Search results

1 – 10 of over 1000
Article
Publication date: 26 July 2021

Sovantharith Seng, Mahdi Nasrullah Al-Ameen and Matthew Wright

A huge amount of personal and sensitive data are shared on Facebook, which makes it a prime target for attackers. Adversaries can exploit third-party applications connected to a…

Abstract

Purpose

A huge amount of personal and sensitive data are shared on Facebook, which makes it a prime target for attackers. Adversaries can exploit third-party applications connected to a user’s Facebook profiles (i.e. Facebook apps) to gain access to this personal information. Users’ lack of knowledge and the varying privacy policies of these apps make them further vulnerable to information leakage. However, little has been done to identify mismatches between users’ perceptions and the privacy policies of Facebook apps. This paper aims to address this challenge in the work.

Design/methodology/approach

The authors conducted a lab study with 31 participants, where the authors received data on how they share information on Facebook, their Facebook-related security and privacy practices and their perceptions on the privacy aspects of 65 frequently-used Facebook apps in terms of data collection, sharing and deletion. The authors then compared participants’ perceptions with the privacy policy of each reported app. Participants also reported their expectations about the types of information that should not be collected or shared by any Facebook app.

Findings

The analysis reveals significant mismatches between users’ privacy perceptions and reality (i.e. privacy policies of Facebook apps), where the authors identified over-optimism not only in users’ perceptions of information collection but also in their self-efficacy in protecting their information in Facebook despite experiencing negative incidents in the past.

Originality/value

To the best of the knowledge, this is the first study on the gap between users’ privacy perceptions around Facebook apps and reality. The findings from this study offer direction for future research to address that gap through designing usable, effective and personalized privacy notices to help users to make informed decisions about using Facebook apps.

Details

Information & Computer Security, vol. 29 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 10 October 2016

Mahdi Nasrullah Al-Ameen, S.M. Taiabul Haque and Matthew Wright

Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords…

Abstract

Purpose

Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a one-time code, either via e-mail or text message. The prevalence of smartphones, however, creates security risks in which a stolen phone leads to user’s accounts being accessed. Physical tokens such as RSA’s SecurID create extra burdens for users and cannot be used on many accounts at once. This study aims to improve the usability and security for two-factor online authentication.

Design/methodology/approach

The authors propose a novel second authentication factor that, similar to passwords, is also based on something the user knows but operates similarly to a one-time code for security purposes. The authors design this component to provide higher security guarantee with minimal memory burden and does not require any additional communication channels or hardware. Motivated by psychology research, the authors leverage users’ autobiographical memory in a novel way to create a secure and memorable component for two-factor authentication.

Findings

In a multi-session lab study, all of the participants were able to log in successfully on the first attempt after a one-week delay from registration and reported satisfaction on the usability of the scheme.

Originality/value

The results indicate that the proposed approach to leverage autobiographical memory is a promising direction for further research on second authentication factor based on something the user knows.

Details

Information & Computer Security, vol. 24 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Abstract

Details

The Canterbury Sound in Popular Music: Scene, Identity and Myth
Type: Book
ISBN: 978-1-78769-490-3

Article
Publication date: 1 February 1987

Matthew Melko

Descriptive data are used to illustrate periods of violence and of peace since 1740. The focus is on six time periods and four areas (North America, Western Europe, Eastern Europe…

Abstract

Descriptive data are used to illustrate periods of violence and of peace since 1740. The focus is on six time periods and four areas (North America, Western Europe, Eastern Europe and Russia). Fatality rates are compared and the results suggest that the present day is a time of relative peace.

Details

International Journal of Sociology and Social Policy, vol. 7 no. 2
Type: Research Article
ISSN: 0144-333X

Keywords

Article
Publication date: 1 June 1988

Jo Carby‐Hall

An employee who is eligible to make a complaint for unfair dismissal has to prove that he has been dismissed by the employer if the employer contests that the employee has in fact…

1117

Abstract

An employee who is eligible to make a complaint for unfair dismissal has to prove that he has been dismissed by the employer if the employer contests that the employee has in fact been dismissed. If the dismissal is not contested, all the employee has to do is to show that he has been dismissed. This constitutes the first stage of the proceedings in an industrial tribunal.

