Search results

1 – 10 of over 5000
Article
Publication date: 1 December 2001

Martin Botha and Rossouw von Solms

A survey recently completed by the Computer Security Institute and the Federal Bureau of Investigation revealed that corporations, banks, and governments all face a growing threat…

1222

Abstract

A survey recently completed by the Computer Security Institute and the Federal Bureau of Investigation revealed that corporations, banks, and governments all face a growing threat from computer crime, and in particular computer hacking. The computer hacking activities caused well over $100 million in losses last year in the USA and the trend toward professional computer crime, such as computer hacking, is on the rise. Different methods are currently used to control the computer crime problem, for example, to control the access to and from a network by implementing a firewall. As the survey highlighted, most of these methods are inefficient. New means and ways which will minimise and control the hacking problem must therefore continuously be researched and defined. This paper will propose a method, based on trend analysis, that could be utilized to minimise and control the hacking problem in an organisation.

Details

Information Management & Computer Security, vol. 9 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 17 August 2023

Tareq Na’el Al-Tawil

Malicious hackers are increasingly evolving with technology by developing advanced tools to infiltrate. They are looking at micro laundering via sites like PayPal or using job…

Abstract

Purpose

Malicious hackers are increasingly evolving with technology by developing advanced tools to infiltrate. They are looking at micro laundering via sites like PayPal or using job advertising sites, to avoid exposure. Micro laundering makes it possible to launder a large amount of money in small amounts through thousands of electronic transactions. Therefore, the purpose of this paper is to examine whether the ethical hacking pedagogy is both a feasible and effective approach to prepare information security professionals of the future to combat black hat hacking and other forms of unethical conduct in the cyberspace.

Design/methodology/approach

The paper will specifically explore the ethics and implications of teaching students how to hack. It examines the strengths and limitations of the ethical hacking pedagogy. The discussion will then form the basis for exploring whether ethical hacking pedagogy is logical and justifiable.

Findings

The research has examined whether the ethical hacking pedagogy is an initiative-taking and effective approach to preparing information security professionals. Teaching students to hack is the only feasible approach to preparing future cybersecurity professionals because such training will allow them to master technical skills necessary for penetration testing.

Originality/value

A dominant theme that emerged from the research is the inability to evaluate students’ intention and provide oversight after their graduation. Thus, professional networks and peer groups will play an instrumental role in sustaining students in an environment that fosters ethical conduct.

Details

Journal of Money Laundering Control, vol. 27 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 11 April 2023

Augusto Bargoni, Fauzia Jabeen, Gabriele Santoro and Alberto Ferraris

Few studies have conceptualized how companies can build and nurture international dynamic marketing capabilities (IDMCs) by implementing growth hacking strategies. This paper…

1041

Abstract

Purpose

Few studies have conceptualized how companies can build and nurture international dynamic marketing capabilities (IDMCs) by implementing growth hacking strategies. This paper conceptualizes growth hacking, a managerial-born process to embed a data-driven mind-set in marketing decision-making that combines big-data analysis and continuous learning, allowing companies to adapt their dynamic capabilities to the ever-shifting international competitive arenas.

Design/methodology/approach

Given the scarcity of studies on growth hacking, this paper conceptualizes this managerial-born concept through the double theoretical lenses of IDMCs and information technology (IT) literature.

Findings

The authors put forward research propositions concerning the four phases of growth hacking and the related capabilities and routines developed by companies to deal with international markets. Additional novel propositions are also developed based on the three critical dimensions of growth hacking: big data analytics, digital marketing and coding and automation.

Research limitations/implications

Lack of prior conceptualization as well as the scant literature makes this study liable to some limitations. However, the propositions developed should encourage researchers to develop both empirical and theoretical studies on this managerial-born concept.

Practical implications

This study develops a detailed compendium for managers who want to implement growth hacking within their companies but have failed to identify the necessary capabilities and resources.

Originality/value

The study presents a theoretical approach and develops a set of propositions on a novel phenomenon, observed mainly in managerial practice. Hence, this study could stimulate researchers to deepen the phenomenon and empirically validate the propositions.

