Search results

1 – 10 of 402
Article
Publication date: 17 August 2023

Tareq Na’el Al-Tawil

Malicious hackers are increasingly evolving with technology by developing advanced tools to infiltrate. They are looking at micro laundering via sites like PayPal or using job…

Abstract

Purpose

Malicious hackers are increasingly evolving with technology by developing advanced tools to infiltrate. They are looking at micro laundering via sites like PayPal or using job advertising sites, to avoid exposure. Micro laundering makes it possible to launder a large amount of money in small amounts through thousands of electronic transactions. Therefore, the purpose of this paper is to examine whether the ethical hacking pedagogy is both a feasible and effective approach to prepare information security professionals of the future to combat black hat hacking and other forms of unethical conduct in the cyberspace.

Design/methodology/approach

The paper will specifically explore the ethics and implications of teaching students how to hack. It examines the strengths and limitations of the ethical hacking pedagogy. The discussion will then form the basis for exploring whether ethical hacking pedagogy is logical and justifiable.

Findings

The research has examined whether the ethical hacking pedagogy is an initiative-taking and effective approach to preparing information security professionals. Teaching students to hack is the only feasible approach to preparing future cybersecurity professionals because such training will allow them to master technical skills necessary for penetration testing.

Originality/value

A dominant theme that emerged from the research is the inability to evaluate students’ intention and provide oversight after their graduation. Thus, professional networks and peer groups will play an instrumental role in sustaining students in an environment that fosters ethical conduct.

Details

Journal of Money Laundering Control, vol. 27 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 11 April 2023

Augusto Bargoni, Fauzia Jabeen, Gabriele Santoro and Alberto Ferraris

Few studies have conceptualized how companies can build and nurture international dynamic marketing capabilities (IDMCs) by implementing growth hacking strategies. This paper…

1041

Abstract

Purpose

Few studies have conceptualized how companies can build and nurture international dynamic marketing capabilities (IDMCs) by implementing growth hacking strategies. This paper conceptualizes growth hacking, a managerial-born process to embed a data-driven mind-set in marketing decision-making that combines big-data analysis and continuous learning, allowing companies to adapt their dynamic capabilities to the ever-shifting international competitive arenas.

Design/methodology/approach

Given the scarcity of studies on growth hacking, this paper conceptualizes this managerial-born concept through the double theoretical lenses of IDMCs and information technology (IT) literature.

Findings

The authors put forward research propositions concerning the four phases of growth hacking and the related capabilities and routines developed by companies to deal with international markets. Additional novel propositions are also developed based on the three critical dimensions of growth hacking: big data analytics, digital marketing and coding and automation.

Research limitations/implications

Lack of prior conceptualization as well as the scant literature makes this study liable to some limitations. However, the propositions developed should encourage researchers to develop both empirical and theoretical studies on this managerial-born concept.

Practical implications

This study develops a detailed compendium for managers who want to implement growth hacking within their companies but have failed to identify the necessary capabilities and resources.

Originality/value

The study presents a theoretical approach and develops a set of propositions on a novel phenomenon, observed mainly in managerial practice. Hence, this study could stimulate researchers to deepen the phenomenon and empirically validate the propositions.

Open Access
Article
Publication date: 29 April 2020

P.J. White, Hannah R. Marston, Linda Shore and Robert Turner

In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with…

Abstract

In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with unprecedented wicked problems such as these, the rigour of design and creative processes can tested. COVID-19 has demonstrated how important human centred design responses are in understanding the worldviews and ecosystems of users. Ad hoc design responses or design hacks have demonstrated that they have a role to play in how we create our future individual, community and societal ecosystems.

In terms of age friendly design, this pandemic makes us envision what should be, furthermore, how we could create better products and services through technology. For our ageing communities “Cocooning” and other social restriction measures have exposed technological deficiencies for the needs of older people and opens up questions of our future preparedness for a growing ageing society. Now more than ever, designers need to understand the behavioural mind-set of older people in their own ecosystem and understand existing mental models.

In this opinion piece we posit what acts of design hacking can lead us to greater understanding of users mental models and therefore better understanding of technology needs for both older and younger adults. While presenting various examples of how design hacking is conducted by citizens and participants alike, it shows that it offers designers differing perspectives, experiences and inspiration for technology.

Details

Emerald Open Research, vol. 1 no. 2
Type: Research Article
ISSN: 2631-3952

Keywords

Expert briefing
Publication date: 1 March 2024

This leak included corporate documents and internal communications, and detailed a suite of spyware applications developed by Shanghai-based cybersecurity company I-Soon, a…

Executive summary
Publication date: 20 February 2024

NORTH KOREA: Defence is key to combatting hacking

Details

DOI: 10.1108/OXAN-ES285361

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 7 February 2024

CHINA: Hacking issue will raise tensions

Details

DOI: 10.1108/OXAN-ES285086

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 26 March 2024

Valérie Mérindol and David W. Versailles

Innovation management in the healthcare sector has undergone significant evolutions over the last decades. These evolutions have been investigated from a variety of perspectives…

