Brynne Harrison, Elena Svetieva and Arun Vishwanath
The purpose of this paper is to explore user susceptibility to phishing by unpacking the mechanisms that may influence individual victimization. The focus is on the…
Abstract
Purpose
The purpose of this paper is to explore user susceptibility to phishing by unpacking the mechanisms that may influence individual victimization. The focus is on the characteristics of the e-mail message, users’ knowledge and experience with phishing, and the manner in which these interact and influence how users cognitively process phishing e-mails.
Design/methodology/approach
A field experiment was conducted where 194 subjects were exposed to a real phishing attack. The experimenters manipulated the contents of the message and measures of user traits and user processing were obtained after the phishing attack.
Findings
Of the original list of targets, 47 percent divulged their private information to a bogus form page. Phishing susceptibility was predicted by a particular combination of both low attention to the e-mail elements and high elaboration of the phishing message. The presence of a threat or reward-based phishing message did not affect these processes, nor did it affect subsequent phishing susceptibility. Finally, individual factors such as knowledge and experience with e-mail increased resilience to the phishing attack.
Research limitations/implications
The findings are generalizable to students who are a particularly vulnerable target of phishing attacks.
Practical implications
The results presented in this study provide pragmatic recommendations for developing user-centered interventions to thwart phishing attacks. Lastly the authors suggest more effective educational efforts to protect individuals from such online fraud.
Originality/value
This study provides novel insight into why phishing is successful, the human factor in susceptibility to online deception as well the role of information processing in effective decision making in this context. Based on the findings, the authors dispel common misconceptions about phishing and discuss more effective educational efforts to protect individuals from such online fraud.
Details
Keywords
Diantha D’Costa, Virginia Bodolica and Martin Spraggon
Upon completion of this case study analysis, the course audience is expected to achieve four learning outcomes. In particular, students should be able to conduct a comprehensive…
Abstract
Learning outcomes
Upon completion of this case study analysis, the course audience is expected to achieve four learning outcomes. In particular, students should be able to conduct a comprehensive organizational diagnosis to uncover the peculiarities of managing a family business; analyze the specific challenges faced by family-owned enterprises in the context of emerging markets; evaluate the succession management practices in family organizations and design a profile of a successful successor; assess the effectiveness of managerial decision-making and provide recommendations for securing the sustainability of a family firm.
Case overview/synopsis
This case study unveils the tumultuous story of Vishwanath Shetty, an ambitious entrepreneur who transformed his small venture into a profitable family business with operations in Middle East, Asia and Africa. Since the early establishment of Qontrac International in 1989, he relied on the ownership and management participation of several members of his and his wife’s families. Over the years, Vishwanath was successful in pursuing a strategy of continuous growth and geographic diversification by taking advantage of the business opportunities in several regions and opening up branches in Oman, the United Arab Emirates (UAE), Ghana and India. Yet, almost three decades after its launch, the company was confronted with a number of family, growth and succession management challenges that endangered its survival in the long run. The Shetty family experienced a serious rift due to financial reasons, the performance of the two branches managed by siblings declined, and the old firm structure and management style did not fit well with the newly enlarged and geographically dispersed Qontrac International. To deal with these organizational issues, Vishwanath was faced with an additional dilemma of securing the support of a suitable intra-family candidate who could join the family business and become his successor. By describing the strategic events and family dynamics that shaped the evolution of Qontrac International over time, the case provides an opportunity to assess the effectiveness of managerial decision-making in the context of family firms and provide viable recommendations for ensuring firm survival and longevity.
Complexity academic level
Upper-level undergraduate audience Graduate audience (in Master of Global Entrepreneurial Management program).
Supplementary materials
Teaching Notes are available for educators only. Please contact your library to gain login details or email support@emeraldinsight.com to request teaching notes.
Subject code
Strategy.
Details
Keywords
Western business-to-business firms are under increasing competition from firms in emerging nations. As examples, Mindray in medical devices, LiuGong in earth moving equipment…
Abstract
Purpose
Western business-to-business firms are under increasing competition from firms in emerging nations. As examples, Mindray in medical devices, LiuGong in earth moving equipment, Tata motors in Buses and Suzlon in Wind turbines are emerging as strong competitors in their industries. Yet despite increased competition from emerging nation firms, insufficient research has examined the growth of these firms, specifically in the areas of technology and innovation development processes. The purpose of this study is to examine how emerging nation business-to-business firms that have global ambitions achieve technology competence.
Design/methodology/approach
The authors examined several case studies on emerging market business-to-business firms that have moved to global markets and highlight the following five: LiuGong China (excavating products), Mindray China (medical equipment), Suzlon Energy India (wind generators), Tata Motors Buses India and BYD Auto China (batteries to electric cars). The firms are in business-to-business markets, except for BYD China that emerged as a business-to-business battery supplier but is currently in both business-to-business and business-to-consumer markets.
Findings
The authors find that firms in emerging markets that have global ambitions follow different approaches to innovation development processes from conventional theories and assumptions held by scholars and practitioners in Western developed countries. Our cases suggest that firms follow the proposed progression: domestic markets – internally developed technology; domestic markets –acquired technology; and finally to, global markets – acquired technology.
