Search results
1 – 10 of 847Ali Vafaei-Zadeh, Thurasamy Ramayah, Wai Peng Wong and Haniruzila Md Hanifah
The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on…
Abstract
Purpose
The aim of this research is to analyse the impact of relative advantage, compatibility, ease of use, visibility, voluntariness, image, result demonstrability and trialability on intention to use internet security software using a model developed based on perceived characteristics of innovation by Moore and Benbasat (1991) among undergraduate students.
Design/methodology/approach
Using an intercept survey method, 425 responses were collected from a Malaysian public university using a closed questionnaire which was gotten from the literature. The authors used the SmartPLS software which is a second-generation structural equation modelling software that can be used to model latent variables with negligible requirements.
Findings
The results show that relative advantage, compatibility, visibility, voluntariness, result demonstrability and trialability had a positive effect on use of internet security software while ease of use and image was not significant.
Research limitations/implications
The most important predictor was trialability which sends a clear signal to software developers that users would like to be able to try the software before making a decision to purchase and use. However, the research is limited to students only. Therefore, future research can be extended to wider population.
Practical implications
The result of this paper provides beneficial information to the internet security software developers about what factors affect users’ intentions to buy their products.
Originality/value
The authors used the comprehensive innovation diffusion theory to test the security behaviour of under graduate students from a developing country’s perspectives. Many other similar studies have been done in the developed country’s context. Thus, this paper adds to the literature from a developing country’s perspective.
Details
Keywords
Steve Hawkins, David C. Yen and David C. Chou
Internet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data…
Abstract
Internet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data transmission and storage, including encryption, firewalls, and private networks. This article discusses the awareness of Internet security and challenges faced in both the public and the private sectors.
Details
Keywords
This paper aims to review the current debates regarding the role of the state in securing the cyberspace, with a particular focus on the negotiations taking place in the UN…
Abstract
Purpose
This paper aims to review the current debates regarding the role of the state in securing the cyberspace, with a particular focus on the negotiations taking place in the UN General Assembly (UNGA).
Design/methodology/approach
This paper reflects on the evolution of the UNGA discourse on the role of the state in protecting the cyberspace, based on the textual analysis of all UNGA resolutions pertaining to the politico-military aspects of internet security.
Findings
The paper finds that the lack of an officially adopted definition for internet security in the UNGA discussions led to agreement solely on informative, best practice sharing or voluntary activities addressing other states, rather than providing an integrated vision for protecting the cyberspace.
Research limitations/implications
The analysis is limited to the negotiations taking place in one institutional venue, namely the UNGA between 1998 and 2011, complemented by three resolutions issued by the ITU in 2010; activities conducted in other institutional venues might influence or determine the overall discourse noted in the resolutions under investigation here.
Originality/value
This represents the most comprehensive account of the discourse on the role of the state in securing the cyberspace as presented in the UNGA and ITU resolutions and its evolution over time.
Details
Keywords
Abhishek Tripathi and Sanjay Dubey
To put in common man’s language, Internet is a global network of computers; all of them speak same language. The real power of Internet is that it is available to anyone with a…
Abstract
To put in common man’s language, Internet is a global network of computers; all of them speak same language. The real power of Internet is that it is available to anyone with a computer and a telephone. As Internet is proliferating like a web through out the globe, so will the complexity of the cyber laws, many countries have already laid down cyber laws including India. Security is the single biggest obstacle for the growth of e‐commerce. The Internet security is one of the most unfolded topic for the business environment. Every industry is demanding the Internet security based policies. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information. Self‐protection, while essential, is not sufficient to make cyberspace a safe place to conduct business. National governments should examine the current statutes to determine whether laws are sufficient to combat all kinds of crimes.
Details
Keywords
Siriluck Rotchanakitumnuai and Mark Speece
The purpose of this paper is to consider the technology acceptance model (TAM) in the context of internet securities trading. It examines the antecedents of perceived usefulness…
Abstract
Purpose
The purpose of this paper is to consider the technology acceptance model (TAM) in the context of internet securities trading. It examines the antecedents of perceived usefulness and explores the role of trust and attitude of securities investors toward usage. The behavioural intention of investors to use the internet securities trading service is influenced by perceived usefulness, attitude toward usage, and trust.
Design/methodology/approach
The paper uses survey research to explore the determinants in the e‐securities trading acceptance model.
Findings
The findings show five antecedents have a positive impact on perceived usefulness. These are ease‐of‐use, information quality, accessibility, trust, and flow control of the securities trading process. Respondents identify the highest benefit as the flow control of the securities trading processes via the internet channel.
