Search results
1 – 8 of 8Nik Thompson, Atif Ahmad and Sean Maynard
It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far…
Abstract
Purpose
It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far from conclusive suggesting that strong and as-yet unmeasured influences on behaviour may exist. This paper aims to demonstrate one such link – the effect of internet addiction on information disclosure.
Design/methodology/approach
Data from 216 Web users was collected regarding their perceptions on privacy and information disclosure intentions as well as avoidance behaviour, an element of internet addiction. Using a research model based on the Privacy Calculus theory, structural equation modelling was applied to quantify the determinants of online disclosure under various conditions.
Findings
The authors show that not all aspects of privacy (a multi-dimensional construct) influence information disclosure. While concerns about data collection influence self-disclosure behaviour, the level of awareness about privacy does not. They next examine the impact of internet addiction on these relationships, finding that internet addiction weakens the influence of privacy concerns to the point of non-significance.
Originality/value
The authors highlight some of the influences of self-disclosure behaviour, showing that some but not all aspects of privacy are influential. They also demonstrate that there are powerful influences on user behaviour that have not been accounted for in prior work; internet addiction is one of these factors. This provides some of the first evidence of the potentially deleterious effect of internet addiction on the privacy calculus.
Details
Keywords
The purpose of this paper is to describe the development, design, delivery and evaluation of a postgraduate information security subject that focuses on a managerial, rather than…
Abstract
Purpose
The purpose of this paper is to describe the development, design, delivery and evaluation of a postgraduate information security subject that focuses on a managerial, rather than the more frequently reported technical perspective. The authors aimed to create an atmosphere of intellectual excitement and discovery so that students felt empowered by new ideas, tools and techniques and realized the potential value of what they were learning in the industry.
Design/methodology/approach
The paper develops fundamental principles and arguments that inform the design and development of the teaching curriculum. The curriculum is aimed at security management professionals in general and consultants in particular. The paper explains the teaching method in detail including the specific topics of lectures, representative reading material, assessment tasks and feedback mechanisms. Finally, lessons learned by the authors and their conclusions are presented as a form of reflection.
Findings
The instructors recognized four key factors that played a role in the atmosphere of intellectual excitement and motivation. These were new concepts and ideas, an increased level of engagement, opportunities for students to make their own discoveries and knowledge presented in a practical context. Maintaining a high quality of teaching resources, catering for diverse student needs and incorporating learning cycles of assessment in a short period of time were additional challenges.
Originality/value
Most “information security” curricula described in research literature take a technology-oriented perspective. This paper presents a much-needed management point of view. The teaching curriculum (including assessment tasks) and experiences will be useful to existing and future teaching and research academics in “information security management”. Those interested in developing their own teaching material will benefit from the discussion on potential topic areas, choice of assessment tasks and selection of recommended reading material.
Details
Keywords
This study aims to argue that in the case of quantitative security risk assessment, individuals do not estimate probabilities as a likelihood measure of event occurrence.
Abstract
Purpose
This study aims to argue that in the case of quantitative security risk assessment, individuals do not estimate probabilities as a likelihood measure of event occurrence.
Design/methodology/approach
The study uses the most commonly used quantitative assessment approach, the annualized loss expectancy (ALE), to support the three research hypotheses.
Findings
The estimated probabilities used in quantitative models are subjective.
Research limitations/implications
The ALE model used in security risk assessment, although it is presented in the literature as quantitative, is, in fact, qualitative being influenced by bias.
Practical implications
The study provides a factual basis showing that quantitative assessment is neither realistic nor practical to the real world.
Originality/value
A model that cannot be tested experimentally is not a scientific model. In fact, the probability used in ISRM is an empirical probability or estimator of a probability because it estimates probabilities from experience and observation.
Details
Keywords
The purpose of this paper is to examine the influence of institutional investors’ investment horizons (IIIH) on a wide variety of key corporate policies.
