Search results

1 – 10 of over 41000
Article
Publication date: 6 June 2019

Jeffrey P. Kaleta, Jong Seok Lee and Sungjin Yoo

The purpose of this paper is to focus on a potential tradeoff between security and usability in people’s use of online passwords – in general, complex passwords are secure and…

1093

Abstract

Purpose

The purpose of this paper is to focus on a potential tradeoff between security and usability in people’s use of online passwords – in general, complex passwords are secure and desirable but difficult to use (i.e. difficult to memorize) whereas simple passwords are easy to use, but are insecure and undesirable. Construal level theory (CLT) explains how high vs low construal level causes people to focus on “desirability” vs “feasibility” of an action, which in the research context can translate into the “security” vs “usability” of using passwords.

Design/methodology/approach

The authors conducted a series of three laboratory experiments manipulating people’s construal level and investigating its impact on password use.

Findings

The authors found that people who were induced to think at a high construal level created or showed intention to choose stronger passwords relative to people who were induced to think at a low construal level. Furthermore, this effect was also significantly different from the control group who did not receive any experimental treatment. In addition, the authors found that perspective taking targeted at the desirability of creating a strong password further strengthened the effect of a high construal level on intended password choice.

Originality/value

This research makes several contributions to existing literature on password security. First, this research offers CLT as a theoretical lens to explain an individual’s thinking and behavior concerning online password use. Second, this research offers empirical evidence that a high construal level improves users’ password use, a desirable feature for improved security. Third, this research contributes to the literature on how to apply nudging to influence human behavior toward more desirable, stronger, password use. Finally, our research identifies PT as a factor enhancing the positive effect of a high construal level on online users’ password use.

Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Article
Publication date: 20 April 2023

Thomas Tegethoff, Ricardo Santa, Glaucya Daú and Jimy Cortes

The Colombian Government launched an e-government initiative in 2008 to facilitate communication among the government, citizens and organizations. Considering the high level of…

Abstract

Purpose

The Colombian Government launched an e-government initiative in 2008 to facilitate communication among the government, citizens and organizations. Considering the high level of mistrust of citizens and businesses toward governmental institutions, the government must ensure the security of the information handled and provided by online users. Results to date have not been adequate in the usage of e-government systems. The purpose of this study is to evaluate whether the level of online security affects usage and impacts the cost-effectiveness and quality of the operations and, consequently, the operational effectiveness of organizations using e-government systems.

Design/methodology/approach

Structural equation modeling was used to analyze the antecedents and outcomes of operational effectiveness. To this end, 440 usable questionnaires were collected from managers and personnel from Colombian organizations using e-government systems.

Findings

According to the findings, there is a positive predictive relationship between online security and the dimensions of electronic government effectiveness. Furthermore, neither online security nor any of the dimensions of electronic government effectiveness affect the operational costs of organizations. Nonetheless, the quality of information has a positive effect on the quality of operations. As a result, through the quality of the information, online security has an indirect impact on the quality of operations.

Research limitations/implications

The authors used a convenience sample, carefully selecting respondents based on their operations and practice knowledge and implementation of online security processes. Besides, compared to previous research conducted in developed nations, the sample size is relatively small. Because the survey is based on responses from official companies, it must also be taken into account that over 50% of Colombian labor is informal. Furthermore, Colombia is a nation with a high level of mistrust. When considering these factors, generalizability to all industrial sectors is questionable. Nevertheless, the findings of this study offer relevant information that indicates the need for more extended and comprehensive quantitative research.

Practical implications

Improvements in organizations that use e-government systems, based on the benefits that high-quality information brings to operational performance – cost and quality – will help them survive and become more sustainable and competitive. Furthermore, this study supports the assertion that aspects like online security are critical in promoting information and communication technology uptake and user acceptance in transition and rising economies like Colombia.

Originality/value

There is still a scarcity of information on assessing the effectiveness of electronic government systems and their impact on the quality and cost of operations in organizations that use them. Additionally, Colombia, as a country with low levels of trust between citizens, organizations and government, still lacks information about the impact of online security on the effectiveness of its operations.

