Search results

1 – 10 of 272
Article
Publication date: 10 October 2023

Stefano De Paoli and Jason Johnstone

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this…

Abstract

Purpose

This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts.

Design/methodology/approach

The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis.

Findings

The starting assumption is that penetration testers are akin to offenders in a crime situation, dealing with targets and the absence of capable guardians. A key finding is that penetration testers described their targets as an installed base, highlighting how vulnerabilities, which make a target suitable, often emerge from properties of the existing built digital environments. This includes systems that are forgotten or lack ongoing maintenance. Moreover, penetration testers highlighted that although the testing is often predicated on planned methodologies, often they resort to serendipitous practices such as improvisation.

Originality/value

This paper contributes to theory, showing how Routine Activity Theory and phenomenological concepts can work together in the study of socio-organisational factors of information security. This contribution stems from considering that much research on information security focuses on the internal actions of organisations. The study of penetration testing as a proxy of real attacks allows novel insights into socio-organisational factors of information security in organisations.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 8 April 2024

Lies Bouten and Sophie Hoozée

This study examines how assurors make sense of sustainability assurance (SA) work and how interactions with assurance team members and clients shape assurors’ sensemaking and…

Abstract

Purpose

This study examines how assurors make sense of sustainability assurance (SA) work and how interactions with assurance team members and clients shape assurors’ sensemaking and their actual SA work.

Design/methodology/approach

To obtain detailed accounts of how SA work occurs on the ground, this study explores three SA engagements by interviewing the main actors involved, both at the client firms and at their Big Four assurance providers.

Findings

Individual assurors’ (i.e. partners and other team members) sensemaking of SA work results in the crafting of their logics of action (LoAs), that is, their meanings about the objectives of SA work and how to conduct it. Without organizational socialization, team members may not arrive at shared meanings and deviate from the team-wide assurance approach. To fulfill their objectives for SA work, assurors may engage in socialization with clients or assume a temporary role. Yet, the role negotiations taking place in the shadows of the scope negotiations determine their default role during the engagement.

Practical implications

Two options are available to help SA statement users gauge the relevance of SA work: either displaying the SA work performed or making it more uniform.

Originality/value

This study theoretically grounds how assurors make sense of SA work and documents how (the lack of) professional socialization, organizational socialization and socialization of frequent interaction partners at the client shape actual SA work. Thereby, it unravels the SA work concealed behind SA statements.

Details

Accounting, Auditing & Accountability Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 7 November 2023

Katrina E. Forbes-McKay and Sarah Henderson

This study investigates the relationship between mental well-being (MWB) and social support (SS) whilst addressing the paucity of research on students' support for emergency…

Abstract

Purpose

This study investigates the relationship between mental well-being (MWB) and social support (SS) whilst addressing the paucity of research on students' support for emergency contact schemes (ECSs) and their views on how and when such schemes should be implemented.

Design/methodology/approach

In total, 113 students recruited via opportunistic sampling completed an online survey including the Interpersonal Support Evaluation List - shortened version (Cohen et al. 1985), Warwick–Edinburgh Mental Wellbeing Scale (Tennant et al. 2007) and questions about ECS. A correlational design used the Pearson product-moment correlation to explore the relationship between MWB and SS. A between-subjects design using independent measures t-test investigated differences in SS and MWB between those with and without a “trusted person” (TP).

Findings

The preferred name was “Named Trusted Person Scheme” (NTPS), the preferred TP was parent/guardian or partner, and the preferred means of contact was Personal Tutor to mobile phone. Most students (96%) supported the use of an NTPS when serious concerns were raised about mental or physical health, personal safety or student engagement. Those opposed were concerned about a loss of agency, identifying a TP or the TP worsening the situation. MWB was positively correlated with SS, and those with a TP had higher levels of MWB and SS than those without.

Originality/value

This study addresses the under-explored area of students' support for ECS, whilst enhancing our understanding of the relationship between MWB and SS especially amongst those without a person they can trust. This research provides valuable insights for universities looking to implement or refine such schemes, with the potential to improve students' MWB, academic achievement and retention by enhancing support.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 21 November 2023

Alicia R. Ingersoll, Christy Glass and Alison Cook

This study aims to analyze the connection between institutional isomorphic pressures and both women serving on boards and women’s influence on boards within large American firms.

Abstract

Purpose

This study aims to analyze the connection between institutional isomorphic pressures and both women serving on boards and women’s influence on boards within large American firms.

