Search results

11 – 20 of over 5000
Article
Publication date: 5 October 2015

Bradford W. Reyns

The purpose of this study is to test a comprehensive routine activity framework on three types of online victimization. Prior research has utilized routine activity theory to…

1882

Abstract

Purpose

The purpose of this study is to test a comprehensive routine activity framework on three types of online victimization. Prior research has utilized routine activity theory to explain varied online forms of victimization, but most have focused on its person-based forms. The present study, therefore, expands upon this research to examine the effects of online exposure, online target suitability and online guardianship upon phishing, hacking and malware infection victimization.

Design/methodology/approach

Secondary data from the 23rd Cycle of the Canadian GSS were used to address the study’s research questions using binary logistic regression analyses.

Findings

Particular online behaviors were consistently and positively related to all three types of online victimization, including booking/making reservations, social networking and having one’s information posted online. Other online routines exhibited unique effects on online victimization risk.

Originality/value

In support of the theory, the results suggest that online exposure and target suitability increase risks for phishing, hacking and malware victimization. Online guardianship was also positively related to victimization, a finding that runs counter to theoretical expectations.

Details

Journal of Financial Crime, vol. 22 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 May 1995

Matthew K. O. Lee

One of the main aims of information systems security (ISS) is toprevent unauthorized access to and tampering with information systemsresources. In April 1993 the first ever…

1636

Abstract

One of the main aims of information systems security (ISS) is to prevent unauthorized access to and tampering with information systems resources. In April 1993 the first ever computer crime legislation came into existence in Hong Kong. Issues relating to computer fraud, hacking, and other types of threats to ISS are addressed by the legislation. As a legislative tool used in the control of computer crime, the Hong Kong experience is worth examining because it is the first major effort of this kind in the important and fast growing Far East region. In critically examining this legislation and its implications on ISS management, contributes towards a better understanding of the regulatory control of computer crime and its policy implications. Makes comparisons with countries which have a longer history of computer crime control.

Details

Information Management & Computer Security, vol. 3 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 25 June 2020

Naci Akdemir and Christopher James Lawless

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes…

3792

Abstract

Purpose

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.

Design/methodology/approach

A mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were analysed via binary logistic regression and content analyses methods.

Findings

This research illustrated that Internet users facilitated their victimisation through their online activities. Additionally, using insecure Internet connections and public access computers emerged as risk factors for both cyber-enabled and cyber-dependent crime victimisation. Voluntary and involuntary personal information disclosure through social networking sites and online advertisement websites increased the likelihood of being a target of phishing. Deviant online activities such as free streaming or peer-to-peer sharing emerged to increase the risk of cyber-dependent crime victimisation.

Research limitations/implications

The binary logistic regression analysis results suggested LRAT as a more suitable theoretical framework for cyber-dependent crime victimisation. Future research may test this result with models including more macro variables.

Practical implications

Policymakers may consider implementing regulations regarding limiting the type of information required to login to free Wi-Fi connections. Checking trust signs and green padlocks may be effective safeguarding measures to lessen the adverse impacts of impulsive buying.

Originality/value

This study empirically illustrated that, besides individual-level factors, macro-level factors such as electronic devices being utilised to access the Internet and data breaches of large companies also increased the likelihood of becoming the victim of cyber-enabled and cyber-dependent crime.

Details

Internet Research, vol. 30 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Open Access
Article
Publication date: 29 April 2020

P.J. White, Hannah R. Marston, Linda Shore and Robert Turner

In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with…

Abstract

In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with unprecedented wicked problems such as these, the rigour of design and creative processes can tested. COVID-19 has demonstrated how important human centred design responses are in understanding the worldviews and ecosystems of users. Ad hoc design responses or design hacks have demonstrated that they have a role to play in how we create our future individual, community and societal ecosystems.

In terms of age friendly design, this pandemic makes us envision what should be, furthermore, how we could create better products and services through technology. For our ageing communities “Cocooning” and other social restriction measures have exposed technological deficiencies for the needs of older people and opens up questions of our future preparedness for a growing ageing society. Now more than ever, designers need to understand the behavioural mind-set of older people in their own ecosystem and understand existing mental models.

In this opinion piece we posit what acts of design hacking can lead us to greater understanding of users mental models and therefore better understanding of technology needs for both older and younger adults. While presenting various examples of how design hacking is conducted by citizens and participants alike, it shows that it offers designers differing perspectives, experiences and inspiration for technology.

Details

Emerald Open Research, vol. 1 no. 2
Type: Research Article
ISSN: 2631-3952

Keywords

Expert briefing
Publication date: 1 March 2024

This leak included corporate documents and internal communications, and detailed a suite of spyware applications developed by Shanghai-based cybersecurity company I-Soon, a…

Article
Publication date: 12 January 2015

Marc Richard Hugh Kosciejew

The purpose of this paper is to argue that information is an important effect of documentation. It is in this way that documentation studies distinguishes between concepts of and…

1462

Abstract

Purpose

The purpose of this paper is to argue that information is an important effect of documentation. It is in this way that documentation studies distinguishes between concepts of and practices with “information” and “document”: that is, documentation studies helps illuminate how information is created, stabilized, and materialized such that it can emerge and, in turn, how it can then be controlled, deployed, enforced, entrenched, managed, and used in many different ways, in various settings, and for diverse purposes.

Design/methodology/approach

This paper presents a conceptual framework on documentation, drawing upon the work of Bernd Frohmann, Michel Foucault, Bruno Latour, Hannah Arendt, @@and Ian Hacking, and applied to a case study of Apartheid South Africa.

