Search results
11 – 20 of over 17000Hannes Holm, Teodor Sommestad, Jonas Almroth and Mats Persson
The purpose of this paper is to evaluate if automated vulnerability scanning accurately identifies vulnerabilities in computer networks and if this accuracy is contingent on the…
Abstract
Purpose
The purpose of this paper is to evaluate if automated vulnerability scanning accurately identifies vulnerabilities in computer networks and if this accuracy is contingent on the platforms used.
Design/methodology/approach
Both qualitative comparisons of functionality and quantitative comparisons of false positives and false negatives are made for seven different scanners. The quantitative assessment includes data from both authenticated and unauthenticated scans. Experiments were conducted on a computer network of 28 hosts with various operating systems, services and vulnerabilities. This network was set up by a team of security researchers and professionals.
Findings
The data collected in this study show that authenticated vulnerability scanning is usable. However, automated scanning is not able to accurately identify all vulnerabilities present in computer networks. Also, scans of hosts running Windows are more accurate than scans of hosts running Linux.
Research limitations/implications
This paper focuses on the direct output of automated scans with respect to the vulnerabilities they identify. Areas such as how to interpret the results assessed by each scanner (e.g. regarding remediation guidelines) or aggregating information about individual vulnerabilities into risk measures are out of scope.
Practical implications
This paper describes how well automated vulnerability scanners perform when it comes to identifying security issues in a network. The findings suggest that a vulnerability scanner is a useable tool to have in your security toolbox given that user credentials are available for the hosts in your network. Manual effort is however needed to complement automated scanning in order to get satisfactory accuracy regarding network security problems.
Originality/value
Previous studies have focused on the qualitative aspects on vulnerability assessment. This study presents a quantitative evaluation of seven of the most popular vulnerability scanners available on the market.
Details
Keywords
Pei-Ju Wu and Pattra Chaipiyaphan
Delivery vulnerability is a critically important theme in logistics risk management. However, while logistics service providers often collect and retain massive amounts of…
Abstract
Purpose
Delivery vulnerability is a critically important theme in logistics risk management. However, while logistics service providers often collect and retain massive amounts of logistics data, they seldom utilize such information to diagnose recurrent day-to-day logistics risks. Hence, the purpose of this paper is to investigate delivery vulnerabilities in a logistics system using its own accumulated data.
Design/methodology/approach
This study utilizes pragmatic business analytics to derive insights on logistics risk management from operations data in a logistics system. Additionally, normal accident theory informs the discussion of its management implications.
Findings
This study’s analytical results reveal that a tightly coupled logistics system can align with normal accident theory. Specifically, the vulnerabilities of such a system comprise not only multi-components but also interactive ones.
Research limitations/implications
The tailored business analytics comprise a research foundation for logistics risk management. Additionally, the important research implications of this study’s analytical results arrived at via such results’ integration with normal accident theory demonstrate the value of that theory to logistics risk management.
Practical implications
The trade-offs between logistics risk and logistics-system efficiency should be carefully evaluated. Moreover, improvements to such systems’ internal resilience can help to alleviate potential logistics vulnerabilities.
Originality/value
This pioneering analytical study scrutinizes the critical vulnerability issues of a logistics service provider and therefore represents a valuable contribution to the field of logistics risk management. Moreover, it provides a guide to retrieving valuable insights from existing stockpiles of delivery-vulnerability data.
Details
Keywords
Yuan Li and Jacqueline Eastman
Cute products have found market success. The literature has identified various factors of cuteness, but the effect of size is under-addressed. This study aims to investigate…
Abstract
Purpose
Cute products have found market success. The literature has identified various factors of cuteness, but the effect of size is under-addressed. This study aims to investigate whether and how size perception influences consumers’ cuteness perception.
Design/methodology/approach
In three experiments, size was manipulated in terms of visual cue, product description and product name to determine its impact on cuteness perception.
Findings
The results of the three experiments demonstrate that a size cue of smallness can heighten consumers’ perception of product cuteness. The first two studies provided converging evidence for the main hypothesis that smaller objects are evaluated as cuter. Study 3 not only replicated the findings of the first two studies but also revealed that vulnerability acts as the underlying process for the smallness-cuteness relationship. Study 3 also showed that the purchase likelihood for an extended product warranty is higher in the small condition compared to the control condition.
Research limitations/implications
While the findings were robust across product types and size manipulations, possible boundary conditions related to product types or individual characteristics were not tested.
