Search results

1 – 10 of over 15000
Article
Publication date: 8 July 2014

Swapan Purkait, Sadhan Kumar De and Damodar Suar

The aim of this study is to report on the results of an empirical investigation of the various factors which have significant impacts on the Internet user’s ability to correctly…

1742

Abstract

Purpose

The aim of this study is to report on the results of an empirical investigation of the various factors which have significant impacts on the Internet user’s ability to correctly identify a phishing website.

Design/methodology/approach

The research participants were Internet users who have had at least some experience of financial transactions over the Internet. This study conducted a quantitative research with the help of a structured survey questionnaire along with three experimental tasks. A total of 621 valid samples were collected and the multiple regression analysis technique was used to deduce the answers to the research question.

Findings

The results show that the model is useful and has explanatory power. And adjusted R2 computed as 0.927, means that 92.7 per cent of the variations in the Internet user’s ability to identify phishing website can be explained by the predictors selected for the model.

Research limitations/implications

Future research should account for the Internet user’s general security practices and behaviour, attitude towards online financial activity, risk-taking ability or risk behaviour and their potential effects on Internet users' ability to identify a phishing website.

Practical implications

The implications of this study provide the foundation for future research on the areas that intend to explain the Internet user’s necessity to take protection or avoid risky behaviour while performing financial transaction over the Internet.

Originality/value

This study provides the body of knowledge with an empirical analysis of impact of various factors on an Internet user’s ability to identify phishing websites. The results of this study can help practitioners create a more successful research model and help researchers better understand user behaviour on the Internet.

Details

Information Management & Computer Security, vol. 22 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Case study
Publication date: 2 February 2022

Sahar E-Vahdati, Wan Nordin Wan-Hussin and Oon Hun Ling

This study enables to critique the development of a sustainability strategy brand; integrated reports, sustainability reports, usage of safe internet and online learning skills to…

Abstract

Learning outcomes

This study enables to critique the development of a sustainability strategy brand; integrated reports, sustainability reports, usage of safe internet and online learning skills to reduce inequalities and increase stakeholders’ values.

Case overview/synopsis

Digi Telecommunications (Digi) has been publishing annual sustainability reporting in line with Global Reporting Initiatives since 2009. Albern Murty, Chief Executive Officer (CEO) of Digi, the largest player in the mobile telecommunications industry in Malaysia by the number of subscribers, decided to establish a responsible business brand known as Yellow Heart in 2018 to better serve their stakeholders demand. There was a low stakeholder understanding of Digi’s sustainability efforts and societal impacts. Digi’s Sustainability department aspired to make Yellow Heart the best industry practice for continuous improvements by making Responsible Business commitment one of the main pillars of the company’s strategy and vision. Yellow Heart was linked to Sustainable Development Goals (SDG)10 on reducing inequalities by focusing on Digital Inclusion and Resilience to increase safe access opportunities, provide marginalized communities with opportunities to pursue interests in digital learning pathways and create a more sustainable digital future for all. The case study illustrates the sustainability management at Digi and the planned migration from sustainability reporting to integrated reporting to build trust in the business with all the stakeholders. The case dilemma involves the challenges that Philip Ling Oon Hun, the Head of the Sustainability, faced in deciding the SDGs to focus on and measuring and reporting their outcomes to contribute to the greater good, not only in pure business terms but also to society at large.

Complexity academic level

This case is appropriate for undergraduate or graduate-level programs in Accounting, Corporate Governance and Strategy Implementation.

Supplementary materials

Teaching notes are available for educators only.

Subject code

CSS 1: Accounting and Finance.

Article
Publication date: 2 October 2017

Kai S. Koong, Lai C. Liu, Hong Qin and Tingting Ying

The purpose of this paper is to report on the findings and lessons that were learned from the many cases of internet fraud complaints that are gathered by the Federal Trade…

1411

Abstract

Purpose

The purpose of this paper is to report on the findings and lessons that were learned from the many cases of internet fraud complaints that are gathered by the Federal Trade Commission in the USA. The implications that are contained in the behavior of the complaints and trends identified are critical for addressing all types of online criminal activities in the increasing world of cybercrimes.

