Search results

1 – 10 of 696
Open Access
Article
Publication date: 20 September 2021

Kavya Sharma, Xinhui Zhan, Fiona Fui-Hoon Nah, Keng Siau and Maggie X. Cheng

Phishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research…

4028

Abstract

Purpose

Phishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research focuses on two types of digital nudging, framing and priming, and examines the impact of framing and priming on users' behavior (i.e. action) in a cybersecurity setting. It draws on prospect theory, instance-based learning theory and dual-process theory to generate the research hypotheses.

Design/methodology/approach

A 3 × 2 experimental study was carried out to test the hypotheses. The experiment consisted of three levels for framing (i.e. no framing, negative framing and positive framing) and two levels for priming (i.e. with and without priming).

Findings

The findings suggest that priming users to information security risks reduces their risk-taking behavior, whereas positive and negative framing of information security messages regarding potential consequences of the available choices do not change users' behavior. The results also indicate that risk-averse cybersecurity behavior is associated with greater confidence with the action, greater perceived severity of cybersecurity risks, lower perceived susceptibility to cybersecurity risks resulting from the action and lower trust in the download link.

Originality/value

This research shows that digital nudging in the form of priming is an effective way to reduce users' exposure to cybersecurity risks.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 20 October 2022

Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa and Sarah Bankins

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…

Abstract

Purpose

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to confirm they will abide by an ICT Code of Conduct. Before commencing enrolment, university students sign ICT policies, however, individuals can ignore or act contrary to these policies. This study aims to evaluate whether students can apply ICT Codes of Conduct and explores viable approaches for ensuring that students understand how to act ethically and in accordance with such codes.

Design/methodology/approach

The authors designed a between-subjects experiment involving 260 students’ responses to five scenario-pairs that involve breach/non-breach of a university’s ICT policy following a priming intervention to heighten awareness of ICT policy or relevant ethical principles, with a control group receiving no priming.

Findings

This study found a significant difference in students’ responses to the breach versus non-breach cases, indicating their ability to apply the ICT Code of Conduct. Qualitative comments revealed the priming materials influenced their reasoning.

Research limitations/implications

The authors’ priming interventions were inadequate for improving breach recognition compared to the control group. More nuanced and targeted priming interventions are suggested for future studies.

Practical implications

Appropriate application of ICT Code of Conduct can be measured by collecting student/employee responses to breach/non-breach scenario pairs based on the Code and embedded with ethical principles.

Social implications

Shared awareness and protection of ICT resources.

Originality/value

Compliance with ICT Codes of Conduct by students is under-investigated. This study shows that code-based scenarios can measure understanding and suggest that targeted priming might offer a non-resource intensive training approach.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 1 December 2012

Gilles Doiron

Abstract

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 9 no. 2
Type: Research Article
ISSN: 2077-5504

Open Access
Article
Publication date: 6 May 2014

Rachel Spacey, Louise Cooke, Adrienne Muir and Claire Creaser

The purpose of this paper is to review current knowledge, research and thinking about the difficulties facing public libraries offering internet access to their users in ensuring…

8664

Abstract

Purpose

The purpose of this paper is to review current knowledge, research and thinking about the difficulties facing public libraries offering internet access to their users in ensuring legally compliant and non-offensive use of this facility whilst still adhering to the professional value of freedom of access to information.

Design/methodology/approach

A range of recently published sources (1997-2013) relating to the technical and organisational measures used to manage public internet access primarily in public libraries in the UK with some limited international examples were reviewed and analysed. This work was undertaken as the underpinning research for an AHRC-funded project, MAIPLE (Managing Access to the internet in Public Libraries).

Findings

The provision of public internet access is a well-established component of the role of public libraries, but is seen as a potential problem due to the possibility of misuse, and it appears that simplistic technical solutions have disappointed. Legislation increases the need for more effective solutions that can provide a balance between the need for legal compliance, a welcoming environment for users, and the protection of key freedoms. A range of measures are being adopted worldwide in response to this dilemma.

Originality/value

Research exploring internet access in public libraries and its management in the UK is numerically small and much of it dates back to the start of the twenty-first century. This review presents a comprehensive analysis of the available literature and is of relevance to practitioners and academics in the fields of public librarianship.

