Search results

1 – 10 of over 4000
Article
Publication date: 19 October 2021

Arūnas Gudinavičius and Vincas Grigas

The current study aims to identify and explore causes and consequences of unauthorized use of books from readers', publishers', and authors' points of view. The case of Lithuania…

Abstract

Purpose

The current study aims to identify and explore causes and consequences of unauthorized use of books from readers', publishers', and authors' points of view. The case of Lithuania also assessed, especially historical background (banned alphabet, book smuggling, theft as the social norm in Soviet times) of the country.

Design/methodology/approach

Aiming for more understanding why readers, authors and publishers are using or not using technology for unauthorized access of books, technology acceptance model approach was used, a total of 30 respondents (publishers, authors and readers) were interviewed in semi-structured face-to-face interviews and thematic analysis of collected qualitative data was conducted. Interviews were coded in English with coding software for further analysis.

Findings

Findings indicate that the main cause for the unauthorized use of books is a lack of legal e-book titles and acquisition options. This mainly points at publishers, however, instead of using unauthorized sources as opportunities for author promotion or marketing, they rather concentrate on the causes of unauthorized use of books which they are not in control of, including access to unauthorized sources, habits and economic causes. Some publishers believe that the lack of legal e-book titles is the consequence of unauthorized use of book rather than its cause.

Originality/value

This research contributed to the body of knowledge by investigating unauthorized use of books from readers', publishers' and authors' points of view which renders to have a better understanding of the causes and consequences of such behavior, as well as differences between these roles. The authors suggest that these causes lead to the intention to use and actual use of technology which is easier to use and which gives more perceived advantages – technology for unauthorized downloading and reading of books vs legal e-book acquisition options.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2021-0133.

Details

Online Information Review, vol. 46 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 12 August 2022

Meenakshi Handa, Parul Ahuja and Swati Jain

Along with their immense benefit, online channels of communication and information-sharing also present a myriad set of challenges. The unauthorized downloading and sharing of…

Abstract

Purpose

Along with their immense benefit, online channels of communication and information-sharing also present a myriad set of challenges. The unauthorized downloading and sharing of copyrighted content such as music and movies is one such issue. This study aims to examine the factors related to the unauthorized downloading of content amongst young internet users in an emerging market.

Design/methodology/approach

An online structured questionnaire was used to collect primary data from 219 internet users between 17 and 24 years of age. The partial least squares structural equation modelling was used to analyse the primary data.

Findings

The study findings report that monetary savings and social influence are the main drivers underlying the propensity to engage in unauthorized downloading amongst young adults. Perceptions of harm caused to artists and producers appear to be a deterrent. Though the respondents perceive the quality of content downloaded from unauthorized sites to be less than desirable, and there is also a higher perceived threat from viruses, this does not appear to deter unauthorized downloading behaviour amongst this segment of consumers.

Research limitations/implications

Combating unauthorized downloading and other forms of questionable online behaviours is a challenge for multiple stakeholders. Consumption of unauthorized digital content is examined in the context of online consumers whose demographic profile is often associated with this category of questionable behaviour. The study adds to the extant understanding of the aetiology of what are often considered online unethical and illegal behaviours and makes both practical and theoretical contributions to the subject field.

Originality/value

The study examines an important aspect of rapidly evolving internet technologies. The internet provides a veil to individuals engaging in unethical online activities. Despite the existence of laws declaring these activities to be illegal, instances of copyright violations of music and movies abound. The insights regarding the drivers and deterrents of a form of online unauthorized activity are used to present a set of strategies aimed at addressing such behaviours.

Details

Journal of Information, Communication and Ethics in Society, vol. 20 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 February 1996

Stanley Lai

The withdrawal of charges against a reporter of the Independent, following the failed prosecution of a British Telecom employee illustrates the limitations of the carefully…

Abstract

The withdrawal of charges against a reporter of the Independent, following the failed prosecution of a British Telecom employee illustrates the limitations of the carefully defined offence of ‘unauthorised access’, as provided by s. 1 of the Computer Misuse Act 1990 (the 1990 Act). It remains an oddity that the 1990 Act does little to regulate ‘unauthorised use’, as opposed to ‘unauthorised access’.

Details

Journal of Financial Crime, vol. 3 no. 4
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 1 June 2008

Talal H. Hayale and Husam A. Abu Khadra

The objective of this study is to investigate perceived security threats of Computerized Accounting Information Systems (CAIS) that face Jordanian domestic banks. An empirical…

Abstract

The objective of this study is to investigate perceived security threats of Computerized Accounting Information Systems (CAIS) that face Jordanian domestic banks. An empirical survey using self‐administrated questionnaire has been carried out to achieve the above‐mentioned objective. The study results reveal that accidental entry of “bad” data by employees, accidental destruction of data by employees; intentional entry of “bad” data by employees and employees’ sharing passwords are the top four security threats that face domestic banks. The paper concludes that most security threats that face domestic banks are internally generated and unintentional.

