Search results

1 – 10 of 455
To view the access options for this content please click here
Article
Publication date: 3 May 2018

Matthew Warren and Shona Leitch

The information society has developed rapidly since the end of the twentieth century. Many countries (including Australia) have been looking at ways to protect their…

Abstract

Purpose

The information society has developed rapidly since the end of the twentieth century. Many countries (including Australia) have been looking at ways to protect their citizens against the variety of risks associated with the continued evolution of the internet. The Australian Federal Government in 2013 proposed data retention as one possible method of protecting Australian society and aiding law enforcement agencies to investigate and prosecute cyber-crime.

Design/methodology/approach

The aim of this paper is to consider the issue of data retention from a stakeholder’s perspective by analysing the public submissions garnered by the Australian Federal Government and identify the key issues and concerns that were raised by these stakeholders. The paper used a qualitative approach to undertake theme analysis.

Findings

The paper shows the concerns and wishes that different stakes holders have regarding data retention within Australia.

Originality/value

This is a unique study into implementation of data retention at a national level, in terms of the paper focussing on Australia.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

To view the access options for this content please click here
Article
Publication date: 9 May 2016

Matthew Warren and Richard Lucas

This paper aims to introduce a special section based on papers from Australasian Conference for Information Systems 2014.

Downloads
670

Abstract

Purpose

This paper aims to introduce a special section based on papers from Australasian Conference for Information Systems 2014.

Design/methodology/approach

This paper comments on key contextualisation moments in relevant history.

Findings

This paper describes the initiative in Australia to widen Information and Communication Technology ethics awareness.

Originality/value

This is a new attempt to bring Ethics and Information Systems academics closer together.

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

To view the access options for this content please click here
Article
Publication date: 9 May 2016

Matthew Warren and Shona Leitch

The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.

Downloads
1053

Abstract

Purpose

The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.

Design/methodology/approach

This paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a netnography research approach.

Findings

This paper determines that the Syrian Electronic Army is motivated to protect the Syrian Government. This protection is highlighted by the new media and social media organisations that the Syrian Electronic Army attacks online.

Research limitations/implications

This paper focuses only on one group the Syrian Electronic Army.

Practical implications

A greater understanding of the Syrian Electronic Army.

Social implications

A greater understanding of the development of hacktivism.

Originality/value

A unique study into the motivation of the Syrian Electronic Army.

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 2003

Damien Hutchinson and Matthew Warren

As a continually growing financial service of electronic commerce, Internet banking requires the development and implementation of a sound security procedure. This…

Downloads
14087

Abstract

As a continually growing financial service of electronic commerce, Internet banking requires the development and implementation of a sound security procedure. This involves designing effective methods via which users can be authenticated in a remote environment. Specifically for Internet banking there is a real need for a way uniquely to identify and authenticate users without the possibility of their authenticity being cloned. Some technologies in use have been presented for meeting the security requirements for national, regional and global Internet banking assurance. However, there has been little research conducted particularly on the creation of secure and trusted pathways. Concentrates on presenting a security framework for Internet banking based on discovering and defining these pathways in terms of adequate authentication mechanisms. Proposes a framework concerning how to identify security requirements for Internet banking such that the transactions being conducted are secured within their respective environments.

Details

Logistics Information Management, vol. 16 no. 1
Type: Research Article
ISSN: 0957-6053

Keywords

To view the access options for this content please click here
Article
Publication date: 5 August 2014

Ishan Senarathna, Matthew Warren, William Yeoh and Scott Salzman

The purpose of this paper is to empirically examine the influence of different organisational cultures on e-commerce adoption maturity in small- and medium-sized…

Downloads
9165

Abstract

Purpose

The purpose of this paper is to empirically examine the influence of different organisational cultures on e-commerce adoption maturity in small- and medium-sized enterprises (SMEs).

Design/methodology/approach

The data for this study were gathered using postal survey questionnaire and analysed using quantitative analysis methods.

Findings

The result indicates a positive correlation between adhocracy culture and e-commerce adoption. However, those firms with hierarchy cultural characteristics indicate a negative correlation in relation to e-commerce adoption. The organisational culture differences explain these issues.

Research limitations/implications

The analysis is conducted in a single country (i.e. Sri Lanka). Initial findings provide a basis for further research in other country.

Practical implications

This research reveals the significance of organisational culture and how it influences e-commerce adoption maturity, both positively and negatively. The research findings are useful for SMEs that are planning or are in the process of implementing or reviewing their e-commerce, as well as for SMEs policy makers and business support community that engaged with e-commerce initiatives.

