Search results

1 – 10 of 50
Article
Publication date: 9 July 2018

Jurjen Jansen and Paul van Schaik

The purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In addition, it…

Abstract

Purpose

The purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In addition, it was tested to what extent the model relations are equivalent across fear appeal conditions and across time.

Design/methodology/approach

A pre-test post-test design was used. In the pre-test, 1,201 internet users filled out an online survey and were presented with one of three fear appeal conditions: strong fear appeal, weak fear appeal and control condition. Arguments regarding vulnerability of phishing attacks and response efficacy of vigilant online information-sharing behaviour were manipulated in the fear appeals. In the post-test, data were collected from 786 internet users and analysed with partial least squares path modelling.

Findings

The study found that PMT model relations hold in the domain of phishing. Self-efficacy and fear were the most important predictors of protection motivation. In general, the model results were equivalent across conditions and across time.

Practical Implications

It is important to consider online information-sharing behaviour because it facilitates the occurrence and success of phishing attacks. The results give practitioners more insight into important factors to address in the design of preventative measures to reduce the success of phishing attacks. Future research is needed to test how fear appeals work in real-world settings and over longer periods.

Originality/value

This paper is a substantial adaptation of a previous conference paper (Jansen and Van Schaik, 2017a, b).

Details

Information & Computer Security, vol. 26 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 June 2017

Jurjen Jansen and Paul van Schaik

The purpose of this paper is to compare three social cognitive models in their ability to explain intentions of precautionary online behaviour. The models are: protection…

Abstract

Purpose

The purpose of this paper is to compare three social cognitive models in their ability to explain intentions of precautionary online behaviour. The models are: protection motivation theory (PMT), the reasoned action approach (RAA) and an integrated model comprising variables of these models.

Design/methodology/approach

Data were collected from 1,200 Dutch users of online banking by means of an online survey and analysed using partial least squares path modelling method.

Findings

The two models equally explain about much of the variance in precautionary online behaviour; in the integrated model, the significant predictors of the two models remained significant. Precautionary online behaviour is largely driven by response efficacy, attitude towards behaviour and self-efficacy.

Research limitations/implications

One limitation is that the predictor variables – “self-efficacy” and “attitude” – are represented by one item only in the path-analysis because of high cross-loadings of the other items with the dependent variable.

Practical implications

The results give practitioners a potentially wider range of options to design preventative measures.

Originality/value

The three models are successfully applied to online banking. This paper concludes that both PMT and RAA make a unique contribution in explaining variance for precautionary online behaviour. This paper is a re-publication of a previous conference paper (Jansen and van Schaik, 2016).

Details

Information & Computer Security, vol. 25 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 May 2006

Paul van Schaik, Philip Barker and Oladeji Famakinwa

The aim of the research was to design and evaluate a prototype electronic performance support system (EPSS) for libraries.

Abstract

Purpose

The aim of the research was to design and evaluate a prototype electronic performance support system (EPSS) for libraries.

Design/methodology/approach

Based on the theory of performance support and usability problems identified in the use of academic libraries, a performance support system for using the Dewey Decimal Coding system was designed, implemented and evaluated. The system embedded two components: a tutorial to develop knowledge and two games to develop skills. An experimental evaluation was conducted with three groups of students to assess the effects of the two components.

Findings

The study found that students found the system useful. There was a large difference in confidence in own knowledge (in favour of the groups who studied the tutorial component), approaching statistical significance. Although no major usability problems were identified, some specific problems surfaced that should be addressed in future work. Results from staff (who also used the system) confirmed the findings from students and also highlighted the scaffolding function of the EPSS.

Research limitations/implications

This research has shown the viability of performance support for academic libraries. However, it identified issues for future research, including the inclusion of sound and speech, dynamic adaptability of content to make the system more suited to specific libraries and academic disciplines, and integration with existing library systems and virtual learning environments.

Originality/value

The study has extended the concept of performance support to the domain of academic libraries. Given its wide applicability, the system should be valuable to academics and students worldwide.

Details

The Electronic Library, vol. 24 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 June 2004

Paul van Schaik and Jonathan Ling

Previous research has highlighted the importance of system response time (SRT) for Web usability. In the present study, this parameter was studied using a choice reaction task to…

658

Abstract

Previous research has highlighted the importance of system response time (SRT) for Web usability. In the present study, this parameter was studied using a choice reaction task to assess the effect on both performance and subjective measures. Results showed that SRT variability had no effect on usability when using text displays and, although Web experience increased speed of task performance, this did not affect perceptions of SRT. Presents implications for Web server design and future research into SRT.

Details

The Electronic Library, vol. 22 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 March 1998

Philip Barker

Books form an important part of human culture. They can be used to document, entertain, inform and instruct. Conventional approaches to book production have involved either manual…

Abstract

Books form an important part of human culture. They can be used to document, entertain, inform and instruct. Conventional approaches to book production have involved either manual or mechanical binding of sheets of paper in order to form an organised, structured, composite entity. New publication media now offer many alternative approaches to the creation of books and the ways in which they can be disseminated and used. This paper therefore discusses the growing importance of electronic publication. It then uses a case study to illustrate the influence that online books and other forms of electronic document might have on conventional publishing processes.

