Search results

1 – 10 of over 73000
Article
Publication date: 2 June 2023

N’guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka and Youki Kadobayashi

Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studies…

Abstract

Purpose

Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studies focus on smart-home users. This paper aims to fill this gap by investigating the potential interests of adult smart-home users in cybersecurity awareness training and nonfinancial rewards that may encourage them to adopt sound cybersecurity practices.

Design/methodology/approach

A total of 423 smart-home users between the ages of 25 and 64 completed a survey questionnaire for this study, with 224 participants from Japan and 199 from the UK.

Findings

Cultural factors considerably influence adult smart-home users’ attitudes toward cybersecurity. Specifically, cultural differences impact their willingness to participate in cybersecurity awareness training, their views on the importance of cybersecurity training for children and senior citizens and their preference for nonfinancial rewards as an incentive for good cybersecurity behavior. These results highlight the need to consider cultural differences and their potential impact when developing and implementing cybersecurity programs that target smart-home users.

Practical implications

This research has two main implications. First, it provides insights for information security professionals on the importance of designing cost-effective and time-efficient cybersecurity awareness training programs for smart-home users. Second, the findings may assist governments in establishing nonfinancial incentives to encourage greater uptake of cybersecurity practices among smart-home users.

Originality/value

The paper investigates whether adult smart-home users are willing to spend time and money to engage in cybersecurity awareness training and to encourage their children and elderly parents to participate in training, as well. In addition, the paper examines incentives, especially nonfinancial rewards, that may motivate adult smart-home users to adopt cybersecurity behaviors at home. Furthermore, the paper analyses demographic differences among smart-home users in Japan and the UK.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 August 2019

Raja Sreedharan V., Vijaya Sunder M., Vandana Madhavan and Anand Gurumurthy

Nowadays, firms are keen on improving the quality culture in the organizations. The proven success of Lean and Six Sigma has given rise to the synergetic Lean Six Sigma (LSS…

Abstract

Purpose

Nowadays, firms are keen on improving the quality culture in the organizations. The proven success of Lean and Six Sigma has given rise to the synergetic Lean Six Sigma (LSS) approach that has been catching fire in the past one decade. However, there exists a gap between the understanding and implementation of LSS in the organizations, especially in the emerging economies. Taking this as a valuable opportunity, the purpose of this paper is to present a development of LSS training module.

Design/methodology/approach

This study starts with a literature review of LSS to reinforce the understanding of the research subject in scope of manufacturing sector. Then, an online questionnaire was designed and used to collect responses from 181 companies located in the Indian sub-continent. Subsequently, the results obtained from the survey were analyzed using COARSE approach.

Findings

This study reveals two key findings and associated contributions. First, it was found that the overall awareness of LSS within the responded manufacturing firms is about 70.4 percent. Second, there is no single standard training module that exists in any of the sampled firms to cater to their quality programs. Hence, in order to improve the LSS awareness which could subsequently help managers as a resource for creating an efficient workplace, this paper presents a structured LSS training framework.

Research limitations/implications

Although this paper presents the importance of LSS and associated awareness level among the responded firms, more empirical evidence is required to generalize the model findings. Second, this study is scoped to firms that work out of the Indian sub-continent, and this provides a future opportunity to expand the scope of this research toward a global study for a comparison between emerging and developed economies. Third, this study is limited to manufacturing firms and hence paves an opportunity to research on a similar theme in services context as well.

Practical implications

Before embarking on an LSS journey, an organization can use the LSS training module proposed in this study to assess the employee awareness on LSS. Furthermore, organizations that already have a mature LSS practice can incorporate the LSS training module for periodic evaluation of the employees for effective change management.

Originality/value

The training module presented in this paper is the original contribution by the authors. This is no association to any single identifiable organization or associated funding. The direct practical implication of its application in real time is the value that managers could derive from the proposed LSS training framework.

