Search results

1 – 10 of over 4000
Article
Publication date: 1 December 2001

Martin Botha and Rossouw von Solms

A survey recently completed by the Computer Security Institute and the Federal Bureau of Investigation revealed that corporations, banks, and governments all face a…

1210

Abstract

A survey recently completed by the Computer Security Institute and the Federal Bureau of Investigation revealed that corporations, banks, and governments all face a growing threat from computer crime, and in particular computer hacking. The computer hacking activities caused well over $100 million in losses last year in the USA and the trend toward professional computer crime, such as computer hacking, is on the rise. Different methods are currently used to control the computer crime problem, for example, to control the access to and from a network by implementing a firewall. As the survey highlighted, most of these methods are inefficient. New means and ways which will minimise and control the hacking problem must therefore continuously be researched and defined. This paper will propose a method, based on trend analysis, that could be utilized to minimise and control the hacking problem in an organisation.

Details

Information Management & Computer Security, vol. 9 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 5 June 2017

Jon D. Elhai, Jason C. Levine and Brian J. Hall

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine…

2731

Abstract

Purpose

Despite concerns about digital privacy, little is known about emotional distress about data hacking and surveillance incidents. The purpose of this paper is to examine variables predicting anxiety about data hacking, and the role that such anxiety and other potentially important variables have in explaining the use of digital privacy protection behavior.

Design/methodology/approach

In total, 305 participants from an online labor market were sampled who frequently use the internet, surveyed about recent anxiety (using the Generalized Anxiety Disorder-7 scale (GAD-7)), anxiety about data hacking (GAD-7, in reference to data hacking), and issues of digital privacy: news exposure, perceived importance, self-efficacy, protection behavior, and previous hacking victimization.

Findings

Profession (information technology-related) moderated the symptom structure for recent anxiety, but not data hacking anxiety. Using structural equation modeling, prior hacking victimization predicted anxiety about hacking. Digital privacy protection behavior was related to hacking anxiety and privacy self-efficacy. Data hacking anxiety mediated relations between hacking victimization and privacy protection. Privacy self-efficacy mediated relations between news exposure to hacking incidents and privacy protection.

Research limitations/implications

Limitations include the self-report nature of the instruments, and use of a selective, non-random sample.

Practical implications

Results highlight knowledge, self-efficacy, and threat appraisal among IT managers in motivating better digital security practices.

Originality/value

This is the first study using a standardized instrument of anxiety to examine distress about hacking and predictors of digital privacy protection behavior.

Details

Internet Research, vol. 27 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 29 November 2019

Tony Conway and Tanya Hemphill

“Growth hacking” is a “data-informed” marketing approach that uses digital marketing tools and tactics as well as traditional marketing channels to help technology…

1468

Abstract

Purpose

“Growth hacking” is a “data-informed” marketing approach that uses digital marketing tools and tactics as well as traditional marketing channels to help technology companies show “proof-of-concept” and sustainability before gaining funding. The purpose of this study was to identify and understand the relevance and importance of growth hacking and identify what growth hacking tools and techniques are used by such organisations.

Design/methodology/approach

The main research method for the collection of primary data was in-depth interviews with both industry experts (senior professionals working for growth hacking agencies) and individual growth hacking practitioners who work for technology start-ups based in the UK. Interviews included the use of dimension cards with key growth hacking terms to act as visual cues to facilitate focus and prompt reflection.

Findings

In addition to a data analysis element, growth hacking also requires people to spot emerging opportunities before anyone else does. This makes it very difficult to find people with the right skill-set. It is also important to use traditional marketing methods to bridge the gap between the physical and digital world.

Originality/value

This study shows that growth hacking is a mind-set and process that can help technology start-ups grow quickly with a limited marketing budget. The research offers guidelines and frameworks for start-ups to understand the growth hacking process. The concept has direct synergy with agile marketing and this might be a term/ methodology with which people in the UK may feel more comfortable given the negative connotations of the word “hacking”.

Details

Journal of Research in Marketing and Entrepreneurship, vol. 21 no. 2
Type: Research Article
ISSN: 1471-5201

Keywords

Open Access
Article
Publication date: 9 October 2019

Luke Bacon, Kathleen Azali, Alexandra Lara Crosby and Benjamin Forster

The purpose of this study is to identify shared themes and concerns of two local and critical archives by comparing their design and day-to-day practice.

1507

Abstract

Purpose

The purpose of this study is to identify shared themes and concerns of two local and critical archives by comparing their design and day-to-day practice.

Design/methodology/approach

The action research has drawn on the experience of collaboration between a Sydney-based community space (Frontyard) and the Surabaya-based co-working community (C2O) over one year. Each space houses a small physical library of books, which is the focus of this analysis.

Findings

Hacking has emerged as a key value of both archives. A hacking approach has shaped the design of each space and the organisation each archive. Hacking frames the analysis of each collection in this study.

Practical implications

Pragmatic and political understanding of such archives have implications for better quality and more authentic exchange between the communities that make use of these libraries in Indonesia and Australia.

Originality/value

While some work on local critical archives has been done in Indonesia and Australia, no research to date has made specific comparisons with the aim of sharing knowledge. Because these archives are often temporary and ephemeral, documenting the work that goes into them, and their practitioners’ perspectives, is urgent, making possible shared knowledge that can inform the ways communities make decisions about their own heritage.

