Search results
1 – 10 of 54The purpose of this paper is to explore the phenomena of Apple iPhone jailbreaking, a novel scenario where a company actively oppresses and discourages the co-creation of value…
Abstract
Purpose
The purpose of this paper is to explore the phenomena of Apple iPhone jailbreaking, a novel scenario where a company actively oppresses and discourages the co-creation of value and customisation of its products by loyal consumers.
Design/methodology/approach
This paper conducted a qualitative content and thematic analysis of online jailbreaker discourse to understand the motivations and reasons driving consumers to resist a brand to which they remain extremely loyal.
Findings
Three themes explain jailbreaker motivations: enhanced experience, individual right of self-expression and anti-hegemony. Further two themes explain the differing motivations driving hacktivists to create the “exploits” that are subsequently used by jailbreakers (liberating the masses; status and notoriety). Finally, an integrative conceptual model is provided to showcase how disparate theories of consumer behaviour are synthesised during this novel phenomena.
Originality/value
In contrast to previous work, the consumer activists featured in this paper are devoted to the brand and product they are resisting. Rather than switching to an alternative brand, these jailbreakers and hacktivists remain loyal to the product in a genuine effort to help the brand. Even more interesting is the brand actively oppressing these loyal consumers’ attempts to modify and, in some cases, improve their products. Overall, this paper highlights the contradictory relationship between Apple and some of its consumers and demonstrates how brand loyalty, dissatisfaction, resistance/activism and co-creation can co-exist within the same consumer–brand relationship.
Details
Keywords
MAURITANIA: Jailbreak may increase terrorism risks
CONGO-KINSHASA: Beni jailbreak may prove major blow
Details
DOI: 10.1108/OXAN-ES257012
ISSN: 2633-304X
Keywords
Geographic
Topical
A wave of prison breaks has added to the country’s broader security problems. Since late 2020, criminal gangs and extremist groups have carried out at least nine successful…
Mark A. Harris and Karen P. Patten
This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business…
Abstract
Purpose
This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs.
Design/methodology/approach
This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs.
Findings
This paper identifies emerging mobile device security risks and provides a set of minimum mobile device security recommendations practical for SMEs. However, SMEs would still have increased security risks versus large enterprises who can implement maximum mobile device security recommendations. SMEs are faced with a dilemma: embrace the mobility business strategy and adopt and invest in the necessary security technology, implement minimum precautions with increased risk, or give up their mobility business strategy.
Practical implications
This paper develops a practical list of minimum mobile device security recommendations for SMEs. It also increases the awareness of potential security risks for SMEs from mobile devices.
Originality/value
This paper expands previous research investigating SME adoption of computers, broadband internet-based services, and Wi-Fi by adding mobile devices. It describes the SME competitive advantages from adopting mobile devices for enterprise business mobility, while accentuating the increased business risks and implications for SMEs.
Details
Keywords
COVID-19 and prisons.
Details
DOI: 10.1108/OXAN-DB252818
ISSN: 2633-304X
Keywords
Geographic
Topical
The embarrassing jailbreak tarnishes the mandate Mexico's mid-term election gave the administration of President Enrique Pena Nieto to consolidate its reform programme…
Details
DOI: 10.1108/OXAN-DB200939
ISSN: 2633-304X
Keywords
Geographic
Topical
Kristen Lane and Sidney J. Levy
Advances in information technology have enabled consumers to connect and communicate as they never have before. This chapter conceptualizes information and the digital machines…
Abstract
Advances in information technology have enabled consumers to connect and communicate as they never have before. This chapter conceptualizes information and the digital machines that enable contemporary connection and communication as being part of a “Moveable Feast.” A brief historical review tracing the impact and evolution of information technology on consumers’ lives and the marketplace is first provided. Culminating the historical review is a metaphorical description of the current period as a “Moveable Feast” of information, whereby consumers and digital machines interact to create and share information “dishes” with other consumers worldwide. With this guiding metaphor in place, current marketing-relevant information phenomena are described within a framework of three important digital dyads proposed to exist between humans and machines. Deep discussion of machine–machine, human–machine, and human–human dyads points to the importance of information as a resource that consumers create and exchange in the contemporary marketplace. This chapter concludes by encouraging marketers and marketing researchers to consider the impact and importance of digital information and information technology on consumers’ ability to connect and communicate with digital machines and with one another.
Details
Keywords
Sigi Goode and Amir Riaz
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…
Abstract
Purpose
It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.
Design/methodology/approach
This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.
Findings
Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.
Originality/value
To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.
Details
Keywords
For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less…
Abstract
Purpose
For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using other Internet-enabled devices such as laptop and desktop. Because of this, the inexperienced Indian smartphone user may be vulnerable to Internet-related security breaches, as compared to the citizens of developed economies. Hence, it is essential to understand the attitude, behaviour and security practices of smartphone users in India. Limited research is available about the security behaviour of smartphone users in India as the majority of research in this domain is done outside India.
Design/methodology/approach
In this empirical study, the researchers identified 28 cybersecurity behaviours and practices through a survey of relevant literature. An online survey of identified cybersecurity behaviours and practices was administered to 300 smartphone users. Frequency analysis of the respondent data was done to understand the adoption of recommended cybersecurity behaviours and practices. Pearson’s chi-square with 5% level of significance has been used to test the hypotheses. Post hoc analysis with Bonferroni correction was conducted for statistically significant associations.
Findings
Overall, the respondents did not exhibit good cybersecurity behaviour. Respondents have adopted some of the most popular security features of the smartphone such as the use of screen lock. However, respondents have not adopted or are not aware of the technical security controls such as encryption and remote wipe. Statistically significant differences were found between the cybersecurity behaviour and practices and independent variables such as gender, age, mobile operating system (OS) and mother tongue. Respondents reported high level of motivation to protect their device and data, whereas they reported moderate level of threat awareness and the ability to protect to their device and data. Results of the comparative analysis with a similar study in China and the USA are also reported in this study.
Research limitations/implications
The main limitations of this study are as follows: the respondents' perceptions about their cybersecurity behaviours and practices were measured as opposed to their actual behaviours and practices and the generalizability of the study is limited because the sample size is small as compared to the total number of smartphone users in India.
Practical implications
The findings of this study may be useful for the design of effective cybersecurity prevention and intervention programs for general smartphone users of India.
Originality/value
This study provides an insight about cybersecurity behaviour of smartphone users in India. To the knowledge of the researchers, this is the first study to collect such quantitative data of smartphone users in India for a better understanding of the cybersecurity behaviours and practices. This study identified 28 cybersecurity behaviours and practices, which smartphone users should follow to improve cybersecurity.
Details