Search results

1 – 10 of 69
Article
Publication date: 1 July 2024

Berland Nicolas, Emer Curtis, Guenoun Marcel and Renaud Angele

This study aims to examine the question “How can we understand the dynamics that give rise to multiplicities of overlapping controls (MoOCs)?” and explore the role of local…

Abstract

Purpose

This study aims to examine the question “How can we understand the dynamics that give rise to multiplicities of overlapping controls (MoOCs)?” and explore the role of local politics in the emergence of such multiplicities.

Design/methodology/approach

Building on assemblage theory, we use an in-depth case study of local government in France where a Socialist and Green coalition (the “Coalition”) replaced a long-standing Communist administration. The Coalition introduced a comprehensive set of new management control systems (MCSs), layered onto pre-existing systems.

Findings

The proliferation of new MCSs, together with the persistence of legacy MCSs, gave rise to a MoOC. Linkages between controls constituted potential points of rupture around which the assemblage changed and shifted the nexus of control. Whereas densely populated areas of the assemblage provided sites for conflict in the battle to influence the allocation of resources, some MCSs became isolated or were reterritorialized by political groups seeking autonomy from the new management.

Social implications

We highlight the material consequences of political contentions around MoOCs that obfuscate, and at times frustrate, the implementation of a programme for government.

Originality/value

We contribute a set of concepts pertaining to the dynamics of MoOCs. We offer an alternative perspective on the disappointment associated with the adoption of new management tools in the public sector, showing how MCSs can become battlegrounds for political contention rather than tools for management improvement. We contribute to literature utilizing assemblage theory for analysing management accounting change.

Details

Accounting, Auditing & Accountability Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0951-3574

Keywords

Content available

Abstract

Details

Journal of Accounting & Organizational Change, vol. 8 no. 1
Type: Research Article
ISSN: 1832-5912

Article
Publication date: 4 February 2014

Greg MacLeod

– The purpose of this paper is to introduce the idea of Action Research as a way of making academic research more relevant for social economic change.

Abstract

Purpose

The purpose of this paper is to introduce the idea of Action Research as a way of making academic research more relevant for social economic change.

Design/methodology/approach

This paper seeks a middle path by presenting a method for Action Research that is both scientific and that results in practical social-economic impact on a local society. The method is divided into 11 systematic steps.

Findings

The author has found that the method results in job creation and place-based economic development.

Originality/value

Usually social activists and academic professionals do not mix. This approach combines both theory and practice, which is unusual in university circles.

Details

Humanomics, vol. 30 no. 1
Type: Research Article
ISSN: 0828-8666

Keywords

Book part
Publication date: 2 February 2018

Jack Fiorito, Irene Padavic and Zachary A. Russell

The question of why workers support unions is one of the most fundamental in employment relations. Using Ajzen’s Theory of Planned Behavior we conduct a selective review of…

Abstract

The question of why workers support unions is one of the most fundamental in employment relations. Using Ajzen’s Theory of Planned Behavior we conduct a selective review of literature and evidence on union voting, joining, and participation. We focus primarily on the question of motivation as stemming from self-interest or from pro-social considerations. Secondary attention is given to the influence of others’ views (subjective norms) and worker perceptions that they can achieve desired behaviors (perceived control or self-efficacy). We find support for the notion that workers are concerned with neither member self-interest (“just us”) alone, nor pro-social (“justice”) alone, but rather that they are motivated to form, join, and participate by both considerations. This micro-foundation for considering unions as institutions suggests that unions are neither narrow self-interested institutions nor purely pro-social movements, but “a little bit of both.” We offer propositions and consider implications for theory, practice, and future research.

Details

Advances in Industrial and Labor Relations, 2017: Shifts in Workplace Voice, Justice, Negotiation and Conflict Resolution in Contemporary Workplaces
Type: Book
ISBN: 978-1-78743-486-8

Keywords

Article
Publication date: 8 June 2020

Karen Renaud

Abstract

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Article
Publication date: 31 January 2024

Rufai Ahmad, Sotirios Terzis and Karen Renaud

This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.

Abstract

Purpose

This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.

Design/methodology/approach

In total, 67 examples of real-world MIM phishing attacks were collected from various online sources. Each example was coded using established guidelines from the literature to identify the persuasion principles, and the URL construction techniques employed.