Article
Publication date: 5 June 2017

Jon D. Elhai, Jason C. Levine and Brian J. Hall

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables…

3324

Abstract

Purpose

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables predicting anxiety about data hacking, and the role that such anxiety and other potentially important variables have in explaining the use of digital privacy protection behavior.

Design/methodology/approach

In total, 305 participants from an online labor market were sampled who frequently use the internet, surveyed about recent anxiety (using the Generalized Anxiety Disorder-7 scale (GAD-7)), anxiety about data hacking (GAD-7, in reference to data hacking), and issues of digital privacy: news exposure, perceived importance, self-efficacy, protection behavior, and previous hacking victimization.

Findings

Profession (information technology-related) moderated the symptom structure for recent anxiety, but not data hacking anxiety. Using structural equation modeling, prior hacking victimization predicted anxiety about hacking. Digital privacy protection behavior was related to hacking anxiety and privacy self-efficacy. Data hacking anxiety mediated relations between hacking victimization and privacy protection. Privacy self-efficacy mediated relations between news exposure to hacking incidents and privacy protection.

Research limitations/implications

Limitations include the self-report nature of the instruments, and use of a selective, non-random sample.

Practical implications

Results highlight knowledge, self-efficacy, and threat appraisal among IT managers in motivating better digital security practices.

Originality/value

This is the first study using a standardized instrument of anxiety to examine distress about hacking and predictors of digital privacy protection behavior.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 29 November 2019

Tony Conway and Tanya Hemphill

“Growth hacking” is a “data-informed” marketing approach that uses digital marketing tools and tactics as well as traditional marketing channels to help technology companies show…

2394

Abstract

Purpose

“Growth hacking” is a “data-informed” marketing approach that uses digital marketing tools and tactics as well as traditional marketing channels to help technology companies show “proof-of-concept” and sustainability before gaining funding. The purpose of this study was to identify and understand the relevance and importance of growth hacking and identify what growth hacking tools and techniques are used by such organisations.

Design/methodology/approach

The main research method for the collection of primary data was in-depth interviews with both industry experts (senior professionals working for growth hacking agencies) and individual growth hacking practitioners who work for technology start-ups based in the UK. Interviews included the use of dimension cards with key growth hacking terms to act as visual cues to facilitate focus and prompt reflection.

Findings

In addition to a data analysis element, growth hacking also requires people to spot emerging opportunities before anyone else does. This makes it very difficult to find people with the right skill-set. It is also important to use traditional marketing methods to bridge the gap between the physical and digital world.

Originality/value

This study shows that growth hacking is a mind-set and process that can help technology start-ups grow quickly with a limited marketing budget. The research offers guidelines and frameworks for start-ups to understand the growth hacking process. The concept has direct synergy with agile marketing and this might be a term/ methodology with which people in the UK may feel more comfortable given the negative connotations of the word “hacking”.

Details

Journal of Research in Marketing and Entrepreneurship, vol. 21 no. 2
Type: Research Article
ISSN: 1471-5201

Keywords

Open Access
Article
Publication date: 9 October 2019

Luke Bacon, Kathleen Azali, Alexandra Lara Crosby and Benjamin Forster

The purpose of this study is to identify shared themes and concerns of two local and critical archives by comparing their design and day-to-day practice.

2572

Abstract

Purpose

The purpose of this study is to identify shared themes and concerns of two local and critical archives by comparing their design and day-to-day practice.

Design/methodology/approach

The action research has drawn on the experience of collaboration between a Sydney-based community space (Frontyard) and the Surabaya-based co-working community (C2O) over one year. Each space houses a small physical library of books, which is the focus of this analysis.

Findings

Hacking has emerged as a key value of both archives. A hacking approach has shaped the design of each space and the organisation each archive. Hacking frames the analysis of each collection in this study.

Practical implications

Pragmatic and political understanding of such archives have implications for better quality and more authentic exchange between the communities that make use of these libraries in Indonesia and Australia.

Originality/value

While some work on local critical archives has been done in Indonesia and Australia, no research to date has made specific comparisons with the aim of sharing knowledge. Because these archives are often temporary and ephemeral, documenting the work that goes into them, and their practitioners’ perspectives, is urgent, making possible shared knowledge that can inform the ways communities make decisions about their own heritage.

