Search results

21 – 30 of over 10000
Article
Publication date: 20 November 2017

Jamie Costley

This paper looks at a particular type of cheating that occurs in an online university setting. That is, when students who have a connection from outside the online learning…

Abstract

Purpose

This paper looks at a particular type of cheating that occurs in an online university setting. That is, when students who have a connection from outside the online learning environment conspire to cheat together. It measures the correlations between student variables and cheating, instructional variables and cheating and learning outcomes and cheating. The purpose of this paper is to understand the relationships between these factors and cheating, in the hope that the multifaceted nature of academic dishonesty can be better understood.

Design/methodology/approach

This study surveyed a group of students (n = 88) who participated in cyber university classes in South Korea. The study investigates the correlations between student characteristics, student attitudes, instructional design, lecture quality and learning outcomes with cheating.

Findings

The research looks at correlations between stable demographic factors and student attitudes towards cheating and finds no strong relationships. On the other hand, this study finds statistically significant negative correlations between instructional design quality and cheating, and lecture quality and cheating. This shows that instructors can affect the amount their students cheat through improving the quality of their courses. Also, there was a significant relationship between students’ levels of learning, satisfaction, engagement and interest and cheating.

Originality/value

Looking at cheating from a variety of angles within a single research agenda gives a clear understanding to instructors as to how cheating in their class will manifest, and how it will negatively impact the quality of a student’s experience.

Details

Interactive Technology and Smart Education, vol. 14 no. 4
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 22 May 2024

Derek Friday, Steven Alexander Melnyk, Morris Altman, Norma Harrison and Suzanne Ryan

The vulnerability of customers to malware attacks through weak supplier links has prompted a need for collaboration as a strategic alternative in improving supply chain…

Abstract

Purpose

The vulnerability of customers to malware attacks through weak supplier links has prompted a need for collaboration as a strategic alternative in improving supply chain cybersecurity (SCC). Current studies overlook the fact that the effectiveness of cybersecurity strategies is dependent on the form of interfirm relationship mechanisms within which supply chain digital assets are embedded. This paper analyses the association between interfirm collaborative cybersecurity management capabilities (ICCMC) and cybersecurity parameters across a supply chain and proposes an agenda for future research.

Design/methodology/approach

A systematic literature review (SLR) is conducted, employing text mining software to analyse content extracted from 137 scholarly articles on SCC from January 2013 to January 2022.

Findings

The co-occurrence analysis strongly confirms the potential of ICCMC to reinforce SCC. Furthermore, we establish that relational factors could have multiple roles: as antecedents for ICCMC, and as factors that directly affect SCC parameters. The analysis reveals knowledge gaps in SCC theory grounding, including a fragmented and sparse representation of SCC parameters and the potential presence of an omitted variable – SCC – that could improve subsequent testing of causal relationships for theory development.

Originality/value

The paper’s contribution is at the intersection of interfirm collaboration and mandating cybersecurity requirements across a supply chain. Our paper contributes to closing a social-technical gap by introducing social aspects such as the Relational View and the importance of developing ICCMC to reinforce SCC. We offer a method for testing co-occurrences in SLRs, a comprehensive definition of SCC, and a framework with propositions for future research on increasing the effectiveness of collaborative cybersecurity management. We position collaboration as a necessary condition for the transition from cybersecurity of a firm to cybersecurity across a supply chain, and its ecosystem.

Details

International Journal of Physical Distribution & Logistics Management, vol. 54 no. 5
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 3 March 2023

Thi Truc Quynh Ho, Thi Khanh Linh Tran and Son Van Huynh

The purpose of this paper is to examine the mediating effect of cyber-victimization (CV) and the moderating effect of academic stress (AS) in the link between smartphone addiction…

Abstract

Purpose

The purpose of this paper is to examine the mediating effect of cyber-victimization (CV) and the moderating effect of academic stress (AS) in the link between smartphone addiction (SPA) and psychological distress (PD) among a sample of Vietnamese college students.

Design/methodology/approach

A total of 423 college students participated in this study. Measures of SPA, CV, AS and PD were used for data collection. Using PROCESS macro software (Model 4 and Model 1) and the bootstrapping method, the author performed a mediation analysis and a moderation analysis.

