Search results
1 – 10 of over 1000Sovantharith Seng, Mahdi Nasrullah Al-Ameen and Matthew Wright
A huge amount of personal and sensitive data are shared on Facebook, which makes it a prime target for attackers. Adversaries can exploit third-party applications connected to a…
Abstract
Purpose
A huge amount of personal and sensitive data are shared on Facebook, which makes it a prime target for attackers. Adversaries can exploit third-party applications connected to a user’s Facebook profiles (i.e. Facebook apps) to gain access to this personal information. Users’ lack of knowledge and the varying privacy policies of these apps make them further vulnerable to information leakage. However, little has been done to identify mismatches between users’ perceptions and the privacy policies of Facebook apps. This paper aims to address this challenge in the work.
Design/methodology/approach
The authors conducted a lab study with 31 participants, where the authors received data on how they share information on Facebook, their Facebook-related security and privacy practices and their perceptions on the privacy aspects of 65 frequently-used Facebook apps in terms of data collection, sharing and deletion. The authors then compared participants’ perceptions with the privacy policy of each reported app. Participants also reported their expectations about the types of information that should not be collected or shared by any Facebook app.
Findings
The analysis reveals significant mismatches between users’ privacy perceptions and reality (i.e. privacy policies of Facebook apps), where the authors identified over-optimism not only in users’ perceptions of information collection but also in their self-efficacy in protecting their information in Facebook despite experiencing negative incidents in the past.
Originality/value
To the best of the knowledge, this is the first study on the gap between users’ privacy perceptions around Facebook apps and reality. The findings from this study offer direction for future research to address that gap through designing usable, effective and personalized privacy notices to help users to make informed decisions about using Facebook apps.
Details
Keywords
Mahdi Nasrullah Al-Ameen, S.M. Taiabul Haque and Matthew Wright
Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords…
Abstract
Purpose
Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a one-time code, either via e-mail or text message. The prevalence of smartphones, however, creates security risks in which a stolen phone leads to user’s accounts being accessed. Physical tokens such as RSA’s SecurID create extra burdens for users and cannot be used on many accounts at once. This study aims to improve the usability and security for two-factor online authentication.
Design/methodology/approach
The authors propose a novel second authentication factor that, similar to passwords, is also based on something the user knows but operates similarly to a one-time code for security purposes. The authors design this component to provide higher security guarantee with minimal memory burden and does not require any additional communication channels or hardware. Motivated by psychology research, the authors leverage users’ autobiographical memory in a novel way to create a secure and memorable component for two-factor authentication.
Findings
In a multi-session lab study, all of the participants were able to log in successfully on the first attempt after a one-week delay from registration and reported satisfaction on the usability of the scheme.
Originality/value
The results indicate that the proposed approach to leverage autobiographical memory is a promising direction for further research on second authentication factor based on something the user knows.
Details
Keywords
Descriptive data are used to illustrate periods of violence and of peace since 1740. The focus is on six time periods and four areas (North America, Western Europe, Eastern Europe…
Abstract
Descriptive data are used to illustrate periods of violence and of peace since 1740. The focus is on six time periods and four areas (North America, Western Europe, Eastern Europe and Russia). Fatality rates are compared and the results suggest that the present day is a time of relative peace.
Details
Keywords
An employee who is eligible to make a complaint for unfair dismissal has to prove that he has been dismissed by the employer if the employer contests that the employee has in fact…
Abstract
An employee who is eligible to make a complaint for unfair dismissal has to prove that he has been dismissed by the employer if the employer contests that the employee has in fact been dismissed. If the dismissal is not contested, all the employee has to do is to show that he has been dismissed. This constitutes the first stage of the proceedings in an industrial tribunal.
The purpose of this paper is to draw attention to the range and depth of sustainability issues at their points of impact with company experience, and to pilot an illustration of…
Abstract
Purpose
The purpose of this paper is to draw attention to the range and depth of sustainability issues at their points of impact with company experience, and to pilot an illustration of how they could be imaginatively yet critically approached for management development purposes.
Design/methodology/approach
Citing and making sense of a variety of seminal or otherwise relevant sources in order to illustrate an imaginative yet critical approach to sustainability. This is a pilot demonstration to stimulate discussion and to help individuals develop their own sense making.
Findings
The need to allow space and time for reflection on the depth and breadth of sustainability approaches in order to enable personal understanding leading to wise action.
Research limitations/implications
This paper discusses planetary sustainability yet is confined to mainly Anglophone sources. Some of the latent environmental thought forms discussed, e.g. doom, may be largely restricted to them.
Practical implications
Divergent evaluations of trans-disciplinary, critical sustainability approaches are necessary for the longer-term development of motivation within companies.
Originality/value
This appears to be the first attempted trans-disciplinary yet critical business studies approach to sustainability at its points of impact with corporate operations. It aims to contribute to a new kind of management development path.
Details
Keywords
HIS holidays over, before the individual and strenuous winter work of his library begins, the wise librarian concentrates for a few weeks on the Annual Meeting of the Library…
Abstract
HIS holidays over, before the individual and strenuous winter work of his library begins, the wise librarian concentrates for a few weeks on the Annual Meeting of the Library Association. This year the event is of unusual character and of great interest. Fifty years of public service on the part of devoted workers are to be commemorated, and there could be no more fitting place for the commemoration than Edinburgh. It is a special meeting, too, in that for the first time for many years the Library Association gathering will take a really international complexion. If some too exacting critics are forward to say that we have invited a very large number of foreign guests to come to hear themselves talk, we may reply that we want to hear them. There is a higher significance in the occasion than may appear on the surface—for an effort is to be made in the direction of international co‐operation. In spite of the excellent work of the various international schools, we are still insular. Now that the seas are open and a trip to America costs little more than one to (say) Italy, we hope that the way grows clearer to an almost universal co‐working amongst libraries. It is overdue. May our overseas guests find a real atmosphere of welcome, hospitality and friendship amongst us this memorable September!
The purpose of this paper is to consider issues related to gamification through the non-game aquarium context and explore how the intention of aquarium visitors to play a game…
Abstract
Purpose
The purpose of this paper is to consider issues related to gamification through the non-game aquarium context and explore how the intention of aquarium visitors to play a game that imparts knowledge about marine animals and promotes the conservation of these animals is influenced by visitors’ attitudes toward marine animals, motivations to visit the aquarium and perceptions of the game’s benefits.
Design/methodology/approach
This study surveyed individuals who have visited Taiwan’s National Museum of Marine Biology and Aquarium at least once in the past three years and who use smartphones. They were shown a description of a hypothetical game scenario that they were asked to imagine to be available while at the aquarium. The partial least squares method was used to analyze the data from 225 returns.
Findings
The study shows that gamification can satisfy a visitor’s desire to learn and enjoy the aquarium simultaneously. Gamification is limited by the visit motivation and the attitudes toward marine animals that visitors bring with them. The usefulness of gamification is limited when visitors desire relaxation during the visit.
Originality/value
This study considers the application of gamification in the context of aquariums and the tourism field and the non-technology-related antecedents to the use of gamification. Gamification is not silver bullet for every situation, and a good understanding of potential users is important for its success and targeting of players. The importance of intrinsic benefits over extrinsic benefits is confirmed. Thus, this study addresses several gaps in the gamification literature.
Details