Practical implications
The findings suggest how brand managers can use size perceptions to influence consumers’ perceptions of the cuteness of their products and brands.
Originality/value
The findings inform brand managers about the nuances of size cues that may affect how customers perceive their products and identify a more generally applicable cuteness factor that may have downstream implications for marketing practitioners.
Details
Keywords
Tom Vander Beken and Stijn Van Daele
The aim of this paper is to demonstrate the potential of vulnerability studies of economic activities to study the relationship between organised crime and the economy and…
Abstract
Purpose
The aim of this paper is to demonstrate the potential of vulnerability studies of economic activities to study the relationship between organised crime and the economy and illustrate it by examples taken from a vulnerability study of the European waste management industry.
Design/methodology/approach
Based on both economical and criminological perspectives a scanning tool for assessing the vulnerability of economic sectors was developed and applied to a specific case.
Findings
Sector vulnerability studies belong to the wider family of criminal opportunity approaches, all of which aim to identify areas of current risk and future prevention. Sector vulnerability studies (vulnerability to organised crime and other risks) extend the range by bringing in economic sectors. Although starting from the analysis of the formal economy, sector vulnerability studies can provide insights concerning potential irregularities and opportunities for informal economies to flourish as well.
Originality/value
This paper addresses informal markets and the relationship between organised crime and the economy from a vulnerability perspective, focusing on the opportunities provided by licit economic activity. Although such opportunity approaches exist and have been applied to various cases before, there are only a few examples of its application to vulnerabilities to organised crime.
Details
Keywords
Emilia Vann Yaroson, Liz Breen, Jiachen Hou and Julie Sowter
The purpose of this study was to advance the knowledge of pharmaceutical supply chain (PSC) resilience using complex adaptive system theory (CAS).
Abstract
Purpose
The purpose of this study was to advance the knowledge of pharmaceutical supply chain (PSC) resilience using complex adaptive system theory (CAS).
Design/methodology/approach
An exploratory research design, which adopted a qualitative approach was used to achieve the study’s research objective. Qualitative data were gathered through 23 semi-structured interviews with key supply chain actors across the PSC in the UK.
Findings
The findings demonstrate that CAS, as a theory, provides a systemic approach to understanding PSC resilience by taking into consideration the various elements (environment, PSC characteristics, vulnerabilities and resilience strategies) that make up the entire system. It also provides explanations for key findings, such as the impact of power, conflict and complexity in the PSC, which are influenced by the interactions between supply chain actors and as such increase its susceptibility to the negative impact of disruption. Furthermore, the antecedents for building resilience strategies were the outcome of the decision-making process referred to as co-evolution from a CAS perspective.
Originality/value
Based on the data collected, the study was able to reflect on the relationships, interactions and interfaces between actors in the PSC using the CAS theory, which supports the proposition that resilience strategies can be adopted by supply chain actors to enhance this service supply chain. This is a novel empirical study of resilience across multiple levels of the PSC and as such adds valuable new knowledge about the phenomenon and the use of CAS theory as a vehicle for exploration and knowledge construction in other supply chains.
Details
Keywords
Charlotte Kendra Gotangco, Abigail Marie Favis, Ma. Aileen Leah Guzman, Marion Lara Tan, Carissa Quintana and Jairus Carmela Josol
Climate vulnerability assessments are often operationalized by the analysis of indicators defined by the spatial boundaries of the community under study. These, however, sometimes…
Abstract
Purpose
Climate vulnerability assessments are often operationalized by the analysis of indicators defined by the spatial boundaries of the community under study. These, however, sometimes fail to capture interdependency among communities for basic resources. This paper aims to propose a framework for characterizing vulnerability caused by interdependency by adapting a supply chain lens.
Design/methodology/approach
The paper proposes a definition for “indirect vulnerability” that recognizes the transboundary and teleconnected nature of vulnerability arising from resource networks among cities and communities. A conceptual framework using a supply chain approach is presented for climate hazards in particular. This approach is then demonstrated through a rapid appraisal of the rice, energy and water supply chains and the waste management chains of Metro Manila.
Findings
The application of the supply chain lens to assessing the indirect vulnerability of Metro Manila brings to fore issues extending beyond the decision-making boundaries of local government units. Addressing these will require vertical government coordination and horizontal inter-sectoral collaboration. Thus, this supply chain-based indirect vulnerability assessment can be complementary to traditional vulnerability assessments in providing a larger systems perspective.
