Search results
1 – 10 of over 1000Michelle Cayford, Wolter Pieters and P.H.A.J.M van Gelder
This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related…
Abstract
Purpose
This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related. Likewise, it looks at the relation between perceptions of effectiveness and opinions on the acceptable cost of surveillance technology.
Design/methodology/approach
For this study, surveys of Dutch students and their parents were conducted over three consecutive years.
Findings
A key finding of this paper is that the public does not engage in a trade-off neither with regard to privacy-effectiveness (exchanging more effectiveness for less privacy and vice versa) nor with effectiveness-cost, but rather expects all three elements to be achieved simultaneously. This paper also found that the correlation between perceived effectiveness and perceived privacy was stronger for parents than for students.
Research limitations/implications
Participants for this study were exclusively in The Netherlands. Survey questions on the effectiveness of surveillance technology focused on one type of technology, and on private mobile device use in two scenarios.
Social implications
The public’s perceptions of the effectiveness of surveillance technology potentially influence its acceptance of the technology, which, in turn, can affect the legitimacy and use of the technology.
Originality/value
Within the much-discussed privacy-security debate lies a less-heard debate – that of the effectiveness of the surveillance technology in question. The public is one actor in this debate. This study examines the public’s perceptions of this less-heard debate.
Details
Keywords
W. Pieters and L. Consoli
The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types…
Abstract
Purpose
The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.
Design/methodology/approach
Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.
Findings
It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.
Research limitations/implications
The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.
Practical implications
The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.
Originality/value
This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk.
Details
Keywords
Vitor Lima, Marco Tulio Zanini and Hélio Arthur Reis Irigaray
This research investigates and conceptualizes non-dyadic human–robot interactions (HRI).
Abstract
Purpose
This research investigates and conceptualizes non-dyadic human–robot interactions (HRI).
Design/methodology/approach
The authors conducted a netnographic study of the Facebook group called “iRobot – Roomba,” an online brand community dedicated to Roomba vacuums. Their data analysis employed an abductive approach, which extended the grounded theory method.
Findings
Dyadic portrayals of human–robot interactions can be expanded to consider other actants that are relevant to the consumption experiences of consumer robots. Not only humans but also nonhumans, such as an online brand community, have a meaningful role to play in shaping interactions between humans and robots.
Research limitations/implications
The present study moves theoretical discussions on HRI from the individual level grounded in a purely psychological approach to a more collective and sociocultural approach.
Practical implications
If managers do not have a proper assessment of human–robot interactions that considers different actants and their role in the socio-technical arrangement, they will find it more challenging to design and suggest new consumption experiences.
Originality/value
Unlike most previous marketing and consumer research on human–robot interactions, we show that different actants exert agency in different ways, at different times and with different socio-technical arrangements.
Details
Keywords
Pieter W. van der Walt and Pieter A. van Brakel
In the pre‐Web days, in fact not more than two years ago, there was no mention of the word or even a job description for what we know today as the Webmaster. The phenomenal and…
Abstract
In the pre‐Web days, in fact not more than two years ago, there was no mention of the word or even a job description for what we know today as the Webmaster. The phenomenal and even unexpected growth of the Internet, but specifically the World Wide Web, created the need for a completely new and unique staff member in an organisation with very specialised interests and skills. It soon became clear that practical knowledge of new skills such as HTML formatting and Web server installation and maintenance were imperative for an organisation that wants to stay ahead of its competitors. Today, the main assignment of a Webmaster is to design, implement and maintain an effective World Wide Web site. To be able to do this the Webmaster must acquire knowledge of diverse fields such as network configuration, interface and graphical design, software development, business strategy, writing, editing, marketing and project management. Furthermore, both the growth rate of the Web and its impact on enterprise are responsible for the fact that the task description of the Webmaster is under constant transformation. Instead of being only responsible for HTML formatting, programming and Web site maintenance, Webmasters have become an integral part of a larger Web site team and have to manage other specialised tasks such as being an editor, graphic artist and programmer. The Webmaster has in certain instances become an important part of the team responsible for the entire business strategy of an enterprise, because many Web sites are now being used for their marketing and supporting activities. However, with online database vendors such as KR Dialog, DataStar, Medline and LEXIS‐NEXIS also moving into the Web environment, a few of which have already implemented Web‐based interfaces to assist in the online search process, the Webmaster's responsibilities might extend to that of supporting information professionals and their online search activities as well. Hence the goal and position of the Webmaster will be discussed in an effort to indicate how the Webmaster can play a role in enhancing the online search process.
Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel
When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the…
Abstract
Purpose
When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in complying with a security policy (i.e. walk from the office to the smart key activator) influences vulnerability. In particular, the attractiveness of a no-effort alternative (i.e. someone else walking from your office to the key activators to perform a task on your behalf) was evaluated. The contribution of this study relates to showing how experimental psychology can be used to determine the cost-benefit analysis (CBA) of physical building security measures.
Design/methodology/approach
Twenty-seven different “offenders” visited the offices of 116 employees. Using a script, each offender introduced a problem, provided a solution and asked the employee to hand over their office key.
Findings
A total of 58.6 per cent of the employees handed over their keys to a stranger; no difference was found between female and male employees. The likelihood of handing over the keys for employees close to a key activator was similar to that of those who were further away.
Research limitations/implications
The results suggest that installing additional key activators is not conducive to reducing the building’s security vulnerability associated with the handing over of keys to strangers.
Originality/value
No research seems to have investigated the distribution of smart key activators in the context of a physical penetration test. This research highlights the need to raise awareness of social engineering and of the vulnerabilities introduced via smart locks (and other smart systems).
Details
Keywords
Jan-Willem Bullee, Lorena Montoya, Marianne Junger and Pieter Hartel
The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.