Findings

The principles of social proof, liking and authority were the most widely used in MIM phishing, followed by scarcity and reciprocity. Most phishing examples use three persuasion principles, often a combination of authority, liking and social proof. In contrast to email phishing but similar to vishing, the social proof principle was the most commonly used in MIM phishing. Phishers implement the social proof principle in different ways, most commonly by claiming that other users have already acted (e.g. crafting messages that indicate the sender has already benefited from the scam). In contrast to email, retail and fintech companies are the most commonly targeted in MIM phishing. Furthermore, phishers created deceptive URLs using multiple URL obfuscation techniques, often using spoofed domains, to make the URL complex by adding random characters and using homoglyphs.

Originality/value

The insights from this study provide a theoretical foundation for future research on the psychological aspects of phishing in MIM apps. The study provides recommendations that software developers should consider when developing automated anti-phishing solutions for MIM apps and proposes a set of MIM phishing awareness training tips.

Details

Information & Computer Security, vol. 32 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 March 2020

R.I. Ferguson, Karen Renaud, Sara Wilford and Alastair Irons

Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics…

2361

Abstract

Purpose

Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction.

Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization's right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain.

This paper argues the need for a practical, ethically grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organizations, as well as acknowledging the needs of law enforcement. The paper derives a set of ethical guidelines, and then maps these onto a forensics investigation framework. The framework to expert review in two stages is subjected, refining the framework after each stage. The paper concludes by proposing the refined ethically grounded digital forensics investigation framework. The treatise is primarily UK based, but the concepts presented here have international relevance and applicability.

Design/methodology/approach

In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals' rights to privacy and organizations' rights to control intellectual capital disclosure.

Findings

The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically informed approach to digital forensics investigations, as a remedy, is highlighted and a framework proposed to provide this.

Research limitations/implications

The proposed ethically informed framework for guiding digital forensics investigations suggests a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.

Originality/value

Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

Open Access
Article
Publication date: 16 July 2021

Karen Renaud and Jacques Ophoff

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller…

6603

Abstract

Purpose

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller businesses lack sufficient situational awareness to make informed decisions in this space, or because they lack the resources to implement security controls and precautions.

Design/methodology/approach

In this paper, Endsley’s theory of situation awareness was extended to propose a model of SMEs’ cyber situational awareness, and the extent to which this awareness triggers the implementation of cyber security measures. Empirical data were collected through an online survey of 361 UK-based SMEs; subsequently, the authors used partial least squares modeling to validate the model.

Findings

The results show that heightened situational awareness, as well as resource availability, significantly affects SMEs’ implementation of cyber precautions and controls.

Research limitations/implications

While resource limitations are undoubtedly a problem for SMEs, their lack of cyber situational awareness seems to be the area requiring most attention.

Practical implications

The findings of this study are reported and recommendations were made that can help to improve situational awareness, which will have the effect of encouraging the implementation of cyber security measures.

Originality/value

This is the first study to apply the situational awareness theory to understand why SMEs do not implement cyber security best practice measures.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 15 March 2022

Lanna-Gaye Kamara Franklyn-Green, Natola Meredith and Ibrahim Ajagunna

The aim of the paper is to examine the impacts of the coronavirus disease-2019 (COVID-19) pandemic on the Caribbean cruise industry and assess the post-pandemic prospects for…

258

Abstract

Purpose

The aim of the paper is to examine the impacts of the coronavirus disease-2019 (COVID-19) pandemic on the Caribbean cruise industry and assess the post-pandemic prospects for recovery.

Design/methodology/approach

The study used a qualitative approach applied through personal interviews as well as data from secondary sources.

Findings

The prospects for the post-pandemic cruise industry reveal the need for long-term plans and strategies from Caribbean countries if the countries are to remain viable.

Research limitations/implications

The research was limited to Jamaica, St. Lucia and Antigua and Barbuda. The scope could have been broadened to include other Caribbean islands such as Barbados.

Practical implications

The study is practical and useful to tourism practitioners and governments seeking to create a balance between reaping the benefits of cruise tourism and safeguarding its citizens.

Social implications

The pandemic has caused a re-examination of how people interact.

Originality/value

The study adds to the body of literature on the post-pandemic survival of the Caribbean cruise industry and provides a useful briefing for practitioners.

Details

Worldwide Hospitality and Tourism Themes, vol. 14 no. 2
Type: Research Article
ISSN: 1755-4217

Keywords

Content available
Book part
Publication date: 16 August 2021

Abstract

Details

Intercultural Management in Practice
Type: Book
ISBN: 978-1-83982-827-0

1 – 10 of 69