Search results

1 – 10 of over 19000
Article
Publication date: 12 February 2018

Ali Vafaei-Zadeh, Thurasamy Ramayah, Wai Peng Wong and Haniruzila Md Hanifah

The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on…

Abstract

Purpose

The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on intention to use internet security software using a model developed based on perceived characteristics of innovation by Moore and Benbasat (1991) among undergraduate students.

Design/methodology/approach

Using an intercept survey method, 425 responses were collected from a Malaysian public university using a closed questionnaire which was gotten from the literature. The authors used the SmartPLS software which is a second-generation structural equation modelling software that can be used to model latent variables with negligible requirements.

Findings

The results show that relative advantage, compatibility, visibility, voluntariness, result demonstrability and trialability had a positive effect on use of internet security software while ease of use and image was not significant.

Research limitations/implications

The most important predictor was trialability which sends a clear signal to software developers that users would like to be able to try the software before making a decision to purchase and use. However, the research is limited to students only. Therefore, future research can be extended to wider population.

Practical implications

The result of this paper provides beneficial information to the internet security software developers about what factors affect users’ intentions to buy their products.

Originality/value

The authors used the comprehensive innovation diffusion theory to test the security behaviour of under graduate students from a developing country’s perspectives. Many other similar studies have been done in the developed country’s context. Thus, this paper adds to the literature from a developing country’s perspective.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 48 no. 1
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 24 October 2018

Ali Vafaei-Zadeh, Ramayah Thurasamy and Haniruzila Hanifah

This paper aims to investigate the impact of perceived price level and information security awareness on computer users’ attitude. Moreover, this study aims to investigate the…

1009

Abstract

Purpose

This paper aims to investigate the impact of perceived price level and information security awareness on computer users’ attitude. Moreover, this study aims to investigate the effect of attitude, subjective norms and perceived behavioral control (PBC) on intention to use anti-malware software.

Design/methodology/approach

Data were collected using a structured questionnaire from 225 students of five public universities in Malaysia. Purposive sampling technique was used in this study. AMOS 24 was used to test the research framework using a two-step approach.

Findings

Findings give support to some of the hypotheses developed with R2 values of 0.521 for attitude and 0.740 for intention. Perceived price level had a negative effect on attitude while information security awareness had a positive effect on attitude and intention. Attitude, subjective norms and PBC were all positively related to intention, but perceived price level did not affect intention. This suggests that benefits of using anti-malware are more than its price value. Therefore, the price has no direct effect on intention to use.

Research limitations/implications

University computer networks are as open and inviting as their campuses. Therefore, this research can be helpful to the universities to safeguard their networks and encourage the students to use anti-malware. However, using anti-malware software will enable an individual to identify and prioritize security risks, quickly detect and mitigate security breaches, improve the understanding of security gaps and safeguard the sensitive data by minimizing the risks related to malware.

Originality/value

This study ventured to model the information security behavior of anti-malware usage by individual users by using the theory of planned behavior with the addition of two new variables, perceived price level and information security awareness to explain the behavior better.

Article
Publication date: 1 May 1999

Satish Kumar

Discusses the need for a security firewall. Describes the different firewall technologies and models available for deploying security firewalls. Describes the set of…

818

Abstract

Discusses the need for a security firewall. Describes the different firewall technologies and models available for deploying security firewalls. Describes the set of specifications chosen to implement the security firewall at the Tata Energy Research Institute and the approach taken to implement these specifications. Also describes the resources on security mailing lists, including Web sites available on the Internet.

Details

Campus-Wide Information Systems, vol. 16 no. 2
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 4 March 2014

Deepa Mani, Kim-Kwang Raymond Choo and Sameera Mubarak

Opportunities for malicious cyber activities have expanded with the globalisation and advancements in information and communication technology. Such activities will increasingly…

1911

Abstract

Purpose

Opportunities for malicious cyber activities have expanded with the globalisation and advancements in information and communication technology. Such activities will increasingly affect the security of businesses with online presence and/or connected to the internet. Although the real estate sector is a potential attack vector for and target of malicious cyber activities, it is an understudied industry. This paper aims to contribute to a better understanding of the information security threats, awareness, and risk management standards currently employed by the real estate sector in South Australia.

Design/methodology/approach

The current study comprises both quantitative and qualitative methodologies, which include 20 survey questionnaires and 20 face-to-face interviews conducted in South Australia.

Findings

There is a lack of understanding about the true magnitude of malicious cyber activities and its impact on the real estate sector, as illustrated in the findings of 40 real estate organisations in South Australia. The findings and the escalating complexities of the online environment underscore the need for regular ongoing training programs for basic online security (including new cybercrime trends) and the promotion of a culture of information security (e.g. when using smart mobile devices to store and access sensitive data) among staff. Such initiatives will enable staff employed in the (South Australian) real estate sector to maintain the current knowledge of the latest cybercrime activities and the best cyber security protection measures available.

Originality/value

This is the first academic study focusing on the real estate organisations in South Australia. The findings will contribute to the evidence on the information security threats faced by the sector as well as in develop sector-specific information security risk management guidelines.

