An empirical investigation of the factors that influence Internet user’s ability to correctly identify a phishing website

2014 ◽  
Vol 22 (3) ◽  
pp. 194-234 ◽  
Author(s):  
Swapan Purkait ◽  
Sadhan Kumar De ◽  
Damodar Suar

Purpose – The aim of this study is to report on the results of an empirical investigation of the various factors which have significant impacts on the Internet user’s ability to correctly identify a phishing website. Design/methodology/approach – The research participants were Internet users who have had at least some experience of financial transactions over the Internet. This study conducted a quantitative research with the help of a structured survey questionnaire along with three experimental tasks. A total of 621 valid samples were collected and the multiple regression analysis technique was used to deduce the answers to the research question. Findings – The results show that the model is useful and has explanatory power. And adjusted R2 computed as 0.927, means that 92.7 per cent of the variations in the Internet user’s ability to identify phishing website can be explained by the predictors selected for the model. Research limitations/implications – Future research should account for the Internet user’s general security practices and behaviour, attitude towards online financial activity, risk-taking ability or risk behaviour and their potential effects on Internet users' ability to identify a phishing website. Practical implications – The implications of this study provide the foundation for future research on the areas that intend to explain the Internet user’s necessity to take protection or avoid risky behaviour while performing financial transaction over the Internet. Originality/value – This study provides the body of knowledge with an empirical analysis of impact of various factors on an Internet user’s ability to identify phishing websites. The results of this study can help practitioners create a more successful research model and help researchers better understand user behaviour on the Internet.

2017 ◽  
Vol 29 (3) ◽  
pp. 862-882 ◽  
Author(s):  
Fiona X. Yang ◽  
Sherry Xiuchang Tan

Purpose This paper aims to empirically investigate how event innovation may induce desirable corporate branding. Design/methodology/approach A survey yielded 280 complete responses from tourists who had attended an event in Macau. Structural equation modeling was used to test the innovation-corporate loyalty framework through perceived event value and corporate image, with a multi-group comparison to examine differences between first-time and repeat customers. Findings The results indicate that innovation is not only the key to value enhancement of the event but also an efficacious instrument of branding the parent company and building corporate loyalty; only product-related innovation has a significant impact on event value; both functional and emotional values induce a more favorable corporate image; and event-induced corporate branding is more effective in securing repeat business than attracting new clientele. Practical implications The findings help hospitality operators and event planners to leverage innovative events for corporate branding and cater to different customer segments by providing distinct marketing strategies. Originality/value The study contributes to the body of knowledge regarding event management and corporate branding and sheds light on future research to explore the initiative and benefit of pushing forward event innovation.


2004 ◽  
Vol 21 (2) ◽  
pp. 115-126 ◽  
Author(s):  
Monica T. Whitty

AbstractWhile flirting is a relatively underresearched area within psychology, even less is known about how people cyber-flirt. This paper explores how often individuals flirt offline compared to online. Moreover, it attempts to examine how men and women flirt within these different spaces. Five thousand, six hundred and ninety-seven individuals, of which 3554 (62%) were women and 2143 (38%) were men, completed a survey about their flirting behaviour both in face-to-face interactions and in chatrooms. The first hypothesis, which stated that the body would be used to flirt with as frequently online as offline, was partly supported. However, it was found that individuals downplayed the importance of physical attractiveness online. Women flirted by displaying nonverbal signals (offline) or substitutes for nonverbal cues (online), to a greater extent than men. In chatrooms men were more likely than women to initiate contact. It is concluded that cyber-flirting is more than simply a meeting of minds and that future research needs to consider the role of the body in online interactions.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Adrian St. Patrick Duncan