Details

International Journal of Quality & Reliability Management, vol. 37 no. 5
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 21 June 2021

Laila Dahabiyeh

As insiders remain to be a main reason behind security breaches, effective information security awareness campaigns become critical in protecting organizations from security…

Abstract

Purpose

As insiders remain to be a main reason behind security breaches, effective information security awareness campaigns become critical in protecting organizations from security incidents. The purpose of this paper is to identify factors that influence organizational adoption and acceptance of computer-based security awareness training tools.

Design/methodology/approach

The paper uses content analysis of online reviews of the top ten computer-based security awareness training tools that received Gartner peer insights Customers’ Choice 2019 award.

Findings

This study identifies nine critical adoption and success factors. These are synthesized into a conceptual framework based on the technology–organization–environment framework. The findings reveal that technological, organizational and environmental factors come into play in adoption decisions but with varying degrees of importance.

Practical implications

This study highlights key factors that technology vendors should take into consideration when designing computer-based security awareness training tools to increase adoption rates.

Originality/value

This research offers a novel contribution to the literature on information security awareness delivery methods by identifying key factors that influence organizational adoption and acceptance of computer-based security awareness training tools. Those factors were identified using content analysis of online reviews, which is a new methodological approach to the information security awareness literature.

Details

Information & Computer Security, vol. 29 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 July 2015

Ruth Østgaard Skotnes

This paper aims to follow-up on previous research by studying the degree of management commitment to information and communication technology (ICT) safety and security within…

1199

Abstract

Purpose

This paper aims to follow-up on previous research by studying the degree of management commitment to information and communication technology (ICT) safety and security within network companies in the electric power supply sector, implementation of awareness creation and training measures for ICT safety and security within these companies and the relationship between these two variables.

Design/methodology/approach

Data were mainly collected through a survey among users of ICT systems in network companies within the Norwegian electric power supply sector. In addition, qualitative data were gathered through interviews with representatives from the regulatory authorities, and observation studies were conducted at ICT safety and security conferences.

Findings

In accordance with previous research, our survey data showed a statistically significant correlation between management commitment to ICT safety and security and implementation of awareness creation and training measures. The majority of survey respondents viewed the degree of management commitment to ICT safety and security within their own organization as high, even though qualitative studies showed contradictory results. The network companies had implemented awareness creation and training measures to a varying degree. However, interactive awareness measures were used to a lesser extent than formal one-way communication methods.

Originality/value

The paper provides insight into management commitment to and implementation of awareness creation and training measures for ICT safety and security within network companies.

Details

Information & Computer Security, vol. 23 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 March 2014

Eyong B. Kim

The purpose of this paper is to survey the status of information security awareness among college students in order to develop effective information security awareness training

4279

Abstract

Purpose

The purpose of this paper is to survey the status of information security awareness among college students in order to develop effective information security awareness training (ISAT).

Design/methodology/approach

Based on a review of the literature and theoretical standpoints as well as the National Institute of Standards and Technology Special Publication 800-50 report, the author developed a questionnaire to investigate the attitudes toward information security awareness of undergraduate and graduate students in a business college at a mid-sized university in New England. Based on that survey and the previous literature, suggestions for more effective ISAT are provided.

Findings

College students understand the importance and the need for ISAT but many of them do not participate in it. However, security topics that are not commonly covered by any installed (or built-in) programs or web sites have a significant relationship with information security awareness. It seems that students learned security concepts piecemeal from variety of sources.

Practical implications

Universities can assess their ISAT for students based on the findings of this study.

Originality/value

If any universities want to improve their current ISAT, or establish it, the findings of this study offer some guidelines.

