Search results

11 – 20 of over 17000
Article
Publication date: 11 October 2011

Hannes Holm, Teodor Sommestad, Jonas Almroth and Mats Persson

The purpose of this paper is to evaluate if automated vulnerability scanning accurately identifies vulnerabilities in computer networks and if this accuracy is contingent on the…

4911

Abstract

Purpose

The purpose of this paper is to evaluate if automated vulnerability scanning accurately identifies vulnerabilities in computer networks and if this accuracy is contingent on the platforms used.

Design/methodology/approach

Both qualitative comparisons of functionality and quantitative comparisons of false positives and false negatives are made for seven different scanners. The quantitative assessment includes data from both authenticated and unauthenticated scans. Experiments were conducted on a computer network of 28 hosts with various operating systems, services and vulnerabilities. This network was set up by a team of security researchers and professionals.

Findings

The data collected in this study show that authenticated vulnerability scanning is usable. However, automated scanning is not able to accurately identify all vulnerabilities present in computer networks. Also, scans of hosts running Windows are more accurate than scans of hosts running Linux.

Research limitations/implications

This paper focuses on the direct output of automated scans with respect to the vulnerabilities they identify. Areas such as how to interpret the results assessed by each scanner (e.g. regarding remediation guidelines) or aggregating information about individual vulnerabilities into risk measures are out of scope.

Practical implications

This paper describes how well automated vulnerability scanners perform when it comes to identifying security issues in a network. The findings suggest that a vulnerability scanner is a useable tool to have in your security toolbox given that user credentials are available for the hosts in your network. Manual effort is however needed to complement automated scanning in order to get satisfactory accuracy regarding network security problems.

Originality/value

Previous studies have focused on the qualitative aspects on vulnerability assessment. This study presents a quantitative evaluation of seven of the most popular vulnerability scanners available on the market.

Details

Information Management & Computer Security, vol. 19 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 16 December 2019

Pei-Ju Wu and Pattra Chaipiyaphan

Delivery vulnerability is a critically important theme in logistics risk management. However, while logistics service providers often collect and retain massive amounts of…

1268

Abstract

Purpose

Delivery vulnerability is a critically important theme in logistics risk management. However, while logistics service providers often collect and retain massive amounts of logistics data, they seldom utilize such information to diagnose recurrent day-to-day logistics risks. Hence, the purpose of this paper is to investigate delivery vulnerabilities in a logistics system using its own accumulated data.

Design/methodology/approach

This study utilizes pragmatic business analytics to derive insights on logistics risk management from operations data in a logistics system. Additionally, normal accident theory informs the discussion of its management implications.

Findings

This study’s analytical results reveal that a tightly coupled logistics system can align with normal accident theory. Specifically, the vulnerabilities of such a system comprise not only multi-components but also interactive ones.

Research limitations/implications

The tailored business analytics comprise a research foundation for logistics risk management. Additionally, the important research implications of this study’s analytical results arrived at via such results’ integration with normal accident theory demonstrate the value of that theory to logistics risk management.

Practical implications

The trade-offs between logistics risk and logistics-system efficiency should be carefully evaluated. Moreover, improvements to such systems’ internal resilience can help to alleviate potential logistics vulnerabilities.

Originality/value

This pioneering analytical study scrutinizes the critical vulnerability issues of a logistics service provider and therefore represents a valuable contribution to the field of logistics risk management. Moreover, it provides a guide to retrieving valuable insights from existing stockpiles of delivery-vulnerability data.

Details

The International Journal of Logistics Management, vol. 31 no. 1
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 18 August 2023

Yuan Li and Jacqueline Eastman

Cute products have found market success. The literature has identified various factors of cuteness, but the effect of size is under-addressed. This study aims to investigate…

Abstract

Purpose

Cute products have found market success. The literature has identified various factors of cuteness, but the effect of size is under-addressed. This study aims to investigate whether and how size perception influences consumers’ cuteness perception.

Design/methodology/approach

In three experiments, size was manipulated in terms of visual cue, product description and product name to determine its impact on cuteness perception.

Findings

The results of the three experiments demonstrate that a size cue of smallness can heighten consumers’ perception of product cuteness. The first two studies provided converging evidence for the main hypothesis that smaller objects are evaluated as cuter. Study 3 not only replicated the findings of the first two studies but also revealed that vulnerability acts as the underlying process for the smallness-cuteness relationship. Study 3 also showed that the purchase likelihood for an extended product warranty is higher in the small condition compared to the control condition.

Research limitations/implications

While the findings were robust across product types and size manipulations, possible boundary conditions related to product types or individual characteristics were not tested.

Practical implications

The findings suggest how brand managers can use size perceptions to influence consumers’ perceptions of the cuteness of their products and brands.