Practical implications
The results suggest that investors prefer to have the freedom to control the details of the process when trading securities. In addition, trust is important for all levels of the TAM process. Trust has a large impact which is mediated through both perceived usefulness and attitude toward usage. There is a weaker direct impact on intention to use.
Originality/value
This paper includes a more comprehensive measurement of the antecedents of perceived usefulness such as ease‐of‐use, information quality, accessibility, flow control, and trust. It also demonstrates the importance of trust in explaining the psychological attitudes toward the service.
Details
Keywords
CHINA: Beijing will not back down on internet security
David C. Chou, David C. Yen, Binshan Lin and Philip Hong‐Lam Cheng
Through the tremendous growth of Internet users during the last few years, organizations now realize the potential market of the information highway. However, these organizations…
Abstract
Through the tremendous growth of Internet users during the last few years, organizations now realize the potential market of the information highway. However, these organizations now face the problem of Internet security. The open environment of the Internet contributes greatly to its success, but also plants inherent security problems. Discusses the security frameworks implemented in the cyberspace environment and the current developments and future trends involving this issue.
Details
Keywords
Sharman Lichtenstein and Paula M.C. Swatman
Explains how, with the Internet increasingly being used for the conduct of electronic commerce, organizations are now cognizant of the need to control their employees’ usage of…
Abstract
Explains how, with the Internet increasingly being used for the conduct of electronic commerce, organizations are now cognizant of the need to control their employees’ usage of the Internet. Little research has been conducted to date into this important concern. Suggests that an Internet acceptable usage policy is one vehicle for providing this control, containing guidelines for employees indicating both acceptable and unacceptable Internet usages. The policy aims to control those employee behaviours and actions which contribute to the incidence and severity of internal and external Internet risks, while enabling employees and the organization to gain maximum business value from the Internet connection. Explores the issues to be considered in the development of an organization’s Internet acceptable usage policy. Uses a case study of a large Australian organization to illustrate the issues. Proposes a set of criteria for an effective Internet acceptable usage policy as a result of this research.
Details
Keywords
Ashish Garg, Jeffrey Curtis and Hilary Halper
Internet security is a pervasive concern for all companies. However, developing the business case to support investments in IT security has been particularly challenging because…
Abstract
Internet security is a pervasive concern for all companies. However, developing the business case to support investments in IT security has been particularly challenging because of difficulties in precisely quantifying the economic impact of a breach. Previous studies have attempted to quantify the magnitude of losses resulting from a breach in IT security, but reliance on self‐reported company data has resulted in widely varying estimates of limited credibility. Employing an event study methodology, this study offers an alternative approach and more rigorous evaluation of breaches in IT security. This attempt has revealed several new perspectives concerning the market reaction to IT security breaches. A final component of the study is the extension of the analysis to incorporate eSecurity vendors and a fuller exploration of market reactions before and after the denial of service attacks of February 2000. The key takeaway for corporate IT decision makers is that IT security breaches are extremely costly, and that the stock market has already factored in some level of optimal IT security investment by companies.
Details
Keywords
We expect an explosive application of these technologies to take place when they become mature and may further assist auditors in improving the quality of their work. How to use…
Abstract
Purpose
We expect an explosive application of these technologies to take place when they become mature and may further assist auditors in improving the quality of their work. How to use some of the computer‐assisted auditing techniques (CAATs) more effectively with the emerging information technologies.
Design/methodology/approach
Constructed an infrastructure with the support of emerging technologies. Electronic auditing (EA) framework–prepared and used with information technology, these examples are object‐oriented distributed middlewares, internet security technologies, and intelligent agents.
Findings
How a CPA may conveniently audit the loan account of a bank with EA framework. Demonstration/application.
Research limitations/implications
Auditors will have to design one specialized audit software for each auditee's electronic data processing (EDP) system if the EDP system uses proprietary file formats or different operating systems. The EA has some limitations. This approach depends on distributed middlewares standards, i.e. CORBA, DCOM, or Java RMI, to enable the interconnections of the auditor's GASI, auditee's EDP systems.
Practical implications
This system emulates EDP applications in the banking industry and is based on the Common Object Request Broker Architecture (CORBA) architecture industrial standard.
Originality/value
How auditor could effectively apply existing CAATs with the support of the modern information technologies such as object‐oriented distributed middleware, internet security technologies, and intelligent agents. Furthermore, this article proposes a new auditing approach that we call EA. Application in banking and financial institution for auditing banks loan account.
Details