Details

Information Management & Computer Security, vol. 22 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 11 September 2017

Brenden Kuerbis and Farzaneh Badiei

There is growing contestation between states and private actors over cybersecurity responsibilities, and its governance is ever more susceptible to nationalization. The authors…

2046

Abstract

Purpose

There is growing contestation between states and private actors over cybersecurity responsibilities, and its governance is ever more susceptible to nationalization. The authors believe these developments are based on an incomplete picture of how cybersecurity is actually governed in practice and theory. Given this disconnect, this paper aims to attempt to provide a cohesive understanding of the cybersecurity institutional landscape.

Design/methodology/approach

Drawing from institutional economics and using extensive desk research, the authors develop a conceptual model and broadly sketch the activities and contributions of market, networked and hierarchical governance structures and analyze how they interact to produce and govern cybersecurity.

Findings

Analysis shows a robust market and networked governance structures and a more limited role for hierarchical structures. Ex ante efforts to produce cybersecurity using purely hierarchical governance structures, even buttressed with support from networked governance structures, struggle without market demand like in the case of secure internet identifiers. To the contrary, ex post efforts like botnet mitigation, route monitoring and other activities involving information sharing seem to work under a variety of combinations of governance structures.

Originality/value

The authors’ conceptual framework and observations offer a useful starting point for unpacking how cybersecurity is produced and governed; ultimately, we need to understand if and how these governance structure arrangements actually impact variation in observed levels of cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 December 2005

Kyle Kucera, Michel Plaisent, Prosper Bernard and Lassana Maguiraga

Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study…

833

Abstract

Purpose

Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study was to determine the prevalence of spyware in internet shareware and freeware and to investigate the personal information collected.

Design/methodology/approach

The methodology was a two‐phase, multi‐case study. The first phase determined that five of the 50 most popular pieces of Windows®‐based freeware and shareware available to internet users from CNETDownload.com were suspected of containing spyware: these were included as data sources for phase two. The purpose of phase two was to confirm the existence of spyware and to identify the types and frequencies of any personal data transmissions. For this phase, data were collected and analyzed utilizing a passive network monitor program to examine packets of data transmitted from a personal computer to external destinations on the internet.

Findings

The findings confirmed the existence and use of spyware in three of five suspected cases. However, the data indicated that there was a low occurrence of spyware and that these programs have the capability to collect numerous types of personal data. The main limitation is that these results are based on a snapshot of data obtained during five days.

Practical implications

The study has practical implications for internet users, who should be aware that spyware exists and understand its potential threat. Spyware developers should provide the user with an effective removal tool. Finally, marketers are cautioned that spyware might alienate customers.

Originality/value

This paper confirms the potential for misuse of these programs.

Details

Journal of Enterprise Information Management, vol. 18 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Content available
Article
Publication date: 1 December 2003

70

Abstract

Details

Circuit World, vol. 29 no. 4
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 18 July 2023

Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah and T. Ramayah

The main objective of this study is to investigate the factors that influence the adoption intention of cloud computing services among individual users using the extended theory…

Abstract

Purpose

The main objective of this study is to investigate the factors that influence the adoption intention of cloud computing services among individual users using the extended theory of planned behavior.

Design/methodology/approach

A purposive sampling technique was used to collect a total of 339 data points, which were analyzed using SmartPLS to derive variance-based structural equation modeling and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The results obtained from PLS-SEM indicate that attitude towards cloud computing, subjective norms, perceived behavioral control, perceived security, cost-effectiveness, and performance expectancy all have a positive and significant impact on the adoption intention of cloud computing services among individual users. On the other hand, the findings from fsQCA provide a clear interpretation and deeper insights into the adoption intention of individual users of cloud computing services by revealing the complex relationships between multiple combinations of antecedents. This helps to understand the reasons for individual users' adoption intention in emerging countries.

Practical implications

This study offers valuable insights to cloud service providers and cyber entrepreneurs on how to promote cloud computing services to individual users in developing countries. It helps these organizations understand their priorities for encouraging cloud computing adoption among individual users from emerging countries. Additionally, policymakers can also understand their role in creating a comfortable and flexible cloud computing access environment for individual users.

Originality/value

This study has contributed to the increasingly growing empirical literature on cloud computing adoption and demonstrates the effectiveness of the proposed theoretical framework in identifying the potential reasons for the slow growth of cloud computing services adoption in the developing world.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Case study
Publication date: 20 January 2017

Alice M. Tybout

Trend Micro, an antivirus and Internet content security software provider, accidentally releases a flawed pattern file update that disables users' computers. The primary impact is…

Abstract

Trend Micro, an antivirus and Internet content security software provider, accidentally releases a flawed pattern file update that disables users' computers. The primary impact is on users in Japan, where 150,000 customers are affected. As the media press for answers and the stock price plummets, Eva Chen (CEO) and Akihiko Omikawa (president of Trend Micro Japan) must decide how to respond.

To consider a range of crisis management options, including apologizing, sharing information, and compensating harmed customers and illustrate the role of corporate culture in determining a company's response to a crisis. Trend Micro's strong customer orientation and collaborative culture guided its response and led to a full recovery in a short period of time.

Details

Kellogg School of Management Cases, vol. no.
Type: Case Study
ISSN: 2474-6568
Published by: Kellogg School of Management

Keywords

1 – 10 of over 19000