Search results

1 – 10 of 23
Article
Publication date: 17 July 2017

Michael SW Lee and Ian Soon

The purpose of this paper is to explore the phenomena of Apple iPhone jailbreaking, a novel scenario where a company actively oppresses and discourages the co-creation of value…

4963

Abstract

Purpose

The purpose of this paper is to explore the phenomena of Apple iPhone jailbreaking, a novel scenario where a company actively oppresses and discourages the co-creation of value and customisation of its products by loyal consumers.

Design/methodology/approach

This paper conducted a qualitative content and thematic analysis of online jailbreaker discourse to understand the motivations and reasons driving consumers to resist a brand to which they remain extremely loyal.

Findings

Three themes explain jailbreaker motivations: enhanced experience, individual right of self-expression and anti-hegemony. Further two themes explain the differing motivations driving hacktivists to create the “exploits” that are subsequently used by jailbreakers (liberating the masses; status and notoriety). Finally, an integrative conceptual model is provided to showcase how disparate theories of consumer behaviour are synthesised during this novel phenomena.

Originality/value

In contrast to previous work, the consumer activists featured in this paper are devoted to the brand and product they are resisting. Rather than switching to an alternative brand, these jailbreakers and hacktivists remain loyal to the product in a genuine effort to help the brand. Even more interesting is the brand actively oppressing these loyal consumers’ attempts to modify and, in some cases, improve their products. Overall, this paper highlights the contradictory relationship between Apple and some of its consumers and demonstrates how brand loyalty, dissatisfaction, resistance/activism and co-creation can co-exist within the same consumer–brand relationship.

Details

Journal of Product & Brand Management, vol. 26 no. 4
Type: Research Article
ISSN: 1061-0421

Keywords

Article
Publication date: 4 March 2014

Mark A. Harris and Karen P. Patten

This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business…

8561

Abstract

Purpose

This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs.

Design/methodology/approach

This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs.

Findings

This paper identifies emerging mobile device security risks and provides a set of minimum mobile device security recommendations practical for SMEs. However, SMEs would still have increased security risks versus large enterprises who can implement maximum mobile device security recommendations. SMEs are faced with a dilemma: embrace the mobility business strategy and adopt and invest in the necessary security technology, implement minimum precautions with increased risk, or give up their mobility business strategy.

Practical implications

This paper develops a practical list of minimum mobile device security recommendations for SMEs. It also increases the awareness of potential security risks for SMEs from mobile devices.

Originality/value

This paper expands previous research investigating SME adoption of computers, broadband internet-based services, and Wi-Fi by adding mobile devices. It describes the SME competitive advantages from adopting mobile devices for enterprise business mobility, while accentuating the increased business risks and implications for SMEs.

Details

Information Management & Computer Security, vol. 22 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 2 January 2020

Pintu Shah and Anuja Agarwal

For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less…

1319

Abstract

Purpose

For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using other Internet-enabled devices such as laptop and desktop. Because of this, the inexperienced Indian smartphone user may be vulnerable to Internet-related security breaches, as compared to the citizens of developed economies. Hence, it is essential to understand the attitude, behaviour and security practices of smartphone users in India. Limited research is available about the security behaviour of smartphone users in India as the majority of research in this domain is done outside India.

Design/methodology/approach

In this empirical study, the researchers identified 28 cybersecurity behaviours and practices through a survey of relevant literature. An online survey of identified cybersecurity behaviours and practices was administered to 300 smartphone users. Frequency analysis of the respondent data was done to understand the adoption of recommended cybersecurity behaviours and practices. Pearson’s chi-square with 5% level of significance has been used to test the hypotheses. Post hoc analysis with Bonferroni correction was conducted for statistically significant associations.

Findings

Overall, the respondents did not exhibit good cybersecurity behaviour. Respondents have adopted some of the most popular security features of the smartphone such as the use of screen lock. However, respondents have not adopted or are not aware of the technical security controls such as encryption and remote wipe. Statistically significant differences were found between the cybersecurity behaviour and practices and independent variables such as gender, age, mobile operating system (OS) and mother tongue. Respondents reported high level of motivation to protect their device and data, whereas they reported moderate level of threat awareness and the ability to protect to their device and data. Results of the comparative analysis with a similar study in China and the USA are also reported in this study.

Research limitations/implications

The main limitations of this study are as follows: the respondents' perceptions about their cybersecurity behaviours and practices were measured as opposed to their actual behaviours and practices and the generalizability of the study is limited because the sample size is small as compared to the total number of smartphone users in India.

Practical implications

The findings of this study may be useful for the design of effective cybersecurity prevention and intervention programs for general smartphone users of India.

