Search results
1 – 10 of 23The purpose of this paper is to explore the phenomena of Apple iPhone jailbreaking, a novel scenario where a company actively oppresses and discourages the co-creation of value…
Abstract
Purpose
The purpose of this paper is to explore the phenomena of Apple iPhone jailbreaking, a novel scenario where a company actively oppresses and discourages the co-creation of value and customisation of its products by loyal consumers.
Design/methodology/approach
This paper conducted a qualitative content and thematic analysis of online jailbreaker discourse to understand the motivations and reasons driving consumers to resist a brand to which they remain extremely loyal.
Findings
Three themes explain jailbreaker motivations: enhanced experience, individual right of self-expression and anti-hegemony. Further two themes explain the differing motivations driving hacktivists to create the “exploits” that are subsequently used by jailbreakers (liberating the masses; status and notoriety). Finally, an integrative conceptual model is provided to showcase how disparate theories of consumer behaviour are synthesised during this novel phenomena.
Originality/value
In contrast to previous work, the consumer activists featured in this paper are devoted to the brand and product they are resisting. Rather than switching to an alternative brand, these jailbreakers and hacktivists remain loyal to the product in a genuine effort to help the brand. Even more interesting is the brand actively oppressing these loyal consumers’ attempts to modify and, in some cases, improve their products. Overall, this paper highlights the contradictory relationship between Apple and some of its consumers and demonstrates how brand loyalty, dissatisfaction, resistance/activism and co-creation can co-exist within the same consumer–brand relationship.
Details
Keywords
Mark A. Harris and Karen P. Patten
This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business…
Abstract
Purpose
This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs.
Design/methodology/approach
This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs.
Findings
This paper identifies emerging mobile device security risks and provides a set of minimum mobile device security recommendations practical for SMEs. However, SMEs would still have increased security risks versus large enterprises who can implement maximum mobile device security recommendations. SMEs are faced with a dilemma: embrace the mobility business strategy and adopt and invest in the necessary security technology, implement minimum precautions with increased risk, or give up their mobility business strategy.
Practical implications
This paper develops a practical list of minimum mobile device security recommendations for SMEs. It also increases the awareness of potential security risks for SMEs from mobile devices.
Originality/value
This paper expands previous research investigating SME adoption of computers, broadband internet-based services, and Wi-Fi by adding mobile devices. It describes the SME competitive advantages from adopting mobile devices for enterprise business mobility, while accentuating the increased business risks and implications for SMEs.
Details
Keywords
For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less…
Abstract
Purpose
For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using other Internet-enabled devices such as laptop and desktop. Because of this, the inexperienced Indian smartphone user may be vulnerable to Internet-related security breaches, as compared to the citizens of developed economies. Hence, it is essential to understand the attitude, behaviour and security practices of smartphone users in India. Limited research is available about the security behaviour of smartphone users in India as the majority of research in this domain is done outside India.
Design/methodology/approach
In this empirical study, the researchers identified 28 cybersecurity behaviours and practices through a survey of relevant literature. An online survey of identified cybersecurity behaviours and practices was administered to 300 smartphone users. Frequency analysis of the respondent data was done to understand the adoption of recommended cybersecurity behaviours and practices. Pearson’s chi-square with 5% level of significance has been used to test the hypotheses. Post hoc analysis with Bonferroni correction was conducted for statistically significant associations.
Findings
Overall, the respondents did not exhibit good cybersecurity behaviour. Respondents have adopted some of the most popular security features of the smartphone such as the use of screen lock. However, respondents have not adopted or are not aware of the technical security controls such as encryption and remote wipe. Statistically significant differences were found between the cybersecurity behaviour and practices and independent variables such as gender, age, mobile operating system (OS) and mother tongue. Respondents reported high level of motivation to protect their device and data, whereas they reported moderate level of threat awareness and the ability to protect to their device and data. Results of the comparative analysis with a similar study in China and the USA are also reported in this study.
Research limitations/implications
The main limitations of this study are as follows: the respondents' perceptions about their cybersecurity behaviours and practices were measured as opposed to their actual behaviours and practices and the generalizability of the study is limited because the sample size is small as compared to the total number of smartphone users in India.
