Search results

1 – 10 of over 1000
Article
Publication date: 29 August 2019

Michelle Cayford, Wolter Pieters and P.H.A.J.M van Gelder

This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related…

Abstract

Purpose

This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related. Likewise, it looks at the relation between perceptions of effectiveness and opinions on the acceptable cost of surveillance technology.

Design/methodology/approach

For this study, surveys of Dutch students and their parents were conducted over three consecutive years.

Findings

A key finding of this paper is that the public does not engage in a trade-off neither with regard to privacy-effectiveness (exchanging more effectiveness for less privacy and vice versa) nor with effectiveness-cost, but rather expects all three elements to be achieved simultaneously. This paper also found that the correlation between perceived effectiveness and perceived privacy was stronger for parents than for students.

Research limitations/implications

Participants for this study were exclusively in The Netherlands. Survey questions on the effectiveness of surveillance technology focused on one type of technology, and on private mobile device use in two scenarios.

Social implications

The public’s perceptions of the effectiveness of surveillance technology potentially influence its acceptance of the technology, which, in turn, can affect the legitimacy and use of the technology.

Originality/value

Within the much-discussed privacy-security debate lies a less-heard debate – that of the effectiveness of the surveillance technology in question. The public is one actor in this debate. This study examines the public’s perceptions of this less-heard debate.

Details

Journal of Information, Communication and Ethics in Society, vol. 18 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 30 October 2009

W. Pieters and L. Consoli

The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types…

856

Abstract

Purpose

The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.

Design/methodology/approach

Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.

Findings

It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.

Research limitations/implications

The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.

Practical implications

The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.

Originality/value

This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk.

Details

Journal of Information, Communication and Ethics in Society, vol. 7 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 24 May 2022

Vitor Lima, Marco Tulio Zanini and Hélio Arthur Reis Irigaray

This research investigates and conceptualizes non-dyadic human–robot interactions (HRI).

Abstract

Purpose

This research investigates and conceptualizes non-dyadic human–robot interactions (HRI).

Design/methodology/approach

The authors conducted a netnographic study of the Facebook group called “iRobot – Roomba,” an online brand community dedicated to Roomba vacuums. Their data analysis employed an abductive approach, which extended the grounded theory method.

Findings

Dyadic portrayals of human–robot interactions can be expanded to consider other actants that are relevant to the consumption experiences of consumer robots. Not only humans but also nonhumans, such as an online brand community, have a meaningful role to play in shaping interactions between humans and robots.

Research limitations/implications

The present study moves theoretical discussions on HRI from the individual level grounded in a purely psychological approach to a more collective and sociocultural approach.

Practical implications

If managers do not have a proper assessment of human–robot interactions that considers different actants and their role in the socio-technical arrangement, they will find it more challenging to design and suggest new consumption experiences.

Originality/value

Unlike most previous marketing and consumer research on human–robot interactions, we show that different actants exert agency in different ways, at different times and with different socio-technical arrangements.

Details

Marketing Intelligence & Planning, vol. 40 no. 6
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 10 October 2023

Stefano De Paoli and Jason Johnstone

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…

Abstract

Purpose

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.

Design/methodology/approach

The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.

Findings

The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.

Originality/value

This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 June 1997

Pieter W. van der Walt and Pieter A. van Brakel

In the pre‐Web days, in fact not more than two years ago, there was no mention of the word or even a job description for what we know today as the Webmaster. The phenomenal and…