Findings

Results indicated a significant mediating effect of CV in the link between SPA and PD. Moreover, this relationship was moderated by AS.

Originality/value

The findings could serve as a guide for future research and mental health professionals.

Details

Journal of Public Mental Health, vol. 22 no. 1
Type: Research Article
ISSN: 1746-5729

Keywords

Article
Publication date: 9 May 2016

Matthew Warren and Shona Leitch

The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.

1225

Abstract

Purpose

The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.

Design/methodology/approach

This paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a netnography research approach.

Findings

This paper determines that the Syrian Electronic Army is motivated to protect the Syrian Government. This protection is highlighted by the new media and social media organisations that the Syrian Electronic Army attacks online.

Research limitations/implications

This paper focuses only on one group the Syrian Electronic Army.

Practical implications

A greater understanding of the Syrian Electronic Army.

Social implications

A greater understanding of the development of hacktivism.

Originality/value

A unique study into the motivation of the Syrian Electronic Army.

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 April 1986

Nancy S. Greene

The University of Wyoming Law Library had a problem. We had a five‐year‐old database of our collection, maintained on the university's Cyber mainframe computer. A technician…

Abstract

The University of Wyoming Law Library had a problem. We had a five‐year‐old database of our collection, maintained on the university's Cyber mainframe computer. A technician entered data manually into this database we call SIR. We also had a card print program on the Cyber, which used the same manually input file to print out author and title cards. At the same time, we were cataloging our holdings on OCLC, adding local classification numbers and subject headings to each record, although we did not use most of the information on the MARC record.

Details

OCLC Micro, vol. 2 no. 4
Type: Research Article
ISSN: 8756-5196

Book part
Publication date: 22 August 2022

Andy Phippen and Emma Bond

The COVID-19 pandemic has driven universities to deliver education online, making use of digital platforms for both formal and informal learning. This move has accelerated…

Abstract

The COVID-19 pandemic has driven universities to deliver education online, making use of digital platforms for both formal and informal learning. This move has accelerated concerns regarding institutions’ capabilities to protect students from online abuse and support those who fall victim to its many forms. Empirical data drawn from UK universities prior to the pandemic highlight the lack of policy and practice across the university sector around both awareness of, and support from, online abuse among the student body. Further concerns during the pandemic, which highlight failures not just of safeguarding policy, but cybersecurity practice, demonstrate the need for universities to not only recognise their duty of care regarding student welfare but also to provide training and education for all, making use of online and hybrid higher education.

Details

The Emerald Handbook of Higher Education in a Post-Covid World: New Approaches and Technologies for Teaching and Learning
Type: Book
ISBN: 978-1-80382-193-1

Keywords

Article
Publication date: 17 June 2020

Rajni Goel, Anupam Kumar and James Haddow

This study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The…

1793

Abstract

Purpose

This study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The framework can be systematically used to assess the strategic orientation of a firm with respect to its cybersecurity posture. The goal is to assist top-management-team with tailoring their decision-making about security investments while managing cyber risk at their organization.

Design/methodology/approach

A thematic analysis of existing publications using content analysis techniques generates the initial set of keywords of significance. Additional factor analysis using the keywords provides us with a framework comprising of five pillars comprising prioritize, resource, implement, standardize and monitor (PRISM) for assessing a firm’s strategic cybersecurity orientation.

Findings

The primary contribution is the development of a novel PRISM framework, which enables cyber decision-makers to identify and operationalize a tailored approach to address risk management and cybersecurity problems. PRISM framework evaluation will help organizations identify and implement the most tailored risk management and cybersecurity approach applicable to their problem(s).

Originality/value

The new norm is for companies to realize that data stratification in cyberspace extends throughout their organizations, intertwining their need for cybersecurity within business operations. This paper fulfills an identified need improve the ability of company leaders, as CIOs and others, to address the growing problem of how organizations can better handle cyber threats by using an approach that is a methodology for cross-organization cybersecurity risk management.

