Search results

1 – 10 of 11
Article
Publication date: 1 May 2000

Steven M. Furnell and Paul S. Dowland

The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue within IT systems. Traditional methods of user…

Abstract

The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue within IT systems. Traditional methods of user authentication and access control do not provide comprehensive protection and offer opportunities for compromise by various classes of abuser. A potential solution is provided in the form of intrusion detection systems, which are able to provide proactive monitoring of system activity and apply automatic responses in the event of suspected problems. This paper presents the principles of intrusion monitoring and then proceeds to describe the conceptual architecture of the Intrusion Monitoring System (IMS), an approach that is the focus of current research and development by the authors. The main functional elements of the IMS architecture are described, followed by thoughts regarding the practical implementation and the associated advantages (and potential disadvantages) that this would deliver. It is concluded that whilst an IMS‐type approach would not represent a total replacement for conventional controls, it would represent an effective means to complement the protection already provided.

Details

Information Management & Computer Security, vol. 8 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 May 2001

Steven M. Furnell, Pelagia Chiliarchaki and Paul S. Dowland

Security analyser tools provide a useful means of automatically identifying, and potentially exploiting, vulnerabilities within computer systems and networks but they are also of…

2693

Abstract

Security analyser tools provide a useful means of automatically identifying, and potentially exploiting, vulnerabilities within computer systems and networks but they are also of assistance to hackers looking for ways to break in. The paper highlights the range of tools that are available and of potential use to both audiences and considers the extent to which each group is likely to benefit from them in practice. It is considered that the ease of use of tools such as Back Orifice 2000 provides a means by which even the relatively unskilled hacker may inflict damage upon a system. Although tools are generally equally available to hackers and administrators, the hacker community is likely to be more aware of the opportunities available. Even where adminstrators are aware of the existence of particular tools, survey results indicate that they make relatively limited use of them. Factors that may account for this include their overall workload and lack of security awareness. Appropriate countermeasures can be identified to combat the individual categories of tool, but the problem of ensuring that these safeguards are implemented still remains.

Details

Information Management & Computer Security, vol. 9 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 1974

Frances Neel Cheney

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Tenn. 37203. Mrs. Cheney does not sell the books listed here. They are…

Abstract

Communications regarding this column should be addressed to Mrs. Cheney, Peabody Library School, Nashville, Tenn. 37203. Mrs. Cheney does not sell the books listed here. They are available through normal trade sources. Mrs. Cheney, being a member of the editorial board of Pierian Press, will not review Pierian Press reference books in this column. Descriptions of Pierian Press reference books will be included elsewhere in this publication.

Details

Reference Services Review, vol. 2 no. 3
Type: Research Article
ISSN: 0090-7324

Book part
Publication date: 5 August 2019

Dawne Moon and Theresa W. Tobin

Scholars who study humility tend to think of it in highly individualized terms, such as an absence of vanity or an accurate self-assessment. Individuating definitions can lead to…

Abstract

Scholars who study humility tend to think of it in highly individualized terms, such as an absence of vanity or an accurate self-assessment. Individuating definitions can lead to such jarring concepts as the “humble white supremacist” (Roberts & Wood, 2007). Qualitative sociological research in the (predominantly North American) evangelical movement to accept and affirm lesbian, gay, bisexual, trans, queer, and intersex (LGBTQI) identities, same-sex marriage, and sex/gender transition reveals that humility is not simply the awareness that “I could be wrong.” That awareness is rooted in what we have found to be humility’s defining element, concern to foster relationship. These findings prompt us to define humility as a fundamentally social disposition, as concern to protect the kinds of intimate connection with others that can transform the self. Recognizing the social nature of humility reveals why humility is incompatible with injustice.

Details

Religion, Humility, and Democracy in a Divided America
Type: Book
ISBN: 978-1-78973-949-7

Keywords

Book part
Publication date: 9 May 2023

Josephine Wolff

The COVID-19 pandemic accelerated many organisations’ reliance on the Internet, with schools, companies, and government agencies, among other institutions, all shifting their…

Abstract

The COVID-19 pandemic accelerated many organisations’ reliance on the Internet, with schools, companies, and government agencies, among other institutions, all shifting their operations online in a relatively short period of time. This sudden shift created opportunities for cybercriminals, as did the burden on the healthcare sector, the rush for unemployment benefits, and the desire for up-to-date information about outbreaks and health precautions. This chapter examines the trends in cybercrime during the COVID-19 pandemic that were spurred by these changes, as well as the mitigation measures implemented by government and private industry stakeholders to help protect critical infrastructure and online operations. It argues that the nature of cybercrime and the most common forms of criminal activity did not change substantially during the pandemic, but rather that criminals’ focus on whom to target and how to exploit evolving current events enabled them to wield existing criminal tools to greater effect, and potentially also at greater scale, though reliable statistics on the frequency and size of cybercrimes are scarce. Finally, the chapter considers how these trends in cybercrime forced private organisations and governments to undertake new cybersecurity measures and programs and whether the long-term effects of the pandemic might actually include stronger cybersecurity if these efforts continue past the end of the public health crisis.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Article
Publication date: 1 May 1969

THERE has recently sprung up a great interest in antiques, probably due to Arthur Negus and his TV and broadcast programmes, and perhaps it is this which has made county…

Abstract

THERE has recently sprung up a great interest in antiques, probably due to Arthur Negus and his TV and broadcast programmes, and perhaps it is this which has made county librarians also, think about their past and their beginnings. Gloucestershire was the first to become aware of the fact that its library was fifty years old, and that a genuine antique, in the shape of its first librarian, still existed and could be questioned about the early days. So in December, 1967, the Gloucestershire Library Committee staged a most successful 50th birthday party, and invited me to cut the birthday cake, on which were 50 candles! And a very great occasion it was.

