Search results

1 – 10 of 847
Article
Publication date: 12 February 2018

Ali Vafaei-Zadeh, Thurasamy Ramayah, Wai Peng Wong and Haniruzila Md Hanifah

The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on…

Abstract

Purpose

The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on intention to use internet security software using a model developed based on perceived characteristics of innovation by Moore and Benbasat (1991) among undergraduate students.

Design/methodology/approach

Using an intercept survey method, 425 responses were collected from a Malaysian public university using a closed questionnaire which was gotten from the literature. The authors used the SmartPLS software which is a second-generation structural equation modelling software that can be used to model latent variables with negligible requirements.

Findings

The results show that relative advantage, compatibility, visibility, voluntariness, result demonstrability and trialability had a positive effect on use of internet security software while ease of use and image was not significant.

Research limitations/implications

The most important predictor was trialability which sends a clear signal to software developers that users would like to be able to try the software before making a decision to purchase and use. However, the research is limited to students only. Therefore, future research can be extended to wider population.

Practical implications

The result of this paper provides beneficial information to the internet security software developers about what factors affect users’ intentions to buy their products.

Originality/value

The authors used the comprehensive innovation diffusion theory to test the security behaviour of under graduate students from a developing country’s perspectives. Many other similar studies have been done in the developed country’s context. Thus, this paper adds to the literature from a developing country’s perspective.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 48 no. 1
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 1 August 2000

Steve Hawkins, David C. Yen and David C. Chou

Internet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data…

10725

Abstract

Internet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data transmission and storage, including encryption, firewalls, and private networks. This article discusses the awareness of Internet security and challenges faced in both the public and the private sectors.

Details

Information Management & Computer Security, vol. 8 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 23 September 2013

Roxana Radu

This paper aims to review the current debates regarding the role of the state in securing the cyberspace, with a particular focus on the negotiations taking place in the UN

913

Abstract

Purpose

This paper aims to review the current debates regarding the role of the state in securing the cyberspace, with a particular focus on the negotiations taking place in the UN General Assembly (UNGA).

Design/methodology/approach

This paper reflects on the evolution of the UNGA discourse on the role of the state in protecting the cyberspace, based on the textual analysis of all UNGA resolutions pertaining to the politico-military aspects of internet security.

Findings

The paper finds that the lack of an officially adopted definition for internet security in the UNGA discussions led to agreement solely on informative, best practice sharing or voluntary activities addressing other states, rather than providing an integrated vision for protecting the cyberspace.

Research limitations/implications

The analysis is limited to the negotiations taking place in one institutional venue, namely the UNGA between 1998 and 2011, complemented by three resolutions issued by the ITU in 2010; activities conducted in other institutional venues might influence or determine the overall discourse noted in the resolutions under investigation here.

Originality/value

This represents the most comprehensive account of the discourse on the role of the state in securing the cyberspace as presented in the UNGA and ITU resolutions and its evolution over time.

Details

info, vol. 15 no. 6
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 1 January 2006

Abhishek Tripathi and Sanjay Dubey

To put in common man’s language, Internet is a global network of computers; all of them speak same language. The real power of Internet is that it is available to anyone with a…

Abstract

To put in common man’s language, Internet is a global network of computers; all of them speak same language. The real power of Internet is that it is available to anyone with a computer and a telephone. As Internet is proliferating like a web through out the globe, so will the complexity of the cyber laws, many countries have already laid down cyber laws including India. Security is the single biggest obstacle for the growth of e‐commerce. The Internet security is one of the most unfolded topic for the business environment. Every industry is demanding the Internet security based policies. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information. Self‐protection, while essential, is not sufficient to make cyberspace a safe place to conduct business. National governments should examine the current statutes to determine whether laws are sufficient to combat all kinds of crimes.

Details

Journal of Advances in Management Research, vol. 3 no. 1
Type: Research Article
ISSN: 0972-7981

Keywords

Article
Publication date: 25 September 2009

Siriluck Rotchanakitumnuai and Mark Speece

The purpose of this paper is to consider the technology acceptance model (TAM) in the context of internet securities trading. It examines the antecedents of perceived usefulness…

1738

Abstract

Purpose

The purpose of this paper is to consider the technology acceptance model (TAM) in the context of internet securities trading. It examines the antecedents of perceived usefulness and explores the role of trust and attitude of securities investors toward usage. The behavioural intention of investors to use the internet securities trading service is influenced by perceived usefulness, attitude toward usage, and trust.

Design/methodology/approach

The paper uses survey research to explore the determinants in the e‐securities trading acceptance model.

Findings

The findings show five antecedents have a positive impact on perceived usefulness. These are ease‐of‐use, information quality, accessibility, trust, and flow control of the securities trading process. Respondents identify the highest benefit as the flow control of the securities trading processes via the internet channel.

