Search results

1 – 10 of 34
To view the access options for this content please click here
Article

Michael SW Lee and Ian Soon

The purpose of this paper is to explore the phenomena of Apple iPhone jailbreaking, a novel scenario where a company actively oppresses and discourages the co-creation of…

Abstract

Purpose

The purpose of this paper is to explore the phenomena of Apple iPhone jailbreaking, a novel scenario where a company actively oppresses and discourages the co-creation of value and customisation of its products by loyal consumers.

Design/methodology/approach

This paper conducted a qualitative content and thematic analysis of online jailbreaker discourse to understand the motivations and reasons driving consumers to resist a brand to which they remain extremely loyal.

Findings

Three themes explain jailbreaker motivations: enhanced experience, individual right of self-expression and anti-hegemony. Further two themes explain the differing motivations driving hacktivists to create the “exploits” that are subsequently used by jailbreakers (liberating the masses; status and notoriety). Finally, an integrative conceptual model is provided to showcase how disparate theories of consumer behaviour are synthesised during this novel phenomena.

Originality/value

In contrast to previous work, the consumer activists featured in this paper are devoted to the brand and product they are resisting. Rather than switching to an alternative brand, these jailbreakers and hacktivists remain loyal to the product in a genuine effort to help the brand. Even more interesting is the brand actively oppressing these loyal consumers’ attempts to modify and, in some cases, improve their products. Overall, this paper highlights the contradictory relationship between Apple and some of its consumers and demonstrates how brand loyalty, dissatisfaction, resistance/activism and co-creation can co-exist within the same consumer–brand relationship.

Details

Journal of Product & Brand Management, vol. 26 no. 4
Type: Research Article
ISSN: 1061-0421

Keywords

To view the access options for this content please click here
Executive summary

CONGO-KINSHASA: Beni jailbreak may prove major blow

Details

DOI: 10.1108/OXAN-ES257012

ISSN: 2633-304X

Keywords

Geographic
Topical
To view the access options for this content please click here
Article

Mark A. Harris and Karen P. Patten

This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business…

Abstract

Purpose

This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs.

Design/methodology/approach

This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs.

Findings

This paper identifies emerging mobile device security risks and provides a set of minimum mobile device security recommendations practical for SMEs. However, SMEs would still have increased security risks versus large enterprises who can implement maximum mobile device security recommendations. SMEs are faced with a dilemma: embrace the mobility business strategy and adopt and invest in the necessary security technology, implement minimum precautions with increased risk, or give up their mobility business strategy.

Practical implications

This paper develops a practical list of minimum mobile device security recommendations for SMEs. It also increases the awareness of potential security risks for SMEs from mobile devices.

Originality/value

This paper expands previous research investigating SME adoption of computers, broadband internet-based services, and Wi-Fi by adding mobile devices. It describes the SME competitive advantages from adopting mobile devices for enterprise business mobility, while accentuating the increased business risks and implications for SMEs.

Details

Information Management & Computer Security, vol. 22 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

To view the access options for this content please click here
Expert briefing

COVID-19 and prisons.

Details

DOI: 10.1108/OXAN-DB252818

ISSN: 2633-304X

Keywords

Geographic
Topical
To view the access options for this content please click here
Expert briefing

The embarrassing jailbreak tarnishes the mandate Mexico's mid-term election gave the administration of President Enrique Pena Nieto to consolidate its reform programme…

Details

DOI: 10.1108/OXAN-DB200939

ISSN: 2633-304X

Keywords

Geographic
Topical
To view the access options for this content please click here
Book part

Kristen Lane and Sidney J. Levy

Advances in information technology have enabled consumers to connect and communicate as they never have before. This chapter conceptualizes information and the digital…

Abstract

Advances in information technology have enabled consumers to connect and communicate as they never have before. This chapter conceptualizes information and the digital machines that enable contemporary connection and communication as being part of a “Moveable Feast.” A brief historical review tracing the impact and evolution of information technology on consumers’ lives and the marketplace is first provided. Culminating the historical review is a metaphorical description of the current period as a “Moveable Feast” of information, whereby consumers and digital machines interact to create and share information “dishes” with other consumers worldwide. With this guiding metaphor in place, current marketing-relevant information phenomena are described within a framework of three important digital dyads proposed to exist between humans and machines. Deep discussion of machine–machine, human–machine, and human–human dyads points to the importance of information as a resource that consumers create and exchange in the contemporary marketplace. This chapter concludes by encouraging marketers and marketing researchers to consider the impact and importance of digital information and information technology on consumers’ ability to connect and communicate with digital machines and with one another.

