cyber risk has significantly increased over the past twenty years. In many organizations, data and operations are managed through a complex technology stack underpinned by an Enterprise Resource Planning (ERP) system such as systemanalyse programmentwicklung (SAP). The ERP environment by itself can be overwhelming for a typical ERP Manager, coupled with increasing cybersecurity issues that arise creating periods of intense time pressure, stress and workload, increasing risk to the organization. This paper aims to identify a pragmatic approach to prioritize vulnerabilities for the ERP Manager.

Design/methodology/approach

Applying attention-based theory, a pragmatic approach is developed to prioritize an organization’s response to the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) vulnerabilities using a Classification and Regression Tree (CART).

Findings

The application of classification and regression tree (CART) to the National Institute of Standards and Technology’s National Vulnerability Database identifies prioritization unavailable within the NIST’s categorization.

Practical implications

The ERP Manager is a role between technology, functionality, centralized control and organization data. Without CART, vulnerabilities are left to a reactive approach, subject to overwhelming situations due to intense time pressure, stress and workload.

Originality/value

To the best of the authors’ knowledge, this work is original and has not been published elsewhere, nor is it currently under consideration for publication elsewhere. CART has previously not been applied to the prioritizing cybersecurity vulnerabilities.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 18 March 2024

A.J. Faas and Jhaid Parreno

The purpose of this study is to identify LGBTQ+ perceptions of and experiences with hazards, vulnerabilities and disasters in the San Francisco Bay Area in the USA and to…

Abstract

Purpose

The purpose of this study is to identify LGBTQ+ perceptions of and experiences with hazards, vulnerabilities and disasters in the San Francisco Bay Area in the USA and to co-develop applied projects to “queer” disaster knowledge production and risk reduction activities in the region.

Design/methodology/approach

This is a community science project in which we collaborate with community members to enhance both community and scientific knowledge with the goal of utilizing it to produce a positive change to pressing social issues and their underlying causes. We do this through a series of four focus group workshops to identify community priorities, hazards, vulnerabilities and local action. We follow this with further ethnographic research and projects to apply findings from phase one.

Findings

The authors have found that: LGBTQ+ people in the Bay Area have unique experiences with hazards, vulnerabilities and disasters; there are significant gaps in the representation of LGBTQ+ hazard exposure in local scientific models that we can address through alternative methodologies; and tabletop exercises, learning modules and podcasts help orient and train disaster response agencies and personnel on LGBTQ+ inclusive operations.

Originality/value

This initiative entails novel approaches to community science for disaster risk reduction and creative collaboration with community-based organizations to foster the development of LGBTQ+ inclusive disaster risk reduction and response.

Details

Disaster Prevention and Management: An International Journal, vol. 33 no. 2
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 20 July 2023

Armin Samani and Fatemeh Saghafi

This study aims to introduce the model of implementation to run the smart production factories. The study also aims to investigate the Industry 4.0 technologies as enablers to…

Abstract

Purpose

This study aims to introduce the model of implementation to run the smart production factories. The study also aims to investigate the Industry 4.0 technologies as enablers to deal with challenges in the way of implementation.

Design/methodology/approach

This contribution benefits from two teams of experts to evaluate the challenges and technologies of Industry 4.0. The Hanlon method is applied to evaluate, rank and prioritise the challenges which are initially scored by experts’ Team 1. Then, the adjacency matrix among enablers and challenges is extracted through the opinions of experts’ Team 2. The study also uses fuzzy cognitive map (FCM) to evaluate the real weights of technologies and challenges, rank and prioritise subsequently.

Findings

A total of 8 challenging obstacles and 24 key technologies have been evaluated. The findings reveals that recruit and retention of experienced managers, undefined return on investment and recruit and retention of multi-skilled workers are the most serious challenges in the way of implementing smart production factories. Furthermore, big data, IT-based management and Internet of Things are the top-ranked key enablers to face the challenges.

Originality/value

To the best of the authors’ knowledge, this study is one of the pioneering studies that uses Hanlon method to evaluate industrial challenges. Integrating Hanlon method and FCM leads to a comprehensive model of evaluation and ranking which is another novelty of this contribution. Although many research studies have been released to implement the smart factories, practical model of implementation for production factories is identified as a literature gap.

Details

Journal of Modelling in Management, vol. 19 no. 1
Type: Research Article
ISSN: 1746-5664

Keywords

Access

Year

Last 12 months (670)

Content type

Article (670)
1 – 10 of 670