Design/methodology/approach

This study examines a longitudinal panel data set of all Standard and Poor’s (S&P) 500 organizations across a seven-year period from 2009 to 2015.

Findings

The analyses affirm that institutional isomorphic pressures impact the prevalence and influence of women on boards. Evidence suggests that coercive and normative pressures strongly impact the number of women serving as corporate directors, whereas the power of women directors is linked only to mimetic pressures.

Practical implications

The research suggests that to increase the number of women serving as directors, the industry must first increase the overall number of women serving in senior management roles. Once women directors gain a critical mass of three women on the board, the association with the total number of women directors, the number of boards upon which they concurrently serve, the power of women directors being selected to board leadership and the influence of women directors increase.

Originality/value

This paper extends existing board diversity work by examining institutional pressures at the international, national and firm levels. By examining the relationship between coercive, normative and mimetic pressures on both the prevalence of women on boards and the influence of women on boards, the authors illuminate certain mechanisms that shape the likelihood of board appointment and placement in more powerful positions.

Details

Corporate Governance: The International Journal of Business in Society, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1472-0701

Keywords

Article
Publication date: 28 February 2024

Ane Bast, Marit Engen and Maria Røhnebæk

This paper aims to explore the role of frontline employees (FLEs) as mediators in transformative service processes within services targeting vulnerable users.

Abstract

Purpose

This paper aims to explore the role of frontline employees (FLEs) as mediators in transformative service processes within services targeting vulnerable users.

Design/methodology/approach

This paper is based on a case study of the development and implementation of a dementia village, and the data consist of documents, in-depth interviews and field observations.

Findings

The analysis identifies FLEs as mediators in six different roles. These roles highlight how FLEs perform as mediators, acting in between and for vulnerable users and thus supporting their well-being. Specifically, the roles explicate the mediating role of FLEs in the design and planning of transformative changes and in daily work practices.

Practical implications

The different mediating roles of FLEs presented here should inform care providers and managers of how employees can become assets for supporting vulnerable users’ well-being during the design and planning stages of transformative change and through daily service work.

Originality/value

This paper offers novel insights into the multifaceted roles of FLEs in transformative services. The findings add to the current debate on mediation in transformative services and contribute to the literature by extending and refining the established conceptual and empirical understandings of the role of transformative service mediators in consumers’ well-being.

Details

Journal of Services Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 18 January 2024

Nafeesa Safdar, Qamar Ali, Aiman Zahra and Tanveer Hussain

Physical activity is an eminent practice for the maintenance of physical and mental health. Physical fitness always enables students to perform their various tasks efficiently…

Abstract

Purpose

Physical activity is an eminent practice for the maintenance of physical and mental health. Physical fitness always enables students to perform their various tasks efficiently specifically in academic performance. Student health is a principal factor for the performance of all kinds of activities particularly in academic performance. This study aimed to evaluate physical activity among university students and the factors for being inactive.

Design/methodology/approach

A questionnaire was designed and distributed among the students via WhatsApp, Skype and email, however, some responses were collected physically to maintain the quality of data. The questionnaire was categorized into demographic factors, current physical activity status and reasons for physical inactivity. Each section was further divided into questions and total 24 questions were asked from each individual for evaluation of inactiveness.

Findings

The finding of this research explored that enormous number of students are doing part time jobs and unable to find enough time for relaxation. The research was limited and evaluated limited factors and explored that 60.6% of students had less time for entertainment and this is only 2 h for this 60.6% of students. Among all factors of physical activity walking was preferable for 48.34% of the students. Students want to participate in healthy activities. Moreover, students are unable to perform physical exercise due to busy schedules of jobs (47.02%), part-time job burden (15.89%), study burden (35.10%) and poor health conditions (1.32%).

Originality/value

This study concluded that higher percentage of students have stress of limited resources and under this stress condition they are unable to take a balanced diet which they considered cost-effective. They did not perform maximum in their academic and daily activities and did not participate in sports activities. It was also observed that institutions did not provide a sufficient platform for physical activity for students. The research shows the factors which affect the student’s academic performance as being physically inactive. Evaluation of results explored that numerous students have limited resources during their career development and their attention remain diverted to overcome their limited resources which keep them physically unfit. The findings also explored that physically inactive students have heavy study and job burden which is not overcome and analyzed by their institutions.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 12 December 2022

Omid Boodaghi, Zohreh Fanni and Asma Mehan

Despite various comparative studies in the field of cultural heritage protection in the world, there is still a significant lack of comparative research on policies related to the…

Abstract

Purpose

Despite various comparative studies in the field of cultural heritage protection in the world, there is still a significant lack of comparative research on policies related to the legal system of countries' governance. The purpose of this study is to address the comparative policies in Iran and Italy, with a particular focus on the results of the executive experiences of two different types of policies in the cities of Oroumieh (North-West of Iran) and Turin (in North-West of Italy).

