Search results
1 – 10 of over 2000Michelle Cayford, Wolter Pieters and P.H.A.J.M van Gelder
This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related…
Abstract
Purpose
This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related. Likewise, it looks at the relation between perceptions of effectiveness and opinions on the acceptable cost of surveillance technology.
Design/methodology/approach
For this study, surveys of Dutch students and their parents were conducted over three consecutive years.
Findings
A key finding of this paper is that the public does not engage in a trade-off neither with regard to privacy-effectiveness (exchanging more effectiveness for less privacy and vice versa) nor with effectiveness-cost, but rather expects all three elements to be achieved simultaneously. This paper also found that the correlation between perceived effectiveness and perceived privacy was stronger for parents than for students.
Research limitations/implications
Participants for this study were exclusively in The Netherlands. Survey questions on the effectiveness of surveillance technology focused on one type of technology, and on private mobile device use in two scenarios.
Social implications
The public’s perceptions of the effectiveness of surveillance technology potentially influence its acceptance of the technology, which, in turn, can affect the legitimacy and use of the technology.
Originality/value
Within the much-discussed privacy-security debate lies a less-heard debate – that of the effectiveness of the surveillance technology in question. The public is one actor in this debate. This study examines the public’s perceptions of this less-heard debate.
Details
Keywords
W. Pieters and L. Consoli
The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types…
Abstract
Purpose
The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.
Design/methodology/approach
Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.
Findings
It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.
Research limitations/implications
The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.
Practical implications
The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.
Originality/value
This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk.
Details
Keywords
Vitor Lima, Marco Tulio Zanini and Hélio Arthur Reis Irigaray
This research investigates and conceptualizes non-dyadic human–robot interactions (HRI).
Abstract
Purpose
This research investigates and conceptualizes non-dyadic human–robot interactions (HRI).
Design/methodology/approach
The authors conducted a netnographic study of the Facebook group called “iRobot – Roomba,” an online brand community dedicated to Roomba vacuums. Their data analysis employed an abductive approach, which extended the grounded theory method.
Findings
Dyadic portrayals of human–robot interactions can be expanded to consider other actants that are relevant to the consumption experiences of consumer robots. Not only humans but also nonhumans, such as an online brand community, have a meaningful role to play in shaping interactions between humans and robots.
Research limitations/implications
The present study moves theoretical discussions on HRI from the individual level grounded in a purely psychological approach to a more collective and sociocultural approach.
Practical implications
If managers do not have a proper assessment of human–robot interactions that considers different actants and their role in the socio-technical arrangement, they will find it more challenging to design and suggest new consumption experiences.
Originality/value
Unlike most previous marketing and consumer research on human–robot interactions, we show that different actants exert agency in different ways, at different times and with different socio-technical arrangements.
Details
Keywords
Stefano De Paoli and Jason Johnstone
This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…
Abstract
Purpose
This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.
Design/methodology/approach
The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.
Findings
The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.
Originality/value
This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.
Details
Keywords
Pieter W. van der Walt and Pieter A. van Brakel
In the pre‐Web days, in fact not more than two years ago, there was no mention of the word or even a job description for what we know today as the Webmaster. The phenomenal and…
Abstract
In the pre‐Web days, in fact not more than two years ago, there was no mention of the word or even a job description for what we know today as the Webmaster. The phenomenal and even unexpected growth of the Internet, but specifically the World Wide Web, created the need for a completely new and unique staff member in an organisation with very specialised interests and skills. It soon became clear that practical knowledge of new skills such as HTML formatting and Web server installation and maintenance were imperative for an organisation that wants to stay ahead of its competitors. Today, the main assignment of a Webmaster is to design, implement and maintain an effective World Wide Web site. To be able to do this the Webmaster must acquire knowledge of diverse fields such as network configuration, interface and graphical design, software development, business strategy, writing, editing, marketing and project management. Furthermore, both the growth rate of the Web and its impact on enterprise are responsible for the fact that the task description of the Webmaster is under constant transformation. Instead of being only responsible for HTML formatting, programming and Web site maintenance, Webmasters have become an integral part of a larger Web site team and have to manage other specialised tasks such as being an editor, graphic artist and programmer. The Webmaster has in certain instances become an important part of the team responsible for the entire business strategy of an enterprise, because many Web sites are now being used for their marketing and supporting activities. However, with online database vendors such as KR Dialog, DataStar, Medline and LEXIS‐NEXIS also moving into the Web environment, a few of which have already implemented Web‐based interfaces to assist in the online search process, the Webmaster's responsibilities might extend to that of supporting information professionals and their online search activities as well. Hence the goal and position of the Webmaster will be discussed in an effort to indicate how the Webmaster can play a role in enhancing the online search process.
Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel
When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the…
Abstract
Purpose
When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in complying with a security policy (i.e. walk from the office to the smart key activator) influences vulnerability. In particular, the attractiveness of a no-effort alternative (i.e. someone else walking from your office to the key activators to perform a task on your behalf) was evaluated. The contribution of this study relates to showing how experimental psychology can be used to determine the cost-benefit analysis (CBA) of physical building security measures.
Design/methodology/approach
Twenty-seven different “offenders” visited the offices of 116 employees. Using a script, each offender introduced a problem, provided a solution and asked the employee to hand over their office key.