Details

New Library World, vol. 70 no. 11
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 30 May 2008

Leo‐Paul Dana, Aldene Meis‐Mason and Robert B. Anderson

To learn how Inuvialuit people feel about the oil and gas activities on their land.

1062

Abstract

Purpose

To learn how Inuvialuit people feel about the oil and gas activities on their land.

Design/methodology/approach

Interviews were administered to a stratified sample, on Inuvialuit land. Participants included: Inuvialuit elders; entrepreneurs; public servants; employees of the private sector; managers of oil companies; unemployed persons; housewives; the mayor of Inuvik; and the first aboriginal woman leader in Canada.

Findings

It was reported that oil and gas industry activities are having a positive impact on the regional economy, creating indirect as well as direct financial benefits for the Inuvialuit among others. However, some residents qualified their support saying that they are in favour of continued activity only if benefits filter to them as opposed to being enjoyed only by oil companies and migrant employees. Concern was also expressed for the environment and for the threat that development brings to wildlife upon which people rely on as a food source.

Research limitations/implications

This study should have a longitudinal follow‐up.

Practical implications

While oil and gas exploration and the building of a pipeline may have economic advantages, this might have social, cultural and environment costs for the Inuvialuit.

Originality/value

The paper illustrates how oil and gas activities on Inuvialuit land will transform the lives of these people.

Details

Journal of Enterprising Communities: People and Places in the Global Economy, vol. 2 no. 2
Type: Research Article
ISSN: 1750-6204

Keywords

Content available
Article
Publication date: 1 December 2004

Steven Furnell

292

Abstract

Details

Internet Research, vol. 14 no. 5
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 27 June 2023

Kristijan Mirkovski, Kamel Rouibah, Paul Lowry, Joanna Paliszkiewicz and Marzena Ganc

Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government…

Abstract

Purpose

Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government websites regularly. The purpose of this study is to investigate the cross-country determinants of e-government reuse intention by proposing a theoretical model that integrates constructs from (1) the Delone and McLean IS success model (i.e. system quality, service quality, information quality, perceived value and user satisfaction); (2) the trust and risk models (i.e. citizen trust, overall risk, time risk, privacy risk and psychological risks); and (3) Hofstede's cultural model (i.e. uncertainty avoidance, masculinity, individualism and cross-cultural trust and risk).

Design/methodology/approach

Based on data from interviews with 81 Kuwaiti citizens and surveys of 1,829 Kuwaiti and Polish citizens, this study conducted comprehensive, cross-cultural and comparative analyses of e-government reuse intention in a cross-country setting.

Findings

The results show that trust is positively associated with citizens' intention to reuse e-government services, whereas risk is negatively associated with citizens' perceived value. This study also found that masculinity–femininity and uncertainty avoidance are positively associated with the intention to reuse e-government services and that individualism–collectivism has no significant relationship with reuse intention. This study's findings have important implications for researchers and practitioners seeking to understand and improve e-government success in cross-country settings.

Originality/value

This study developed a parsimonious model of quality, trust, risk, culture and technology reuse that captures country-specific cultural contexts and enables us to conduct a comprehensive, cross-cultural and comparative analysis of e-government reuse intention in the cross-country setting of Kuwait and Poland.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 27 August 2021

Bharat Taneja and Kumkum Bharti

This study aims to examine the research pattern and growth trends of published research on a unified theory of acceptance and use of technology 2 (UTAUT2) from 2012 to 2019. The…

1311

Abstract

Purpose

This study aims to examine the research pattern and growth trends of published research on a unified theory of acceptance and use of technology 2 (UTAUT2) from 2012 to 2019. The study also examines the research scope of UTAUT2 for future researchers.

Design/methodology/approach

This study has adopted a bibliometric approach followed by a structured literature review analysis to synthesize the research on UTAUT2 since 2012. In total, 163 documents were analyzed for type of studies, theories and frameworks, methodologies, author wise collaboration, organizations that contributed to the body of knowledge in the UTAUT2 research and journals that published studies in this domain. VOSviewer and Tableau were used for the data visualization, whereas TCCM, which means theory (T), context (C), characteristics (C) and methodology (M) framework is used to propose the future research directions.

Findings

The findings reveal research on UTAUT2 is growing. The structured literature analysis of the top 15 cited articles further analyzed the parsimony of new models in detail. In addition, the study highlights the inception by and promoters of UTAUT2 in a separate section. The data for this study was collected by searching the title, abstract and keywords of documents in the Scopus database.

Research limitations/implications

This study is based on research papers, published in the UTAUT2 research area, that have been extracted from the Scopus database by keywords only. Future studies can also perform a meta-analysis of various clusters generated by bibliometric analysis.

Practical implications

This study is useful for practitioners to devise strategies for increasing technology acceptance, adoption and utilization in the times to come.

Originality/value

To the best of the authors’ knowledge, this study is one of the very few and early studies, which examined patterns and growth trends of the UTAUT2 studies with the TCCM framework, to suggest scope for future research studies.

Details

foresight, vol. 24 no. 2
Type: Research Article
ISSN: 1463-6689

Keywords

1 – 10 of 11