Purpose The purpose of this paper hinged on the concept of smart libraries and their development for the furtherance of information access, dissemination and information resources and services delivery in Caribbean libraries. Design/methodology/approach To conduct this research, the literature of smart libraries and technologically driven and their application in libraries were reviewed by examining existing literature on information and communication technologies and technology in libraries. Findings The literature highlighted that this technological advancement is not yet fully on stream in academic libraries of the Caribbean owing to the lack of financial, technological and organizational resources. It further outlined that certain aspects of library automation are fostered through the inclusion of technology. Research limitations/implications The limitation of this study is that only academic libraries of the Caribbean region were assessed. Other regions should be explored in future research. Originality/value The concept of smart libraries is an emerging issue with limited scope for scrutiny; a systematic and extensive review of recent research on smart in libraries is unavailable. This paper presents an overview of smart libraries or technologically driven libraries, its findings for potential research opportunities and development for academic libraries. In addition, it will build on the body of knowledge that is presently non-existent on smart libraries in the Caribbean.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Yusheng Lu ◽  
Jiantong Zhang

PurposeThe digital revolution and the use of big data (BD) in particular has important applications in the construction industry. In construction, massive amounts of heterogeneous data need to be analyzed to improve onsite efficiency. This article presents a systematic review and identifies future research directions, presenting valuable conclusions derived from rigorous bibliometric tools. The results of this study may provide guidelines for construction engineering and global policymaking to change the current low-efficiency of construction sites.Design/methodology/approachThis study identifies research trends from 1,253 peer-reviewed papers, using general statistics, keyword co-occurrence analysis, critical review, and qualitative-bibliometric techniques in two rounds of search.FindingsThe number of studies in this area rapidly increased from 2012 to 2020. A significant number of publications originated in the UK, China, the US, and Australia, and the smallest number from one of these countries is more than twice the largest number in the remaining countries. Keyword co-occurrence is divided into three clusters: BD application scenarios, emerging technology in BD, and BD management. Currently developing approaches in BD analytics include machine learning, data mining, and heuristic-optimization algorithms such as graph convolutional, recurrent neural networks and natural language processes (NLP). Studies have focused on safety management, energy reduction, and cost prediction. Blockchain integrated with BD is a promising means of managing construction contracts.Research limitations/implicationsThe study of BD is in a stage of rapid development, and this bibliometric analysis is only a part of the necessary practical analysis.Practical implicationsNational policies, temporal and spatial distribution, BD flow are interpreted, and the results of this may provide guidelines for policymakers. Overall, this work may develop the body of knowledge, producing a reference point and identifying future development.Originality/valueTo our knowledge, this is the first bibliometric review of BD in the construction industry. This study can also benefit construction practitioners by providing them a focused perspective of BD for emerging practices in the construction industry.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rhoydah Nyambane

Purpose The purpose of this paper is to establish the place of the printed book in the era of technological advancement with the assumption that the print media is facing imminent death in the face of readily available and convenient online information. Also the paper aims to assess how the development of new technologies have affected the production, circulation and readership of the printed book, especially among the young generation. Design/methodology/approach Explanatory study was used with closed-ended approach to collect data from 50 students of the Technical University of Kenya and 5 key informant interviews with selected book publishers in Nairobi. The uses and gratification theory was used to explore the knowledge-seeking behavior among the respondents. Findings Findings showed that more than 80% of the respondents preferred the internet to the printed book, which, according to them, has no future in the face of technological advancement. Book publishers, on the other hand, felt that the printed book has a bright future among specific audiences who are committed to it, and especially those in the rural areas who have no access to the internet. While they agreed that the internet has posed a major challenge to the sales and readership of the printed book significantly, it is helping in marketing the printed book as opposed to killing it. New bookshops in Nairobi and modern libraries in high schools, tertiary institutions and universities demonstrate that the printed book is not dying soon. Research limitations/implications The researcher experienced challenges in data collection as the respondents were busy preparing for final examinations and hence many of them were not willing to spare time to fill the questionnaire. To solve this, the researcher had to spend more time to collect data as opposed to if the students were free and ready to participate in the study without any pressure. Practical implications The findings can be used as a basis for further research to widen the scope that can help bring a wider perspective to the topic. The results can also inform policy guidelines on the topic and also contribute to the body of knowledge. Social implications The topic touches on social phenomena that are affecting a number of young people and their information-seeking habits in the era of digital revolution. The way the young generation seek and use information should be of interest not only to academic staff but also to policymakers. Originality/value The paper is original based on primary data that was collected by the researcher from the respondents. It is backed by secondary data to bridge the gap between theory and practice.