Practical implications

The results suggest that investors prefer to have the freedom to control the details of the process when trading securities. In addition, trust is important for all levels of the TAM process. Trust has a large impact which is mediated through both perceived usefulness and attitude toward usage. There is a weaker direct impact on intention to use.

Originality/value

This paper includes a more comprehensive measurement of the antecedents of perceived usefulness such as ease‐of‐use, information quality, accessibility, flow control, and trust. It also demonstrates the importance of trust in explaining the psychological attitudes toward the service.

Details

Industrial Management & Data Systems, vol. 109 no. 8
Type: Research Article
ISSN: 0263-5577

Keywords

Executive summary
Publication date: 12 February 2015

CHINA: Beijing will not back down on internet security

Details

DOI: 10.1108/OXAN-ES197642

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 1 December 1999

David C. Chou, David C. Yen, Binshan Lin and Philip Hong‐Lam Cheng

Through the tremendous growth of Internet users during the last few years, organizations now realize the potential market of the information highway. However, these organizations…

2471

Abstract

Through the tremendous growth of Internet users during the last few years, organizations now realize the potential market of the information highway. However, these organizations now face the problem of Internet security. The open environment of the Internet contributes greatly to its success, but also plants inherent security problems. Discusses the security frameworks implemented in the cyberspace environment and the current developments and future trends involving this issue.

Details

Industrial Management & Data Systems, vol. 99 no. 8
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 December 1997

Sharman Lichtenstein and Paula M.C. Swatman

Explains how, with the Internet increasingly being used for the conduct of electronic commerce, organizations are now cognizant of the need to control their employees’ usage of…

3727

Abstract

Explains how, with the Internet increasingly being used for the conduct of electronic commerce, organizations are now cognizant of the need to control their employees’ usage of the Internet. Little research has been conducted to date into this important concern. Suggests that an Internet acceptable usage policy is one vehicle for providing this control, containing guidelines for employees indicating both acceptable and unacceptable Internet usages. The policy aims to control those employee behaviours and actions which contribute to the incidence and severity of internal and external Internet risks, while enabling employees and the organization to gain maximum business value from the Internet connection. Explores the issues to be considered in the development of an organization’s Internet acceptable usage policy. Uses a case study of a large Australian organization to illustrate the issues. Proposes a set of criteria for an effective Internet acceptable usage policy as a result of this research.

Details

Information Management & Computer Security, vol. 5 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 May 2003

Ashish Garg, Jeffrey Curtis and Hilary Halper

Internet security is a pervasive concern for all companies. However, developing the business case to support investments in IT security has been particularly challenging because…

7969

Abstract

Internet security is a pervasive concern for all companies. However, developing the business case to support investments in IT security has been particularly challenging because of difficulties in precisely quantifying the economic impact of a breach. Previous studies have attempted to quantify the magnitude of losses resulting from a breach in IT security, but reliance on self‐reported company data has resulted in widely varying estimates of limited credibility. Employing an event study methodology, this study offers an alternative approach and more rigorous evaluation of breaches in IT security. This attempt has revealed several new perspectives concerning the market reaction to IT security breaches. A final component of the study is the extension of the analysis to incorporate eSecurity vendors and a fuller exploration of market reactions before and after the denial of service attacks of February 2000. The key takeaway for corporate IT decision makers is that IT security breaches are extremely costly, and that the stock market has already factored in some level of optimal IT security investment by companies.

Details

Information Management & Computer Security, vol. 11 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 May 2005

Junaid M. Shaikh

We expect an explosive application of these technologies to take place when they become mature and may further assist auditors in improving the quality of their work. How to use…

8150

Abstract

Purpose

We expect an explosive application of these technologies to take place when they become mature and may further assist auditors in improving the quality of their work. How to use some of the computer‐assisted auditing techniques (CAATs) more effectively with the emerging information technologies.

Design/methodology/approach

Constructed an infrastructure with the support of emerging technologies. Electronic auditing (EA) framework–prepared and used with information technology, these examples are object‐oriented distributed middlewares, internet security technologies, and intelligent agents.

Findings

How a CPA may conveniently audit the loan account of a bank with EA framework. Demonstration/application.

Research limitations/implications

Auditors will have to design one specialized audit software for each auditee's electronic data processing (EDP) system if the EDP system uses proprietary file formats or different operating systems. The EA has some limitations. This approach depends on distributed middlewares standards, i.e. CORBA, DCOM, or Java RMI, to enable the interconnections of the auditor's GASI, auditee's EDP systems.

Practical implications

This system emulates EDP applications in the banking industry and is based on the Common Object Request Broker Architecture (CORBA) architecture industrial standard.

Originality/value

How auditor could effectively apply existing CAATs with the support of the modern information technologies such as object‐oriented distributed middleware, internet security technologies, and intelligent agents. Furthermore, this article proposes a new auditing approach that we call EA. Application in banking and financial institution for auditing banks loan account.

Details

Managerial Auditing Journal, vol. 20 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

1 – 10 of 847