Originality/value

This study provides an insight about cybersecurity behaviour of smartphone users in India. To the knowledge of the researchers, this is the first study to collect such quantitative data of smartphone users in India for a better understanding of the cybersecurity behaviours and practices. This study identified 28 cybersecurity behaviours and practices, which smartphone users should follow to improve cybersecurity.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 February 2021

Pooja Sarin, Arpan Kumar Kar and Vigneswara P. Ilavarasan

The Web 3.0 has been hugely enabled by smartphones and new generation mobile applications. With the growing adoption of smartphones, the use of mobile applications has grown…

Abstract

Purpose

The Web 3.0 has been hugely enabled by smartphones and new generation mobile applications. With the growing adoption of smartphones, the use of mobile applications has grown exponentially and so has the development of mobile applications. This study is an attempt to understand the issues and challenges faced in the mobile applications domain using discussions made on Twitter based on mining of user generated content.

Design/methodology/approach

The study uses 89,908 unique tweets to understand the nature of the discussions. These tweets are analyzed using descriptive, content and network analysis. Further using transaction cost economics, the findings are reviewed to develop practice insights about the ecosystem.

Findings

Findings indicate that the discussions are mostly skewed toward a positive polarity and positive user experiences. The tweeters are predominantly application developers who are interacting more with marketers and less with individual users.

Research limitations/implications

Most of these applications are for individual use (B2C) and not for enterprise usage. There are very few individual users who contribute to these discussions. The predominant users are application reviewers or bloggers of review websites who use the recently developed applications and discuss their thoughts on the same.

Practical implications

The results may be useful in varied domains which are planning to expand their reach to a larger audience using mobile applications and for marketers who primarily focus on promotional content.

Social implications

The domain of mobile applications on social media is still restricted to promotions and digital marketing and may solely be used for the purpose of link building by application developers. As such, the discussions could provide inputs towards mobile phone manufacturers and ecosystem providers on what are the real issues these communities are facing while developing these applications.

Originality/value

The study uses mixed research methodology for mining experiences in the domain of mobile application developers using social media analytics and transaction cost economics. The discussion on the findings provides inputs for policy-making and possible intervention areas.

Details

Journal of Advances in Management Research, vol. 18 no. 4
Type: Research Article
ISSN: 0972-7981

Keywords

Article
Publication date: 16 August 2022

Nisha TN and Mugdha Shailendra Kulkarni

The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information…

Abstract

Purpose

The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information system faces. Banking and other financial services are always top among the most attractive targets for cyber attackers. Blind phishing or spear phishing is still one of the major contributors to all malicious activities in the e-banking sector. All the counter mechanisms, therefore, revolve around the concept of how security-aware the customers are. To fool these mechanisms, attacks are becoming smarter and are searching for methods where the human involvement is diminishing to zero. Zero click attacks are one big leap that attackers are taking that removes the requirement of human involvement in initiating attacks and are moving toward an era of unassisted attacks. Even though the standard procedure and protocols are built into the banking system, they fail to detect this attack resulting in significant losses.

Design/methodology/approach

This paper follows a conceptual review of the upcoming concept in security and its implication in e-banking sector. The methodology adopted in this paper uses review papers, articles and white papers to conclude a theoretical model. A detailed analysis of unassisted attacks is considered from 2010 onwards till 2022.

Findings

This research deliberates on the methodologies of zero click attacks and gives a detailed analysis of attack vectors and their exploits. This research also identifies the likely attacks on e-banking that these vulnerabilities can trigger.

Originality/value

The key contribution is toward the early detection of zero click attacks, suggesting countermeasure, reducing the likelihood of these attacks and the financial impact.

Details

Journal of Financial Crime, vol. 30 no. 5
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 March 2021

Steffen Roth

This study aims to present a solution-focused approach to current problems and criticisms faced by business schools.

Abstract

Purpose

This study aims to present a solution-focused approach to current problems and criticisms faced by business schools.

Design/methodology/approach

To facilitate the required shift from problems to solutions, this study outlines a theory method and demonstrates how it has informed my teaching at Financial Times (FT)-ranked business schools and other institutions of higher education in two subjects and on three continents.

Findings

The study reports on two student exercises showing that even advanced business school students confuse organizations with political economic hierarchies.

Originality/value

The study concludes that business schools pursuing a smart specialization strategy by challenging this reductionist view may turn into new schools of management distinguished by a broader, multifunctional concept of themselves and their impact on their environment.

