Search results

1 – 10 of over 80000
Article
Publication date: 21 September 2015

Dae Woon Kim

The literature on the growth and regulations pertaining to private security has been largely confined to western countries, with very little published on other jurisdictions…

Abstract

Purpose

The literature on the growth and regulations pertaining to private security has been largely confined to western countries, with very little published on other jurisdictions including South Korea. The purpose of this paper is to provide a general account of the development of the South Korean industry and an assessment of regulation, covering the period from 1950 to the present day, and to explore areas of possible improvement in regulation.

Design/methodology/approach

A research synthesis method was utilised to identify and integrate qualitative materials on turning points and regulatory changes, with the addition of a gap analysis based on established concepts of best practice in industry regulation.

Findings

The security industry in South Korea has grown exponentially, worth over $2.7 billion per annum. Notwithstanding this, regulation evolved through piecemeal rather than comprehensive changes. The problem is similar to those found in many other countries. However, in South Korea, over-reliance on market mechanisms of regulation, combined with the government’s lukewarm stance on stimulating the non-public security sector, means that there are inadequate guarantees of baseline competence and integrity.

Practical implications

The study demonstrates the need for governments to be more proactive and consultative in regulating the burgeoning security industry, and move away from ad hoc responses to industry problems. Regulation should be comprehensive in covering all relevant operational aspects of security work that are reflective of a growth profile. Regulatory agencies should actively explore training programmes linked to career path development and professionalisation. Execution of regulatory enforcement should be independent from political or third-party influence. Regulators should be innovative in applying and evaluating research-based regulatory strategies.

Originality/value

The study provides a comprehensive overview of the South Korean security industry and regulatory issues, adding to a more international understanding of regulatory challenges in security.

Details

Journal of Criminological Research, Policy and Practice, vol. 1 no. 3
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 20 August 2020

Kholekile Gwebu and Clayton W. Barrows

The purpose of this study is to expand on the existing literature by specifically examining data security incidents within the hospitality industry, assessing origins and causes…

1241

Abstract

Purpose

The purpose of this study is to expand on the existing literature by specifically examining data security incidents within the hospitality industry, assessing origins and causes, comparing breaches within the industry with those of other industries and identifying areas of concern.

Design/methodology/approach

A sample of data breach incidents is drawn from the Verizon VERIS Community Database (VCDB). Statistical comparisons between hospitality and non-hospitality industry firms are conducted following the Verizon A4 threat framework.

Findings

The results reveal that breaches between hospitality and non-hospitality firms differ significantly in terms of actors, actions, assets and attributes. Specifically, proportions of breaches in the hospitality industry are larger in terms of external actors, hacking and malware, user devices compromised and integrity violations. Additionally, compared to other industries, point-of-sales (POS) system breaches occur at a higher rate in the hospitality industry. The study finds that company size, hacking and malware predict the likelihood of a POS breach.

Research limitations/implications

The study uses secondary data and does not include the entire universe of data breaches.

Originality/value

In the quest to reduce data breach incidents, it is imperative to identify and assess the nature of data breach incidents between industries. Doing so permits the development of targeted industry-specific solutions rather than generic ones. This study systematically identifies differences between hospitality and non-hospitality data security incidents and then suggests areas where hospitality companies should focus future attention to mitigate breach incidents.

研究目的

本论文延展了现有文献, 检测了酒店业中的数据安全事故, 评估其起因, 比较其他产业和酒店产业数据泄露的区别, 以及找出关键区域。

研究设计/方法/途径

样本数据为 Verizon VERIS 社区数据库(VCDB)中的数据泄露事件。研究遵循Verizon A4 危险模型, 对酒店业和非酒店业之间事件进行了数据分析比较。

研究结果

研究结果表明酒店公司和非酒店公司的数据泄露在当事人、行为、资产、和属性方面, 有着很大不同。其中, 酒店业中的数据泄露比例在外部因素、黑客、病毒、用户端失灵、和违反道德方面比较大。此外, 相对其他产业, POS系统在酒店产业中的数据泄露概率较高。本论文发现公司规模、黑客、和病毒对POS数据泄露的影响有着重大决定作用。

研究理论限制/意义

本论文使用二手数据, 并未检测整体数据泄露数据。

研究原创性/价值

为了减少数据泄露事件, 产业之间数据泄露事件属性的认定和评价至关重要。因此, 可以针对具体产业具体事件制定出特定的解决方案。本论文系统上指出了酒店和非酒店业的数据安全事件的区别, 以及指出哪些方面, 酒店业应该重点关注, 以减少未来数据泄露事件。

Article
Publication date: 20 November 2009

Princely Ifinedo

The purpose of this paper is to add a layer of understanding to a previous survey of information technology (IT) security concerns and issues in global financial services…

2220

Abstract

Purpose

The purpose of this paper is to add a layer of understanding to a previous survey of information technology (IT) security concerns and issues in global financial services institutions (GFSI).