Practical implications
The findings of this study may be useful for the design of effective cybersecurity prevention and intervention programs for general smartphone users of India.
Originality/value
This study provides an insight about cybersecurity behaviour of smartphone users in India. To the knowledge of the researchers, this is the first study to collect such quantitative data of smartphone users in India for a better understanding of the cybersecurity behaviours and practices. This study identified 28 cybersecurity behaviours and practices, which smartphone users should follow to improve cybersecurity.
Details
Keywords
Pooja Sarin, Arpan Kumar Kar and Vigneswara P. Ilavarasan
The Web 3.0 has been hugely enabled by smartphones and new generation mobile applications. With the growing adoption of smartphones, the use of mobile applications has grown…
Abstract
Purpose
The Web 3.0 has been hugely enabled by smartphones and new generation mobile applications. With the growing adoption of smartphones, the use of mobile applications has grown exponentially and so has the development of mobile applications. This study is an attempt to understand the issues and challenges faced in the mobile applications domain using discussions made on Twitter based on mining of user generated content.
Design/methodology/approach
The study uses 89,908 unique tweets to understand the nature of the discussions. These tweets are analyzed using descriptive, content and network analysis. Further using transaction cost economics, the findings are reviewed to develop practice insights about the ecosystem.
Findings
Findings indicate that the discussions are mostly skewed toward a positive polarity and positive user experiences. The tweeters are predominantly application developers who are interacting more with marketers and less with individual users.
Research limitations/implications
Most of these applications are for individual use (B2C) and not for enterprise usage. There are very few individual users who contribute to these discussions. The predominant users are application reviewers or bloggers of review websites who use the recently developed applications and discuss their thoughts on the same.
Practical implications
The results may be useful in varied domains which are planning to expand their reach to a larger audience using mobile applications and for marketers who primarily focus on promotional content.
Social implications
The domain of mobile applications on social media is still restricted to promotions and digital marketing and may solely be used for the purpose of link building by application developers. As such, the discussions could provide inputs towards mobile phone manufacturers and ecosystem providers on what are the real issues these communities are facing while developing these applications.
Originality/value
The study uses mixed research methodology for mining experiences in the domain of mobile application developers using social media analytics and transaction cost economics. The discussion on the findings provides inputs for policy-making and possible intervention areas.
Details
Keywords
Nisha TN and Mugdha Shailendra Kulkarni
The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information…
Abstract
Purpose
The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information system faces. Banking and other financial services are always top among the most attractive targets for cyber attackers. Blind phishing or spear phishing is still one of the major contributors to all malicious activities in the e-banking sector. All the counter mechanisms, therefore, revolve around the concept of how security-aware the customers are. To fool these mechanisms, attacks are becoming smarter and are searching for methods where the human involvement is diminishing to zero. Zero click attacks are one big leap that attackers are taking that removes the requirement of human involvement in initiating attacks and are moving toward an era of unassisted attacks. Even though the standard procedure and protocols are built into the banking system, they fail to detect this attack resulting in significant losses.
Design/methodology/approach
This paper follows a conceptual review of the upcoming concept in security and its implication in e-banking sector. The methodology adopted in this paper uses review papers, articles and white papers to conclude a theoretical model. A detailed analysis of unassisted attacks is considered from 2010 onwards till 2022.
Findings
This research deliberates on the methodologies of zero click attacks and gives a detailed analysis of attack vectors and their exploits. This research also identifies the likely attacks on e-banking that these vulnerabilities can trigger.
Originality/value
The key contribution is toward the early detection of zero click attacks, suggesting countermeasure, reducing the likelihood of these attacks and the financial impact.
Details
Keywords
This study aims to present a solution-focused approach to current problems and criticisms faced by business schools.
Abstract
Purpose
This study aims to present a solution-focused approach to current problems and criticisms faced by business schools.
Design/methodology/approach
To facilitate the required shift from problems to solutions, this study outlines a theory method and demonstrates how it has informed my teaching at Financial Times (FT)-ranked business schools and other institutions of higher education in two subjects and on three continents.
Findings
The study reports on two student exercises showing that even advanced business school students confuse organizations with political economic hierarchies.
Originality/value
The study concludes that business schools pursuing a smart specialization strategy by challenging this reductionist view may turn into new schools of management distinguished by a broader, multifunctional concept of themselves and their impact on their environment.