Originality/value
Innovative tools are needed to make community vulnerability assessments both holistic and tractable. Existing methods in the private sector can be adapted rather than reinventing the wheel. This supply chain framework can be a useful decision support and planning tool across governance levels to comprehensively address vulnerability.
Details
Keywords
Helen Forbes-Mewett and Kien Nguyen-Trung
Since the late 1980s, social theorists championed for the birth of a new era, in which societies were increasingly exposed to growing global risks. The presence of increasing…
Abstract
Since the late 1980s, social theorists championed for the birth of a new era, in which societies were increasingly exposed to growing global risks. The presence of increasing risks including natural disasters, technological errors, terrorist attacks, nuclear wars and environmental degradation suggests that human beings are becoming increasingly vulnerable. Therefore, an understanding of vulnerability is crucial. Vulnerability is often considered as the potential to suffer from physical attacks. This approach, however, has limited capacity to explain many forms of suffering including not only physical aspects, but also mental, social, economic, political and social dimensions. This chapter draws on the vulnerability literature to present an overarching framework for the book. It starts with an outline of the concept origins, then discusses its relationship with the risk society thesis before forming conceptualisation. The chapter then points out the key similarities and differences between vulnerability and other concepts such as risk, disaster, poverty, security and resilience. The authors rework an existing “security” framework to develop a new definition of the concept of vulnerability. Finally, the authors look into the root causes and the formation of vulnerability within social systems.
Details
Keywords
Subhadip Roy and Shamindra Nath Sanyal
This study aims to explore the dimensions of perceived consumption vulnerability (PCV) for the elderly citizens (EC) in India and its consequences. Consumer vulnerability is a…
Abstract
Purpose
This study aims to explore the dimensions of perceived consumption vulnerability (PCV) for the elderly citizens (EC) in India and its consequences. Consumer vulnerability is a recent and important construct for marketers and policymakers to understand the consumption behavior of the EC.
Design/methodology/approach
To achieve the study objectives, the authors conducted 50 in-depth interviews and six focus group discussions of ECs in two large cities in India. The authors used grounded theory methodology to understand the PCV construct.
Findings
The findings suggest a five-dimensional formative PCV construct with the dimensions being Physical, Financial, Social, Technological and Service Vulnerability contributing to PCV. The findings also suggest a relationship between PCV and consumption variables such as search cost, choice evaluation, consumption and overall satisfaction.
Research limitations/implications
The major contribution of the present study is the exploration of the PCV construct for the EC and its dimensions. The propositions developed in the study could be tested in future studies using a quantitative approach.
Practical implications
The findings call for compassion from the marketers while dealing with the ECs and a separate service strategy that addresses the specific needs of the ECs.
Social implications
The findings call for public policy action to protect the consumption rights of the ECs to reduce their consumption vulnerability.
Originality/value
The present study is a novel attempt to explore the PCV construct and its role in defining consumer behavior of the ECs.
Details
Keywords
This paper aims to examine people's preferences for alternative cyclone vulnerability reduction measures in cyclone prone areas of Bangladesh.
Abstract
Purpose
This paper aims to examine people's preferences for alternative cyclone vulnerability reduction measures in cyclone prone areas of Bangladesh.
Design/methodology/approach
A choice experiment (CE) method has been implemented based on the pressure and release (PAR) vulnerability model. Data were collected from a sample of households in two districts of Bangladesh in winter 2008.
Findings
The results of a choice experiment (CE) method conducted in selected areas of Bangladesh prone to cyclone hazards indicated that access to resources is viewed as the most influential factor in cyclone vulnerability reduction options. Findings support the pressure and release model (PAR) of vulnerability analysis. Access to training and education and cyclone warning systems are also found to have significant impacts on households' choices of cyclone vulnerability reduction. Structural mitigation measures and access to power and decision making, though significant, were found to have the least impact.
Research limitations/implications
The paper shows that the choice experiment method is a good technique for understanding people's preferences for vulnerability reduction measures.
Practical implications
The paper concludes with a policy recommendation for governmental and non‐governmental agencies to focus on vulnerability reduction measures that tackle the root causes of vulnerability.
Originality/value
This is the first time that the choice experiment method has been used for cyclone vulnerability analysis, and it provides quantitative supports for the PAR model.
Details
Keywords
Vulnerability disclosure debates.