Details

Marketing in a Digital World
Type: Book
ISBN: 978-1-78756-339-1

Keywords

To view the access options for this content please click here
Article

Pintu Shah and Anuja Agarwal

For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence…

Abstract

Purpose

For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using other Internet-enabled devices such as laptop and desktop. Because of this, the inexperienced Indian smartphone user may be vulnerable to Internet-related security breaches, as compared to the citizens of developed economies. Hence, it is essential to understand the attitude, behaviour and security practices of smartphone users in India. Limited research is available about the security behaviour of smartphone users in India as the majority of research in this domain is done outside India.

Design/methodology/approach

In this empirical study, the researchers identified 28 cybersecurity behaviours and practices through a survey of relevant literature. An online survey of identified cybersecurity behaviours and practices was administered to 300 smartphone users. Frequency analysis of the respondent data was done to understand the adoption of recommended cybersecurity behaviours and practices. Pearson’s chi-square with 5% level of significance has been used to test the hypotheses. Post hoc analysis with Bonferroni correction was conducted for statistically significant associations.

Findings

Overall, the respondents did not exhibit good cybersecurity behaviour. Respondents have adopted some of the most popular security features of the smartphone such as the use of screen lock. However, respondents have not adopted or are not aware of the technical security controls such as encryption and remote wipe. Statistically significant differences were found between the cybersecurity behaviour and practices and independent variables such as gender, age, mobile operating system (OS) and mother tongue. Respondents reported high level of motivation to protect their device and data, whereas they reported moderate level of threat awareness and the ability to protect to their device and data. Results of the comparative analysis with a similar study in China and the USA are also reported in this study.

Research limitations/implications

The main limitations of this study are as follows: the respondents' perceptions about their cybersecurity behaviours and practices were measured as opposed to their actual behaviours and practices and the generalizability of the study is limited because the sample size is small as compared to the total number of smartphone users in India.

Practical implications

The findings of this study may be useful for the design of effective cybersecurity prevention and intervention programs for general smartphone users of India.

Originality/value

This study provides an insight about cybersecurity behaviour of smartphone users in India. To the knowledge of the researchers, this is the first study to collect such quantitative data of smartphone users in India for a better understanding of the cybersecurity behaviours and practices. This study identified 28 cybersecurity behaviours and practices, which smartphone users should follow to improve cybersecurity.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article

Pooja Sarin, Arpan Kumar Kar and Vigneswara P. Ilavarasan

The Web 3.0 has been hugely enabled by smartphones and new generation mobile applications. With the growing adoption of smartphones, the use of mobile applications has…

Abstract

Purpose

The Web 3.0 has been hugely enabled by smartphones and new generation mobile applications. With the growing adoption of smartphones, the use of mobile applications has grown exponentially and so has the development of mobile applications. This study is an attempt to understand the issues and challenges faced in the mobile applications domain using discussions made on Twitter based on mining of user generated content.

Design/methodology/approach

The study uses 89,908 unique tweets to understand the nature of the discussions. These tweets are analyzed using descriptive, content and network analysis. Further using transaction cost economics, the findings are reviewed to develop practice insights about the ecosystem.

Findings

Findings indicate that the discussions are mostly skewed toward a positive polarity and positive user experiences. The tweeters are predominantly application developers who are interacting more with marketers and less with individual users.

Research limitations/implications

Most of these applications are for individual use (B2C) and not for enterprise usage. There are very few individual users who contribute to these discussions. The predominant users are application reviewers or bloggers of review websites who use the recently developed applications and discuss their thoughts on the same.

Practical implications

The results may be useful in varied domains which are planning to expand their reach to a larger audience using mobile applications and for marketers who primarily focus on promotional content.

Social implications

The domain of mobile applications on social media is still restricted to promotions and digital marketing and may solely be used for the purpose of link building by application developers. As such, the discussions could provide inputs towards mobile phone manufacturers and ecosystem providers on what are the real issues these communities are facing while developing these applications.

Originality/value

The study uses mixed research methodology for mining experiences in the domain of mobile application developers using social media analytics and transaction cost economics. The discussion on the findings provides inputs for policy-making and possible intervention areas.

Details

Journal of Advances in Management Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0972-7981

Keywords

To view the access options for this content please click here
Article

Steffen Roth

This study aims to present a solution-focused approach to current problems and criticisms faced by business schools.

Abstract

Purpose

This study aims to present a solution-focused approach to current problems and criticisms faced by business schools.

Design/methodology/approach

To facilitate the required shift from problems to solutions, this study outlines a theory method and demonstrates how it has informed my teaching at Financial Times (FT)-ranked business schools and other institutions of higher education in two subjects and on three continents.

Findings

The study reports on two student exercises showing that even advanced business school students confuse organizations with political economic hierarchies.

Originality/value

The study concludes that business schools pursuing a smart specialization strategy by challenging this reductionist view may turn into new schools of management distinguished by a broader, multifunctional concept of themselves and their impact on their environment.

Details

Journal of Organizational Change Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0953-4814

Keywords

1 – 10 of 34