Details

Journal of Documentation, vol. 70 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 4 March 2021

Najat AlSaied and Fokiya Akhtar

A variety of alternate technology-enhanced teaching approaches are now available to university students to broaden their learning experiences and complement conventional…

2025

Abstract

Purpose

A variety of alternate technology-enhanced teaching approaches are now available to university students to broaden their learning experiences and complement conventional face-to-face teaching. This paper aims to outline a study conducted at an English Medium Instruction (EMI) University in the Arabian Gulf where students were studying media. The study explored an innovative teaching approach that sought to enhance the students’ interaction with mobile phone applications as part of their learning experiences during the course.

Design/methodology/approach

The focus of the study was on enhancing the students’ English writing skills such as vocabulary, spelling and grammar and on improving their technical skills such as in video production. The study collected both quantitative and qualitative data.

Findings

The results indicated that mobile phone applications were helpful in improving students’ journalistic writing skills where they had a good level of proficiency in English, more so than students with poor English who are more dependent on traditional learning methods. Students also benefitted from mobile phone video production workshops that were intensive and creative. Based on the results of this study, it is recommended that courses and labs in media courses have skilled technicians that can train students in creative mobile phone video production while faculty members need to be trained and proactively encouraged to use mobile phones for teaching and learning purposes.

Originality/value

wBased on the results of this study, it is recommended that courses and labs in media courses have skilled technicians that can train students in creative mobile phone video production while faculty members need to be trained and proactively encouraged to use mobile phones for teaching and learning purposes.

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 17 no. 1
Type: Research Article
ISSN: 2077-5504

Keywords

Open Access
Article
Publication date: 4 August 2021

Jonathan Menary, Stacia Stetkiewicz, Abhishek Nair, Petra Jorasch, Amrit K. Nanda, Adrien Guichaoua, Mariana Rufino, Arnout R.H. Fischer and Jessica A.C. Davies

Restrictions on social interaction and travel due to the COVID-19 pandemic have affected how researchers approach fieldwork and data collection. Whilst online focus groups have…

Abstract

Restrictions on social interaction and travel due to the COVID-19 pandemic have affected how researchers approach fieldwork and data collection. Whilst online focus groups have received attention since the 2000s as a method for qualitative data collection, relatively little of the relevant literature appears to have made use of now ubiquitous video calling software and synchronous, interactive discussion tools. Our own experiences in organising fieldwork aimed at understanding the impact of different “future-proofing” strategies for the European agri-food system during this period resulted in several methodological changes being made at short notice. We present an approach to converting in-person focus group to a virtual methodology and provide a checklist for researchers planning their own online focus groups. Our findings suggest data are comparable to in-person focus groups and factors influencing data quality during online focus groups can be safeguarded. There are several key steps, both before and during the focus groups, which can be taken to ensure the smooth running of such events. We share our reflections on this approach and provide a resource for other researchers moving to online-only data collection.

Open Access
Article
Publication date: 1 July 2021

Xiaochun Guan, Sheng Lou, Han Li and Tinglong Tang

Deployment of deep neural networks on embedded devices is becoming increasingly popular because it can reduce latency and energy consumption for data communication. This paper…

2675

Abstract

Purpose

Deployment of deep neural networks on embedded devices is becoming increasingly popular because it can reduce latency and energy consumption for data communication. This paper aims to give out a method for deployment the deep neural networks on a quad-rotor aircraft for further expanding its application scope.

Design/methodology/approach

In this paper, a design scheme is proposed to implement the flight mission of the quad-rotor aircraft based on multi-sensor fusion. It integrates attitude acquisition module, global positioning system position acquisition module, optical flow sensor, ultrasonic sensor and Bluetooth communication module, etc. A 32-bit microcontroller is adopted as the main controller for the quad-rotor aircraft. To make the quad-rotor aircraft be more intelligent, the study also proposes a method to deploy the pre-trained deep neural networks model on the microcontroller based on the software packages of the RT-Thread internet of things operating system.

Findings

This design provides a simple and efficient design scheme to further integrate artificial intelligence (AI) algorithm for the control system design of quad-rotor aircraft.

Originality/value

This method provides an application example and a design reference for the implementation of AI algorithms on unmanned aerial vehicle or terminal robots.

