Search results

1 – 4 of 4
Article
Publication date: 12 June 2023

Pintu Shah and Anuja Agarwal

The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the…

Abstract

Purpose

The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the countermeasures is to improve the cyber hygiene of the end-users. Serious games or game-based learning has emerged as a promising approach for implementing security education, training and awareness program. In this paper, the researchers propose a tabletop card game called Cyber Suraksha to increase threat awareness and motivate users to adopt recommended security controls for smartphone users. Cyber Suraksha provides an active learning environment for the players. This paper aims to provide the details of the design and evaluation of the game using a between-subjects design.

Design/methodology/approach

The researchers have used constructive learning theory and the Fogg behaviour model (FBM) to design a tabletop card game called Cyber Suraksha. The researchers evaluated the game using a between-subjects design. The participants' responses in the control and intervention groups were collected using the risk behaviour diagnosis scale. Pearson’s Chi-Square test with a 5% significance level was used to test the hypotheses.

Findings

The results indicate that the game is enjoyable and fun. Cyber Suraksha game effectively motivates users to adopt the recommended security control for the targeted behaviour. The results indicate that the participants in the intervention group are 2.65 times more likely to adopt recommended behaviour. The findings of this study provide evidence for the effectiveness of hope and fear appeals in improving cybersecurity awareness.

Research limitations/implications

The generalizability of the study is limited because the sample size is small compared to the total number of smartphone users in India, and only students from computer/IT UG programs in India are used as participants in this study.

Practical implications

This study uses hope and a fear appeal to design an effective serious game. It also demonstrates using the FBM and constructive learning principles for effective serious game design. Cyber Suraksha is effective for the student group and may be tested with other age groups.

Originality/value

To the researchers' knowledge, there are no serious games for cybersecurity awareness focusing on the threats faced by smartphone users based on FBM and constructive learning theory. This research used hope along with a fear appeal to motivate smartphone users to adopt recommended security controls.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 January 2020

Pintu Shah and Anuja Agarwal

For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less…

1322

Abstract

Purpose

For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using other Internet-enabled devices such as laptop and desktop. Because of this, the inexperienced Indian smartphone user may be vulnerable to Internet-related security breaches, as compared to the citizens of developed economies. Hence, it is essential to understand the attitude, behaviour and security practices of smartphone users in India. Limited research is available about the security behaviour of smartphone users in India as the majority of research in this domain is done outside India.

Design/methodology/approach

In this empirical study, the researchers identified 28 cybersecurity behaviours and practices through a survey of relevant literature. An online survey of identified cybersecurity behaviours and practices was administered to 300 smartphone users. Frequency analysis of the respondent data was done to understand the adoption of recommended cybersecurity behaviours and practices. Pearson’s chi-square with 5% level of significance has been used to test the hypotheses. Post hoc analysis with Bonferroni correction was conducted for statistically significant associations.

Findings

Overall, the respondents did not exhibit good cybersecurity behaviour. Respondents have adopted some of the most popular security features of the smartphone such as the use of screen lock. However, respondents have not adopted or are not aware of the technical security controls such as encryption and remote wipe. Statistically significant differences were found between the cybersecurity behaviour and practices and independent variables such as gender, age, mobile operating system (OS) and mother tongue. Respondents reported high level of motivation to protect their device and data, whereas they reported moderate level of threat awareness and the ability to protect to their device and data. Results of the comparative analysis with a similar study in China and the USA are also reported in this study.

Research limitations/implications

The main limitations of this study are as follows: the respondents' perceptions about their cybersecurity behaviours and practices were measured as opposed to their actual behaviours and practices and the generalizability of the study is limited because the sample size is small as compared to the total number of smartphone users in India.

Practical implications

The findings of this study may be useful for the design of effective cybersecurity prevention and intervention programs for general smartphone users of India.

Originality/value

This study provides an insight about cybersecurity behaviour of smartphone users in India. To the knowledge of the researchers, this is the first study to collect such quantitative data of smartphone users in India for a better understanding of the cybersecurity behaviours and practices. This study identified 28 cybersecurity behaviours and practices, which smartphone users should follow to improve cybersecurity.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 April 2023

Laina Hilma Sari, Brit Anak Kayan, Zahriah Zahriah, Zulfikar Taqiuddin, Cut Nursaniah and Siti Norbaya Mohd Konar

This paper is an appraisal using the life cycle assessment (LCA) of paint repair for heritage buildings based on the green maintenance model.

Abstract

Purpose

This paper is an appraisal using the life cycle assessment (LCA) of paint repair for heritage buildings based on the green maintenance model.

Design/methodology/approach

Calculation procedures of green maintenance model within cradle-to-site boundaries of LCA approach were undertaken. The calculations evaluate embodied carbon expended from paint repair of Gunongan, Banda Aceh and Melaka Stamp Museum, Melaka.

Findings

The findings show that the type and number of coats applied will determine the lifespan of the paint. The lifespan of paint influences the frequency of its repair, thus affecting environmental maintenance impact (EMI).

Practical implications

Green maintenance model is not confined to heritage buildings and can be applied to any repair types, materials used and building forms. The model supports and stimulates research dedicated to the sustainable development of cultural heritage. This results in the attainment of environmentally focused conservation, promoting sustainable repair approach and inculcating sustainable development of the historic environment.

Social implications

Green maintenance model highlights the efficiency of repair options that may be adopted for heritage buildings, thus cultivating skills and knowledge in cultural heritage and sustainable development.

Originality/value

The paint repair appraisal of heritage buildings in different countries and localities, which share similar tropical climate, can be undertaken. It demonstrates how different approaches by relevant agencies to the paint repair of heritage buildings impact on embodied carbon expenditure.

Details

Journal of Cultural Heritage Management and Sustainable Development, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-1266

Keywords

Article
Publication date: 2 June 2021

Rofikoh Rokhim, Iin Mayasari and Permata Wulandari

This study aims to analyze the adoption of the people entrepreneurship credit with online platform – a government-sponsored subsidy of small and medium enterprises to reduce…

Abstract

Purpose

This study aims to analyze the adoption of the people entrepreneurship credit with online platform – a government-sponsored subsidy of small and medium enterprises to reduce poverty and to improve welfare – in the Central Java, Indonesia. The objective of the research is also to analyze the motivation of small and medium enterprises to adopt the credit with online platform in supporting business activities. The research framework used the technology acceptance model – the effect of perception of usefulness, perception of ease of use, subjective norm and four As – availability, affordability, awareness, acceptability and trust – to analyze them as the determinants on the intention to adopt the People Entrepreneurship Credit.

Design/methodology/approach

The quantitative method with survey was deployed in the study by distributing questionnaires. The number of collected data was 380 credit users, and the criteria used for the respondents were the small entrepreneurs with the use of the people entrepreneurship credit as the micro credit program.

Findings

Results indicated that perception of usefulness, perception of ease of use, subjective norm, availability, trust and affordability have direct effect on the intention to adopt the credit. Interestingly, the strongest direct effect on the adoption intention was more likely to come from the perception of ease of use. Meanwhile, awareness and acceptability have no direct effect on the intention to adopt.

Originality/value

This study provides new theoretical insights regarding the implementation of technology acceptance model to analyze the intention to adopt and the analysis of four As concept. The findings of the study will provide a better strategy for banking as service industries in formulating the program of credit access for the entrepreneurs to run the business properly.

Details

Journal of Research in Marketing and Entrepreneurship, vol. 23 no. 1
Type: Research Article
ISSN: 1471-5201

Keywords

1 – 4 of 4