Design/methodology/approach

This paper uses data obtained from a secondary source. The dimensions of national culture used in this paper come from Hofstede's work. Two analyses are performed on the data. First, a non‐parametric test is conducted to determine whether there are significant differences on the 13 IT security concerns when the dimensions of national culture are used to group responses. Second, a correlation analysis is carried out between the study's variables.

Findings

First, the results indicate that the dimensions of national culture are not statistically important in differentiating responses and perceptions of IT security concerns across GFSI. Second, some of the dimensions of national culture are found to have significant correlations with a few of the IT security concerns investigated.

Research limitations/implications

The use of a secondary data source introduces some limitations. The views captured in the survey are those of management team, it is likely that end‐users' perceptions may vary considerably. Nonetheless, the main finding of the paper for corporate managers in the financial services industry is that IT security concerns appear to be uniform across cultures. Further, the data show that the dimension of uncertainty avoidance deserves further attention with regard to the assessment of security concerns in GFSI. This information may be useful for decision making and planning purposes in the financial services industry.

Originality/value

This paper is believed to be among the first to examine the impacts of national culture on IT security concerns in GFSI. The paper's conclusions may offer useful insights to corporate managers in the industry.

Details

Information Management & Computer Security, vol. 17 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 1 August 2019

Anna V. Shokhnekh, Olga A. Mironova, Lidiya A. Sizeneva, Marina N. Semenova and Al-Muttar Mohammed Yousif Oudah

The chapter presents a mechanism of innovational development of cluster of the hospitality industry in the system of region's economic security, which formation takes place in the…

Abstract

The chapter presents a mechanism of innovational development of cluster of the hospitality industry in the system of region's economic security, which formation takes place in the conditions of complex turbulent state of economy, which leads to crises of various scales and volumes. Cluster is treated as a platform that unifies efforts and partnership interactions between large, medium, and small business and synthesizes expectations of consumers on the basis of territorial concentration of readiness to care about a customer in the form of provision of the need: (1) selection and readiness of consumer to accept a specific complex service of the hospitality industry (with tourist service complexes); (2) movement (with transport complex); (3) accommodation (with hotel complex), (4) readiness for catering (with catering complex); (5) entertainment (with participation of complex of entertainment); (6) security (with security complex). The process of clustering leads to a new treatment of the notion of competition, development of capabilities to be a business partner, and finding advantages in generation of innovations together with intermediaries and neighbors.

Article
Publication date: 29 October 2019

Yongkil Ahn, Dongyeon Kim and Dong-Joo Lee

The purpose of this paper is to identify the attributes that predict customer attrition behavior in the brokerage and investment banking sectors.

Abstract

Purpose

The purpose of this paper is to identify the attributes that predict customer attrition behavior in the brokerage and investment banking sectors.

Design/methodology/approach

The authors analyze the complete stock trading records and customer profiles of 458,098 retail customers from a Korean brokerage house. The authors develop customer attrition prediction models and further explore the practicality of these models using statistical classification techniques.

Findings

The results from three different binary selection models indicate that customer transaction patterns effectively explain the attrition of active retail customers in subsequent periods. The study results demonstrate that monetary value variables are the most critical for predicting customer attrition in the securities industry.

Research limitations/implications

This study contributes to the customer attrition literature by documenting the first large-scale field-based evidence that confirms the practicality of the canonical recency, frequency and monetary (RFM) framework in the investment banking and brokerage industry. The findings advance previous survey-based studies in the financial services industry by identifying the attributes that predict customer attrition behaviors in the securities industry.

Practical implications

The outcomes can be easily operationalized for attrition prediction by practitioners in financial service firms. Moreover, the ex post density of inactive customers in the top 10 percent most-likely-to-churn group is estimated to be five to six times the ex ante unconditional attrition ratio, which ascertains that the attributes recognized in this study work well for the purpose of target marketing.

Originality/value

While the securities industry is regarded as one of the most information-intensive industries, detailed empirical investigation into customer attrition in the field has lagged behind partly due to the lack of suitable securities transaction data and demographic information at the customer level. The current research fills this gap in the literature by taking advantage of a large-scale field data set and offers a starting point for more elaborate studies on the drivers of customer attrition in the financial services sector.

Details

International Journal of Bank Marketing, vol. 38 no. 3
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 27 January 2012

Noel M. Cowell, Hilton McDavid and Tanzia S. Saunders

The purpose of this paper is to explore security management in the hospitality sector of Jamaica.

1543

Abstract

Purpose

The purpose of this paper is to explore security management in the hospitality sector of Jamaica.

Design/methodology approach

The paper is based on a combination of available documentary sources and in‐depth interviews conducted with key players in the fields of law enforcement, security management and hospitality in Jamaica.