Researchlimitations/implications
The authors contribute to research in three areas. First, they suggest that the innovation development process for emerging market firms is different from the Western world. Second, they provide a framework of innovation development process that can be tested in multiple environments. Third, this study suggests a deeper examination of the longitudinal development of business-to-business firms, an area that has received less attention.
Practicalimplications
The authors suggest that firms need to better track their competition from emerging nations because emerging nation firms can quickly acquire technology to become strong competitors.
Originality/value
Extant research has not examined these issues.
Details
Keywords
Using case studies of business process outsourcing enterprises in India, this study aims to discuss how impact sourcing is used to provide employment opportunities to persons with…
Abstract
Purpose
Using case studies of business process outsourcing enterprises in India, this study aims to discuss how impact sourcing is used to provide employment opportunities to persons with disabilities (PWDs) and summarizes the business factors associated with successful impact sourcing for PWDs.
Design/methodology/approach
The effect of impact sourcing on the employment of PWDs is a newly emerging phenomenon, and this study focuses on the impact-sourcing mechanism and investigates whether such sourcing contributes to promoting PWD employment in India. It does so by examining the business model characteristics of organizations through case studies.
Findings
The results show that effective training systems and operational styles enable continuous market competitiveness for social enterprises. The case studies also demonstrate that it is possible to expand businesses by transferring and replicating management know-how through an organization’s operating model. It also highlights the catalytic role of impact sourcing service providers in promoting formal PWD employment in a labor market where the informal economy is dominant. Central and local governments’ support for social enterprises may promote formal employment of PWDs, an internationally-recognized goal.
Originality/value
Impact sourcing for PWDs is an emerging field. This study offers a new contribution to existing work integration social enterprises literature by providing new insight into effective ways of achieving employment for PWDs through outsourcing business. This study highlights the important role of social enterprises in achieving formal employment of PWDs.
Details
Keywords
This study aims to review and analyze sustainable business practices prevailing in different emerging countries in Asia. It also identifies the challenges faced by these countries…
Abstract
Purpose
This study aims to review and analyze sustainable business practices prevailing in different emerging countries in Asia. It also identifies the challenges faced by these countries in the implementation of sustainable practices.
Design/methodology/approach
To achieve the objectives of the study and answer the key research questions, systematic literature review method was chosen. A total of 75 papers were chosen and reviewed for this study.
Findings
Organizations in many emerging Asian countries are concerned about environmental aspects and have started investing in sustainable business practices. Yet they face many challenges during the implementation, which vary across countries.
Research limitations/implications
This study helps in understanding the sustainable practices that are currently being used in Asia and this understanding would help organizations and policy makers formulate new practices or improve upon existing ones for better outcomes. As the study was limited to a few representative countries in Asia, and a limited number of sectors, future research may build upon it by including more countries and sectors and perform empirical tests for comprehensive understanding of the topic under discussion.
Practical implications
With an idea of what works in various Asian countries, as garnered from this paper, organizations can adopt sustainable practices suited to them, while also training employees and all stakeholders on the implementation of these practices.
Social implications
A knowledge of the challenges in each country to sustainable practice implementation, identified from this paper, can help policymakers frame and implement policies that can overcome the shortcomings of the existing systems.
Originality/value
This paper is a pioneer in the area of sustainable business practices in Asia and is a one-stop source to understand current trends and challenges in the Asian context.
Details
Keywords
Noman H. Chowdhury, Marc T.P. Adam and Timm Teubner
A growing body of research has identified time pressure as a key driver of cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS documents (e.g…
Abstract
Purpose
A growing body of research has identified time pressure as a key driver of cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS documents (e.g. best practices, guidelines and policies) intended to strengthen CS. The purpose of this paper is to provide an overview of how specifically time pressure is addressed by CS documents.
Design/methodology/approach
The authors conducted a systematic search for CS documents followed by a content analysis of the identified documents. First, the authors carried out a systematic Web search and identified 92 formal and informal CS documents (e.g. security policies, procedures, guidelines, manuals and best practices). Second, they systematically analyzed the resulting documents (n = 92), using a structured approach of data familiarization and low-/high-level coding for the identification and interpretation of themes. Based on this analysis, the authors formulated a conceptual framework that captures the sources and effects of time pressure along the themes of industry, operations and users.
Findings
The authors developed a conceptual framework that outlines the role of time pressure for the CS industry, threats and operations. This provides a shared frame of reference for researchers and practitioners to understand the antecedents and consequences of time pressure in the organizational CS context.
Research limitations/implications
While the analyzed documents acknowledge time pressure as an important factor for CS, the documents provide limited information on how to respond to these concerns. Future research could, hence, consult with CS experts and policymakers to inform the development of effective guidelines and policies on how to address time pressure in the identified areas. A dedicated analysis within each area will allow to investigate the corresponding aspects of time pressure in-depth along with a consideration for targeted guidelines and policies. Last, note that a differentiation between CS document types (e.g. formal vs informal and global vs regional) was beyond the scope of this paper and may be investigated by future work.
Originality/value
This study makes three main contributions to the CS literature. First, this study broadens the understanding of the role of time pressure in CS to consider the organizational perspective along the themes of industry, threats and operations. Second, this study provides the first comprehensive assessment of how organizations address time pressure through CS documents, and how this compares to existing research in academic literature. Third, by developing a conceptual framework, this study provides a shared frame of reference for researchers and practitioners to further develop CS documents that consider time pressure’s role in secure behavior.