Originality/value

This study is the first to research the influence of different types of organisational cultures on e-commerce adoption maturity. It fills the research gap by advancing the understanding between the association of organisation cultures and e-commerce adoption.

Details

Industrial Management & Data Systems, vol. 114 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

To view the access options for this content please click here
Article
Publication date: 1 December 1997

This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/02632779510795430. When citing…

Downloads
634

Abstract

This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/02632779510795430. When citing the article, please cite: William H. Johnson, Warren R. Matthews, (1995), “Disaster plan simulates plane crash into high-rise building”, Facilities, Vol. 13 Iss: 9/10, pp. 31 - 37.

Details

Disaster Prevention and Management: An International Journal, vol. 6 no. 5
Type: Research Article
ISSN: 0965-3562

To view the access options for this content please click here
Article
Publication date: 1 March 1997

Steven M. Furnell and Matthew J. Warren

Examines the damaging effects that malicious computer abuse, such as hacking and viruses, can have on the development of an information‐based society. Computing and…

Downloads
1666

Abstract

Examines the damaging effects that malicious computer abuse, such as hacking and viruses, can have on the development of an information‐based society. Computing and telecommunications technologies are a key ingredient in the realization of this society, but are increasingly the targets of criminals and mischief makers. Highlights the apparent escalation in computer‐abuse incidents, as illustrated by a number of recent surveys, and examines the effects that these may have on the public perception of technology (and, hence, the smooth transition to the information society). Also presents some broad recommendations regarding what can be done to address the problem. This considers both technical measures to help safeguard systems and revised attitudes to computer abuse, to insure that incidents can be dealt with more effectively.

Details

Internet Research, vol. 7 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 1 September 2000

Matthew Warren and William Hutchinson

Supply chain management (SCM) is increasingly dependent on electronic systems. At the same time, the vulnerability of these systems to attack from malicious individuals or…

Downloads
4269

Abstract

Supply chain management (SCM) is increasingly dependent on electronic systems. At the same time, the vulnerability of these systems to attack from malicious individuals or groups is growing. This paper examines some of the forms such attacks can take, and their relevance to the supply function. Provides examples of attacks. Concludes that companies should consider the security aspects of electronic commerce before developing their systems.

Details

International Journal of Physical Distribution & Logistics Management, vol. 30 no. 7/8
Type: Research Article
ISSN: 0960-0035

Keywords

To view the access options for this content please click here
Article
Publication date: 11 May 2015

Shona Leitch and Matthew Warren

The purpose of this study is to explore Australian public and stakeholders views towards the regulation of the Internet and its content. The federal government called for…

Abstract

Purpose

The purpose of this study is to explore Australian public and stakeholders views towards the regulation of the Internet and its content. The federal government called for submissions addressing their proposal, and this paper analyses these submissions for themes and provides clarity as to the Australian public and stakeholders key concerns in regards to the proposed policy.

Design/methodology/approach

The paper uses a qualitative approach to analyse the public consultations to the Australian Federal Government. These documents are coded and analysed to determine negative and positive viewpoints.

Findings

The research has shown, based upon the analysis of the consultation, that there was no public support for any of the measures put forward, that the Australian Federal Government in its response has not recognised this public feedback and instead has only utilised some of the qualitative feedback obtained through the public consultation process to try to justify its case to proceed with its proposals.

Research limitations/implications

The study is focussed on Australia.

Practical implications

The paper analyses a proposed national approach to filtering the content of the Internet and discussed the public reaction to such an approach.

Social implications

The paper looks at how different parts of Australian society view Internet filtering in a positive or negative manner.

Originality/value

The only study that directly looks at the viewpoint of the Australian public.

Details

Journal of Information, Communication and Ethics in Society, vol. 13 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

To view the access options for this content please click here
Article
Publication date: 1 August 2001

William Hutchinson and Matthew Warren

Examines the attitudes of Australian IS/IT managers to the concept of cyber‐vigilantism. Also, it explores the policies and procedures which have been set in place by…

Abstract

Examines the attitudes of Australian IS/IT managers to the concept of cyber‐vigilantism. Also, it explores the policies and procedures which have been set in place by various organisations to cope with concerted attacks on their systems. It finds that although a majority of managers do approve of the concept of “striking back”, only a minority are prepared for this eventuality. There appears to be complacency about the threats posed by organised, offensive attackers.

Details

Information Management & Computer Security, vol. 9 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of 455