Findings

Jamaica's image as a tourism destination has been severely damaged by reports of its high murder rates. With the exception of tourism harassment however, visitors to the island are largely unaffected by crime. This outcome is not accidental; rather it is the result of a social consensus combined with a well‐articulated, comprehensive, long‐term crime management strategy involving multiple stakeholders ranging from the level of government to the individual hospitality establishment. Despite these positives however, the paper expresses serious doubts about the sustainability of the existing tourism and hospitality model.

Research limitations/implications

The study is qualitative in nature and focuses on the hospitality sector in the major commercial centre and one of the major resort centres. Both have been characterised by high levels of criminal violence in the last decade. As such the results may offer important insights into crime management and tourism development but cannot be generalised.

Practical implications

The paper carries significant implications for policy in that it analyses the challenges of security management in a tourism destination marked by severe and complex and social contradictions.

Originality/value

Despite the enormity of the public discourse on the impact of crime on tourism, there has been little scholarly analysis of the challenges of security management in an environment marked simultaneously by extreme tourism dependence and extreme levels of criminal violence.

Details

Worldwide Hospitality and Tourism Themes, vol. 4 no. 1
Type: Research Article
ISSN: 1755-4217

Keywords

Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 April 2002

Martin Gill, Chris Moon, Polly Seaman and Vicky Turbin

This article presents the results of an exploratory investigation into the role of the security manager in the UK hotel industry, an area of management that has been…

9846

Abstract

This article presents the results of an exploratory investigation into the role of the security manager in the UK hotel industry, an area of management that has been under‐researched. In addition, this paper provides qualitative evidence about the range of crime experienced by hotels, and how this crime is managed. The paper utilises information from in‐depth interviews with five specialised security managers representing large hotels in London and 65 owners and managers of small hotels in London, Salisbury, Leicester and Brighton, UK. The findings indicate that the role of the security manager, at least in these hotels, is perceived to have undergone a process of transformation. Traditional security responsibilities of guarding and loss prevention have been broadened to include health and safety, IT security, disciplinary action, fire safety and insurance. Hotels are also shown to be unique contexts, facing a broad range of crime problems.

Details

International Journal of Contemporary Hospitality Management, vol. 14 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 1 January 2002

Alan E. Sorcher and George R. Kramer

In the midst of one of the most challenging periods in decades, the securities industry is relearning the meaning of the ancient Chinese curse – “may you live in interesting…

Abstract

In the midst of one of the most challenging periods in decades, the securities industry is relearning the meaning of the ancient Chinese curse – “may you live in interesting times”. The end of the 90’s bull market, September 11th and corporate wrongdoing have given rise to new rules and far‐reaching new statutes. At the same time, technological change and global consolidation of markets and regulations also continue to drive change, as they did throughout the 1990s. The authors highlight some of the crucial regulatory and legislative developments that will have significant consequences for the securities industry. Legislative proposals in response to the recent corporate scandals, analyst independence, anti‐money laundering rules, and the effectiveness of the Gramm‐Leach‐Bliley Act are among the issues examined.

Details

Journal of Investment Compliance, vol. 3 no. 1
Type: Research Article
ISSN: 1528-5812

Keywords

Article
Publication date: 19 August 2009

Andrej Sotlar

The purpose of this paper is to analyse the development of the private security sector in several former Yugoslav countries that have gone through difficult post‐conflict…

Abstract

Purpose

The purpose of this paper is to analyse the development of the private security sector in several former Yugoslav countries that have gone through difficult post‐conflict reconstruction including the field of security.

Design/methodology/approach

The paper takes a qualitative approach to data collection that includes interviews with experts in the field of private security from several ex‐Yugoslav countries.

Findings

While much effort is invested in the rebuilding of new, democratic public police forces in post‐conflict societies, little attention is usually paid to non‐state providers of security, for example, private security industry. Private security could, potentially, be both a crucial additional stabilising factor in assuring security in post‐conflict environments and a cause of instability if it lacks legislative control, professionalism and ethical guidance. Hence, both the state and the police should support the private security industry in helping it to achieve legitimacy and, where appropriate, partner state bodies. A well‐regulated private security sector could also become a substantial employer of large numbers of demobilised combatants in post‐conflict societies. Analyses of private security sectors in several former Yugoslav countries that experienced conflict identify a number of potential advantages and challenges. On one hand, in those countries with appropriate legislation in this regard, private security is becoming a valuable additional provider of security, while on the other hand, even strict regulation has failed to prevent some private security companies maintaining links with paramilitary, political and organised crime groups. Legal regulation is a precondition for the stable development of private security in those countries focussed upon in this paper, and this is not possible without appropriate action regarding the training, integrity and ethical behaviour of private security officers.

Research limitations/implications

The results are limited to developments in ex‐Yugoslavia, and may not be easily generalized to other situations and venues.

Practical implications

This paper provides a useful source of information for security policy makers and security experts in post‐conflict societies.

Originality/value

This paper extends understanding of the development of private security in post‐conflict societies.

Details

Policing: An International Journal of Police Strategies & Management, vol. 32 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

1 – 10 of over 80000