2017 ◽  
Vol 16 (3) ◽  
pp. 303-318 ◽  
Author(s):  
Denise Dávila ◽  
Meghan E. Barnes

Purpose Grounded in the scholarship addressing teacher self-censorship around controversial topics, this paper aims to investigate a three-part research question: How do secondary English language arts (ELA) teacher–candidates (TCs) in the penultimate semester of their undergraduate teacher education program position political texts/speeches, interpret high school teens’ political standpoints and view the prospects of discussing political texts/speeches with students? The study findings provide insights to the ways some TCs might position themselves as novice ELA teachers relative to political texts/speeches, students, colleagues and families in their future school communities. Design/methodology/approach Audio-recorded data from whole-class and small-group discussions were coded for TCs’ positioning of political texts/speeches, interpretations of teens’ political standpoints and viewpoints on discussing with students President Obama’s speech, “A More Perfect Union” (“A.M.P.U.”) The coded data set was further analyzed to identify themes across the TCs’ perspectives. Findings The data set tells the story of a group of TCs whose positionalities, background knowledge and practical experiences in navigating divergent perspectives would influence both their daily selection and censorship of political texts/speeches like “A.M.P.U.” and their subsequent willingness to guide equitable yet critical conversations about controversial issues in the secondary ELA classroom. Originality/value In advance of the 2018 midterm elections, this paper considers how the common core state standards’ (CCSS) recommendations to include more nonfiction documents in ELA instruction positions ELA teachers to provide interdisciplinary support in helping students think critically about political issues. It expands on the body of scholarship that, thus far, has been primarily grounded in the research on social studies instruction.


2019 ◽  
Vol 14 (1) ◽  
pp. 91-114 ◽  
Author(s):  
Ju Liu

Purpose The purpose of this paper is to contextually theorise the different patterns of emerging multinational companies’ (EMNCs’) learning processes for innovation and the different influences of their technology-driven FDIs (TFDIs) on the processes. Design/methodology/approach A comparative case study method and process tracing technique are employed to investigate how and why firms’ learning processes for innovation took place, how and why the TFDIs emerged and influenced the firms’ learning processes in different ways. Findings The paper identifies two different patterns of learning process for innovation (Glider model vs Helicopter model) and two different roles of the case firms’ TFDIs (accelerator vs starter) in the different contexts of their learning processes. It is found that the capability building of the domestic wind energy industry has an important influence on the case of EMNCs’ learning processes and thus on the roles of their TFDIs. Research limitations/implications The limitation of the paper lies in its small number of cases in a specific industry of a specific country. The two contextually identified learning models and roles of TFDIs may not be applied to other industries or other countries. Future research should investigate more cases in broader sectoral and geographic scope to test the models and also to identify new models. Practical implications For EMNCs, who wants to use the Helicopter model to rapidly gain production and innovation capability, cross-cultural management and integration management are crucial to practitioners. For emerging countries with ambitions to explore the global knowledge and technology pool, besides of the EMNC’s capability building, the capability building in the domestic industries should not be overlooked by policy makers. Originality/value The paper develops a dynamic and contextual analytical framework which helps to answer the important questions about how and under what context a TFDI emerges and influences firm’s learning process for innovation. It theorises the EMNCs’ learning process and TFDIs in the context of the development of the domestic industry. It strengthens the explanatory power of the learning-based view and adds new knowledge to the current FSA/CSA discourse in the international business literature.