Findings

Apartheid’s documentation helped achieve apartness at the macro and micro levels of society: on the macro level, the creation and subsequent separation of different racial and ethnic identities were drafted, adopted, and turned into law through legislative documents; on the micro level, these identities were reinforced through routines with personal documents and public signs. This documentation functioned as a documentary apparatus, providing a tangible link between individuals and their official racial and ethnic categories by creating a seamless movement of documents through various institutions; further it helped transform these racial and ethnic identities into lived facts that disciplined and controlled life.

Originality/value

By examining documentation, one can present a fresh and unique perspective to understanding the construction of various things, such as the construction of identities. This conceptual framework contributes to Library and Information Science (LIS) by illuminating the central role of documentation in the creation, stabilization, materialization, and emergence of information. By using Apartheid South Africa as a case study, this paper demonstrates how this framework can be applied to shed new light on different kinds of phenomena in diverse contexts; consequently, it not only contributes to and extends parts of the scholarship on documentation studies within LIS, but also presents new directions for other academic disciplines and multidisciplinary analyses and research.

Details

Journal of Documentation, vol. 71 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Executive summary
Publication date: 4 October 2018

CHINA/US: Economic conflict will lead to more hacking

Details

DOI: 10.1108/OXAN-ES238952

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 20 August 2020

Kholekile Gwebu and Clayton W. Barrows

The purpose of this study is to expand on the existing literature by specifically examining data security incidents within the hospitality industry, assessing origins and causes…

1222

Abstract

Purpose

The purpose of this study is to expand on the existing literature by specifically examining data security incidents within the hospitality industry, assessing origins and causes, comparing breaches within the industry with those of other industries and identifying areas of concern.

Design/methodology/approach

A sample of data breach incidents is drawn from the Verizon VERIS Community Database (VCDB). Statistical comparisons between hospitality and non-hospitality industry firms are conducted following the Verizon A4 threat framework.

Findings

The results reveal that breaches between hospitality and non-hospitality firms differ significantly in terms of actors, actions, assets and attributes. Specifically, proportions of breaches in the hospitality industry are larger in terms of external actors, hacking and malware, user devices compromised and integrity violations. Additionally, compared to other industries, point-of-sales (POS) system breaches occur at a higher rate in the hospitality industry. The study finds that company size, hacking and malware predict the likelihood of a POS breach.

Research limitations/implications

The study uses secondary data and does not include the entire universe of data breaches.

Originality/value

In the quest to reduce data breach incidents, it is imperative to identify and assess the nature of data breach incidents between industries. Doing so permits the development of targeted industry-specific solutions rather than generic ones. This study systematically identifies differences between hospitality and non-hospitality data security incidents and then suggests areas where hospitality companies should focus future attention to mitigate breach incidents.

研究目的

本论文延展了现有文献, 检测了酒店业中的数据安全事故, 评估其起因, 比较其他产业和酒店产业数据泄露的区别, 以及找出关键区域。

研究设计/方法/途径

样本数据为 Verizon VERIS 社区数据库(VCDB)中的数据泄露事件。研究遵循Verizon A4 危险模型, 对酒店业和非酒店业之间事件进行了数据分析比较。

研究结果

研究结果表明酒店公司和非酒店公司的数据泄露在当事人、行为、资产、和属性方面, 有着很大不同。其中, 酒店业中的数据泄露比例在外部因素、黑客、病毒、用户端失灵、和违反道德方面比较大。此外, 相对其他产业, POS系统在酒店产业中的数据泄露概率较高。本论文发现公司规模、黑客、和病毒对POS数据泄露的影响有着重大决定作用。

研究理论限制/意义

本论文使用二手数据, 并未检测整体数据泄露数据。

研究原创性/价值

为了减少数据泄露事件, 产业之间数据泄露事件属性的认定和评价至关重要。因此, 可以针对具体产业具体事件制定出特定的解决方案。本论文系统上指出了酒店和非酒店业的数据安全事件的区别, 以及指出哪些方面, 酒店业应该重点关注, 以减少未来数据泄露事件。

Expert briefing
Publication date: 21 February 2017

Media outlets provided unusually detailed coverage of the story that the FSB had arrested two of its own officers and another individual. The investigation has receded into…

Article
Publication date: 24 August 2023

Haroon Iqbal Maseeh, Shamsun Nahar, Charles Jebarajakirthy, Mitchell Ross, Denni Arli, Manish Das, Mehak Rehman and Hafiz Ahmad Ashraf

The purpose of this study is to explore and identify the privacy concerns of smartphone app users pertinent to app usage.

Abstract

Purpose

The purpose of this study is to explore and identify the privacy concerns of smartphone app users pertinent to app usage.

Design/methodology/approach

Adopting a qualitative phenomenological approach, the authors conducted semi-structured interviews with app users to explore the app users' privacy concerns.

Findings

Credibility concerns, unauthorised secondary use and vulnerability concerns are the three major privacy concerns of app users, under which these concerns have sub-concerns, i.e. popularity, privacy policy, stalking, data sharing, hacking and personal harm.

Practical implications

The findings are useful to app marketers, app developers and app stores. App marketers, app developers and app stores can use the findings to understand and properly address app users' privacy concerns, thereby increasing the apps usage.

Originality/value

By exploring the privacy concerns of app users, the authors' study extends the literature and provides a theoretical development of individuals' privacy concerns in the context of a widely used technology, i.e. smartphone applications. Accordingly, this study contributes to the consumer privacy literature.

Details

Marketing Intelligence & Planning, vol. 41 no. 7
Type: Research Article
ISSN: 0263-4503

Keywords

11 – 20 of over 5000