Search results

1 – 10 of 30
Open Access
Article
Publication date: 5 July 2024

Garret Murray, Malin Falkeling and Shang Gao

The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.

Abstract

Purpose

The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.

Design/methodology/approach

A systematic mapping study was carried out to investigate the trends in studies into the human aspects of ransomware, identify challenges encountered by researchers and propose directions for future research. For each of the identified papers from this study, the authors mapped the year of publication, the type of paper, research strategy and data generation method, types of participants included, theories incorporated and lastly, the authors mapped the challenges encountered by the researchers.

Findings

Fifty-nine papers published between 2006 and 2022 are included in the study. The findings indicate that literature on the human aspects of ransomware was scarce prior to 2016. The most-used participant groups in this area are students and cybersecurity professionals, and most studies rely on a survey strategy using the questionnaire to collect data. In addition, many papers did not use theories for their research, but from those that did, game theory was used most often. Furthermore, the most reported challenge is that being hit with ransomware is a sensitive topic, which results in individuals and organisations being reluctant to share their experiences.

Research limitations/implications

This mapping study reveals that the body of literature in the area of human aspects of ransomware has increased over the past couple of years. The findings highlight that being transparent about ransomware attacks, when possible, can help others. Moreover, senior management plays an important role in shaping the information security culture of an organisation, whether to have a culture of transparency or of secrecy.

Originality/value

This study is the first of its kind of systematic mapping studies contributing to the body of knowledge on the human aspects of ransomware.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 September 2024

Xueqi Bao, Jie Yu and Minghuan Shou

This article aims to develop and validate a theoretical model via survey data to identify the affordances and challenges influencing metaverse adoption. We specifically examine…

Abstract

Purpose

This article aims to develop and validate a theoretical model via survey data to identify the affordances and challenges influencing metaverse adoption. We specifically examine the impact of immersion on users' adoption decisions and identify which affordances predict this immersion. Additionally, this paper assesses the importance of perceived risks in users' decision-making processes regarding future metaverse engagement.

Design/methodology/approach

Using regression models applied to 198 survey responses, we tested our proposed model. To deepen our insights, we also conducted a qualitative analysis.

Findings

The findings confirm that users' perceptions of immersion and perceived risks are critical determinants in adoption decisions. Social presence, influenced by factors such as ubiquity and interoperability, emerges as a key component of immersion. From the qualitative data, we identified two potential strategies to enhance metaverse immersion: technical improvements and offline device-assisted strategies.

Originality/value

Our study contributes to the literature on information systems (IS) adoption and provides practical insights for practitioners on crucial considerations in metaverse design.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 29 February 2024

Yuxiao Ye, Yiting Han and Baofeng Huo

In this research, we explore the adverse impact of foreign ownership on operational security, a critical operational implication of the liability of foreignness (LOF).

Abstract

Purpose

In this research, we explore the adverse impact of foreign ownership on operational security, a critical operational implication of the liability of foreignness (LOF).

Design/methodology/approach

The empirical analysis is based on a multi-country dataset from the World Bank Enterprises Survey, which contains detailed firm-level information from over 8,902 firms in 82 emerging market countries. We perform a series of robustness checks to further confirm our findings.

Findings

We find that a high ratio of foreign ownership is associated with an increased likelihood of security breaches and higher security costs. Our results also indicate that high levels of host countries’ institutional quality and firms’ local embeddedness can mitigate such vulnerability in operational security.

Originality/value

This study is one of the first to uncover the critical operational implication of the LOF, indicating that a high ratio of foreign ownership exposes firms to operational security challenges.

Details

International Journal of Operations & Production Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 19 February 2024

Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…

Abstract

Purpose

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.

Design/methodology/approach

An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.

Findings

The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.

Originality/value

This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 23 January 2024

Hao Chen and Yuge Hai

Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for…

Abstract

Purpose

Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for critical influencing factors to discuss the combined influence mechanism of multiple factors on ISM performance (ISMP). This study aims to explore the critical success factors and understand how these factors contribute to ISMP.

Design/methodology/approach

This study used a mixed-method approach to achieve this study’s research goals. In Study 1, the authors conducted a qualitative analysis to take a series of International Organization for Standardization/International Electrotechnical Commission standard documents as the basis to refine the critical factors that may influence organizations’ ISMP. In Study 2, the authors built a research model based on the organizational control perspective and used the survey-based partial least squares-based structural equation modeling (PLS-SEM) approach to understand the relationships between these factors in promoting ISMP. In Study 3, the authors used the fuzzy set qualitative comparative analysis (fsQCA) method to empirically analyze the complex mechanisms of how the combinations of the factors affect ISMP.