Details

Information & Computer Security, vol. 31 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 August 2018

Shrawan Kumar Trivedi and Mohit Yadav

Shopping online is a fast-growing phenomenon. A look into the rapid exponential growth of the primary players in this sector shows huge market potential for e-commerce. Given the…

4738

Abstract

Purpose

Shopping online is a fast-growing phenomenon. A look into the rapid exponential growth of the primary players in this sector shows huge market potential for e-commerce. Given the convenience of internet shopping, e-commerce is seen as an emerging trend among consumers, specifically the younger generation (Gen Y). The popularity of e-commerce and online shopping has captured the attention of e-retailers, encouraging researchers to focus on this area. This paper aims to examine the relationship between online repurchase intention and other variables such as security, privacy concerns, trust and ease of use (EOU), mediated by e-satisfaction.

Design/methodology/approach

A self-administered survey method is used, and students aged between 20 and 35 years at universities in northern India are selected as subjects. To test the hypotheses of this study, an online questionnaire is distributed to participants, with 309 legitimate responses received. The data are analyzed using SPSS version 20.0 and AMOS version 20.0. Structural equation modeling is used to examine the model and to test the hypotheses.

Findings

The results of this study show that security, privacy concerns, trust and EOU have a positive significant relationship with repurchase intention. The findings also reveal that e-satisfaction has a full mediation effect between security and repurchase intention and also between trust and repurchase intention. In addition, a partial mediation effect of e-satisfaction is noted between EOU and repurchase intention and between privacy concerns and repurchase intention.

Practical implications

The results show that security, trust, EOU and privacy concerns are the factors that have most impact on consumer purchasing behavior. In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors.

Social implications

In terms of the repurchase intention of Gen Y consumers, what is needed are strong security features, an easy-to-use interface, a trusted privacy policy and the creation of trust. Furthermore, it may be beneficial to observe e-satisfaction as a mediator when identifying potential problems; online satisfaction is important for the group in this study, and the results show that it impacts on the relation between repurchase intention and other factors.

Originality/value

This research determines the impact of security, privacy concerns, EOU and trust on the online repurchasing behavior of Gen Y in India. The mediation effect of e-satisfaction is also determined.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 48 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 12 October 2015

Martin Butler and Rika Butler

The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk…

1344

Abstract

Purpose

The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile. Online security remains a challenge to ensure safe transacting on the Internet. User authentication, a human-centric process, is regarded as the basis of computer security and hence secure access to online banking services. The increased use of technology to enforce additional actions has the ability to improve the quality of authentication and hence online security, but often at the expense of usability. The objective of this study was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile.

Design/methodology/approach

A web-based survey was designed to determine online consumers’ competence resecure online behaviour, and this was used to quantify the online behaviour as more or less secure. The browsers used by consumers as well as their demographical data were correlated with the security profile of respondents to test for any significant variance in practice that could inform differentiated authentication.

Findings

A statistical difference between behaviours based on some of the dependant variables was evident from the analysis. Based on the results, a case could be made to have different authentication methods for online banking customers based on both their browser selected (before individual identification) as well as demographical data (after identification) to ensure a safer online environment.

Originality/value

The research can be used by the financial services sector to improve online security, where required, without necessarily reducing usability for more “security inclined” customers.

Details

Information & Computer Security, vol. 23 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 April 2002

Jianxin Jeff Yan and Hyun‐Jin Choi

The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games…

4573

Abstract

The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games. Although computer game development often utilizes cutting edge technology in computer graphics, artificial intelligence, human computer interaction and programming, game providers (developers or operators) do not pay much attention to security techniques. In this paper, we look into security failures that have happened or might happen in online games, and discuss some key security issues that have to concern online game providers. Specifically, we look into various kinds of online cheating, and introduce security techniques to deal with cheating prevention, though meanwhile other security issues are also discussed.

Details

The Electronic Library, vol. 20 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 8 September 2020

Artur Strzelecki and Mariia Rizun

This paper aims to consider the question of changes brought to consumers’ trust and security issues by the implementation of the General Data Protection Regulation (GDPR) in…

1503

Abstract

Purpose

This paper aims to consider the question of changes brought to consumers’ trust and security issues by the implementation of the General Data Protection Regulation (GDPR) in electronic commerce.