Details

Information & Computer Security, vol. 28 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 18 April 2017

Jamie Costley and Christopher Henry Lange

Because student viewership of video lectures serves as an important aspect of e-learning environments, video lectures should be delivered in a way that enhances the learning…

2331

Abstract

Purpose

Because student viewership of video lectures serves as an important aspect of e-learning environments, video lectures should be delivered in a way that enhances the learning experience. The delivery of video lectures through diverse forms of media is a useful approach, which may have an effect on student learning, satisfaction, engagement and interest (LSEI), as well as future behavioral intentions (FBI). Furthermore, research has shown the value that LSEI has on learner achievement within online courses, as well as its value in regards to student intention to continue learning in such courses. The purpose of this study is to investigate the relationships between media diversity, LSEI and FBI in hopes of enhancing the e-learning experience.

Design/methodology/approach

This study surveyed a group of students (n = 88) who participated in cyber university classes in South Korea to investigate the correlations between media diversity and lecture viewership, effects of lecture viewership on LSEI and FBI, effects of media diversity on LSEI and FBI as well as the correlation between LSEI and FBI.

Findings

Results show no relationship between media diversity and viewership. Both lecture viewership and media diversity were positively correlated with LSEI. However, neither media diversity nor viewership was positively correlated with FBI. Finally, LSEI was positively correlated with FBI.

Originality/value

This paper looks at how video lectures affect LSEI. Past research has generally looked at learning, satisfaction, engagement and interest as separate entities that are affected by instructional aspects of online learning. Because of their interrelationships with each other, this study combines them as one construct, making a stronger case for their combined association.

Details

Interactive Technology and Smart Education, vol. 14 no. 1
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 15 October 2018

Christopher Hughes, Jamie Costley and Christopher Lange

The paper aims to examine the effect of levels of self-regulated effort (SRE) and levels of cognitive load on the watching and completing of video lectures used as the main source…

Abstract

Purpose

The paper aims to examine the effect of levels of self-regulated effort (SRE) and levels of cognitive load on the watching and completing of video lectures used as the main source of instruction in online learning environments.

Design/methodology/approach

A survey provided data on the students’ engagement with video lectures, their level of SRE and the level of cognitive load they perceived while watching video lectures. The relationships between these variables and statistical significance were analyzed.

Findings

There were three key findings: a positive relationship between SRE and both watching and completing lectures; a negative relationship between SRE and perceptions of existing cognitive load; and students in different demographic groups watched fewer lectures, experienced higher cognitive load and reported lower levels of SRE.

Research limitations/implications

Implications of this study are that video lecture creation would benefit from the development of best practices, consideration of students’ levels of self-regulation, minimization of extraneous load and individual differences among groups of students. Limitations are the context-specific nature of the findings and the fact that data were drawn from self-reported survey responses, meaning they are subjective in nature.

Originality/value

The originality of this paper lies in its investigation of relationship between SRE, cognitive load and video lecture viewership. No research of this topic could be found during the literature review. Findings are of value to those interested in reaping increased levels of video lecture viewership by showing elements that will encourage engagement, satisfaction and better transmission of instruction.

Details

Interactive Technology and Smart Education, vol. 15 no. 3
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 1 June 2023

Khalid Shaheen and Ali Hussein Zolait

This study aims to determine the impacts of the Bahrain Government framework [cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the CTP can…

Abstract

Purpose

This study aims to determine the impacts of the Bahrain Government framework [cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the CTP can impact the cybersecurity of government entities in the Kingdom of Bahrain.

Design/methodology/approach

The authors used a quantitative and qualitative approach. The data were collected by conducting semi-structured interviews with the information technology experts in the Bahrain Government entities participating in the CTP. Also, quantitative data was obtained through a questionnaire distributed to relevant people in the information technology field.

Findings

The findings of this study suggest that the CTP had a significant impact on the cybersecurity assurance of the government entities that participated in the CTP; it increased the employees’ awareness, reduced the number of cyberattacks and optimized the available resources. The findings also highlighted the role of top management in the success of the implementation of the CTP. The results also ensure that the CTP’s maturity model affected the cybersecurity compliance of an organization and the implementation of cybersecurity policies and controls.

Practical implications

This study enhances cybersecurity researchers’ and practitioners’ understanding of the impact of the CTP and its components and evaluates its influence on Bahrain’s cybersecurity assurance.

Originality/value

This study implies that to achieve better cybersecurity, managers should focus on implementing the policies and controls provided by cybersecurity frameworks to enhance cybersecurity assurance.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

21 – 30 of over 10000