Design/methodology/approach

Utilising the comparative, analytical, bibliographic and descriptive historical research methodology, which is based on the study of the local, national and international comprehensive review of regulations and policy-making of cultural heritage preservation policies in Iran and Italy. In this research, the related documents in three languages (Persian, Italian and English) have been examined to compare profoundly and comprehensively the policies and regulations adopted in these two countries to be able to analyze the national and transnational regulations and local policies in the cultural heritage sector.

Findings

In addition to many cultural similarities and numerous commonalities, especially in the multiplicity of urban cultural heritage in historical centers, the results suggest that the legislation structure in Iran is much more centralized than in Italy. Also, the findings suggest that Italy focuses on aligning its previously centralized national legislative system in line with contemporary European heritage and preservation policies.

Originality/value

The paper outlines how to use historical and cultural similarities through comparative study to benefit the experiences of two historical countries in urban heritage conservation and policy-making part despite their differences.

Details

Journal of Cultural Heritage Management and Sustainable Development, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-1266

Keywords

Article
Publication date: 17 April 2024

Jessica Rene Peterson, Kyle C. Ward and Michaela Lawrie

The purpose is to understand how farmers in rural American communities perceive crime, safety and policing.

Abstract

Purpose

The purpose is to understand how farmers in rural American communities perceive crime, safety and policing.

Design/methodology/approach

An online survey, adapted from a version used in Victoria, Australia (Harkness, 2017), was modified and administered through social media and farming organizations throughout three US states. The survey covers topics relating to crime and victimization, feelings of safety or fear in rural areas, policing practices and trust in police in their areas and any crime prevention practices that respondents use.

Findings

With nearly 1,200 respondents and four scales investigated, results indicate that those respondents with more favorable views of law enforcement and the criminal justice system had the highest fear of crime, those who had been prior victims of crime had a higher fear of crime than those who did not, those with higher community involvement had higher fear of crime, and those from Nebraska compared to Colorado had higher fear of crime.

Research limitations/implications

A better understanding of the agricultural community’s perceptions of crime, safety and policing will aid law enforcement in community policing efforts and in farm crime investigation and prevention. Limitations of the study, including the distribution method will be discussed.

Originality/value

Farm- and agriculture-related crimes have serious financial and emotional consequences for producers and local economies. Stereotypes about rural areas being “safe with no crime” are still prevalent. Rural American farmers’ perceptions of crime, safety and police are largely absent from the literature and are important for improving farm crime prevention.

Details

Policing: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 27 March 2024

Haroon Iqbal Maseeh, Charles Jebarajakirthy, Achchuthan Sivapalan, Mitchell Ross and Mehak Rehman

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal…

74

Abstract

Purpose

Smartphone apps collect users' personal information, which triggers privacy concerns for app users. Consequently, app users restrict apps from accessing their personal information. This may impact the effectiveness of in-app advertising. However, research has not yet demonstrated what factors impact app users' decisions to use apps with restricted permissions. This study is aimed to bridge this gap.

Design/methodology/approach

Using a quantitative research method, the authors collected the data from 384 app users via a structured questionnaire. The data were analysed using AMOS and fuzzy-set qualitative comparative analysis (fsQCA).

Findings

The findings suggest privacy concerns and risks have a significant positive effect on app usage with restricted permissions, whilst reputation, trust and perceived benefits have significant negative impact on it. Some app-related factors, such as the number of apps installed and type of apps, also impact app usage with restricted permissions.

Practical implications

Based on the findings, the authors provided several implications for app stores, app developers and app marketers.

Originality/value

This study examines the factors that influence smartphone users' decisions to use apps with restricted permission requests. By doing this, the authors' study contributes to the consumer behaviour literature in the context of smartphone app usage. Also, by explaining the underlying mechanisms through which the principles of communication privacy management theory operate in smartphone app context, the authors' research contributes to the communication privacy management theory.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of 272