Search results
1 – 10 of over 4000David C. Bell, John S. Atkinson and Victoria Mosier
Describes how HIV and AIDS are carried and spread, particularly for high‐risk groups, but adds that it is not only behavioural but also those behaviours in conjunction with…
Abstract
Describes how HIV and AIDS are carried and spread, particularly for high‐risk groups, but adds that it is not only behavioural but also those behaviours in conjunction with others. Employs figures and tables for added explanation and emphasis. Chronicles some individual case studies showing different “risk” behaviours and types of “unsafe” practices. Makes clear that the use of varied types of education are of major importance in the fight against ignorance and nonchalance in the battle against AIDS.
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Abstract
Details
Keywords
Ehinome Ikhalia, Alan Serrano, David Bell and Panos Louvieris
Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering…
Abstract
Purpose
Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC).
Design/methodology/approach
The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paired samples t-tests were administered to 40 participants to measure security awareness – before and after the intervention. Finally, 20 semi-structured interviews were deployed to obtain qualitative data about the usefulness of the App itself.
Findings
Results validate the effectiveness of OSN apps utilising a TTAT-MIP model – specifically the mass interpersonal persuasion (MIP) attributes. Using TTAT-MIP as a guidance, practitioners can develop security awareness systems that better leverage the intra-relationship model of OSNs.
Research limitations/implications
The primary limitation of this study is the experimental settings. Although the results testing the TTAT-MIP Facebook app are promising, these were set under experimental conditions.
Practical implications
SNC enable persuasive security behaviour amongst employees and avoid potential malware threats. SNC support consistent security awareness practices by the regular identification of new threats which may inspire the creation of new security awareness videos.
Social implications
The structure of OSNs is making it easier for malicious users to carry out their activities without the possibility of detection. By building a security awareness programme using the TTAT-MIP model, organisations can proactively manage security awareness.
Originality/value
Many security systems are cumbersome, inconsistent and non-specific. The outcome of this research provides organisations and security practitioners with a framework for designing and developing proactive and tailored security awareness systems.
Details
Keywords
Abstract
Details
Keywords
Echoing the Second Report of the Central Training Council, the Estimates Committee of the House of Commons has recommended that the first task of industrial training boards is to…
Abstract
Echoing the Second Report of the Central Training Council, the Estimates Committee of the House of Commons has recommended that the first task of industrial training boards is to make “a comprehensive study of the long term needs of industry”. They also recommended, somewhat contradictorily, that the Manpower Research Unit of the Ministry of Labour should “carry out a comprehensive assessment of future manpower needs of every industry”.
David Bell and Francis McErlean
The clustering of objects in a layered object storage system is by common consent an exceedingly difficult problem. Studies the performance of three heuristic placement…
Abstract
The clustering of objects in a layered object storage system is by common consent an exceedingly difficult problem. Studies the performance of three heuristic placement algorithms. A series of eight reasonably realistic case studies were used as a benchmark battery, and several hundred experiments were carried out to evaluate results of using the algorithms. Presents the results and the insights gained from the study.
Details