Search results

21 – 30 of over 100000
Article
Publication date: 1 March 2006

Czesław Mesjasz

To present which properties of social systems can be used in studying and determining their broadly defined security. A core concept of security is to be developed into a typology…

1263

Abstract

Purpose

To present which properties of social systems can be used in studying and determining their broadly defined security. A core concept of security is to be developed into a typology of attributes of security of social systems.

Design/methodology/approach

The interpretation of security has become one of the most important challenges of theory of international relations and of related areas. Unfortunately, theory only follows the processes and provides descriptions and interpretations. Explanations are rare or superficial. Predictions or normative approaches, essential for security considerations, are mainly embedded either in ideological discourse or in common sense conclusions. A broadly defined systems thinking is applied as an instrument allowing for enhancement of methodology of security research in dealing with complex social phenomena.

Findings

It may not be expected that systems thinking could provide all the answers to the questions arising in security theory and policy. At the same time, it can be shown how strongly the discourse on a broadly defined security, not only in international relations, has been influenced by systems thinking.

Research limitations/implications

It is but an introductory survey study and includes omissions and simplifications that have to be explained in detail in further studies.

Practical implications

An introduction to the further research on the links between systems thinking and discourse on broadly defined security of individuals and social systems.

Originality/value

Allows systems specialists to avoid simplifications in understanding social systems and at the same time helps security specialists to avoid abuses and trivialization of systems thinking.

Details

Kybernetes, vol. 35 no. 3/4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 27 April 2012

Wu He

The purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations…

6608

Abstract

Purpose

The purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations address social media security risks more effectively.

Design/methodology/approach

This paper begins by reviewing the disparate discussions in literature on social media security risks and mitigation techniques. Based on an extensive review, some key insights were identified and summarized to help organizations more effectively address social media security risks.

Findings

Many organizations do not have effective social media security policy in place and are unsure of how to develop effective social media security strategies to mitigate social media security risks. This paper provides guidance to organizations to mitigate social media security risks that may threaten the organizations.

Originality/value

The paper consolidates the fragmented discussion in literature and provides an in‐depth review of social media security risks and mitigation techniques. Practical insights are identified and summarized from an extensive literature review. Sharing these insights has the potential to encourage more discussion on best practices for reducing the risks of social media to organizations.

Article
Publication date: 10 August 2018

Curtis C. Campbell

The purpose of this paper is to investigate the top three cybersecurity issues in organizations related to social engineering and aggregate solutions for counteracting human…

2458

Abstract

Purpose

The purpose of this paper is to investigate the top three cybersecurity issues in organizations related to social engineering and aggregate solutions for counteracting human deception in social engineering attacks.

Design/methodology/approach

A total of 20 experts within Information System Security Association participated in a three-round Delphi study for aggregating and condensing expert opinions. Three rounds moved participants toward consensus for solutions to counteract social engineering attacks in organizations.

Findings

Three significant issues: compromised data; ineffective practices; and lack of ongoing education produced three target areas for implementing best practices in countering social engineering attacks. The findings offer counteractions by including education, policies, processes and continuous training in security practices.

Research limitations/implications

Study limitations include lack of prior data on effective social engineering defense. Research implications stem from the psychology of human deception and trust with the ability to detect deception.

Practical implications

Practical implications relate to human judgment in complying with effective security policies and programs and consistent education and training. Future research may include exploring financial, operational and educational costs of implementing social engineering solutions.

Social implications

Social implications apply across all knowledge workers who benefit from technology and are trusted to protect organizational assets and intellectual property.

Originality/value

This study contributes to the field of cybersecurity with a focus on trust and human deception to investigate solutions to counter social engineering attacks. This paper adds to under-represented cybersecurity research regarding effective implementation for social engineering defense.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 25 November 2013

Wu He

As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of this paper…

4197

Abstract

Purpose

As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of this paper is to survey the state-of-the-art of security aspect of mobile social media, identify recent trends, and provide recommendations for researchers and practitioners in this fast moving field.

Design/methodology/approach

This paper reviews disparate discussions in literature on security aspect of mobile social media though blog mining and an extensive literature search. Based on the detailed review, the author summarizes some key insights to help enterprises understand security risks associated with mobile social media.