Originality/value

The findings inform brand managers about the nuances of size cues that may affect how customers perceive their products and identify a more generally applicable cuteness factor that may have downstream implications for marketing practitioners.

Details

Journal of Product & Brand Management, vol. 32 no. 8
Type: Research Article
ISSN: 1061-0421

Keywords

Article
Publication date: 29 August 2008

Tom Vander Beken and Stijn Van Daele

The aim of this paper is to demonstrate the potential of vulnerability studies of economic activities to study the relationship between organised crime and the economy and…

1514

Abstract

Purpose

The aim of this paper is to demonstrate the potential of vulnerability studies of economic activities to study the relationship between organised crime and the economy and illustrate it by examples taken from a vulnerability study of the European waste management industry.

Design/methodology/approach

Based on both economical and criminological perspectives a scanning tool for assessing the vulnerability of economic sectors was developed and applied to a specific case.

Findings

Sector vulnerability studies belong to the wider family of criminal opportunity approaches, all of which aim to identify areas of current risk and future prevention. Sector vulnerability studies (vulnerability to organised crime and other risks) extend the range by bringing in economic sectors. Although starting from the analysis of the formal economy, sector vulnerability studies can provide insights concerning potential irregularities and opportunities for informal economies to flourish as well.

Originality/value

This paper addresses informal markets and the relationship between organised crime and the economy from a vulnerability perspective, focusing on the opportunities provided by licit economic activity. Although such opportunity approaches exist and have been applied to various cases before, there are only a few examples of its application to vulnerabilities to organised crime.

Details

International Journal of Social Economics, vol. 35 no. 10
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 11 February 2021

Emilia Vann Yaroson, Liz Breen, Jiachen Hou and Julie Sowter

The purpose of this study was to advance the knowledge of pharmaceutical supply chain (PSC) resilience using complex adaptive system theory (CAS).

2334

Abstract

Purpose

The purpose of this study was to advance the knowledge of pharmaceutical supply chain (PSC) resilience using complex adaptive system theory (CAS).

Design/methodology/approach

An exploratory research design, which adopted a qualitative approach was used to achieve the study’s research objective. Qualitative data were gathered through 23 semi-structured interviews with key supply chain actors across the PSC in the UK.

Findings

The findings demonstrate that CAS, as a theory, provides a systemic approach to understanding PSC resilience by taking into consideration the various elements (environment, PSC characteristics, vulnerabilities and resilience strategies) that make up the entire system. It also provides explanations for key findings, such as the impact of power, conflict and complexity in the PSC, which are influenced by the interactions between supply chain actors and as such increase its susceptibility to the negative impact of disruption. Furthermore, the antecedents for building resilience strategies were the outcome of the decision-making process referred to as co-evolution from a CAS perspective.

Originality/value

Based on the data collected, the study was able to reflect on the relationships, interactions and interfaces between actors in the PSC using the CAS theory, which supports the proposition that resilience strategies can be adopted by supply chain actors to enhance this service supply chain. This is a novel empirical study of resilience across multiple levels of the PSC and as such adds valuable new knowledge about the phenomenon and the use of CAS theory as a vehicle for exploration and knowledge construction in other supply chains.

Details

Supply Chain Management: An International Journal, vol. 26 no. 3
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 20 March 2017

Charlotte Kendra Gotangco, Abigail Marie Favis, Ma. Aileen Leah Guzman, Marion Lara Tan, Carissa Quintana and Jairus Carmela Josol

Climate vulnerability assessments are often operationalized by the analysis of indicators defined by the spatial boundaries of the community under study. These, however, sometimes…

Abstract

Purpose

Climate vulnerability assessments are often operationalized by the analysis of indicators defined by the spatial boundaries of the community under study. These, however, sometimes fail to capture interdependency among communities for basic resources. This paper aims to propose a framework for characterizing vulnerability caused by interdependency by adapting a supply chain lens.

Design/methodology/approach

The paper proposes a definition for “indirect vulnerability” that recognizes the transboundary and teleconnected nature of vulnerability arising from resource networks among cities and communities. A conceptual framework using a supply chain approach is presented for climate hazards in particular. This approach is then demonstrated through a rapid appraisal of the rice, energy and water supply chains and the waste management chains of Metro Manila.

Findings

The application of the supply chain lens to assessing the indirect vulnerability of Metro Manila brings to fore issues extending beyond the decision-making boundaries of local government units. Addressing these will require vertical government coordination and horizontal inter-sectoral collaboration. Thus, this supply chain-based indirect vulnerability assessment can be complementary to traditional vulnerability assessments in providing a larger systems perspective.

Originality/value

Innovative tools are needed to make community vulnerability assessments both holistic and tractable. Existing methods in the private sector can be adapted rather than reinventing the wheel. This supply chain framework can be a useful decision support and planning tool across governance levels to comprehensively address vulnerability.