Findings

The following three research findings are obtained. First, based on the text-based qualitative analysis, the authors refined the critical success factors that may increase ISMP, including information security policies (ISP), top management support (TMS), alignment (ALI), information security risk assessment (IRA), information security awareness (ISA) and information security culture (ISC). Second, the PLS-SEM testing results confirmed TMS is the antecedent variable motivating organization’s formation (ISP) and information control (ISC) approaches; these two types of organization control approaches increase IRA, ISA and ALI and then promote ISMP directly and indirectly. Third, the fsQCA testing results found two configurations that can achieve high ISMP and one driving path that leads to non-high ISMP.

Originality/value

This study extends knowledge by exploring configuration factors to improve or impede the performances of organizations’ ISM. To the best of the authors’ knowledge, this study is one of the first to explore the use of the fsQCA approach in information security studies, and the results not only revealed causal associations between single factors but also highlighted the critical role of configuration factors in developing organizational ISMP. This study calls attention to information security managers of an organization should highlight the combined effect between the factors and reasonably allocate organizational resources to achieve high ISMP.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 November 2023

Hsiao-Ting Tseng, Waqar Nadeem, M. Sam Hajli, Mauricio Featherman and Nick Hajli

Consumers may enjoy the information sharing and social support made available when a social media platform is used for pre-purchase research; however, do consumers reevaluate the…

Abstract

Purpose

Consumers may enjoy the information sharing and social support made available when a social media platform is used for pre-purchase research; however, do consumers reevaluate the privacy and security of the platform differently when ordering and payment capabilities are added? As social media systems have evolved into social commerce platforms (SCPs), individuals are often faced with whether to complete a purchase they have been researching or switch to a traditional e-commerce platform to complete the transaction. This research examines consumer trust formation in the SCP channel and how consumer interest and engagement in the channel are maintained and influence consumer decisions to purchase via the SCP.

Design/methodology/approach

Based on trust and involvement literature, a research model was conceptualized to capture consumer beliefs about SCP privacy and security and whether the SCP can be trusted, using these inputs into subsequent consumer interest, engagement and decisions on whether to use the SCP for purchasing. The research model was empirically tested using the panel data's structural equation modeling (AMOS) (n = 405). The data showed acceptable reliability and convergent validity, while the original research model provides predictive validity and theory-confirming insights.

Findings

Results confirm that consumer perceptions of privacy and security play a crucial role as decision criteria, informing their judgments of whether a new social commerce channel can be trusted enough to conduct purchases. Further, consumer trust supports their interest in the SCP, resulting in enduring and enhanced behavioral use and, to a lesser extent, purchase intent. Still, a majority of this sample declined to purchase using the SCP and rather preferred to transact on tried and trusted traditional e-commerce sites.

Originality/value

This study is among the first to examine trust formation in new SCPs, where consumers are deciding to expand their engagement level from social and informational to commercial.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 May 2024

Heesup Han, Seongseop (Sam) Kim, Tadesse Bekele Hailu, Amr Al-Ansi, Sandra Maria Correia Loureiro and Jinkyung Jenny Kim

This research paper aims to explore the concerns and determinants of travelers’ behavior toward ChatGPT in the hospitality and tourism context. It also examines the weight of risk…

Abstract

Purpose

This research paper aims to explore the concerns and determinants of travelers’ behavior toward ChatGPT in the hospitality and tourism context. It also examines the weight of risk factors versus that of motivation and innovation characteristics influencing travelers’ approach behaviors toward ChatGPT.

Design/methodology/approach

A cumulative prospect theory was used to determine travelers’ responses to ChatGPT. This study, using a fuzzy-set qualitative approach, explored risk, motivation and innovation factors as determinants of approach behaviors for ChatGPT.

Findings

Findings revealed that risk, motivation and innovation factors were the key triggers of approach behaviors for ChatGPT. An intricate combination effect of the perceived risk, motivation and innovation characteristics was found, and the necessary predictors were determined.

Practical implications

The findings of this study will expand our current knowledge and offer practical insights for the development of ChatGPT in the hospitality and tourism sector.

Originality/value

This study makes a significant contribution to the existing literature by providing a nuanced understanding of the intricate interplay between the various factors that shape customer behavior in the context of technology adoption in hospitality and tourism studies.

Details

International Journal of Contemporary Hospitality Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 9 August 2024

Mohammad Reza Jalilvand and Hamed Ghasemi

Augmented reality (AR) is revolutionizing the tourism and hospitality industry by offering immersive experiences as well as creating more engaging, informative and accessible…

Abstract

Purpose

Augmented reality (AR) is revolutionizing the tourism and hospitality industry by offering immersive experiences as well as creating more engaging, informative and accessible travel experiences that attract tourists from around the globe. From virtual tours and immersive historical site recreations to navigation assistance and cultural education, AR technology is transforming the way we explore and interact with the destinations. This study aims to identify benefits, risks, tools and techniques of AR in the tourism and hospitality literature.