Details

Managerial Law, vol. 30 no. 6
Type: Research Article
ISSN: 0309-0558

Article
Publication date: 13 April 2015

Geoffrey Maurice Ahern

The purpose of this paper is to draw attention to the range and depth of sustainability issues at their points of impact with company experience, and to pilot an illustration of…

Abstract

Purpose

The purpose of this paper is to draw attention to the range and depth of sustainability issues at their points of impact with company experience, and to pilot an illustration of how they could be imaginatively yet critically approached for management development purposes.

Design/methodology/approach

Citing and making sense of a variety of seminal or otherwise relevant sources in order to illustrate an imaginative yet critical approach to sustainability. This is a pilot demonstration to stimulate discussion and to help individuals develop their own sense making.

Findings

The need to allow space and time for reflection on the depth and breadth of sustainability approaches in order to enable personal understanding leading to wise action.

Research limitations/implications

This paper discusses planetary sustainability yet is confined to mainly Anglophone sources. Some of the latent environmental thought forms discussed, e.g. doom, may be largely restricted to them.

Practical implications

Divergent evaluations of trans-disciplinary, critical sustainability approaches are necessary for the longer-term development of motivation within companies.

Originality/value

This appears to be the first attempted trans-disciplinary yet critical business studies approach to sustainability at its points of impact with corporate operations. It aims to contribute to a new kind of management development path.

Details

Journal of Management Development, vol. 34 no. 4
Type: Research Article
ISSN: 0262-1711

Keywords

Abstract

Details

Challenges to US and Mexican Police and Tourism Stability
Type: Book
ISBN: 978-1-80382-405-5

Content available
Article
Publication date: 13 March 2017

112

Abstract

Details

Equality, Diversity and Inclusion: An International Journal, vol. 36 no. 2
Type: Research Article
ISSN: 2040-7149

Article
Publication date: 1 August 1927

HIS holidays over, before the individual and strenuous winter work of his library begins, the wise librarian concentrates for a few weeks on the Annual Meeting of the Library…

Abstract

HIS holidays over, before the individual and strenuous winter work of his library begins, the wise librarian concentrates for a few weeks on the Annual Meeting of the Library Association. This year the event is of unusual character and of great interest. Fifty years of public service on the part of devoted workers are to be commemorated, and there could be no more fitting place for the commemoration than Edinburgh. It is a special meeting, too, in that for the first time for many years the Library Association gathering will take a really international complexion. If some too exacting critics are forward to say that we have invited a very large number of foreign guests to come to hear themselves talk, we may reply that we want to hear them. There is a higher significance in the occasion than may appear on the surface—for an effort is to be made in the direction of international co‐operation. In spite of the excellent work of the various international schools, we are still insular. Now that the seas are open and a trip to America costs little more than one to (say) Italy, we hope that the way grows clearer to an almost universal co‐working amongst libraries. It is overdue. May our overseas guests find a real atmosphere of welcome, hospitality and friendship amongst us this memorable September!

Details

New Library World, vol. 30 no. 2
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 13 July 2018

Wee Kheng Tan

The purpose of this paper is to consider issues related to gamification through the non-game aquarium context and explore how the intention of aquarium visitors to play a game…

1315

Abstract

Purpose

The purpose of this paper is to consider issues related to gamification through the non-game aquarium context and explore how the intention of aquarium visitors to play a game that imparts knowledge about marine animals and promotes the conservation of these animals is influenced by visitors’ attitudes toward marine animals, motivations to visit the aquarium and perceptions of the game’s benefits.

Design/methodology/approach

This study surveyed individuals who have visited Taiwan’s National Museum of Marine Biology and Aquarium at least once in the past three years and who use smartphones. They were shown a description of a hypothetical game scenario that they were asked to imagine to be available while at the aquarium. The partial least squares method was used to analyze the data from 225 returns.

Findings

The study shows that gamification can satisfy a visitor’s desire to learn and enjoy the aquarium simultaneously. Gamification is limited by the visit motivation and the attitudes toward marine animals that visitors bring with them. The usefulness of gamification is limited when visitors desire relaxation during the visit.

Originality/value

This study considers the application of gamification in the context of aquariums and the tourism field and the non-technology-related antecedents to the use of gamification. Gamification is not silver bullet for every situation, and a good understanding of potential users is important for its success and targeting of players. The importance of intrinsic benefits over extrinsic benefits is confirmed. Thus, this study addresses several gaps in the gamification literature.

Details

Information Technology & People, vol. 31 no. 6
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 1000