Details

International Journal of Climate Change Strategies and Management, vol. 9 no. 2
Type: Research Article
ISSN: 1756-8692

Keywords

Book part
Publication date: 25 November 2019

Helen Forbes-Mewett and Kien Nguyen-Trung

Since the late 1980s, social theorists championed for the birth of a new era, in which societies were increasingly exposed to growing global risks. The presence of increasing…

Abstract

Since the late 1980s, social theorists championed for the birth of a new era, in which societies were increasingly exposed to growing global risks. The presence of increasing risks including natural disasters, technological errors, terrorist attacks, nuclear wars and environmental degradation suggests that human beings are becoming increasingly vulnerable. Therefore, an understanding of vulnerability is crucial. Vulnerability is often considered as the potential to suffer from physical attacks. This approach, however, has limited capacity to explain many forms of suffering including not only physical aspects, but also mental, social, economic, political and social dimensions. This chapter draws on the vulnerability literature to present an overarching framework for the book. It starts with an outline of the concept origins, then discusses its relationship with the risk society thesis before forming conceptualisation. The chapter then points out the key similarities and differences between vulnerability and other concepts such as risk, disaster, poverty, security and resilience. The authors rework an existing “security” framework to develop a new definition of the concept of vulnerability. Finally, the authors look into the root causes and the formation of vulnerability within social systems.

Details

Vulnerability in a Mobile World
Type: Book
ISBN: 978-1-78756-912-6

Keywords

Article
Publication date: 11 September 2017

Subhadip Roy and Shamindra Nath Sanyal

This study aims to explore the dimensions of perceived consumption vulnerability (PCV) for the elderly citizens (EC) in India and its consequences. Consumer vulnerability is a…

Abstract

Purpose

This study aims to explore the dimensions of perceived consumption vulnerability (PCV) for the elderly citizens (EC) in India and its consequences. Consumer vulnerability is a recent and important construct for marketers and policymakers to understand the consumption behavior of the EC.

Design/methodology/approach

To achieve the study objectives, the authors conducted 50 in-depth interviews and six focus group discussions of ECs in two large cities in India. The authors used grounded theory methodology to understand the PCV construct.

Findings

The findings suggest a five-dimensional formative PCV construct with the dimensions being Physical, Financial, Social, Technological and Service Vulnerability contributing to PCV. The findings also suggest a relationship between PCV and consumption variables such as search cost, choice evaluation, consumption and overall satisfaction.

Research limitations/implications

The major contribution of the present study is the exploration of the PCV construct for the EC and its dimensions. The propositions developed in the study could be tested in future studies using a quantitative approach.

Practical implications

The findings call for compassion from the marketers while dealing with the ECs and a separate service strategy that addresses the specific needs of the ECs.

Social implications

The findings call for public policy action to protect the consumption rights of the ECs to reduce their consumption vulnerability.

Originality/value

The present study is a novel attempt to explore the PCV construct and its role in defining consumer behavior of the ECs.

Details

Qualitative Market Research: An International Journal, vol. 20 no. 4
Type: Research Article
ISSN: 1352-2752

Keywords

Article
Publication date: 26 April 2011

Ali Asgary and Abdul Halim

This paper aims to examine people's preferences for alternative cyclone vulnerability reduction measures in cyclone prone areas of Bangladesh.

Abstract

Purpose

This paper aims to examine people's preferences for alternative cyclone vulnerability reduction measures in cyclone prone areas of Bangladesh.

Design/methodology/approach

A choice experiment (CE) method has been implemented based on the pressure and release (PAR) vulnerability model. Data were collected from a sample of households in two districts of Bangladesh in winter 2008.

Findings

The results of a choice experiment (CE) method conducted in selected areas of Bangladesh prone to cyclone hazards indicated that access to resources is viewed as the most influential factor in cyclone vulnerability reduction options. Findings support the pressure and release model (PAR) of vulnerability analysis. Access to training and education and cyclone warning systems are also found to have significant impacts on households' choices of cyclone vulnerability reduction. Structural mitigation measures and access to power and decision making, though significant, were found to have the least impact.

Research limitations/implications

The paper shows that the choice experiment method is a good technique for understanding people's preferences for vulnerability reduction measures.

Practical implications

The paper concludes with a policy recommendation for governmental and non‐governmental agencies to focus on vulnerability reduction measures that tackle the root causes of vulnerability.

Originality/value

This is the first time that the choice experiment method has been used for cyclone vulnerability analysis, and it provides quantitative supports for the PAR model.

Details

Disaster Prevention and Management: An International Journal, vol. 20 no. 2
Type: Research Article
ISSN: 0965-3562

Keywords

Expert briefing
Publication date: 25 May 2017

Vulnerability disclosure debates.

Details

DOI: 10.1108/OXAN-DB221107

ISSN: 2633-304X

Keywords

Geographic
Topical
11 – 20 of over 17000