Search results

1 – 10 of 705
Open Access
Article
Publication date: 19 July 2024

Oluwole Olumide Durodolu

This paper argues that the psychological impact of mobile phone loss and compromised personal information necessitates a comprehensive approach to mental health and data security

Abstract

Purpose

This paper argues that the psychological impact of mobile phone loss and compromised personal information necessitates a comprehensive approach to mental health and data security. It advocates for the development of robust coping strategies, including digital detox practices and enhanced security measures, to mitigate the adverse effects.

Design/methodology/approach

This position paper explores the psychological implications of mobile phone loss, particularly focusing on depression and information access anxiety resulting from compromised personal information. The paper synthesizes existing literature and theoretical frameworks to examine the multifaceted impact of mobile phone loss on mental health and proposes strategies to mitigate these effects. This paper uses a qualitative approach, analyzing data from various studies that have investigated mobile phone addiction, data breaches and the psychological effects of mobile phone loss. The analysis focuses on identifying common themes and patterns related to emotional distress, anxiety and coping mechanisms. The psychological impact is contextualized within the broader framework of digital dependency and mental health.

Findings

The phenomenon of information access anxiety, especially in the context of mobile phone loss, represents a major concern in the digital age. Information access anxiety describes the psychological distress and anxiety experienced by individuals when they are unable to access indispensable information or digital communication tools, typically due to the loss or theft of a mobile device.

Research limitations/implications

This study acknowledges several limitations that should be considered when interpreting its findings. First, the analysis is based predominantly on secondary data sources and literature reviews, which may not fully capture the nuanced experiences of individuals suffering from the psychological impacts of mobile phone loss. Future research could benefit from primary data collection, such as surveys or interviews, to provide a more comprehensive understanding of these phenomena.

Originality/value

This position paper contributes to the burgeoning discourse surrounding the psychological ramifications of mobile phone loss, with a particular emphasis on the manifestation of depression and information access anxiety stemming from compromised personal information.

Open Access
Article
Publication date: 6 March 2019

Betsy Stringam and John Gerdes

The purpose of this paper is to investigate how well hotel website load time performance compared against customer expectation benchmarks. In a competitive market, service…

6430

Abstract

Purpose

The purpose of this paper is to investigate how well hotel website load time performance compared against customer expectation benchmarks. In a competitive market, service interactions are important. As customers move to mobile devices, the time to load a website is a critical part of the service delivery. Long load times can lead to poor service experiences, customer frustration and lost business. Hotel website load times on both mobile and desktop devices were examined and compared to service expectations.

Design/methodology/approach

The study used an online service to assess and compare website load performance using both desktop and mobile devices for 259 international hotel company and sub-brand websites.

Findings

The time to load hotel websites was significantly slower on mobile devices compared to desktops. Load times on both platforms exceeded 3 s, which is considered best practice. Long load times represent a service gap and can cause dissatisfaction resulting in a potential customer abandoning the website for a competitor’s site, thus affecting sales.

Research limitations/implications

While the population for the study was robust in size and contained most of the major hotel companies worldwide, it was not exhaustive. Data also represent a snapshot and will change over time. Load times vary based on test location, access device and network traffic. Additionally, web page load times and customer expectations will change as technology evolves.

Originality/value

Increased use of mobile devices for hotel reservations increases the importance of mobile service delivery. This is the first known study to measure hotel website load times for mobile devices, and to examine both mobile and desktop performance against best practice. The results of this study highlight a service gap, which can lead to loss of business. Given the consistency of the results, the authors suspect that this is an issue that has not been recognized within the industry. This study is valuable because it exposes an issue of website design not generally addressed in the hospitality industry, even though tools are available to monitor site performance.

Details

International Hospitality Review, vol. 33 no. 1
Type: Research Article
ISSN: 2516-8142

Keywords

Open Access
Article
Publication date: 31 July 2024

Luzuko Tekeni and Reinhardt A. Botha

As home users are increasingly responsible for securing their computing devices and home networks, there is a growing need to develop interventions to assist them in protecting…

Abstract

Purpose

As home users are increasingly responsible for securing their computing devices and home networks, there is a growing need to develop interventions to assist them in protecting their home networking devices, which are vulnerable to attack. To this end, this paper aims to examine the motivating factors that drive South African fibre users to protect their home networking devices.