Details

Global Knowledge, Memory and Communication, vol. 68 no. 8/9
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 1 March 2002

Martin Botha and Rossouw von Solms

A survey recently completed by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) revealed that corporations, banks, and governments all…

1076

Abstract

A survey recently completed by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) revealed that corporations, banks, and governments all face a growing threat from computer crime, and in particular computer hacking. Computer hacking activities caused well over US$100 million in losses last year in the USA and the trend toward professional computer crime, such as computer hacking, is on the rise. Different methods are currently used to control the computer crime problem, for example, by controling access to and from a network by implementing a firewall. As the survey highlighted, most of these methods are insufficient. New means and ways which will minimise and control the hacking problem must therefore continuously be researched and defined. Proposes a method, using trend analysis, that could be utilized to minimise and control the hacking problem in an organisation.

Details

Information Management & Computer Security, vol. 10 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 April 1990

Gerald Vinten

Computer hacking is discussed sequentially with respect to: socialand business ethics, fraud legislation, computer misuse legislation andcomputer controls. Enacting…

1382

Abstract

Computer hacking is discussed sequentially with respect to: social and business ethics, fraud legislation, computer misuse legislation and computer controls. Enacting computer‐specific statutes is the approach that is increasingly popular – UK, US and Canadian responses are described. But law can only serve as one plank in prevention and deterrence of hacking, while enforcement will present problems. Computer auditors and security specialists must play a more significant role. Security precautions are summarised.

Details

Managerial Auditing Journal, vol. 5 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 1 January 1990

Margaret Briffa

Reviews the current legal position and the recent proposals of theBritish Law Commission concerning computer security and hacking.Assesses whether the proposals are…

Abstract

Reviews the current legal position and the recent proposals of the British Law Commission concerning computer security and hacking. Assesses whether the proposals are realistic and whether they should be adopted. Advises that legislation be combined with education to prevent computer misuse.

Details

Facilities, vol. 8 no. 1
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 5 October 2015

Bradford W. Reyns

The purpose of this study is to test a comprehensive routine activity framework on three types of online victimization. Prior research has utilized routine activity theory…

1550

Abstract

Purpose

The purpose of this study is to test a comprehensive routine activity framework on three types of online victimization. Prior research has utilized routine activity theory to explain varied online forms of victimization, but most have focused on its person-based forms. The present study, therefore, expands upon this research to examine the effects of online exposure, online target suitability and online guardianship upon phishing, hacking and malware infection victimization.

Design/methodology/approach

Secondary data from the 23rd Cycle of the Canadian GSS were used to address the study’s research questions using binary logistic regression analyses.

Findings

Particular online behaviors were consistently and positively related to all three types of online victimization, including booking/making reservations, social networking and having one’s information posted online. Other online routines exhibited unique effects on online victimization risk.

Originality/value

In support of the theory, the results suggest that online exposure and target suitability increase risks for phishing, hacking and malware victimization. Online guardianship was also positively related to victimization, a finding that runs counter to theoretical expectations.

Details

Journal of Financial Crime, vol. 22 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 May 1995

Matthew K. O. Lee

One of the main aims of information systems security (ISS) is toprevent unauthorized access to and tampering with information systemsresources. In April 1993 the first…

1597

Abstract

One of the main aims of information systems security (ISS) is to prevent unauthorized access to and tampering with information systems resources. In April 1993 the first ever computer crime legislation came into existence in Hong Kong. Issues relating to computer fraud, hacking, and other types of threats to ISS are addressed by the legislation. As a legislative tool used in the control of computer crime, the Hong Kong experience is worth examining because it is the first major effort of this kind in the important and fast growing Far East region. In critically examining this legislation and its implications on ISS management, contributes towards a better understanding of the regulatory control of computer crime and its policy implications. Makes comparisons with countries which have a longer history of computer crime control.

Details

Information Management & Computer Security, vol. 3 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 25 June 2020

Naci Akdemir and Christopher James Lawless

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes…

2068

Abstract

Purpose

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.

Design/methodology/approach

A mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were analysed via binary logistic regression and content analyses methods.

Findings

This research illustrated that Internet users facilitated their victimisation through their online activities. Additionally, using insecure Internet connections and public access computers emerged as risk factors for both cyber-enabled and cyber-dependent crime victimisation. Voluntary and involuntary personal information disclosure through social networking sites and online advertisement websites increased the likelihood of being a target of phishing. Deviant online activities such as free streaming or peer-to-peer sharing emerged to increase the risk of cyber-dependent crime victimisation.

Research limitations/implications

The binary logistic regression analysis results suggested LRAT as a more suitable theoretical framework for cyber-dependent crime victimisation. Future research may test this result with models including more macro variables.

Practical implications

Policymakers may consider implementing regulations regarding limiting the type of information required to login to free Wi-Fi connections. Checking trust signs and green padlocks may be effective safeguarding measures to lessen the adverse impacts of impulsive buying.

Originality/value

This study empirically illustrated that, besides individual-level factors, macro-level factors such as electronic devices being utilised to access the Internet and data breaches of large companies also increased the likelihood of becoming the victim of cyber-enabled and cyber-dependent crime.

Details

Internet Research, vol. 30 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of over 4000