Details
Keywords
Gavin Jiayun Wu, Zhenning “Jimmy” Xu, Saeed Tajdini, Jie Zhang and Lei Song
To unlock social media’s value, this study aims to integrate insights from several theoretical perspectives and the relevant literature, developing an extended social media…
Abstract
Purpose
To unlock social media’s value, this study aims to integrate insights from several theoretical perspectives and the relevant literature, developing an extended social media analytics framework. It identifies the stages underlying the social media analytics process and tests the framework in three important and interconnected areas: social media (Twitter), new product adoption (iWatch and Google Glass) and social media analytic techniques (text mining and sentiment analysis).
Design/methodology/approach
Based upon a systematic review of different research approaches, theories and media types, this paper presents and tests an extended framework in three important and interconnected areas mentioned above.
Findings
This paper offers a theory-driven social media analytics framework. It validates the framework by providing concrete processes, examples, evidence and insights related to three chosen areas mentioned above, thereby helping managers create effective and efficient social media and new product development strategies.
Originality/value
This paper integrates insights from theories of the middle range (Merton, 1949), Campbell’s (1965) model of sociocultural evolution and Fan and Gordon’s (2014) social media analytics framework, developing its own extended social media analytics framework and validating it in three important and interconnected areas mentioned above. This paper demonstrates not only how the proposed framework can be applied to the context of new product development, but also how social media are transforming research approaches (qualitative, quantitative and mixed method) and the very nature of business itself (increased importance of digital business).
Details
Keywords
Rajat Kumar Behera, Pradip Kumar Bala and Nripendra P. Rana
The new ways to complete financial transactions have been developed by setting up mobile payment (m-payment) platforms and such platforms to access banking in the financial…
Abstract
Purpose
The new ways to complete financial transactions have been developed by setting up mobile payment (m-payment) platforms and such platforms to access banking in the financial mainstream can transact as never before. But, does m-payment have veiled consequences? To seek an answer, the research was undertaken to explore the dark sides of m-payment for consumers by extending the theory of innovation resistance (IR) and by measuring non-adoption intention (NAI).
Design/methodology/approach
Three hundred individuals using popular online m-payment apps such as Paytm, PhonePe, Amazon Pay and Google Pay were surveyed for the primary data. IBM AMOS based structural equation modelling (SEM) was used to analyse the data.
Findings
Each m-payment transaction leaves a digital record, making some vulnerable consumers concerned about privacy threats. Lack of global standards prevents consumers from participating in the m-payment system properly until common interfaces are established based on up-to-date standards. Self-compassion (SC) characteristics such as anxiety, efficacy, fatigue, wait-and-see tendencies and the excessive choice of technology effect contribute to the non-adoption of m-payment.
Originality/value
This study proposes a threat model and empirically explores the dark sides of m-payment. In addition, it also unveils the moderator's role of SC in building the structural relationship between IR and NAI.
Details
Keywords
The purpose of this paper is to rank the users’ attitude on major components of mobile cloud computing (MCC) security and investigate the degree of impact of these components on…
Abstract
Purpose
The purpose of this paper is to rank the users’ attitude on major components of mobile cloud computing (MCC) security and investigate the degree of impact of these components on MCC security as a whole.
Design/methodology/approach
Hypotheses were evolved and tested by data collected through an online survey-questionnaire. The survey was administered to 363 users from Chinese organizations. Statistical analysis was carried out and structural equation model was built to validate the interactions.
Findings
The eight components of MCC security in the order of importance are as follows: mobile device related, user identity related, deployment model related, application-level security issues, data related, virtualization related, network related and service delivery related. The empirical analysis validates that these security issues are having significant impact on perceived security of MCC.
Practical implications
Constant vigilance on these eight issues and improving the level of user awareness on these issues enhance the overall security.
Social implications
These issues can be used for designing and developing secured MCC system.
Originality/value
While several previous research has studied various security factors in the MCC security domain, a consolidated understanding on the different components of MCC security is missing. This empirical research has identified and ranked the major components of MCC security. The degree of impact of each of these components on overall MCC security is identified. This provides a different perspective for managing MCC security by explaining what components are most important.
Details