Design/methodology/approach

Using the protection motivation theory as the primary framework, a measurement instrument comprising 53 questionnaire items was developed to measure 13 constructs. The study collected empirical data from a sample of 392 South African home fibre users and evaluated the research model using structural equation modelling.

Findings

The evaluation showed a good fit, with 12 out of 15 predicted hypotheses being accepted for the final research model, contributing to the understanding of the factors that motivate home users to protect their home networking devices.

Originality/value

To the best of the authors’ knowledge, this study is the first to model the factors that drive South African home fibre users to protect their home networking devices. Knowing these factors could help home internet service providers and security software vendors of home products to develop security interventions that could assist home fibre users to secure their home networking devices.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 6 September 2018

Nguyen Dong Phong, Nguyen Huu Khoi and Angelina Nhat-Hanh Le

Mobile shopping is the current trend for firms to conduct business, having great advantages over electronic shopping as well as traditional shopping. The purpose of this paper is…

8834

Abstract

Purpose

Mobile shopping is the current trend for firms to conduct business, having great advantages over electronic shopping as well as traditional shopping. The purpose of this paper is to discuss not only the driving forces of mobile shopping behaviors from the theory of reasoned action (TRA) perspective, but also the additional promotion and barrier sides of the mobile business.

Design/methodology/approach

A structural equation modeling approach with latent constructs is applied on a self-administered survey data of 208 Vietnamese consumers to test the hypotheses.

Findings

The results of this study have proved the predictive power of TRA in exploring consumer behavior in the context of mobile shopping. Also, both promotion and barrier variables have significantly strong impacts on the intention to adopt mobile shopping.

Research limitations/implications

Future studies would benefit from investigating other variables (e.g. specific aspects of trust and risk) and using actual behavior (e.g. online purchases).

Practical implications

Business managers should pay attention to both promotion and barrier factors to understand how and why Vietnamese consumers adopt mobile shopping.

Originality/value

This pioneering study adapts the TRA model with extended promotion and barrier variables to explain mobile shopping in the context of Vietnam.

Details

Journal of Asian Business and Economic Studies, vol. 25 no. 2
Type: Research Article
ISSN: 2515-964X

Keywords

Open Access
Article
Publication date: 16 July 2021

Karen Renaud and Jacques Ophoff

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller…

6510

Abstract

Purpose

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller businesses lack sufficient situational awareness to make informed decisions in this space, or because they lack the resources to implement security controls and precautions.

Design/methodology/approach

In this paper, Endsley’s theory of situation awareness was extended to propose a model of SMEs’ cyber situational awareness, and the extent to which this awareness triggers the implementation of cyber security measures. Empirical data were collected through an online survey of 361 UK-based SMEs; subsequently, the authors used partial least squares modeling to validate the model.

Findings

The results show that heightened situational awareness, as well as resource availability, significantly affects SMEs’ implementation of cyber precautions and controls.

Research limitations/implications

While resource limitations are undoubtedly a problem for SMEs, their lack of cyber situational awareness seems to be the area requiring most attention.

Practical implications

The findings of this study are reported and recommendations were made that can help to improve situational awareness, which will have the effect of encouraging the implementation of cyber security measures.

Originality/value

This is the first study to apply the situational awareness theory to understand why SMEs do not implement cyber security best practice measures.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 12 August 2024

Martina Neri, Elisabetta Benevento, Alessandro Stefanini, Davide Aloini, Federico Niccolini, Annalaura Carducci, Ileana Federigi and Gianluca Dini

Information security awareness (ISA) mainly refers to those aspects that need to be addressed to effectively respond to information security challenges. This research used focus…

Abstract

Purpose

Information security awareness (ISA) mainly refers to those aspects that need to be addressed to effectively respond to information security challenges. This research used focus groups to empirically investigate the main ISA dimensions that emerge from the Italian public health-care sector. This study aims to identify the most critical dimension of ISA and to evaluate the diffusion and maturity of information security policies (ISPs) of health-care infrastructure and training programs.

Design/methodology/approach

This research adopted a qualitative research design and focus groups as a research methodology. Data analysis was conducted using the NVIVO 14 software package and followed the principles of thematic analysis.

