Search results
1 – 10 of over 19000Ali Vafaei-Zadeh, Thurasamy Ramayah, Wai Peng Wong and Haniruzila Md Hanifah
The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on…
Abstract
Purpose
The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on intention to use internet security software using a model developed based on perceived characteristics of innovation by Moore and Benbasat (1991) among undergraduate students.
Design/methodology/approach
Using an intercept survey method, 425 responses were collected from a Malaysian public university using a closed questionnaire which was gotten from the literature. The authors used the SmartPLS software which is a second-generation structural equation modelling software that can be used to model latent variables with negligible requirements.
Findings
The results show that relative advantage, compatibility, visibility, voluntariness, result demonstrability and trialability had a positive effect on use of internet security software while ease of use and image was not significant.
Research limitations/implications
The most important predictor was trialability which sends a clear signal to software developers that users would like to be able to try the software before making a decision to purchase and use. However, the research is limited to students only. Therefore, future research can be extended to wider population.
Practical implications
The result of this paper provides beneficial information to the internet security software developers about what factors affect users’ intentions to buy their products.
Originality/value
The authors used the comprehensive innovation diffusion theory to test the security behaviour of under graduate students from a developing country’s perspectives. Many other similar studies have been done in the developed country’s context. Thus, this paper adds to the literature from a developing country’s perspective.
Details
Keywords
Ali Vafaei-Zadeh, Ramayah Thurasamy and Haniruzila Hanifah
This paper aims to investigate the impact of perceived price level and information security awareness on computer users’ attitude. Moreover, this study aims to investigate the…
Abstract
Purpose
This paper aims to investigate the impact of perceived price level and information security awareness on computer users’ attitude. Moreover, this study aims to investigate the effect of attitude, subjective norms and perceived behavioral control (PBC) on intention to use anti-malware software.
Design/methodology/approach
Data were collected using a structured questionnaire from 225 students of five public universities in Malaysia. Purposive sampling technique was used in this study. AMOS 24 was used to test the research framework using a two-step approach.
Findings
Findings give support to some of the hypotheses developed with R2 values of 0.521 for attitude and 0.740 for intention. Perceived price level had a negative effect on attitude while information security awareness had a positive effect on attitude and intention. Attitude, subjective norms and PBC were all positively related to intention, but perceived price level did not affect intention. This suggests that benefits of using anti-malware are more than its price value. Therefore, the price has no direct effect on intention to use.
Research limitations/implications
University computer networks are as open and inviting as their campuses. Therefore, this research can be helpful to the universities to safeguard their networks and encourage the students to use anti-malware. However, using anti-malware software will enable an individual to identify and prioritize security risks, quickly detect and mitigate security breaches, improve the understanding of security gaps and safeguard the sensitive data by minimizing the risks related to malware.
Originality/value
This study ventured to model the information security behavior of anti-malware usage by individual users by using the theory of planned behavior with the addition of two new variables, perceived price level and information security awareness to explain the behavior better.
Details
Keywords
Discusses the need for a security firewall. Describes the different firewall technologies and models available for deploying security firewalls. Describes the set of…
Abstract
Discusses the need for a security firewall. Describes the different firewall technologies and models available for deploying security firewalls. Describes the set of specifications chosen to implement the security firewall at the Tata Energy Research Institute and the approach taken to implement these specifications. Also describes the resources on security mailing lists, including Web sites available on the Internet.
Details
Keywords
Deepa Mani, Kim-Kwang Raymond Choo and Sameera Mubarak
Opportunities for malicious cyber activities have expanded with the globalisation and advancements in information and communication technology. Such activities will increasingly…
Abstract
Purpose
Opportunities for malicious cyber activities have expanded with the globalisation and advancements in information and communication technology. Such activities will increasingly affect the security of businesses with online presence and/or connected to the internet. Although the real estate sector is a potential attack vector for and target of malicious cyber activities, it is an understudied industry. This paper aims to contribute to a better understanding of the information security threats, awareness, and risk management standards currently employed by the real estate sector in South Australia.
Design/methodology/approach
The current study comprises both quantitative and qualitative methodologies, which include 20 survey questionnaires and 20 face-to-face interviews conducted in South Australia.
Findings
There is a lack of understanding about the true magnitude of malicious cyber activities and its impact on the real estate sector, as illustrated in the findings of 40 real estate organisations in South Australia. The findings and the escalating complexities of the online environment underscore the need for regular ongoing training programs for basic online security (including new cybercrime trends) and the promotion of a culture of information security (e.g. when using smart mobile devices to store and access sensitive data) among staff. Such initiatives will enable staff employed in the (South Australian) real estate sector to maintain the current knowledge of the latest cybercrime activities and the best cyber security protection measures available.
Originality/value
This is the first academic study focusing on the real estate organisations in South Australia. The findings will contribute to the evidence on the information security threats faced by the sector as well as in develop sector-specific information security risk management guidelines.