Details

Global Knowledge, Memory and Communication, vol. 68 no. 8/9
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 1 March 2002

Martin Botha and Rossouw von Solms

A survey recently completed by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) revealed that corporations, banks, and governments all face a…

1086

Abstract

A survey recently completed by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) revealed that corporations, banks, and governments all face a growing threat from computer crime, and in particular computer hacking. Computer hacking activities caused well over US$100 million in losses last year in the USA and the trend toward professional computer crime, such as computer hacking, is on the rise. Different methods are currently used to control the computer crime problem, for example, by controling access to and from a network by implementing a firewall. As the survey highlighted, most of these methods are insufficient. New means and ways which will minimise and control the hacking problem must therefore continuously be researched and defined. Proposes a method, using trend analysis, that could be utilized to minimise and control the hacking problem in an organisation.

Details

Information Management & Computer Security, vol. 10 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 April 1990

Gerald Vinten

Computer hacking is discussed sequentially with respect to: socialand business ethics, fraud legislation, computer misuse legislation andcomputer controls. Enacting…

1417

Abstract

Computer hacking is discussed sequentially with respect to: social and business ethics, fraud legislation, computer misuse legislation and computer controls. Enacting computer‐specific statutes is the approach that is increasingly popular – UK, US and Canadian responses are described. But law can only serve as one plank in prevention and deterrence of hacking, while enforcement will present problems. Computer auditors and security specialists must play a more significant role. Security precautions are summarised.

Details

Managerial Auditing Journal, vol. 5 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 2 February 2023

Najmeh Hafezieh, Neil Pollock and Annmarie Ryan

Digital technologies, digitalised consumers and the torrent of customer data have been transforming marketing practice. In discussing such trends, existing research has either…

1033

Abstract

Purpose

Digital technologies, digitalised consumers and the torrent of customer data have been transforming marketing practice. In discussing such trends, existing research has either focussed on the skills marketers need or broad-based approaches such as agile methods but has given less consideration to just how such skills or approaches might be developed and used in marketers' day-to-day activities and in the organisation of marketing in the firm. This is what the authors address in this paper.

Design/methodology/approach

This paper adopts an in-depth case study approach to examine an exemplary digital enterprise in transformation of their digital marketing. The insights were gathered from 25 interviews, netnography and document analysis of the case organisation in addition to 10 interviews with independent experts.

Findings

Drawing on practice-oriented approach, the authors show how organisations respond to the emerging trends of digital consumers and big data by taking a ‘hacking marketing’ approach and developing novel marketing expertise at disciplinary boundaries. The authors put forward three sets of practices that enable and shape the hacking marketing approach. These include spanning the expertise boundary, making value measurable and experimenting through which their adaptive, iterative and multidisciplinary work occurs. This explains how managing digital consumers and big data is not within the realm of information technology (IT) functions but marketing and how marketing professionals are changing their practice and moving their disciplinary boundaries.

Practical implications

This study offers practical contributions for firms in terms of identifying new work practices and expertise that marketing specialists need in managing digital platforms, digitalised consumers and big data. This study’s results show that enterprises need to design and implement strong training programmes to prepare their marketing workforce in adopting experimentations of agile approach and data-driven decision making. In addition, Marketing education should be changed so that programmes consider a review of their courses and include the novel marketing models and approaches into their curriculum.

Originality/value

This study contributes to the nascent discussions by unpacking how enterprises can develop new marketing expertise and practices beyond skillsets and how such practices form new hacking marketing approach which addresses the problem of the inability of the conventional marketing approach to show its value within the firm.

Details

Journal of Enterprise Information Management, vol. 36 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 1 January 1990

Margaret Briffa

Reviews the current legal position and the recent proposals of theBritish Law Commission concerning computer security and hacking.Assesses whether the proposals are realistic and…

Abstract

Reviews the current legal position and the recent proposals of the British Law Commission concerning computer security and hacking. Assesses whether the proposals are realistic and whether they should be adopted. Advises that legislation be combined with education to prevent computer misuse.

Details

Facilities, vol. 8 no. 1
Type: Research Article
ISSN: 0263-2772

Keywords

1 – 10 of over 5000