Design/methodology/approach

Data for this paper are extracted from the Consumer Sentinel Network Data Handbook covering a period of 13 years. Using the raw data, the occurrences were plotted and trends (number of cycles, time between cycles, and leading state and lagging states) were identified. Descriptive statistics covering the 13 years were examined and discussed. Using 20002 as the base year, the rate of growth of each of the states were ranked annually and were tested for stability and predictability using non-parametric approaches.

Findings

The key findings are indigenous to the occurrences of online fraud complaints in the USA. However, as the leading nation with the best database on fraud complaints, the findings are mission critical to fraud prevention across the globe. Specifically, this study found that since 2002, there have been four distinct cycles. Each cycle is clearly noticeable because there is a rapid growth in the number of crime complaints in the beginning half of the period followed by a slowing down period. However, the speed of change from one cycle to the next is steeper and the time gap is faster. While it is true that from the perspective of all the 50 states, the ranks appear to change every year and thus are not stable. However, the majority of the changes are relatively small so their relative positions by rank are still predictable.

Originality/value

The paper extends existing understanding of online fraud occurrences in the USA. The findings are timely and based on longitudinal data that span over a decade. The four new cycles identified are critical to the body of knowledge. The observed change in time from one cycle to another and its changes from a mathematic to a geometric one are also new. The findings are invaluable to persons working in law enforcement related occupations (auditors, lawyers, forensic experts, among others) and who must deal with the increasing problem of online fraud and cybercrimes.

Details

International Journal of Accounting & Information Management, vol. 25 no. 4
Type: Research Article
ISSN: 1834-7649

Keywords

Article
Publication date: 7 April 2015

Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband and Steven Furnell

The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of…

4089

Abstract

Purpose

The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is also conducted to identify the gaps in the cybersecurity awareness assessment research which warrants the future work.

Design/methodology/approach

The authors used a systematic literature review technique to search the relevant online databases by using pre-defined keywords. The authors limited the search to retrieve only English language academic articles published from 2005 to 2014. Relevant information was extracted from the retrieved articles, and the ensuing discussion centres on providing the answers to the research questions.

Findings

From the online searches, 23 studies that matched the search criteria were retrieved, and the information extracted from each study includes the authors, publication year, assessment method used, target audiences, coverage of assessment and assessment goals.

Originality/value

The review of the retrieved articles indicates that no previous research was conducted in the assessment of the cybersecurity awareness using a programme evaluation technique. It was also found that few studies focused on youngsters and on the issue of safeguarding personal information.

Details

Kybernetes, vol. 44 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 June 2022

Nilaya Murthy and Santosh Gopalkrishnan

The purpose of this study is to find out if there is a sequence or pattern to digital frauds and whether the openness quotient of any individual has a meaningful role to play in…

1032

Abstract

Purpose

The purpose of this study is to find out if there is a sequence or pattern to digital frauds and whether the openness quotient of any individual has a meaningful role to play in them becoming victims of digital frauds. The legal and regulatory angle of digital frauds and relief measures for social media openness and frauds are discussed to examine the connection between openness, identity data, visibility, vulnerability, digital frauds and social media sharing of information.

Design/methodology/approach

This study is empirical and investigative research. Primary data was collected via questionnaires circulated among participants from various age groups to understand the implications of different demographic factors such as age, websites used, profiles created and data shared on the internet, social media and e-commerce websites.

Findings

The results exhibit that the openness factor does affect vulnerability and has an influence on the risk and legal component of inclination towards digital frauds.

Practical implications

This research study results in bridging the gap by increasing the level of understanding and awareness in users toward achieving proactive and regulated behaviour and comprehending the violation of various acts of digital frauds and its implications, especially in the Indian banking sector.

Originality/value

This study will be beneficial to all individuals alike in understanding the implications of excessive openness toward digital platforms and evaluating generic and legal solutions to avoid becoming victims of digital fraud.

Details

International Journal of Law and Management, vol. 64 no. 4
Type: Research Article
ISSN: 1754-243X

Keywords

Open Access
Article
Publication date: 5 September 2024

Amer Jazairy, Mazen Brho, Ila Manuj and Thomas J. Goldsby

Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this…

Abstract

Purpose

Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this gap, this research examines the effect of SC cyber risk management strategies on integration decisions for cybersecurity (with suppliers, customers, and internally) to enhance the SC’s cyber resilience and robustness.