Details
Keywords
Brenden Kuerbis and Farzaneh Badiei
There is growing contestation between states and private actors over cybersecurity responsibilities, and its governance is ever more susceptible to nationalization. The authors…
Abstract
Purpose
There is growing contestation between states and private actors over cybersecurity responsibilities, and its governance is ever more susceptible to nationalization. The authors believe these developments are based on an incomplete picture of how cybersecurity is actually governed in practice and theory. Given this disconnect, this paper aims to attempt to provide a cohesive understanding of the cybersecurity institutional landscape.
Design/methodology/approach
Drawing from institutional economics and using extensive desk research, the authors develop a conceptual model and broadly sketch the activities and contributions of market, networked and hierarchical governance structures and analyze how they interact to produce and govern cybersecurity.
Findings
Analysis shows a robust market and networked governance structures and a more limited role for hierarchical structures. Ex ante efforts to produce cybersecurity using purely hierarchical governance structures, even buttressed with support from networked governance structures, struggle without market demand like in the case of secure internet identifiers. To the contrary, ex post efforts like botnet mitigation, route monitoring and other activities involving information sharing seem to work under a variety of combinations of governance structures.
Originality/value
The authors’ conceptual framework and observations offer a useful starting point for unpacking how cybersecurity is produced and governed; ultimately, we need to understand if and how these governance structure arrangements actually impact variation in observed levels of cybersecurity.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Kyle Kucera, Michel Plaisent, Prosper Bernard and Lassana Maguiraga
Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study…
Abstract
Purpose
Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study was to determine the prevalence of spyware in internet shareware and freeware and to investigate the personal information collected.
Design/methodology/approach
The methodology was a two‐phase, multi‐case study. The first phase determined that five of the 50 most popular pieces of Windows®‐based freeware and shareware available to internet users from CNETDownload.com were suspected of containing spyware: these were included as data sources for phase two. The purpose of phase two was to confirm the existence of spyware and to identify the types and frequencies of any personal data transmissions. For this phase, data were collected and analyzed utilizing a passive network monitor program to examine packets of data transmitted from a personal computer to external destinations on the internet.
Findings
The findings confirmed the existence and use of spyware in three of five suspected cases. However, the data indicated that there was a low occurrence of spyware and that these programs have the capability to collect numerous types of personal data. The main limitation is that these results are based on a snapshot of data obtained during five days.
Practical implications
The study has practical implications for internet users, who should be aware that spyware exists and understand its potential threat. Spyware developers should provide the user with an effective removal tool. Finally, marketers are cautioned that spyware might alienate customers.
Originality/value
This paper confirms the potential for misuse of these programs.
Details
Keywords
Abstract
Details
Keywords
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah and T. Ramayah
The main objective of this study is to investigate the factors that influence the adoption intention of cloud computing services among individual users using the extended theory…
Abstract
Purpose
The main objective of this study is to investigate the factors that influence the adoption intention of cloud computing services among individual users using the extended theory of planned behavior.
Design/methodology/approach
A purposive sampling technique was used to collect a total of 339 data points, which were analyzed using SmartPLS to derive variance-based structural equation modeling and fuzzy-set qualitative comparative analysis (fsQCA).
Findings
The results obtained from PLS-SEM indicate that attitude towards cloud computing, subjective norms, perceived behavioral control, perceived security, cost-effectiveness, and performance expectancy all have a positive and significant impact on the adoption intention of cloud computing services among individual users. On the other hand, the findings from fsQCA provide a clear interpretation and deeper insights into the adoption intention of individual users of cloud computing services by revealing the complex relationships between multiple combinations of antecedents. This helps to understand the reasons for individual users' adoption intention in emerging countries.
Practical implications
This study offers valuable insights to cloud service providers and cyber entrepreneurs on how to promote cloud computing services to individual users in developing countries. It helps these organizations understand their priorities for encouraging cloud computing adoption among individual users from emerging countries. Additionally, policymakers can also understand their role in creating a comfortable and flexible cloud computing access environment for individual users.
Originality/value
This study has contributed to the increasingly growing empirical literature on cloud computing adoption and demonstrates the effectiveness of the proposed theoretical framework in identifying the potential reasons for the slow growth of cloud computing services adoption in the developing world.
Details
Keywords
Trend Micro, an antivirus and Internet content security software provider, accidentally releases a flawed pattern file update that disables users' computers. The primary impact is…
Abstract
Trend Micro, an antivirus and Internet content security software provider, accidentally releases a flawed pattern file update that disables users' computers. The primary impact is on users in Japan, where 150,000 customers are affected. As the media press for answers and the stock price plummets, Eva Chen (CEO) and Akihiko Omikawa (president of Trend Micro Japan) must decide how to respond.
To consider a range of crisis management options, including apologizing, sharing information, and compensating harmed customers and illustrate the role of corporate culture in determining a company's response to a crisis. Trend Micro's strong customer orientation and collaborative culture guided its response and led to a full recovery in a short period of time.
Details