Abstract

Purpose

Innovation management in the healthcare sector has undergone significant evolutions over the last decades. These evolutions have been investigated from a variety of perspectives: clusters, ecosystems of innovation, digital ecosystems and regional ecosystems, but the dynamics of networks have seldom been analyzed under the lenses of entrepreneurial ecosystems (EEs). As identified by Cao and Shi (2020), the literature is silent about the organization of resource allocation systems for network orchestration in EEs. This article investigates these elements in the healthcare sector. It discusses the strategic role played by entrepreneurial support organizations (ESOs) in resource allocation and elaborates on the distinction between sponsored and nonsponsored ESOs in EEs. ESOs are active in network orchestration. The literature explains that ESOs lift organizational, institutional and cultural barriers, and support entrepreneurs' access to cognitive and technological resources. However, allocation models are not yet discussed. Therefore, our research questions are as follows: What is the resource allocation model in healthcare-related EEs? What is the role played by sponsored and nonsponsored ESOs as regards resource allocation to support the emergence and development of EEs in the healthcare sector?

Design/methodology/approach

The article offers an explanatory, exploratory, and theory-building investigation. The research design offers an abductive research protocol and multi-level analysis of seven (sponsored and nonsponsored) ESOs active in French healthcare ecosystems. Field research elaborates on semi-structured interviews collected between 2016 and 2022.

Findings

This article shows explicit complementarities between top-down and bottom-up resource allocation approaches supported by ESOs in the healthcare sector. Despite explicit originalities in each approach, no network orchestration model prevails. Multi-polar coordination is the rule. Entrepreneurs' access to critical technological and cognitive resources is based on resource allocation modalities that differ for sponsored versus nonsponsored ESOs. Emerging from field research, this research also shows that sponsored and nonsponsored ESOs manage their roles in different ways because they confront original issues about organizational legitimacy.

Originality/value

Beyond the results listed above, the main originalities of the paper relate to the instantiation of multi-level analysis operated during field research and to the confrontation between sponsored versus nonsponsored ESOs in the domain of healthcare-related innovation management. This research shows that ESOs have practical relevance because they build original routes for resource allocation and network orchestration in EEs. Each ESO category (sponsored versus nonsponsored) provides original support for resource allocation. The ESO's legitimacy is inferred either from the sponsor or the services delivered to end-users. This research leads to propositions for future research and recommendations for practitioners: ESO managers, entrepreneurs, and policymakers.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Executive summary
Publication date: 5 December 2023

UNITED STATES: Response to Iran hack will be measured

Details

DOI: 10.1108/OXAN-ES283803

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 23 April 2024

Chen Zhong, Hong Liu and Hwee-Joo Kam

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…

Abstract

Purpose

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity competitions among Reddit users. These users constitute a substantial demographic of young individuals, often participating in communities oriented towards college students or cybersecurity enthusiasts. The authors specifically focus on novice learners who showed an interest in cybersecurity but have not participated in competitions. By understanding their views and concerns, the authors aim to devise strategies to encourage their continuous involvement in cybersecurity learning. The Reddit platform provides unique access to this significant demographic, contributing to enhancing and diversifying the cybersecurity workforce.

Design/methodology/approach

The authors propose to mine Reddit posts for information about learners’ attitudes, interests and experiences with cybersecurity competitions. To mine Reddit posts, the authors developed a text mining approach that integrates computational text mining and qualitative content analysis techniques, and the authors discussed the advantages of the integrated approach.

Findings

The authors' text mining approach was successful in extracting the major themes from the collected posts. The authors found that motivated learners would want to form a strategic way to facilitate their learning. In addition, hope and fear collide, which exposes the learners’ interests and challenges.

Originality/value

The authors discussed the findings to provide education and training experts with a thorough understanding of novice learners, allowing them to engage them in the cybersecurity industry.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 April 2024

Tiera Chante Tanksley

This paper aims to center the experiences of three cohorts (n = 40) of Black high school students who participated in a critical race technology course that exposed anti-blackness…

Abstract

Purpose

This paper aims to center the experiences of three cohorts (n = 40) of Black high school students who participated in a critical race technology course that exposed anti-blackness as the organizing logic and default setting of digital and artificially intelligent technology. This paper centers the voices, experiences and technological innovations of the students, and in doing so, introduces a new type of digital literacy: critical race algorithmic literacy.

Design/methodology/approach

Data for this study include student interviews (called “talk backs”), journal reflections and final technology presentations.

Findings

Broadly, the data suggests that critical race algorithmic literacies prepare Black students to critically read the algorithmic word (e.g. data, code, machine learning models, etc.) so that they can not only resist and survive, but also rebuild and reimagine the algorithmic world.

Originality/value

While critical race media literacy draws upon critical race theory in education – a theorization of race, and a critique of white supremacy and multiculturalism in schools – critical race algorithmic literacy is rooted in critical race technology theory, which is a theorization of blackness as a technology and a critique of algorithmic anti-blackness as the organizing logic of schools and AI systems.

Details

English Teaching: Practice & Critique, vol. 23 no. 1
Type: Research Article
ISSN: 1175-8708

Keywords

1 – 10 of 402