Design/methodology/approach

A research model grounded in the supply chain risk management (SCRM) literature, with roots in the Dynamic Capabilities View and the Relational View, was developed. Survey responses of 388 SC managers at US manufacturers were obtained to test the model.

Findings

An impact of SC cyber risk management strategies on internal cyber integration was detected, which in turn impacted external cyber integration with both suppliers and customers. Further, a positive effect of internal and customer cyber integration on both cyber resilience and robustness was found, while cyber integration with suppliers impacted neither.

Practical implications

Industry practitioners may adapt certain risk management and integration strategies to enhance the cybersecurity posture of their SCs.

Originality/value

This research bridges between the established domain of SCRM and the emergent field of SC cybersecurity by forming and testing novel relationships between SCRM-rooted constructs tailored to an SC cyber risks context.

Details

International Journal of Physical Distribution & Logistics Management, vol. 54 no. 11
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 21 November 2023

Diab M. Al-Badayneh, Anis Ben Brik and Amr Elwakad

This study aims to examine social determinants and social strains of cyberbullying victimization among expatriate populations in high-income countries such as Qatar. The authors…

Abstract

Purpose

This study aims to examine social determinants and social strains of cyberbullying victimization among expatriate populations in high-income countries such as Qatar. The authors argue that expatriate students will be exposed to stains and pressures due to several factors, such as feeling alienated, lonely, homesick, insecure and helpless. This study examines a partial assumption of general strain theory (GST), which posits that expats’ cyberbullying victimization can create negative stimuli that lead to negative feelings and, as a result, to delinquent behavior. The delinquent behavior can be seen as a coping method in encountering strains. Logistic regression analysis is applied (using SPSS v. 21) to test the hypothesis that the victimization of expats’ cyberbullying could lead to strain and delinquency.

Design/methodology/approach

A sample of 2,428 expatriate students (46% males and 54% females) was randomly selected from seven public schools in Qatar. The average number of siblings in the household was 2.7. Around 10.8% of the sample reported victimization by cyberbullying. Most came from intact families (80.6%) compared to 19.4 living in broken homes. Concerning the birth order of the student in the family, 25% of the sample were firstborn, and 20% were middle-born. Students’ mother relationships were higher than students’ father relationships (69% vs 51%, respectively). Fathers were higher in undergraduate education than mothers (60% vs 49%, respectively). Considering that 58% of women did not have a job, most fathers work in administrative positions (47% in administrative work and 39% in professional positions) as opposed to mothers’ positions (15% and 21%, respectively). The survey was distributed among expatriate students by trained researchers, teachers and social workers in public schools. The researchers explained the purpose of the study, confidentiality and potential risks and provided directions for completing the survey. Parents and their children provided signed informed consent before participation, following the institutional review boards of Qatar University’s Human Subject Research Committee and the Ministry of Social Development. The victimization of cyberbullying is measured at the dichotomy level by asking a general cyberbullying question (In the last 12 months, had you been bullied by other students using mobile messages, email, voice or video messages? Responses were 1 – yes and 0 – no). A definition of cyberbullying was included in the questionnaire. Independent measures are as follows: (1) demographic variables: gender, belief, health, number of friends and exposure to violence; (2) family variables: delinquent family, coercive parenting, family relations, family disputes, father absence and family ties; (3) school variables: school satisfaction, school violence, student fighting, teachers' violence, school truancy and going late to school; (4) imprudent behavior: smoking, alcohol, not using a seat belt, gambling, stealing less than 100 QR, chewing tobacco, stimuli, volatile drugs, sexual harassment, throwing garbage out of the car, cheating, vandalism and victimization.