Design/methodology/approach

Online shopping policies in Poland and Ukraine are compared from the perspective of four factors as follows: application of terms of service and privacy policy, usage of online payment systems, presence in price comparison engines and grade of secure sockets layer security certificates. Comparison is conducted within the framework of three research questions (complemented by eight hypotheses) set to reveal whether: policies of personal data protection and server security for online stores in both countries are the same; all online stores in both countries obey the existing e-commerce rules; e-commerce policies in the two countries differ significantly. The sample for analysis contains 40 Polish and 40 Ukrainian online stores, representing four industries, namely, electronics, entertainment, fashion and goods for children.

Findings

The research allowed to reveal major differences in the privacy policy of the two countries, caused, mainly, by the absence of GDPR in Ukraine. It also disclosed much stronger cooperation of online stores and price comparison engines in Poland compared to Ukraine. At the same time, research results allow to state that server security in both countries is on the same rather high level and that online stores use transparent and safe methods of online payment.

Research limitations/implications

This research opens a way to other, expanded observations which will include more countries and larger scopes of data. Its main limitation is that GDPR influence is only studied in two countries, not in all countries where it is implemented.

Originality/value

This research contributes from security and trust perspectives by analyzing the situation in two countries as follows: the EU member (Poland) and a non-EU country (Ukraine). The value of exploring the situation of Ukrainian e-commerce consists of understanding how online stores function without implementing the GDPR. Observation of shopbots application allows drawing an important conclusion of the necessity for online stores to cooperate with such services. It was also revealed that consumers’ trust in both countries depends a lot on the payment methods applied by an online store and on the ease of use of these methods.

Details

Digital Policy, Regulation and Governance, vol. 22 no. 4
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 5 June 2009

Juan Carlos Roca, Juan José García and Juan José de la Vega

The purpose of this paper is to test an augmented technology acceptance model (TAM) in the online financial trading context. This research aims to investigate how e‐investors are…

13987

Abstract

Purpose

The purpose of this paper is to test an augmented technology acceptance model (TAM) in the online financial trading context. This research aims to investigate how e‐investors are influenced by perceived trust, security, and privacy jointly with traditional TAM constructs.

Design/methodology/approach

The research examines e‐investors' behavioral intention to use online dealers' and stockbrokers' services. The model suggests that perceived trust jointly with perceived usefulness and perceived ease of use are important antecedents of intentions; the hypotheses are statistically tested using structural modeling.

Findings

The results from this study suggest that perceived trust, usefulness and ease of use are important issues in online trading systems. The findings suggest that online financial dealers and stockbrokers must improve the security of the online system since e‐investors form perceptions about its perceived security and when these perceptions are confirmed, their trust is enhanced and consequently they are more likely to use these online services particularly if the financial information is useful for their purposes.

Research limitations/implications

The findings of the present study have various implications for research as well as practice. First, perceived trust, perceived usefulness and perceived ease of use are critical to the success of an online trading system. Second, perceived privacy did not influence users' beliefs in trust. Since perceived trust and perceived usefulness are the most important antecedents of behavioral intention, managers can increase e‐investors' usage intention by improving their beliefs in how the online trading system can enhance their performance and effectiveness using a system with enough security mechanisms. The major limitation is that trust is examined as a single‐dimension construct.

Originality/value

This paper is one of the first that has empirically tested the link between trust, security, privacy, usefulness, ease of use and behavioral intention in the online trading context.

Details

Information Management & Computer Security, vol. 17 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 17 July 2009

Tzu‐Chuan Chou and An‐Sheng Lee

The purpose of this research is to understand the practices of electronic customer relationship management (eCRM) and to establish a process model for online customers' relational…

1346

Abstract

Purpose

The purpose of this research is to understand the practices of electronic customer relationship management (eCRM) and to establish a process model for online customers' relational assets creation.

Design/methodology/approach

Through a case study of a Taiwanese securities company, qualitative data are gathered on the process where online customers' relational assets evolved. This research is primarily based on 20 interviews of the case company. Four managers from the other two securities brokerage companies are also consulted in order to validate and complement the collected information.

Findings

The model reveals the relational assets creation as a four‐phase process: establish online relational tie, identify the features of online customers, enhance self‐determined behavior, and exploit research & development advantage for long‐term relationships.

Originality/value

In presenting an integrated view of the relational assets creation issue of eCRM has served as a step in establishing a process model. For each phase of the model, key managerial activities were identified that may facilitate online relationship building. The implications of the lessons learned and its future research directions are also discussed.

Details

Information Management & Computer Security, vol. 17 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of over 41000