Design/methodology/approach

The authors conducted a systematic literature review to answer six research questions. The authors also identified 33 primary studies, dated from January 2010 to February 2024 and coded them via a thematic analysis. Related studies were obtained through searching in Web of Science and Scopus.

Findings

The results identified nine themes for benefits, eight themes for risks/disadvantages and four tools and applications-related themes. Through the thematic analysis, the major benefits of AR in the tourism and hospitality were found to be differentiated travel experiences, improved performance of tourism value chain, more effective marketing efforts of tourism businesses, enhanced tourists’ engagement, enhanced performance of tourism destinations, stimulated behavioral intentions, tourist empowerment and providing more value, interactivity and integrity. Furthermore, eight risks were identified: physical, privacy and security, social, service failure, technical, psychological, managerial, information and knowledge gaps. The authors also recognized four tools and applications-related themes, namely, AR-enabled tools, AR applications, AR-enabled apps and AR-based techniques.

Originality/value

To the best of the authors’ knowledge, this review provides the first systematic exploration of the existing literature on usage of AR in the context of tourism and hospitality value chain.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Open Access
Article
Publication date: 18 March 2022

Brighton Nyagadza, Asphat Muposhi, Gideon Mazuruse, Tendai Makoni, Tinashe Chuchu, Eugine T. Maziriri and Anyway Chare

The purpose of this article is to investigate the factors that explain the reasons why customers may be willing to use chatbots in Zimbabwe as an e-banking customer service…

3466

Abstract

Purpose

The purpose of this article is to investigate the factors that explain the reasons why customers may be willing to use chatbots in Zimbabwe as an e-banking customer service gateway, an area that remains under researched.

Design/methodology/approach

The research study applied a cross-sectional survey of 430 customers from five selected commercial banks conducted in Harare, the capital city of Zimbabwe. Hypotheses were tested using structural equation modelling.

Findings

The research study showed that a counterintuitive intention to use chatbots is directly affected by chatbots' expected performance, the habit of using them and other factors.

Research limitations/implications

To better appreciate the current research concept, there is a need to replicate the same study in other contexts to enhance generalisability.

Practical implications

Chatbots are a trending new technology and are starting to be increasingly adopted by banks and they have to consider that customers need to get used to them.

Originality/value

This study contributes to bridging the knowledge gap as it investigates the factors that explain why bank customers may be willing to use chatbots in five selected commercial Zimbabwean banks. This is a pioneering study in the context of a developing economy such as Zimbabwe.

Details

PSU Research Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2399-1747

Keywords

Article
Publication date: 21 March 2024

Thamaraiselvan Natarajan, P. Pragha, Krantiraditya Dhalmahapatra and Deepak Ramanan Veera Raghavan

The metaverse, which is now revolutionizing how brands strategize their business needs, necessitates understanding individual opinions. Sentiment analysis deciphers emotions and…

Abstract

Purpose

The metaverse, which is now revolutionizing how brands strategize their business needs, necessitates understanding individual opinions. Sentiment analysis deciphers emotions and uncovers a deeper understanding of user opinions and trends within this digital realm. Further, sentiments signify the underlying factor that triggers one’s intent to use technology like the metaverse. Positive sentiments often correlate with positive user experiences, while negative sentiments may signify issues or frustrations. Brands may consider these sentiments and implement them on their metaverse platforms for a seamless user experience.

Design/methodology/approach

The current study adopts machine learning sentiment analysis techniques using Support Vector Machine, Doc2Vec, RNN, and CNN to explore the sentiment of individuals toward metaverse in a user-generated context. The topics were discovered using the topic modeling method, and sentiment analysis was performed subsequently.

Findings

The results revealed that the users had a positive notion about the experience and orientation of the metaverse while having a negative attitude towards the economy, data, and cyber security. The accuracy of each model has been analyzed, and it has been concluded that CNN provides better accuracy on an average of 89% compared to the other models.

Research limitations/implications

Analyzing sentiment can reveal how the general public perceives the metaverse. Positive sentiment may suggest enthusiasm and readiness for adoption, while negative sentiment might indicate skepticism or concerns. Given the positive user notions about the metaverse’s experience and orientation, developers should continue to focus on creating innovative and immersive virtual environments. At the same time, users' concerns about data, cybersecurity and the economy are critical. The negative attitude toward the metaverse’s economy suggests a need for innovation in economic models within the metaverse. Also, developers and platform operators should prioritize robust data security measures. Implementing strong encryption and two-factor authentication and educating users about cybersecurity best practices can address these concerns and enhance user trust.

Social implications

In terms of societal dynamics, the metaverse could revolutionize communication and relationships by altering traditional notions of proximity and the presence of its users. Further, virtual economies might emerge, with virtual assets having real-world value, presenting both opportunities and challenges for industries and regulators.

Originality/value

The current study contributes to research as it is the first of its kind to explore the sentiments of individuals toward the metaverse using deep learning techniques and evaluate the accuracy of these models.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 30