Abstract

In the pre‐Web days, in fact not more than two years ago, there was no mention of the word or even a job description for what we know today as the Webmaster. The phenomenal and even unexpected growth of the Internet, but specifically the World Wide Web, created the need for a completely new and unique staff member in an organisation with very specialised interests and skills. It soon became clear that practical knowledge of new skills such as HTML formatting and Web server installation and maintenance were imperative for an organisation that wants to stay ahead of its competitors. Today, the main assignment of a Webmaster is to design, implement and maintain an effective World Wide Web site. To be able to do this the Webmaster must acquire knowledge of diverse fields such as network configuration, interface and graphical design, software development, business strategy, writing, editing, marketing and project management. Furthermore, both the growth rate of the Web and its impact on enterprise are responsible for the fact that the task description of the Webmaster is under constant transformation. Instead of being only responsible for HTML formatting, programming and Web site maintenance, Webmasters have become an integral part of a larger Web site team and have to manage other specialised tasks such as being an editor, graphic artist and programmer. The Webmaster has in certain instances become an important part of the team responsible for the entire business strategy of an enterprise, because many Web sites are now being used for their marketing and supporting activities. However, with online database vendors such as KR Dialog, DataStar, Medline and LEXIS‐NEXIS also moving into the Web environment, a few of which have already implemented Web‐based interfaces to assist in the online search process, the Webmaster's responsibilities might extend to that of supporting information professionals and their online search activities as well. Hence the goal and position of the Webmaster will be discussed in an effort to indicate how the Webmaster can play a role in enhancing the online search process.

Details

The Electronic Library, vol. 15 no. 6
Type: Research Article
ISSN: 0264-0473

Open Access
Article
Publication date: 14 May 2018

Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel

When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the…

1553

Abstract

Purpose

When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in complying with a security policy (i.e. walk from the office to the smart key activator) influences vulnerability. In particular, the attractiveness of a no-effort alternative (i.e. someone else walking from your office to the key activators to perform a task on your behalf) was evaluated. The contribution of this study relates to showing how experimental psychology can be used to determine the cost-benefit analysis (CBA) of physical building security measures.

Design/methodology/approach

Twenty-seven different “offenders” visited the offices of 116 employees. Using a script, each offender introduced a problem, provided a solution and asked the employee to hand over their office key.

Findings

A total of 58.6 per cent of the employees handed over their keys to a stranger; no difference was found between female and male employees. The likelihood of handing over the keys for employees close to a key activator was similar to that of those who were further away.

Research limitations/implications

The results suggest that installing additional key activators is not conducive to reducing the building’s security vulnerability associated with the handing over of keys to strangers.

Originality/value

No research seems to have investigated the distribution of smart key activators in the context of a physical penetration test. This research highlights the need to raise awareness of social engineering and of the vulnerabilities introduced via smart locks (and other smart systems).

Details

Journal of Corporate Real Estate, vol. 20 no. 2
Type: Research Article
ISSN: 1463-001X

Keywords

Article
Publication date: 13 November 2017

Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel

The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.

1872

Abstract

Purpose

The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.

Design/methodology/approach

Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly used in half of the emails.

Findings

Nineteen per cent of the employees provided their PII in a general phishing email, compared to 29 per cent in the spear phishing condition. Employees having a high power distance cultural background were more likely to provide their PII, compared to those with a low one. There was no effect of age on providing the PII requested when the recipient’s years of service within the organisation is taken into account.

Practical implications

This research shows that success is higher when the opening sentence of a phishing email is personalised. The resulting model explains victimisation by phishing emails well, and it would allow practitioners to focus awareness campaigns to maximise their effect.

Originality/value

The innovative aspect relates to explaining spear phishing using four socio-demographic variables.

Details

Information & Computer Security, vol. 25 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 29 December 2016

Karine Charry and Tina Tessitore

This chapter takes a deeper look into understanding an increasingly popular advertising tool – product placement (PP) – by defining it, examining its usage and measuring its…

Abstract

Purpose

This chapter takes a deeper look into understanding an increasingly popular advertising tool – product placement (PP) – by defining it, examining its usage and measuring its consequences, both from a marketing and a consumer welfare perspective. It also tries to reconcile these contradictory perspectives to achieve a common ground and a positive outcome for all stakeholders.

Methodology/approach

A literature review of current research findings, from both a marketing and public policy perspective, is used to arrive at a more balanced viewpoint of PP.