Details

Industrial Robot: the international journal of robotics research and application, vol. 48 no. 5
Type: Research Article
ISSN: 0143-991X

Keywords

Open Access
Article
Publication date: 3 May 2016

Victoria Gosling, Garry Crawford, Gaynor Bagnall and Ben Light

The purpose of this paper is to consider the key findings of a yearlong collaborative research project focusing on the London Symphony Orchestra’s development, implementation and…

3325

Abstract

Purpose

The purpose of this paper is to consider the key findings of a yearlong collaborative research project focusing on the London Symphony Orchestra’s development, implementation and testing of a branded smartphone app. This app was designed to primarily sell discounted tickets, engage and inform a student audience.

Design/methodology/approach

A mixed-method approach including an analysis of the technology, focus groups and interviews was used.

Findings

Though the aims of app developers and marketers are often to provide customers with more choice and interactivity, this research suggests that though the app proved a useful mechanism for selling discounted tickets, it indicates that existing customers were mostly enroled and mobilised via a limited and focused functionality for the app.

Originality/value

This paper is significant as mobile phone use remains comparatively under-researched, in particular there is still a relatively small literature on the growing phenomena of apps, and even less on their use in brand marketing. Also importantly, though this paper offers a consideration of one case, the app has since been expanded to include the ticketing for ten major orchestras in London, and moreover, many of the lessons learnt from this study will be of relevance to other arts organisations.

Details

Arts and the Market, vol. 6 no. 1
Type: Research Article
ISSN: 2056-4945

Keywords

Open Access
Article
Publication date: 22 March 2024

Geming Zhang, Lin Yang and Wenxiang Jiang

The purpose of this study is to introduce the top-level design ideas and the overall architecture of earthquake early-warning system for high speed railways in China, which is…

Abstract

Purpose

The purpose of this study is to introduce the top-level design ideas and the overall architecture of earthquake early-warning system for high speed railways in China, which is based on P-wave earthquake early-warning and multiple ways of rapid treatment.

Design/methodology/approach

The paper describes the key technologies that are involved in the development of the system, such as P-wave identification and earthquake early-warning, multi-source seismic information fusion and earthquake emergency treatment technologies. The paper also presents the test results of the system, which show that it has complete functions and its major performance indicators meet the design requirements.

Findings

The study demonstrates that the high speed railways earthquake early-warning system serves as an important technical tool for high speed railways to cope with the threat of earthquake to the operation safety. The key technical indicators of the system have excellent performance: The first report time of the P-wave is less than three seconds. From the first arrival of P-wave to the beginning of train braking, the total delay of onboard emergency treatment is 3.63 seconds under 95% probability. The average total delay for power failures triggered by substations is 3.3 seconds.

Originality/value

The paper provides a valuable reference for the research and development of earthquake early-warning system for high speed railways in other countries and regions. It also contributes to the earthquake prevention and disaster reduction efforts.

Open Access
Article
Publication date: 4 August 2020

Mark Ryan

The media has even been very critical of some East Asian countries’ use of digital contact-tracing to control Covid-19. For example, South Korea has been criticised for its use of…

13143

Abstract

Purpose

The media has even been very critical of some East Asian countries’ use of digital contact-tracing to control Covid-19. For example, South Korea has been criticised for its use of privacy-infringing digital contact-tracing. However, whether their type of digital contact-tracing was unnecessarily harmful to the human rights of Korean citizens is open for debate. The purpose of this paper is to examine this criticism to see if Korea’s digital contact-tracing is ethically justifiable.

Design/methodology/approach

This paper will evaluate Korea’s digital contact-tracing through the lens of the four human rights principles to determine if their response is ethically justifiable. These four principles were originally outlined in the European Court of Human Rights, namely, necessary, proportional, scientifically valid and time-bounded (European Court of Human Rights 1950).

Findings

The paper will propose that while the use of Korea’s digital contact-tracing was scientifically valid and proportionate (albeit, in need for improvements), it meets the necessity requirement, but is too vague to meet the time-boundedness requirement.

Originality/value

The Covid-19 pandemic has proven to be one of the worst threats to human health and the global economy in the past century. There have been many different strategies to tackle the pandemic, from somewhat laissez-faire approaches, herd immunity, to strict draconian measures. Analysis of the approaches taken in the response to the pandemic is of high scientific value and this paper is one of the first to critically engage with one of these methods – digital contact-tracing in South Korea.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 696