Findings

The focus group results highlighted that health-care personnel find it difficult to comply with the main ISA dimensions, a situation that leads to risky behaviors. Password management, data storage and transfer and instant messaging applications emerged as the most critical of the main ISA dimensions in the context of this research. It also transpired that ISPs are not all-encompassing as they mainly focus on privacy problems but neglect security concerns. Finally, training programs are not fully implemented in the investigated context, thus undermining their positive enhancing role for ISA.

Originality/value

The public health-care sector emerged as a critical yet still under-investigated context. The need for an in-depth investigation of organizational sciences approaches to overcoming information security challenges is also recommended in several prior research studies.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 2 July 2024

Marcel Spruit, Deborah Oosting and Celine Kreffer

The use of mobile digital devices requires secure behaviour while using these devices. To influence this behaviour, one should be able to adequately measure the behaviour. The…

Abstract

Purpose

The use of mobile digital devices requires secure behaviour while using these devices. To influence this behaviour, one should be able to adequately measure the behaviour. The purpose of this study is to establish a model for measuring secure behaviour, and to use this model to measure the secure behaviour of individuals while using mobile digital devices such as smartphones and laptops.

Design/methodology/approach

Based on a wide-ranging questionnaire (N = 1000), this study investigates the degree of influence that a relatively large number of factors have on secure behaviour while using mobile digital devices. These factors include knowledge and cognitive attitude, but also affective attitude, as well as several types of bias.

Findings

This study has provided a model for measuring secure behaviour. The results of the measurements show that knowledge, bias, cognitive attitude and affective attitude all have impact on secure behaviour while using mobile digital devices. Moreover, none of these factors is of minor importance.

Practical implications

This study shows that it is important to also consider previously undervalued factors, such as affective attitude and various types of bias, when designing interventions to improve secure behaviour while using mobile digital devices.

Originality/value

Most research on secure behaviour has only looked at a small number of influencing factors, usually limited to knowledge and cognitive attitude. This study shows that one needs a more elaborate model for measuring secure behaviour, and that previously undervalued factors have a clear influence on secure behaviour.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 22 July 2020

Nsikak P. Owoh and M. Mahinderjit Singh

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of…

2243

Abstract

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effectively secured, users’ privacy can be violated due to eavesdropping and information disclosure. In this paper, we demonstrated the possibility of unauthorized access to location information of a user during sensing due to the ineffective security mechanisms in most sensing applications. We analyzed 40 apps downloaded from Google Play Store and results showed a 100% success rate in traffic interception and disclosure of sensitive information of users. As a countermeasure, a security scheme which ensures encryption and authentication of sensed data using Advanced Encryption Standard 256-Galois Counter Mode was proposed. End-to-end security of location and motion data from smartphone sensors are ensured using the proposed security scheme. Security analysis of the proposed scheme showed it to be effective in protecting Android based sensor data against eavesdropping, information disclosure and data modification.

Details

Applied Computing and Informatics, vol. 18 no. 1/2
Type: Research Article
ISSN: 2210-8327

Keywords

Open Access
Article
Publication date: 14 July 2021

Molly Cooper, Yair Levy, Ling Wang and Laurie Dringus

This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.

1744

Abstract

Purpose

This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices.

Design/methodology/approach

This study has three phases. The first phase included 32 subject matter experts that provided feedback toward a phishing alert and warning system. The second phase included development and a pilot study to validate a phishing alert and warning system prototype. The third phase included delivery of the Phishing Alert and Warning System (PAWSTM mobile app) to 205 participants. This study designed, developed, as well as empirically tested the PAWSTM mobile app that alerted and warned participants to the signs of phishing in emails on mobile devices.

Findings

The results of this study indicated audio alerts and visual warnings potentially lower phishing susceptibility in emails. Audiovisual warnings appeared to assist study participants in noticing phishing emails more easily and in less time than without audiovisual warnings.

Practical implications

This study's implications to mitigation of phishing emails are key, as it appears that alerts and warnings added to email applications may play a significant role in the reduction of phishing susceptibility.

Originality/value

This study extends the existing information security body of knowledge on phishing prevention and awareness by using audiovisual alerts and warnings to email recipients tested in real-life applications.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

8590

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

1 – 10 of 705