Abstract
Purpose
The purpose of this paper is to examine the influence of institutional investors’ investment horizons (IIIH) on a wide variety of key corporate policies.
Design/methodology/approach
The authors perform regression analysis to a panel data set of quarterly financial statement data for US firms over the 1981-2014 using several measures of IIIH.
Findings
The authors argue that an increase in the presence of long-term investors contributes to more effective monitoring and information quality. This results in a reduction in agency costs and informational asymmetry problems for firms that are more heavily influenced by long-term investors, which in turn influences the corporate policies they pursue. Consistent with these arguments, the evidence suggests that firms with a greater long-term institutional investor base maintain lower investment outlays, higher dividend payments, lower levels of cash and higher levels of leverage. All results hold after controlling for potential endogeneity issues.
Originality/value
The authors show that a greater presence of long-term institutional investors leads to higher dividends, lower investment outlays, lower cash holdings and higher leverage. The comprehensive nature of the predictions with respect to overall corporate finance policies and the supporting evidence provided represents an important contribution, as previous studies have tended to focus on one specific area of corporate behavior (i.e. such as cash holdings).
Details
Keywords
David Butler, Robert Butler, Justin Doran and Sean O’Connor
Growing evidence suggests regional economic factors impact on individual outcomes, such as life expectancy and well-being. The purpose of this paper is to investigate the impact…
Abstract
Purpose
Growing evidence suggests regional economic factors impact on individual outcomes, such as life expectancy and well-being. The purpose of this paper is to investigate the impact that player-specific and regional differences have on the number of senior international appearances football players accumulate over the course of their careers, for six UEFA member countries, from 1993 to 2014.
Design/methodology/approach
The research employs a Poisson regression model to analyse the impact of individual and regional factors on the number of senior international caps a footballer receives over the course of their career.
Findings
The results indicate that both individual and regional variables can explain the number of caps a player receives over the course of their career. The authors find that an individual’s career length positively influences the number of international caps accrued. Players born in wealthier and more populous regions accumulate a greater number of international appearances. Distance from the capital has no effect, however, the number of youth academies in the player’s region of birth has a significant positive effect.
Research limitations/implications
The analysis is limited to regional variations within economically developed states. It would be interesting to test whether the correlation between relative regional development and international success exists in less developed countries. The authors only address mens international football in this study and cannot comment on the generality of the findings across genders or sports.
Practical implications
The results can provide insights for local football authorities and policy makers concerned with regional characteristics and those interested in the development of elite talent.
Originality/value
This is the first study to analyse a pan-European data set, using an increasingly adopted econometric method to understanding regional economic development – Poisson modelling.
Details
Keywords
DURING some comments on the brain drain last month it was remarked that work study technologists stood on the periphery. Suddenly they have been moved right to the centre as the…
Abstract
DURING some comments on the brain drain last month it was remarked that work study technologists stood on the periphery. Suddenly they have been moved right to the centre as the result of a communication from Dr. Robert N. Lehrer. He is among the six American work study experts best known to the profession in this country, ranking with Barnes and Mundel as having contributed much to a right appreciation of the subject's value and its techniques.
The librarian and researcher have to be able to uncover specific articles in their areas of interest. This Bibliography is designed to help. Volume IV, like Volume III, contains…
Abstract
The librarian and researcher have to be able to uncover specific articles in their areas of interest. This Bibliography is designed to help. Volume IV, like Volume III, contains features to help the reader to retrieve relevant literature from MCB University Press' considerable output. Each entry within has been indexed according to author(s) and the Fifth Edition of the SCIMP/SCAMP Thesaurus. The latter thus provides a full subject index to facilitate rapid retrieval. Each article or book is assigned its own unique number and this is used in both the subject and author index. This Volume indexes 29 journals indicating the depth, coverage and expansion of MCB's portfolio.
Details
Keywords
Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony
Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…
Abstract
Purpose
Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.
Design/methodology/approach
This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.
Findings
This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.
Originality/value
The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.
Details