Details

Journal of Economic and Administrative Sciences, vol. 24 no. 1
Type: Research Article
ISSN: 1026-4116

Keywords

Book part
Publication date: 16 August 2010

Anne L. Christensen, Jane Cote and Claire K. Latham

Universities are expected to prepare accounting students to conduct themselves with integrity in all environments, including those that utilize information technology (IT). Our…

Abstract

Universities are expected to prepare accounting students to conduct themselves with integrity in all environments, including those that utilize information technology (IT). Our study investigates student integrity in an online environment to determine if students are honest about accessing unauthorized Internet solutions. We then evaluate student responsiveness to interventions designed to discourage unauthorized access using techniques suggested by the literature to foster ethical behavior. Our examination of such factors as moral development, moral identity, age, gender, and grade point average finds no significant relationship with student ethical behavior. More problematic, classroom interventions proved ineffective in preventing students from accessing unauthorized online solutions. We conclude with suggestions for developing and encouraging ethical behavior among accounting students in IT learning environments.

Details

Advances in Accounting Education
Type: Book
ISBN: 978-0-85724-292-1

Article
Publication date: 1 May 1995

Matthew K. O. Lee

One of the main aims of information systems security (ISS) is toprevent unauthorized access to and tampering with information systemsresources. In April 1993 the first ever…

1636

Abstract

One of the main aims of information systems security (ISS) is to prevent unauthorized access to and tampering with information systems resources. In April 1993 the first ever computer crime legislation came into existence in Hong Kong. Issues relating to computer fraud, hacking, and other types of threats to ISS are addressed by the legislation. As a legislative tool used in the control of computer crime, the Hong Kong experience is worth examining because it is the first major effort of this kind in the important and fast growing Far East region. In critically examining this legislation and its implications on ISS management, contributes towards a better understanding of the regulatory control of computer crime and its policy implications. Makes comparisons with countries which have a longer history of computer crime control.

Details

Information Management & Computer Security, vol. 3 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 13 April 2010

Riaan J. Rudman

The purpose of this paper is to identify and investigate the security issues an organisation operating in the “new” online environment is exposed to through Web 2.0 applications…

3279

Abstract

Purpose

The purpose of this paper is to identify and investigate the security issues an organisation operating in the “new” online environment is exposed to through Web 2.0 applications, with specific focus on unauthorised access (encompassing hackers). The study aims to recommend possible safeguards to mitigate these incremental risks to an acceptable level.

Design/methodology/approach

An extensive literature review was performed to obtain an understanding of the technologies driving Web 2.0 applications. Thereafter, the technologies were mapped against Control Objectives for Information and Related Technology (CobiT) and Trust Service Principles and Criteria and associated control objectives relating to security risks, specifically to hacker risks. These objectives were used to identify relevant risks and formulate appropriate internal control measures.

Findings

The findings show that every organisation, technology and application is unique and the safeguards depend on the nature of the organisation, information at stake, degree of vulnerability and risks. A comprehensive security program, including a multi‐layer technological, as well as an administrative component, should be implemented. User training on acceptable practices should also be conducted.

Originality/value

Obtaining an understanding of Web 2.0 and Web 2.0 security is important, as Web 2.0 is a new, poorly understood technology and with the growing mobility of users, the potential surface area of attack increases and should be managed. The paper will help organisations, information repository managers, information technology (IT) professionals, librarians and internal and external auditors to understand the “new” risks relating to unauthorised access, which previously did not exist in an on‐line environment, and will assist the development of a framework to limit the most significant risks.

Details

The Electronic Library, vol. 28 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 March 1995

Richard Cardinali

The thrust of management information system (MIS) operations is tokeep an information system running smoothly and to ensure services aredelivered in an uninterrupted, reliable and…

1383

Abstract

The thrust of management information system (MIS) operations is to keep an information system running smoothly and to ensure services are delivered in an uninterrupted, reliable and secure fashion. This poses a special challenge in today′s environment of computer misuses. Focuses on four main areas normally addressed when protecting a company′s most vital asset – its database. These are: information system vulnerability; computer crime; employee access; and personnel policies. Examines research pertaining to safeguarding data, software and hardware from deliberate computer‐based information security breaches.

Details

Information Management & Computer Security, vol. 3 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 29 March 2021

Ramaraj Palanisamy and Yang Wu

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for…

501

Abstract

Purpose

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility?

Design/methodology/approach

These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables.

Findings

The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues.

Research limitations/implications

The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems.

Practical implications

The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES.

Social implications

Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES.

Originality/value

This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 March 1997

B. Shrinath

Information is power — so it has been said — and nowhere has this statement been realised more significantly than in the banking industry. IT and banking in the 1990s and going…

Abstract

Information is power — so it has been said — and nowhere has this statement been realised more significantly than in the banking industry. IT and banking in the 1990s and going forward to the next millennium are tightly bonded. It is now more difficult to determine whether business drives technology or the other way round. Given this scenario, one of the most important facets of managing IT in a bank is that of information security.

Details

Journal of Financial Crime, vol. 5 no. 1
Type: Research Article
ISSN: 1359-0790

1 – 10 of over 4000