2018 ◽  
Vol 26 (3) ◽  
pp. 264-276 ◽  
Author(s):  
Jurjen Jansen ◽  
Paul van Schaik

Purpose The purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In addition, it was tested to what extent the model relations are equivalent across fear appeal conditions and across time. Design/methodology/approach A pre-test post-test design was used. In the pre-test, 1,201 internet users filled out an online survey and were presented with one of three fear appeal conditions: strong fear appeal, weak fear appeal and control condition. Arguments regarding vulnerability of phishing attacks and response efficacy of vigilant online information-sharing behaviour were manipulated in the fear appeals. In the post-test, data were collected from 786 internet users and analysed with partial least squares path modelling. Findings The study found that PMT model relations hold in the domain of phishing. Self-efficacy and fear were the most important predictors of protection motivation. In general, the model results were equivalent across conditions and across time. Practical Implications It is important to consider online information-sharing behaviour because it facilitates the occurrence and success of phishing attacks. The results give practitioners more insight into important factors to address in the design of preventative measures to reduce the success of phishing attacks. Future research is needed to test how fear appeals work in real-world settings and over longer periods. Originality/value This paper is a substantial adaptation of a previous conference paper (Jansen and Van Schaik, 2017a, b).


2019 ◽  
Vol 43 (5) ◽  
pp. 799-817 ◽  
Author(s):  
Ivan-Damir Anic ◽  
Jelena Budak ◽  
Edo Rajh ◽  
Vedran Recher ◽  
Vatroslav Skare ◽  
...  

Purpose The purpose of this paper is to investigate the relationship between individual and societal determinants of online privacy concern (OPC) and behavioral intention of internet users. The study also aims to assess the degree of reciprocity between consumers’ perceived benefits of using the internet and their OPC in the context of their decision-making process in the online environment. Design/methodology/approach The study proposes comprehensive model for analysis of antecedents and consequences of OPC. Empirical analysis is performed using the PLS–SEM approach on a representative sample of 2,060 internet users. Findings The findings show that computer anxiety and perceived quality of regulatory framework are significant antecedents of OPC, while traditional values and inclinations toward security, family and social order; and social trust are not. Furthermore, the study reveals that perceived benefits of using the internet are the predominant factor explaining the intention to share personal information and adopt new technologies, while OPC dominates in explanation of protective behavior. Research limitations/implications Although the authors tested an extended model, there might be other individual characteristics driving the level of OPC. This research covers just one country and further replications should be conducted to confirm findings in diverse socio-economic contexts. It is impossible to capture the real behavior with survey data, and experimental studies may be needed to verify the research model. Practical implications Managers should work toward maximizing perceived benefits of consumers’ online interaction with the company, while at the same time being transparent about the gathered data and their intended purpose. Considering the latter, companies should clearly communicate their compliance with the emerging new data protection regulation. Originality/value New extended model is developed and empirically tested, consolidating current different streams of research into one conceptual model.


2017 ◽  
Vol 10 (3) ◽  
pp. 342-359 ◽  
Author(s):  
Mokter Hossain

Purpose The purpose of this paper is to provide state-of-the-art knowledge about business model innovation (BMI) and suggest avenues for future research. Design/methodology/approach A systematic literature review approach was adopted with thematic analysis being conducted on 92 articles. Findings The body of knowledge for this concept is in its infancy and is highly fragmented. This study therefore attempts to consolidate this fragmented knowledge. It reveals dominant themes, establishes coherence, and identifies conflicting arguments in the current literature. It also points out gaps in the research and highlights new directions for research. Research limitations/implications This study analyzed articles that were found based on a systematic literature review approach. Practical implications This study identifies some fundamental issues that managers need to understand regarding BMI. Originality/value The main value of this study lies in its synthesis of the current knowledge of BMI.


Sign in / Sign up

Export Citation Format

Share Document