Findings
A total of 58.6 per cent of the employees handed over their keys to a stranger; no difference was found between female and male employees. The likelihood of handing over the keys for employees close to a key activator was similar to that of those who were further away.
Research limitations/implications
The results suggest that installing additional key activators is not conducive to reducing the building’s security vulnerability associated with the handing over of keys to strangers.
Originality/value
No research seems to have investigated the distribution of smart key activators in the context of a physical penetration test. This research highlights the need to raise awareness of social engineering and of the vulnerabilities introduced via smart locks (and other smart systems).
Details
Keywords
Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel
The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.
Abstract
Purpose
The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.
Design/methodology/approach
Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly used in half of the emails.
Findings
Nineteen per cent of the employees provided their PII in a general phishing email, compared to 29 per cent in the spear phishing condition. Employees having a high power distance cultural background were more likely to provide their PII, compared to those with a low one. There was no effect of age on providing the PII requested when the recipient’s years of service within the organisation is taken into account.
Practical implications
This research shows that success is higher when the opening sentence of a phishing email is personalised. The resulting model explains victimisation by phishing emails well, and it would allow practitioners to focus awareness campaigns to maximise their effect.
Originality/value
The innovative aspect relates to explaining spear phishing using four socio-demographic variables.
Details
Keywords
Karine Charry and Tina Tessitore
This chapter takes a deeper look into understanding an increasingly popular advertising tool – product placement (PP) – by defining it, examining its usage and measuring its…
Abstract
Purpose
This chapter takes a deeper look into understanding an increasingly popular advertising tool – product placement (PP) – by defining it, examining its usage and measuring its consequences, both from a marketing and a consumer welfare perspective. It also tries to reconcile these contradictory perspectives to achieve a common ground and a positive outcome for all stakeholders.
Methodology/approach
A literature review of current research findings, from both a marketing and public policy perspective, is used to arrive at a more balanced viewpoint of PP.
Practical implications
Public policy makers are advised to improve the consistency of current regulations in terms of PP disclosure in the media, regardless of where a programme is produced or broadcast, to help create savvier consumers. Marketers are advised not to fight against PP regulations, but rather to develop their creativity in order to avoid consumers rejecting the disclosed placement.
Social implications
We address consumers’ ability to raise a protective shield when they encounter a PP situation. We explain how certain disclosures regarding the commercial intent of PP may be more effective than others, thereby empowering consumers to manage their behaviour and make informed decisions. We then describe how PP can be used to educate consumers about pro-social issues in an entertaining, non-patronising way.
Originality/value
This chapter proposes to go beyond the usual divide between advertisers and policy makers to arrive at a balanced view, considering the positive role that PP may play in education, while mitigating its potential negative impacts through effective consumer training.
Details
Keywords
W. B.H.J. van de Donk and Pieter W. Tops
Two extreme positions set the tone in learned literature on the feasibility of democracies in the information society. In the opinion of a number of authors, the widely proclaimed…
Abstract
Two extreme positions set the tone in learned literature on the feasibility of democracies in the information society. In the opinion of a number of authors, the widely proclaimed “electronic revolution” will inevitably take us to “direct democracy”. The only question these computopeans hold different views on is to what extent active steering of the further introduction of technology is necessary to reach direct democracy. Some of them (like De Sola Pool, 1983) are of the opinion that technologies of freedom are involved, which will almost automatically result in a more democratic society, provided that the free market is left to its own devices. Other authors believe that the new technology enables a drastic renewal of political culture and structure, provided that it is used deliberately in a practical and sensible way (Etzioni, Laudon, & Lipson, 1975; Becker, 1981; Hollander, 1985; Barber, 1988; Abramson, Arterton, and Orren, 1988).
Preeadashnie Pillay, Caren Brenda Scheepers and Rick Diesel
The COVID-19 pandemic has burdened the health-care system and exposed nurses to immense stress. This study therefore aims to investigate nurses’ mental well-being who are working…
Abstract
Purpose
The COVID-19 pandemic has burdened the health-care system and exposed nurses to immense stress. This study therefore aims to investigate nurses’ mental well-being who are working with COVID-19-positive patients. Burnout leads to decreased productivity and manifests as emotional exhaustion, depersonalisation (cynicism) and low personal accomplishment (professional efficacy). Authentic leadership is built on a humanistic value system, which is the core value of nurses and other health-care professionals. This study therefore used authentic leadership as the independent variable.
Design/methodology/approach
A cross-sectional quantitative research method was adopted by distributing validated online questionnaires to 1,334 nurses in a private pathology laboratory and 241 questionnaires were analysed with 93.4% female respondents. Multiple linear regression model testing was conducted.
Findings
Multiple regression analyses showed statistically significant negative correlations between authentic leadership and emotional exhaustion, cynicism, job stress and job-stress-related presenteeism, and a positive correlation between authentic leadership and professional efficacy.
Practical implications
This study provides empirical data to encourage organisations to focus on developing authentic leaders to decrease nurses’ burnout, job stress and presenteeism. The health-care sector should strive to create an environment where nurses are valued and their talent is recognised to increase employee engagement and commitment.
Originality/value
There were two contributions in this study: first, to determine whether there is a relationship between authentic leadership job stress and job-stress-related presenteeism. Second, to determine whether there is a relationship between authentic leadership and the three sub-constructs of burnout.
Details