Details

Information Management & Computer Security, vol. 22 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 2 February 2022

Tsz-Wai Lui and Lakshmi Goel

Training is one of the key dimensions of internal marketing. Virtual reality (VR), a computer technology that replicates an environment (real or imagined) and simulates a user’s…

1041

Abstract

Purpose

Training is one of the key dimensions of internal marketing. Virtual reality (VR), a computer technology that replicates an environment (real or imagined) and simulates a user’s physical presence in that environment to allow for user interaction, offers unique opportunities from a training perspective, such as allowing users to improve their skills without the consequence of failing real customers or the need to be in the real environment physically. This study aims to focus on comparing the effectiveness of VR hospitality training with that of real-world hospitality training.

Design/methodology/approach

This study adopts situated cognition theory to empirically test the effect of the awareness of contextual variables (social interaction, location and task) on learning and compare learning outcomes between tourism training in VR and real-world experimental settings.

Findings

Results indicate that location and task awareness enhance cognitive absorption, but social awareness does not influence cognitive absorption. There is no significant difference between training in real-world and VR environments. Finally, cognitive absorption has a positive effect on mental model change (the learning outcome).

Originality/value

This result advances the theoretical understanding on the significance of learning context by applying situated cognition theory in hospitality training and has significant implications for training that aims for rigor and efficiency within cost, location and time constraints.

研究目的

培训是内部营销的关键维度之一。 虚拟现实 (VR), 一种复制某种环境(真实的或想象的)并模拟在该环境中实质性存在的用户的计算机技术并且允许用户交互, 从培训的角度来看提供独特的机会, 例如允许用户在没有培训的情况下提高他们的技能避免承担损失真实客户的后果或需要实际身处真实环境中。 本研究的重点是比较 VR 酒店培训与现实世界的招待培训的效果。

研究设计/方法/途径

本研究采用情境认知理论对情境变量(社交互动、位置和任务)的认识对学习和比较 VR 和现实世界实验环境中的旅游培训之间的学习成果进行实证检验。

研究发现

结果表明, 位置和任务意识增强了认知吸收, 但社会意识不影响认知吸收。 在现实世界和 VR 环境中的训练之间没有显着差异。 最后, 认知吸收对心理模式改变(学习结果)有显著积极作用。

研究原创性/价值

该结果通过在酒店培训中应用情境认知理论促进了对学习情境重要性的理论理解, 并对旨在成本、地点和时间限制内实现严谨和高效的培训具有重要意义。

Article
Publication date: 10 October 2008

Charlie C. Chen, B. Dawn Medlin and R.S. Shaw

The aim of this research is to make users aware of the importance surrounding the issue of security and security awareness while at the same time making educators as well as other…

2721

Abstract

Purpose

The aim of this research is to make users aware of the importance surrounding the issue of security and security awareness while at the same time making educators as well as other individuals aware of the differing effects of cultural dimensions into the learning process.

Design/methodology/approach

An inter‐cultural study was conducted to investigate if users from the USA and Taiwan exposed to the same situational awareness learning would have different performance in those security awareness outcomes.

Findings

The findings confirm that American users who received the situational learning outperformed those users who received the traditional face‐to‐face instruction. Taiwanese users did not perform significantly differently between these two treatments.

Research limitations/implications

The study was only focused on two countries and therefore may limit its implications worldwide. But the study does show that global citizens also react differently to security awareness as would be expected due to differing cultures. Certainly, awareness of the risks and safeguards is the first line of defense that can be employed by any individual, but how individuals address these risks can be very dissimilar in different cultures. Therefore, the implications are apparent that the issue of security awareness should be studied from different cultural perspectives.

Originality/value

This paper offers original findings and value into the investigation of whether or not situational security awareness training is culturally‐bounded.

Details

Information Management & Computer Security, vol. 16 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 13 November 2017

Harrison Stewart and Jan Jürjens

The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be…

6059

Abstract

Purpose

The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable asset.

Design/methodology/approach

Before developing the instrument for the survey, first, effective measurement built upon existing literature review was identified and developed and the survey questionnaires were set according to past studies and the findings based on qualitative analyses. Data were collected by using cross-sectional questionnaire and a Likert scale, whereby each question was related to an item as in the work of Witherspoon et al. (2013). Data analysis was done using the SPSS.3B.