Findings

Risks related to mobile social media are identified based on the results of the review. Best practices and useful tips are offered to help enterprises mitigate risks of mobile social media. This paper also provides insights and guidance for enterprises to mitigate the security risks of mobile social media.

Originality/value

The paper consolidates the fragmented discussion in literature and provides an in-depth review to help researchers understand the latest development of security risks associated with mobile social media.

Details

Information Management & Computer Security, vol. 21 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 12 July 2019

Seyi Olalekan Olawuyi

Many nations in Sub-Saharan Africa, including Nigeria have initiated programmes targeted at addressing food insecurity, but without any major significant breakthrough. This…

Abstract

Purpose

Many nations in Sub-Saharan Africa, including Nigeria have initiated programmes targeted at addressing food insecurity, but without any major significant breakthrough. This necessitates the call for inclusion of social network institutional framework into the food and nutrition security policy of many developing countries. This is touted as an important social safety net needed for farming households’ economic advancement and welfare. Consequent on this, the purpose of this paper is to investigate the importance of social networks in building resilience against food insecurity among farmers in Oyo State, Nigeria.

Design/methodology/approach

Data collected from a sample of 297 smallholder farmers during 2015/2016 agricultural production season were analysed using descriptive statistics to describe farmers’ notable characteristics. However, Foster–Greer–Thorbecke indices vis-à-vis food consumption expenditure-metrics technique was used to evaluate the food security profile of the respondents. Similarly, ordinary least square and two-stage least square (2SLS) models were applied to investigate the effects and “reverse causality” in the social networks food security model.

Findings

The study findings indicated that about 48.15 per cent of the smallholder farmers are food insecure. Similarly, the study revealed that age (p<0.01), years of formal education (p<0.05), marital status (p<0.05), number of persons in the family (p<0.01), executive status in social groups (p<0.05), aggregate social networks (p<0.1) and non-food consumption expenditure (p<0.01) made significant contributions to food security status of farming households. Importantly, 2SLS estimation indicated non-existence of reverse causality effect of social networks components and households’ food security status.

Social implications

There is an urgent need for pragmatic policies that support systematic and organized social groups and networks formation in the rural/agrarian areas across Nigeria.

Originality/value

A widely accepted view of economic theory posits that traditional capitals (physical, economic/financial and human) drive households’ welfare including food security status. However, this study has established the relevance of social networks as an important component of human well-being. Apparently, this study also established the exogeneity of social networks in the framework of households’ food security status.

Details

International Journal of Social Economics, vol. 46 no. 7
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 11 December 2023

Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai and Quynh-Chi Le

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Abstract

Purpose

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Design/methodology/approach

Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.

Findings

The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.

Research limitations/implications

This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.

Practical implications

Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.

Originality/value

The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 January 1994

Madonna Harrington Meyer, Debra Street and Jill Quadagno

Welfare states are sets of rules and policies that redistribute resources across social classes and across generations. In nearly all western nations, social spending on the aged…

Abstract

Welfare states are sets of rules and policies that redistribute resources across social classes and across generations. In nearly all western nations, social spending on the aged has surpassed spending on all other age groups combined. In 1992 alone, spending in the U.S. on Social Security topped $250 billion and on Medicare $130 billion.

Details

International Journal of Sociology and Social Policy, vol. 14 no. 1/2
Type: Research Article
ISSN: 0144-333X

Article
Publication date: 9 June 2022

Lily Pharris and Begona Perez-Mira

The purpose of this transcendental phenomenological qualitative research study is to understand the essence of what it is like to be an information systems professional working in…

Abstract

Purpose

The purpose of this transcendental phenomenological qualitative research study is to understand the essence of what it is like to be an information systems professional working in the USA while managing and defending against social engineering attacks on an organization. The findings add to the information system (IS) body of literature by uncovering commonly shared attitudes, motivations, experiences and beliefs held by IS professionals who are responsible for protecting their company from social engineering attacks.

