Search results

1 – 10 of over 3000
To view the access options for this content please click here
Article
Publication date: 1 May 2002

David C. Bell, John S. Atkinson and Victoria Mosier

Describes how HIV and AIDS are carried and spread, particularly for high‐risk groups, but adds that it is not only behavioural but also those behaviours in conjunction…

Abstract

Describes how HIV and AIDS are carried and spread, particularly for high‐risk groups, but adds that it is not only behavioural but also those behaviours in conjunction with others. Employs figures and tables for added explanation and emphasis. Chronicles some individual case studies showing different “risk” behaviours and types of “unsafe” practices. Makes clear that the use of varied types of education are of major importance in the fight against ignorance and nonchalance in the battle against AIDS.

Details

International Journal of Sociology and Social Policy, vol. 22 no. 4/5/6
Type: Research Article
ISSN: 0144-333X

Keywords

To view the access options for this content please click here
Article
Publication date: 16 May 2016

David Bell

Downloads
154

Abstract

Details

Reference Reviews, vol. 30 no. 4
Type: Research Article
ISSN: 0950-4125

Keywords

To view the access options for this content please click here
Article
Publication date: 20 February 2017

David Bell

Downloads
187

Abstract

Details

Reference Reviews, vol. 31 no. 2
Type: Research Article
ISSN: 0950-4125

Keywords

To view the access options for this content please click here
Article
Publication date: 16 January 2017

David Bell

Abstract

Details

Reference Reviews, vol. 31 no. 1
Type: Research Article
ISSN: 0950-4125

Keywords

To view the access options for this content please click here
Article
Publication date: 16 October 2017

David Bell

Abstract

Details

Reference Reviews, vol. 31 no. 8
Type: Research Article
ISSN: 0950-4125

Keywords

To view the access options for this content please click here
Article
Publication date: 7 August 2019

Ehinome Ikhalia, Alan Serrano, David Bell and Panos Louvieris

Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social…

Abstract

Purpose

Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC).

Design/methodology/approach

The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paired samples t-tests were administered to 40 participants to measure security awareness – before and after the intervention. Finally, 20 semi-structured interviews were deployed to obtain qualitative data about the usefulness of the App itself.

Findings

Results validate the effectiveness of OSN apps utilising a TTAT-MIP model – specifically the mass interpersonal persuasion (MIP) attributes. Using TTAT-MIP as a guidance, practitioners can develop security awareness systems that better leverage the intra-relationship model of OSNs.

Research limitations/implications

The primary limitation of this study is the experimental settings. Although the results testing the TTAT-MIP Facebook app are promising, these were set under experimental conditions.

Practical implications

SNC enable persuasive security behaviour amongst employees and avoid potential malware threats. SNC support consistent security awareness practices by the regular identification of new threats which may inspire the creation of new security awareness videos.

Social implications

The structure of OSNs is making it easier for malicious users to carry out their activities without the possibility of detection. By building a security awareness programme using the TTAT-MIP model, organisations can proactively manage security awareness.

Originality/value

Many security systems are cumbersome, inconsistent and non-specific. The outcome of this research provides organisations and security practitioners with a framework for designing and developing proactive and tailored security awareness systems.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

To view the access options for this content please click here
Article
Publication date: 17 September 2018

David Bell

Abstract

Details

Reference Reviews, vol. 32 no. 7/8
Type: Research Article
ISSN: 0950-4125

Keywords

To view the access options for this content please click here
Article
Publication date: 1 May 1968

David Bell and David Coleman

Echoing the Second Report of the Central Training Council, the Estimates Committee of the House of Commons has recommended that the first task of industrial training…

Abstract

Echoing the Second Report of the Central Training Council, the Estimates Committee of the House of Commons has recommended that the first task of industrial training boards is to make “a comprehensive study of the long term needs of industry”. They also recommended, somewhat contradictorily, that the Manpower Research Unit of the Ministry of Labour should “carry out a comprehensive assessment of future manpower needs of every industry”.

Details

Education + Training, vol. 10 no. 5
Type: Research Article
ISSN: 0040-0912

To view the access options for this content please click here
Book part
Publication date: 11 November 2019

Mariann Hardey

Abstract

Details

The Culture of Women in Tech
Type: Book
ISBN: 978-1-78973-426-3

To view the access options for this content please click here
Article
Publication date: 1 April 1994

David Bell and Francis McErlean

The clustering of objects in a layered object storage system is by common consent an exceedingly difficult problem. Studies the performance of three heuristic placement…

Abstract

The clustering of objects in a layered object storage system is by common consent an exceedingly difficult problem. Studies the performance of three heuristic placement algorithms. A series of eight reasonably realistic case studies were used as a benchmark battery, and several hundred experiments were carried out to evaluate results of using the algorithms. Presents the results and the insights gained from the study.

Details

Kybernetes, vol. 23 no. 3
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 3000