Findings

Findings showed that n = 255, 10.8% of the expats’ sample N = 2,428 reported victimization of cyberbullying, of whom 46% were males and 54% were females. A total of 24% of the victims of cyberbullying were males, and 5.8% were females. About a third of the sample were cyberbullying perpetrators (n = 716, 29.5%). Victims of cyberbullying came from intact families (62.4%) compared to broken families (37.6%). A round third of the victims reported the absence of a father during their childhood (n = 78, 31.7%). Most of the victims came from a typical community compared to the delinquent community (71.2% vs 28.2%). About a third of the victims reported it was easy to talk with the father when needed (32% compared to 42.7%), who said it was easy. More than half of the victims do not use seat belts. A low percentage of them were gambling (n = 68, 27% or 2.9% of the total sample). Regarding escaping imprudent and delinquent behaviors, findings showed that a third and more than a tenth of the cyberbullying were smokers and alcoholics (n = 69, 27.4% and n = 42, 16.7% respectively). Moreover, among the most serious, widely spread student problems, around a quarter of the victims reported using chewing tobacco (Sweeka is the local name) (n = 54, 21.4%). Finally, drug use among victims was more than a tenth of them (n = 41, 16.3%). About a quarter of the victims reported stealing less than 100 QR (n = 67, 26.8% or 2.9% of the total sample). Concerning the crimes committed by victims, findings showed that more than forth of them committed assault (n = 71, 28.3%), student fights (n = 202, 80.8%), school violence (n = 117, 46.6%) and half of the victims (50.2%) were also victims of face-to-face bullying. Little below half of the sample was exposed to violence (n = 120, 48.6%) and was the victim of violence in the past 12 months (n = 100, 40.8%). A significant gender differences was found in the victimization of cyberbullying (1 = yes, 0 = no) (a = 000). Moreover, significant mean differences were found between expatriates student victimization of cyberbullying at (a = 000) in all strain variables. Using binary regression analysis to examine the equality of probability of being a victim of cyberbullying as accounted for by the independent variables, the model’s predictability was 89.4%. The Hosmer and Lemeshow test and omnibus tests support the model’s fit (a = 000). Nagelkerke R2 shows that the stain variables accounted for 24% of the variance in the expat's student victimization of cyberbullying.

Research limitations/implications

Conceptualization and determination of what constitutes cyberbullying from the criminal law perspective are needed. Cyberbullying is defined as a form of violence and crime involving new technologies (Sun et al., 2016, p. 62). Policymakers should provide accessible and equitable access to the criminal justice system, the integration of expatriates and the provision of support services to avoid delinquency.

Practical implications

A social cohesion, inclusion and well-being policy is needed for expatriate students and their families in Qatar. In particular, cultural diversity policy and programs, a source of strength and enrichment should be promoted in educational settings. Social inclusion and cultural diversity programs could ease the alienation and marginalization that expatriate students may encounter in their host societies to prevent stains and negative emotions that lead to delinquency and criminal behaviors. Access to support services without discrimination to avoid health and psychological strains and risk factors. This includes but is not limited to avoidance of stigmatization, embarrassment, sense of helplessness, humiliation and other negative feelings toward expatriates. Awareness and promotion of cultural diversity values are needed to enhance cultural acceptance to reduce victimization among the expatriate population. Criminal law and security implications conceptualization and determination of what constitutes cyberbullying from the criminal law perspective are needed. Cyberbullying is a form of violence and crime involving new technologies (Sun et al., 2016). Policymakers should provide accessible and equitable access to the criminal justice system, integrating expatriates and providing support services to avoid delinquency. There is a pressing need for further research within the realm of crime and law to establish the precise legal boundaries surrounding cyberbullying and to delineate the potential scope for legislative measures aimed at safeguarding against victimization in Qatar. Although the state of Qatar has taken steps to address cyberbullying by incorporating it into relevant legal frameworks, there remains a gap in terms of specifically targeting cyberbullying involving children and adolescents. Despite the introduction of the new Cybercrime Prevention Law, the issue of cyberbullying among these vulnerable groups is not adequately addressed.

Social implications

Social implication includes but is not limited to avoidance of stigmatization, embarrassment, sense of helplessness, humiliation and other negative feelings towards expatriate. Awareness and promotion of cultural diversity values is needed to enhance cultural acceptance to reduce victimization among expatriate population.