Practical implications

Public policy makers are advised to improve the consistency of current regulations in terms of PP disclosure in the media, regardless of where a programme is produced or broadcast, to help create savvier consumers. Marketers are advised not to fight against PP regulations, but rather to develop their creativity in order to avoid consumers rejecting the disclosed placement.

Social implications

We address consumers’ ability to raise a protective shield when they encounter a PP situation. We explain how certain disclosures regarding the commercial intent of PP may be more effective than others, thereby empowering consumers to manage their behaviour and make informed decisions. We then describe how PP can be used to educate consumers about pro-social issues in an entertaining, non-patronising way.

Originality/value

This chapter proposes to go beyond the usual divide between advertisers and policy makers to arrive at a balanced view, considering the positive role that PP may play in education, while mitigating its potential negative impacts through effective consumer training.

Details

Advertising in New Formats and Media
Type: Book
ISBN: 978-1-78560-312-9

Keywords

Book part
Publication date: 22 December 2006

W. B.H.J. van de Donk and Pieter W. Tops

Two extreme positions set the tone in learned literature on the feasibility of democracies in the information society. In the opinion of a number of authors, the widely proclaimed…

Abstract

Two extreme positions set the tone in learned literature on the feasibility of democracies in the information society. In the opinion of a number of authors, the widely proclaimed “electronic revolution” will inevitably take us to “direct democracy”. The only question these computopeans hold different views on is to what extent active steering of the further introduction of technology is necessary to reach direct democracy. Some of them (like De Sola Pool, 1983) are of the opinion that technologies of freedom are involved, which will almost automatically result in a more democratic society, provided that the free market is left to its own devices. Other authors believe that the new technology enables a drastic renewal of political culture and structure, provided that it is used deliberately in a practical and sensible way (Etzioni, Laudon, & Lipson, 1975; Becker, 1981; Hollander, 1985; Barber, 1988; Abramson, Arterton, and Orren, 1988).

Details

Comparative Public Administration
Type: Book
ISBN: 978-1-84950-453-9

Article
Publication date: 24 August 2021

Wei Li, Yushi Jiang, Miao Miao, Qing Yan and Fan He

Enterprises often use anthropomorphic images to display products. In this study, by discussing the differences of the anthropomorphic images of juxtaposition and fusion, the…

Abstract

Purpose

Enterprises often use anthropomorphic images to display products. In this study, by discussing the differences of the anthropomorphic images of juxtaposition and fusion, the authors can distinguish the boundary conditions of the influence of different visual object structures on consumers' attention.

Design/methodology/approach

Based on schema theory and information processing theory and using eye movement methods, this study analyzed the attractiveness of anthropomorphic images to consumers under different congruence levels through experiments of 2 (congruence: high and low) *2(visual object structure: juxtaposition and fusion)*2(self-construct: interdependent and independent). This study discusses the difference in the attractiveness of interdependent and independent consumers in the context of high congruence, juxtaposition and fusion of two visual object structures.

Findings

The results show that compared with the low congruence anthropomorphic image, the high congruence anthropomorphic image can attract more attention of consumers. In the case of low compatibility of anthropomorphic images, the juxtaposition structure of anthropomorphic images is more attractive to consumers than the fusion structure. In the case of high compatibility of anthropomorphic images, for independent self-consumers, the attraction of fusion structure image is higher than the juxtaposition image, and for interdependent self-consumers, the attraction of juxtaposition image is higher than the fusion image.

Originality/value

The conclusion enriches the anthropomorphic marketing theory. It reveals different degrees of attention paid to anthropomorphic image by consumers of different types of self-construct. Eye movement methods provide a new perspective for the study of anthropomorphic marketing and provide a reference for enterprises to publicize products or services through anthropomorphic image.

Details

Journal of Contemporary Marketing Science, vol. 4 no. 2
Type: Research Article
ISSN: 2516-7480

Keywords

1 – 10 of over 1000