Details

The Electronic Library, vol. 16 no. 3
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 1 June 2002

Sjoerd Beugelsdijk, Arjen Slangen and Marco van Herpen

This paper is based on the punctuated equilibrium model of organizational change. We argue that there are multiple ways in which organizational change takes place. More in…

15311

Abstract

This paper is based on the punctuated equilibrium model of organizational change. We argue that there are multiple ways in which organizational change takes place. More in particular, by looking at the interaction between the two types of organizational change (radical and incremental), we identify two shapes of organizational change. We illustrate this by means of a case study of a large, Dutch beer‐brewing company. The study focuses on a major change in the distribution system of beer and a period of structural inertia, caused by long CEO tenure. The problems associated with the subsequent CEO succession and the different levels of management that interact in these change processes are also discussed. This leads to the identification of a number of drivers and determinants of shapes of organizational change.

Details

Journal of Organizational Change Management, vol. 15 no. 3
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 21 November 2022

Dorotea Ottaviani, Cecilia De Marinis and Alice Buoli

The paper investigates the pivotal role of storytelling as a pedagogical tool in tertiary education, specifically in the context of the practice-based doctoral framework in design…

Abstract

Purpose

The paper investigates the pivotal role of storytelling as a pedagogical tool in tertiary education, specifically in the context of the practice-based doctoral framework in design disciplines. In such a doctoral model, storytelling assumes different meanings and nuances that open to a study in relation to the self-reflective process at the core of the learning paradigm.

Design/methodology/approach

The research methodology integrates a qualitative and participatory approach with visual and design-based methods through which the authors interact with primary sources (the body of work of PhD candidates) and relevant research literature.

Findings

Drawing on the expanding field of creative practice research, the research work evidences the emergence of storytelling as a research method and learning tool applied at different levels of the candidates' Doctor of Philosophy (PhD) journey and provides methodological insights into the practice-based doctoral training paradigm.

Originality/value

The paper demonstrates the role of storytelling as a learning tool and evidences the multiple levels that storytelling assumes over the course of a practice-based doctoral journey, integrating processual, operational and contextual dimensions.

Details

Archnet-IJAR: International Journal of Architectural Research, vol. 18 no. 1
Type: Research Article
ISSN: 2631-6862

Keywords

Article
Publication date: 1 December 1961

For the first time since 1938 one of the periodic unrestricted conferences of the FID was held in England. It took place in London, at the Caxton Hall, from 6th to 16th September…

Abstract

For the first time since 1938 one of the periodic unrestricted conferences of the FID was held in England. It took place in London, at the Caxton Hall, from 6th to 16th September 1961, and was attended by over five hundred delegates coming from thirty‐eight countries and from all five continents. A strong contingent came from the United Kingdom and, of these, as might be expected, many were members of Aslib. Moreover, Aslib, as the British representative body in the Federation, was responsible for the arrangements.

Details

Aslib Proceedings, vol. 13 no. 12
Type: Research Article
ISSN: 0001-253X

Open Access
Article
Publication date: 24 May 2023

Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens and Malcolm Ryan

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity…

1543

Abstract

Purpose

Cybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity professionals, the authors conducted a study to uncover profiles of human factors that influence which ethical principles are valued highest following exposure to ethical dilemmas presented in a cybersecurity game.

Design/methodology/approach

The authors’ game first sensitises players (cybersecurity trainees) to five cybersecurity ethical principles (beneficence, non-maleficence, justice, autonomy and explicability) and then allows the player to explore their application in multiple cybersecurity scenarios. After playing the game, players rank the five ethical principles in terms of importance. A total of 250 first-year cybersecurity students played the game. To develop profiles, the authors collected players' demographics, knowledge about ethics, personality, moral stance and values.

Findings

The authors built models to predict the importance of each of the five ethical principles. The analyses show that, generally, the main driver influencing the priority given to specific ethical principles is cultural background, followed by the personality traits of extraversion and conscientiousness. The importance of the ingroup was also a prominent factor.

Originality/value

Cybersecurity professionals need to understand the impact of users' ethical choices. To provide ethics training, the profiles uncovered will be used to build artificially intelligent (AI) non-player characters (NPCs) to expose the player to multiple viewpoints. The NPCs will adapt their training according to the predicted players’ viewpoint.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 15 January 2019

Marcel Bastiaansen, Xander Dennis Lub, Ondrej Mitas, Timothy Hyungsoo Jung, Mário Passos Ascenção, Dai-In Han, Teemu Moilanen, Bert Smit and Wim Strijbosch

This paper aims to stimulate the discussion in the fields of hospitality, tourism and leisure on what exactly constitutes “an experience” and how to measure it; the authors unpack…

5265

Abstract

Purpose

This paper aims to stimulate the discussion in the fields of hospitality, tourism and leisure on what exactly constitutes “an experience” and how to measure it; the authors unpack the experience construct into its core constituent elements, namely, emotions.

Design/methodology/approach

The paper reviews insights from psychology and cognitive neuroscience that define experiences as a fine-grained temporal succession of emotions that occur during an experiential episode. Limitations of current methods for measuring experiences are discussed, after which biometric and neuroscientific methods are reviewed that are optimally geared toward measuring emotions, as they occur during an experience with fine temporal detail.

Findings

An overview is presented of the available studies within the fields of hospitality, tourism and leisure that use these methodologies. These studies show that using these methodologies provides a fruitful methodological approach to measuring experiences in real time.

Practical implications

Companies are constantly seeking to create memorable experiences for their customers. The proposed research methodologies allow companies to get a more fine-grained image of what impacts customers over the course of their experience and to actively integrate the use of emotions into creating experiences, as emotions are key to making them memorable.

Originality/value

The paper sketches the contours of a rapidly emerging framework that unpacks memorable experiences into their constituent element – emotions. It is proposed that this will contribute to a deeper understanding of how consumers experience offerings in the hospitality, tourism and leisure industry.

Details

International Journal of Contemporary Hospitality Management, vol. 31 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

1 – 10 of 50