Findings

Based on the results from three surveys and findings, a principle of information security compliance practices was proposed based on the authors’ proposed nine-five-circle (NFC) principle that enhances information security management by identifying human conduct and IT security-related issues regarding the aspect of information security management. Furthermore, the authors’ principle has enabled closing the gap between technology and humans in this study by proving that the factors in the present study’s finding are interrelated and work together, rather than on their own.

Research limitations/implications

The main objective of this study was to address the lack of research evidence on what mobilizes and influences information security management development and implementation. This objective has been fulfilled by surveying, collecting and analyzing data and by giving an account of the attributes that hinder information security management. Accordingly, a major practical contribution of the present research is the empirical data it provides that enable obtaining a bigger picture and precise information about the real issues that cause information security management shortcomings.

Practical implications

In this sense, despite the fact that this study has limitations concerning the development of a diagnostic tool, it is obviously the main procedure for the measurements of a framework to assess information security compliance policies in the organizations surveyed.

Social implications

The present study’s discoveries recommend in actuality that using flexible tools that can be scoped to meet individual organizational needs have positive effects on the implementation of information security management policies within an organization. Accordingly, the research proposes that organizations should forsake the oversimplified generalized guidelines that neglect the verification of the difference in information security requirements in various organizations. Instead, they should focus on the issue of how to sustain and enhance their organization’s compliance through a dynamic compliance process that involves awareness of the compliance regulation, controlling integration and closing gaps.

Originality/value

The rapid growth of information technology (IT) has created numerous business opportunities. At the same time, this growth has increased information security risk. IT security risk is an important issue in industrial sectors, and in organizations that are innovating owing to globalization or changes in organizational culture. Previously, technology-associated risk assessments focused on various technology factors, but as of the early twenty-first century, the most important issue identified in technology risk studies is the human factor.

Details

Information & Computer Security, vol. 25 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 March 2018

Gary Lamph, Mark Sampson, Debra Smith, Gary Williamson and Mark Guyers

Personality disorder is reported to elicit strong emotional responses and negative attitudes in mental health staff (Bodner et al., 2015). The purpose of this paper is to provide…

Abstract

Purpose

Personality disorder is reported to elicit strong emotional responses and negative attitudes in mental health staff (Bodner et al., 2015). The purpose of this paper is to provide an overview of the design and development of a co-produced e-learning training package for personality disorder awareness and an evaluation of its effectiveness. This study was carried out to explore if e-learning is an effective mode of training delivery for raising personality disorder awareness.

Design/methodology/approach

The e-learning was uniquely developed by subject matter experts working in co-production with people with lived experience. Self-reported measures were completed at three separate intervals to evaluate the effectiveness of the training: at pre-, post- and three-month follow up. Quantitative data were collected via these questionnaires.

Findings

The results from this evaluation show that e-learning is an effective mode of delivery for raising the awareness of personality disorder among mental health professionals, achieving similar outcomes to those reported following face-to-ace training.

Research limitations/implications

Attrition at follow-up phase was high which was consistent with other similar studies. The evaluation was led by the lead contributors and in the geographical area of its development. The study was relatively small and the participants were self-selected, therefore findings should be treated with caution.

Practical implications

E-learning can provide flexible training to compliment and act as an alternative to face-to-face personality disorder training. E-learning may provide an alternative refresher course to knowledge and understanding framework or other face-to-face methods. Co-produced training can be mirrored within an e-learning programme, careful planning to ensure the service user voice is heard and that their lived experience is embraced is required.

Originality/value

This is the first evaluation of a co-produced e-learning only personality disorder awareness training. It is also the first paper to carry out a review of the published evaluations of personality awareness training in the UK with comparisons explored across the studies.

Details

The Journal of Mental Health Training, Education and Practice, vol. 13 no. 2
Type: Research Article
ISSN: 1755-6228

Keywords

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

1 – 10 of over 73000