Originality/value

The present study examines some strain theory assumptions and the victimization of the cyberbullying expatriate population. This study tests a partial assumption of GST, which states that the expatriate population’s exposure to the victimization of cyberbullying can lead to negative stimuli that, in return, create negative feelings and, as a result, imprudent and delinquent behavior. The cyberbullying behavior can be seen as an escaping and coping method in encountering strains. This study underscores the presence of cyberbullying within high schools among expatriate students, exerting significant effects on their personal, social and emotional behaviors. The novel insights gleaned from this investigation contribute substantively to the comprehension of both the pervasiveness and repercussions of cyberbullying on the well-being of expatriate students. This contribution is particularly vital, given the dearth of research in the field, largely attributable to the growing dependence of students on the internet for various cyber activities. This study examines a partial assumption of GST (in non-Western country). Moreover, it uses an advanced statistical analysis and large sample.

Details

Journal of Criminological Research, Policy and Practice, vol. 10 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Book part
Publication date: 15 December 2016

Rachel Wexelbaum

The author of this chapter will explain how libraries define safe space through policies, procedures, and professional codes of ethics. The chapter will generate a history of the…

Abstract

Purpose

The author of this chapter will explain how libraries define safe space through policies, procedures, and professional codes of ethics. The chapter will generate a history of the concept of libraries as safe space, will explain how libraries attempt to create safe spaces in physical and online environments, and will show how library practices both help and harm patrons in need of safe space.

Methodology/approach

This chapter provides a review of the literature that illustrates how libraries provide safe space – or not – for their patrons. The author will deconstruct the ALA Code of Ethics and Bill of Rights to demonstrate how libraries remain heteronormative institutions that do not recognize the existence of diverse patrons or employees, and how this phenomenon manifests in libraries.

Findings

Libraries, either through their physical construction or through policies and procedures, have become spaces for illegal activities and discrimination. Populations who would be most likely to use libraries often report barriers to access.

Practical implications

Libraries should revisit their policies and procedures, as well as assess their physical and online spaces, to determine whether or not they truly provide safe space for their patrons. While libraries can become safer spaces, they should clearly communicate what types of safety they actually provide.

Originality/value

This chapter offers a critique of libraries as safe spaces, which will challenge popular opinions of libraries, and compel the profession to improve.

Details

The Future of Library Space
Type: Book
ISBN: 978-1-78635-270-5

Keywords

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Book part
Publication date: 27 November 2014

Julia Crouse Waddell, Caitlin McLaughlin, Robert LaRose, Nora Rifon and Christina Wirth-Hawkins

The purpose of this research was to utilize protection motivation theory, which states that individuals will take actions to protect themselves from threats when they have both…

Abstract

Purpose

The purpose of this research was to utilize protection motivation theory, which states that individuals will take actions to protect themselves from threats when they have both knowledge of actions that will protect them from the threat and the motivation to do so, to develop a better way of training adolescents to be safe on the Internet.

Design/methodology/approach

This study utilized an experimental approach in a high school environment to test its hypotheses. Participants were split into two groups: a group who received a tutorial about how to stay safe on the Internet (an enactive mastery tutorial that allowed students to actually try out the skills they were learning) and a group who did not receive the training. Participants were then asked about their intentions to engage in protective behaviors, their perceived ability to do so, and the likelihood that these protective behaviors would help them to stay safer on the Internet.

Findings

The findings indicated that an enactive mastery training program increased intentions to engage in safe online behavior in the future, offering a foundation for the development of future theory-based online safety interventions.

Research limitations/implications

This study was conducted in a small geographic region in schools that agreed to utilize a class period to test the enactive mastery tutorial, which limits its external validity. Furthermore, this study only measured intentions to engage in protective behaviors, not actual behaviors.

Practical implications

This research provides a guideline for an effective way of increasing the likelihood that adolescents will engage in protective behaviors online, which has great practical applications for teachers, administrators, PSA advertisers, etc.

Originality/value

This chapter provides a framework for creating programs to help adolescents engage in safer behavior. Furthermore, it introduces the idea of involvement to the protection motivation theory literature, which is a valuable variable to consider when determining how to create an effective campaign to change behavior.

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78350-629-3

Keywords

1 – 10 of over 15000