Search results
1 – 10 of 69Berland Nicolas, Emer Curtis, Guenoun Marcel and Renaud Angele
This study aims to examine the question “How can we understand the dynamics that give rise to multiplicities of overlapping controls (MoOCs)?” and explore the role of local…
Abstract
Purpose
This study aims to examine the question “How can we understand the dynamics that give rise to multiplicities of overlapping controls (MoOCs)?” and explore the role of local politics in the emergence of such multiplicities.
Design/methodology/approach
Building on assemblage theory, we use an in-depth case study of local government in France where a Socialist and Green coalition (the “Coalition”) replaced a long-standing Communist administration. The Coalition introduced a comprehensive set of new management control systems (MCSs), layered onto pre-existing systems.
Findings
The proliferation of new MCSs, together with the persistence of legacy MCSs, gave rise to a MoOC. Linkages between controls constituted potential points of rupture around which the assemblage changed and shifted the nexus of control. Whereas densely populated areas of the assemblage provided sites for conflict in the battle to influence the allocation of resources, some MCSs became isolated or were reterritorialized by political groups seeking autonomy from the new management.
Social implications
We highlight the material consequences of political contentions around MoOCs that obfuscate, and at times frustrate, the implementation of a programme for government.
Originality/value
We contribute a set of concepts pertaining to the dynamics of MoOCs. We offer an alternative perspective on the disappointment associated with the adoption of new management tools in the public sector, showing how MCSs can become battlegrounds for political contention rather than tools for management improvement. We contribute to literature utilizing assemblage theory for analysing management accounting change.
Details
Keywords
– The purpose of this paper is to introduce the idea of Action Research as a way of making academic research more relevant for social economic change.
Abstract
Purpose
The purpose of this paper is to introduce the idea of Action Research as a way of making academic research more relevant for social economic change.
Design/methodology/approach
This paper seeks a middle path by presenting a method for Action Research that is both scientific and that results in practical social-economic impact on a local society. The method is divided into 11 systematic steps.
Findings
The author has found that the method results in job creation and place-based economic development.
Originality/value
Usually social activists and academic professionals do not mix. This approach combines both theory and practice, which is unusual in university circles.
Details
Keywords
Jack Fiorito, Irene Padavic and Zachary A. Russell
The question of why workers support unions is one of the most fundamental in employment relations. Using Ajzen’s Theory of Planned Behavior we conduct a selective review of…
Abstract
The question of why workers support unions is one of the most fundamental in employment relations. Using Ajzen’s Theory of Planned Behavior we conduct a selective review of literature and evidence on union voting, joining, and participation. We focus primarily on the question of motivation as stemming from self-interest or from pro-social considerations. Secondary attention is given to the influence of others’ views (subjective norms) and worker perceptions that they can achieve desired behaviors (perceived control or self-efficacy). We find support for the notion that workers are concerned with neither member self-interest (“just us”) alone, nor pro-social (“justice”) alone, but rather that they are motivated to form, join, and participate by both considerations. This micro-foundation for considering unions as institutions suggests that unions are neither narrow self-interested institutions nor purely pro-social movements, but “a little bit of both.” We offer propositions and consider implications for theory, practice, and future research.
Details
Keywords
Rufai Ahmad, Sotirios Terzis and Karen Renaud
This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.
Abstract
Purpose
This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.
Design/methodology/approach
In total, 67 examples of real-world MIM phishing attacks were collected from various online sources. Each example was coded using established guidelines from the literature to identify the persuasion principles, and the URL construction techniques employed.
Findings
The principles of social proof, liking and authority were the most widely used in MIM phishing, followed by scarcity and reciprocity. Most phishing examples use three persuasion principles, often a combination of authority, liking and social proof. In contrast to email phishing but similar to vishing, the social proof principle was the most commonly used in MIM phishing. Phishers implement the social proof principle in different ways, most commonly by claiming that other users have already acted (e.g. crafting messages that indicate the sender has already benefited from the scam). In contrast to email, retail and fintech companies are the most commonly targeted in MIM phishing. Furthermore, phishers created deceptive URLs using multiple URL obfuscation techniques, often using spoofed domains, to make the URL complex by adding random characters and using homoglyphs.
Originality/value
The insights from this study provide a theoretical foundation for future research on the psychological aspects of phishing in MIM apps. The study provides recommendations that software developers should consider when developing automated anti-phishing solutions for MIM apps and proposes a set of MIM phishing awareness training tips.
Details
Keywords
R.I. Ferguson, Karen Renaud, Sara Wilford and Alastair Irons
Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics…
Abstract
Purpose
Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction.
Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization's right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain.
This paper argues the need for a practical, ethically grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organizations, as well as acknowledging the needs of law enforcement. The paper derives a set of ethical guidelines, and then maps these onto a forensics investigation framework. The framework to expert review in two stages is subjected, refining the framework after each stage. The paper concludes by proposing the refined ethically grounded digital forensics investigation framework. The treatise is primarily UK based, but the concepts presented here have international relevance and applicability.
Design/methodology/approach
In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals' rights to privacy and organizations' rights to control intellectual capital disclosure.
Findings
The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically informed approach to digital forensics investigations, as a remedy, is highlighted and a framework proposed to provide this.
Research limitations/implications
The proposed ethically informed framework for guiding digital forensics investigations suggests a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.
Originality/value
Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other.
Details
Keywords
Karen Renaud and Jacques Ophoff
There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller…
Abstract
Purpose
There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller businesses lack sufficient situational awareness to make informed decisions in this space, or because they lack the resources to implement security controls and precautions.
Design/methodology/approach
In this paper, Endsley’s theory of situation awareness was extended to propose a model of SMEs’ cyber situational awareness, and the extent to which this awareness triggers the implementation of cyber security measures. Empirical data were collected through an online survey of 361 UK-based SMEs; subsequently, the authors used partial least squares modeling to validate the model.
Findings
The results show that heightened situational awareness, as well as resource availability, significantly affects SMEs’ implementation of cyber precautions and controls.
Research limitations/implications
While resource limitations are undoubtedly a problem for SMEs, their lack of cyber situational awareness seems to be the area requiring most attention.
Practical implications
The findings of this study are reported and recommendations were made that can help to improve situational awareness, which will have the effect of encouraging the implementation of cyber security measures.
Originality/value
This is the first study to apply the situational awareness theory to understand why SMEs do not implement cyber security best practice measures.
Details
Keywords
Lanna-Gaye Kamara Franklyn-Green, Natola Meredith and Ibrahim Ajagunna
The aim of the paper is to examine the impacts of the coronavirus disease-2019 (COVID-19) pandemic on the Caribbean cruise industry and assess the post-pandemic prospects for…
Abstract
Purpose
The aim of the paper is to examine the impacts of the coronavirus disease-2019 (COVID-19) pandemic on the Caribbean cruise industry and assess the post-pandemic prospects for recovery.
Design/methodology/approach
The study used a qualitative approach applied through personal interviews as well as data from secondary sources.
Findings
The prospects for the post-pandemic cruise industry reveal the need for long-term plans and strategies from Caribbean countries if the countries are to remain viable.
Research limitations/implications
The research was limited to Jamaica, St. Lucia and Antigua and Barbuda. The scope could have been broadened to include other Caribbean islands such as Barbados.
Practical implications
The study is practical and useful to tourism practitioners and governments seeking to create a balance between reaping the benefits of cruise tourism and safeguarding its citizens.
Social implications
The pandemic has caused a re-examination of how people interact.
Originality/value
The study adds to the body of literature on the post-pandemic survival of the Caribbean cruise industry and provides a useful briefing for practitioners.
Details