Abstract
Purpose
The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.
Design/methodology/approach
Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly used in half of the emails.
Findings
Nineteen per cent of the employees provided their PII in a general phishing email, compared to 29 per cent in the spear phishing condition. Employees having a high power distance cultural background were more likely to provide their PII, compared to those with a low one. There was no effect of age on providing the PII requested when the recipient’s years of service within the organisation is taken into account.
Practical implications
This research shows that success is higher when the opening sentence of a phishing email is personalised. The resulting model explains victimisation by phishing emails well, and it would allow practitioners to focus awareness campaigns to maximise their effect.
Originality/value
The innovative aspect relates to explaining spear phishing using four socio-demographic variables.
Details
Keywords
Wei Li, Yushi Jiang, Miao Miao, Qing Yan and Fan He
Enterprises often use anthropomorphic images to display products. In this study, by discussing the differences of the anthropomorphic images of juxtaposition and fusion, the…
Abstract
Purpose
Enterprises often use anthropomorphic images to display products. In this study, by discussing the differences of the anthropomorphic images of juxtaposition and fusion, the authors can distinguish the boundary conditions of the influence of different visual object structures on consumers' attention.
Design/methodology/approach
Based on schema theory and information processing theory and using eye movement methods, this study analyzed the attractiveness of anthropomorphic images to consumers under different congruence levels through experiments of 2 (congruence: high and low) *2(visual object structure: juxtaposition and fusion)*2(self-construct: interdependent and independent). This study discusses the difference in the attractiveness of interdependent and independent consumers in the context of high congruence, juxtaposition and fusion of two visual object structures.
Findings
The results show that compared with the low congruence anthropomorphic image, the high congruence anthropomorphic image can attract more attention of consumers. In the case of low compatibility of anthropomorphic images, the juxtaposition structure of anthropomorphic images is more attractive to consumers than the fusion structure. In the case of high compatibility of anthropomorphic images, for independent self-consumers, the attraction of fusion structure image is higher than the juxtaposition image, and for interdependent self-consumers, the attraction of juxtaposition image is higher than the fusion image.
Originality/value
The conclusion enriches the anthropomorphic marketing theory. It reveals different degrees of attention paid to anthropomorphic image by consumers of different types of self-construct. Eye movement methods provide a new perspective for the study of anthropomorphic marketing and provide a reference for enterprises to publicize products or services through anthropomorphic image.
Details
Keywords
Wolter Pieters and Robert van Haren
The aim of the research described was to identify reasons for differences between discourses on electronic voting in the UK and The Netherlands, from a qualitative point of view.
Abstract
Purpose
The aim of the research described was to identify reasons for differences between discourses on electronic voting in the UK and The Netherlands, from a qualitative point of view.
Design/methodology/approach
From both countries, eight e‐voting experts were interviewed on their expectations, risk estimations, cooperation and learning experiences. The design was based on the theory of strategic niche management. A qualitative analysis of the data was performed to refine the main variables and identify connections.
Findings
The results show that differences in these variables can partly explain the variations in the embedding of e‐voting in the two countries, from a qualitative point of view. Key differences include the goals of introducing e‐voting, concerns in relation to verifiability and authenticity, the role of the Electoral Commissions and a focus on learning versus a focus on phased introduction.
Research limitations/implications
The current study was limited to two countries. More empirical data can reveal other relevant subvariables, and contribute to a framework that can improve our understanding of the challenges of electronic voting.
Originality/value
This study shows the context‐dependent character of discussions on information security. It can be informative for actors involved in e‐voting in the UK and The Netherlands, and other countries using or considering electronic voting.
Details
Keywords
NOTWITHSTANDING the fact that there exists a considerable amount of literature published in various forms on the subject of brittle lacquers and their applications to a multitude…
Abstract
NOTWITHSTANDING the fact that there exists a considerable amount of literature published in various forms on the subject of brittle lacquers and their applications to a multitude of diverse problems a brief resume of some of the general principles involved would seem not to be out of place.
Research into the interpretability and explainability of data analytics and artificial intelligence (AI) systems is on the rise. However, most recent studies either solely promote…
Abstract
Purpose
Research into the interpretability and explainability of data analytics and artificial intelligence (AI) systems is on the rise. However, most recent studies either solely promote the benefits of explainability or criticize it due to its counterproductive effects. This study addresses this polarized space and aims to identify opposing effects of the explainability of AI and the tensions between them and propose how to manage this tension to optimize AI system performance and trustworthiness.
Design/methodology/approach
The author systematically reviews the literature and synthesizes it using a contingency theory lens to develop a framework for managing the opposing effects of AI explainability.
Findings
The author finds five opposing effects of explainability: comprehensibility, conduct, confidentiality, completeness and confidence in AI (5Cs). The author also proposes six perspectives on managing the tensions between the 5Cs: pragmatism in explanation, contextualization of the explanation, cohabitation of human agency and AI agency, metrics and standardization, regulatory and ethical principles, and other emerging solutions (i.e. AI enveloping, blockchain and AI fuzzy systems).
Research limitations/implications
As in other systematic literature review studies, the results are limited by the content of the selected papers.
Practical implications
The findings show how AI owners and developers can manage tensions between profitability, prediction accuracy and system performance via visibility, accountability and maintaining the “social goodness” of AI. The results guide practitioners in developing metrics and standards for AI explainability, with the context of AI operation as the focus.
Originality/value
This study addresses polarized beliefs amongst scholars and practitioners about the benefits of AI explainability versus its counterproductive effects. It poses that there is no single best way to maximize AI explainability. Instead, the co-existence of enabling and constraining effects must be managed.
Details