Details

Journal of Organizational Change Management, vol. 34 no. 4
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 8 April 2019

Gavin Jiayun Wu, Zhenning “Jimmy” Xu, Saeed Tajdini, Jie Zhang and Lei Song

To unlock social media’s value, this study aims to integrate insights from several theoretical perspectives and the relevant literature, developing an extended social media…

1516

Abstract

Purpose

To unlock social media’s value, this study aims to integrate insights from several theoretical perspectives and the relevant literature, developing an extended social media analytics framework. It identifies the stages underlying the social media analytics process and tests the framework in three important and interconnected areas: social media (Twitter), new product adoption (iWatch and Google Glass) and social media analytic techniques (text mining and sentiment analysis).

Design/methodology/approach

Based upon a systematic review of different research approaches, theories and media types, this paper presents and tests an extended framework in three important and interconnected areas mentioned above.

Findings

This paper offers a theory-driven social media analytics framework. It validates the framework by providing concrete processes, examples, evidence and insights related to three chosen areas mentioned above, thereby helping managers create effective and efficient social media and new product development strategies.

Originality/value

This paper integrates insights from theories of the middle range (Merton, 1949), Campbell’s (1965) model of sociocultural evolution and Fan and Gordon’s (2014) social media analytics framework, developing its own extended social media analytics framework and validating it in three important and interconnected areas mentioned above. This paper demonstrates not only how the proposed framework can be applied to the context of new product development, but also how social media are transforming research approaches (qualitative, quantitative and mixed method) and the very nature of business itself (increased importance of digital business).

Details

Qualitative Market Research: An International Journal, vol. 22 no. 2
Type: Research Article
ISSN: 1352-2752

Keywords

Content available
Article
Publication date: 17 July 2017

David Taylor and Iryna Pentina

536

Abstract

Details

Journal of Product & Brand Management, vol. 26 no. 4
Type: Research Article
ISSN: 1061-0421

Article
Publication date: 29 November 2022

Rajat Kumar Behera, Pradip Kumar Bala and Nripendra P. Rana

The new ways to complete financial transactions have been developed by setting up mobile payment (m-payment) platforms and such platforms to access banking in the financial…

1309

Abstract

Purpose

The new ways to complete financial transactions have been developed by setting up mobile payment (m-payment) platforms and such platforms to access banking in the financial mainstream can transact as never before. But, does m-payment have veiled consequences? To seek an answer, the research was undertaken to explore the dark sides of m-payment for consumers by extending the theory of innovation resistance (IR) and by measuring non-adoption intention (NAI).

Design/methodology/approach

Three hundred individuals using popular online m-payment apps such as Paytm, PhonePe, Amazon Pay and Google Pay were surveyed for the primary data. IBM AMOS based structural equation modelling (SEM) was used to analyse the data.

Findings

Each m-payment transaction leaves a digital record, making some vulnerable consumers concerned about privacy threats. Lack of global standards prevents consumers from participating in the m-payment system properly until common interfaces are established based on up-to-date standards. Self-compassion (SC) characteristics such as anxiety, efficacy, fatigue, wait-and-see tendencies and the excessive choice of technology effect contribute to the non-adoption of m-payment.

Originality/value

This study proposes a threat model and empirically explores the dark sides of m-payment. In addition, it also unveils the moderator's role of SC in building the structural relationship between IR and NAI.

Details

Information Technology & People, vol. 36 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 27 September 2022

Ramaraj Palanisamy and Yi Shi

The purpose of this paper is to rank the users’ attitude on major components of mobile cloud computing (MCC) security and investigate the degree of impact of these components on…

Abstract

Purpose

The purpose of this paper is to rank the users’ attitude on major components of mobile cloud computing (MCC) security and investigate the degree of impact of these components on MCC security as a whole.

Design/methodology/approach

Hypotheses were evolved and tested by data collected through an online survey-questionnaire. The survey was administered to 363 users from Chinese organizations. Statistical analysis was carried out and structural equation model was built to validate the interactions.

Findings

The eight components of MCC security in the order of importance are as follows: mobile device related, user identity related, deployment model related, application-level security issues, data related, virtualization related, network related and service delivery related. The empirical analysis validates that these security issues are having significant impact on perceived security of MCC.

Practical implications

Constant vigilance on these eight issues and improving the level of user awareness on these issues enhance the overall security.

Social implications

These issues can be used for designing and developing secured MCC system.

Originality/value

While several previous research has studied various security factors in the MCC security domain, a consolidated understanding on the different components of MCC security is missing. This empirical research has identified and ranked the major components of MCC security. The degree of impact of each of these components on overall MCC security is identified. This provides a different perspective for managing MCC security by explaining what components are most important.

Details

Information & Computer Security, vol. 31 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 23