Design/methodology/approach

This is a qualitative, transcendental phenomenological study that was developed to gain a deeper understanding about the essence of what it is like to be an IS professional defending a US business against social engineering attacks. This research design is used when sharing the experiences of study participants is more important than presenting the interpretations of the researcher. To target participants from the industries identified as regularly targeted by social engineers, purposive sampling was used in conjunction with the snowball sampling technique to find additional participants until saturation was reached.

Findings

Ten themes emerged from the data analysis: (1) foster a security culture, (2) prevention means education, (3) layered security means better protection, (4) prepare, defend and move on, (5) wide-ranging responsibilities, (6) laying the pipes, (7) all hands on deck, (8) continuous improvement, (9) attacks will never be eliminated and (10) moving pieces makes it harder. The ten themes, together, reveal the essence of the shared experiences of the participants with the phenomenon.

Originality/value

Understanding how to defend an enterprise from social engineering attacks is an international issue with implications for businesses and IS professionals across the world. The findings revealed that to prevent social engineer attacks, all employees – IS and non-IS professionals alike – must be unified in their desire to protect the organization. This means IS professionals and organizational leadership must establish a strong security culture, not only through layered technology and electronic controls but also through open communication between all departments and continuously engaging, training and reinforcing social engineering education, policies, procedures and practices with all employees.

Details

Information & Computer Security, vol. 31 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 June 2015

Ghada Barsoum

The purpose of this paper is twofold: first, it seeks to voice the concerns of educated youth in Egypt as they describe their work options and preferences. Second, it seeks to…

1850

Abstract

Purpose

The purpose of this paper is twofold: first, it seeks to voice the concerns of educated youth in Egypt as they describe their work options and preferences. Second, it seeks to highlight the gravity of the policy gap in addressing work informality, drawing on some of the international experience in this field.

Design/methodology/approach

Qualitative research in the form of in-depth interviews, desk-review of policies, and descriptive statistical analysis of a recent national survey of labour in Egypt.

Findings

A large proportion of educated youth work within the realm of informality and there is a clear policy gap in addressing this issue. Contrary to what would be expected, young people value access to social security and work stability. They face systemic hurdles related to access to such benefits. Because of the legacy of guaranteed government hiring of the educated in Egypt, young people express a great appreciation of work in the government, for virtually being the only employer offering job stability and social security in the labour market.

Research limitations/implications

This paper addresses a gap in the literature on youth employment in Egypt, where there is a dearth of research focusing on the lived experience of employment precariousness. The majority of studies in this field relies on statistics with little qualitative research voicing the views of this group.

Practical implications

Reforms are more urgent than timely to extend social security and other measures of social protection to workers within the informal economy.

Originality/value

The paper builds on primary data and provides insights about the way educated youth perceive their working conditions and options. The paper also provides a discussion of the social security system in Egypt, its coverage, and possible reform approaches.

Details

International Journal of Sociology and Social Policy, vol. 35 no. 5/6
Type: Research Article
ISSN: 0144-333X

Keywords

Article
Publication date: 7 October 2013

Karin Hedström, Fredrik Karlsson and Ella Kolkowska

Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of…

1446

Abstract

Purpose

Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information security.

Design/methodology/approach

This research was carried out as a longitudinal case study at a Swedish hospital. Data were collected using a combination of interviews, information security documents, and observations. Data were analysed using a combination of a value-based compliance model and the taxonomy laid out in SAT to determine user rationality.

Findings

The paper argues that management of information security and design of countermeasures should be based on an understanding of users' rationale covering both intentional and unintentional non-compliance. The findings are presented in propositions with practical and theoretical implications: P1. Employees' non-compliance is predominantly based on means-end calculations and based on a practical rationality, P2. An information security investigation of employees' rationality should not be based on an a priori assumption about user intent, P3. Information security management and choice of countermeasures should be based on an understanding of the use rationale, and P4. Countermeasures should target intentional as well as unintentional non-compliance.

Originality/value

This work is an extension of Hedström et al. arguing for the importance of addressing user rationale for successful management of information security. The presented propositions can form a basis for information security management, making the objectives underlying the study presented in Hedström et al. more clear.

Details

Information Management & Computer Security, vol. 21 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

21 – 30 of over 100000