Joseph York Thomas and David P. Biros
The study of deception and the theories, which have been developed have relied heavily on laboratory experiments in controlled environments, using American college students…
Abstract
Purpose
The study of deception and the theories, which have been developed have relied heavily on laboratory experiments in controlled environments, using American college students participating in mock scenarios. The purpose of this paper is to validate previous deception detection research in a real-world, high stakes environment where the unit of analysis is the question–response pair.
Design/methodology/approach
The study used previously confirmed linguistic and paralinguistic speech cues and the constructs of deception in an attempt to validate a leading deception theory, interpersonal deception theory (IDT). A combination of descriptive and predictive analysis was conducted to best understand the relationship between speech cues and changes in the subjects’ behavior.
Findings
The result validates IDT with mixed results on individual measures and their constructs. However, there is clear evidence across the 711 question-response pairs that not only was it possible to differentiate truth from deceptive behavior but also patterns of behavior can be seen over time.
Research limitations/implications
Because of the real-world nature of the study, it is difficult to generalize the results to a larger population. However, one implication for future research is the development of methods to capture, process and prepare raw speech into data ready for analysis.
Originality/value
This paper attempts to fill the gap between the controlled mock scenarios and the harsh reality of real-world deception.
Details
Keywords
Fletcher Glancy, David P. Biros, Nan Liang and Andy Luse
The authors argue that the current studies about malicious insiders confuse the fact that malicious attacks belong to two different categories, namely, those that launch…
Abstract
Purpose
The authors argue that the current studies about malicious insiders confuse the fact that malicious attacks belong to two different categories, namely, those that launch instrumental attacks and expressive attacks. The authors collect malicious insider data from publicly available sources and use text-mining techniques to analyze the association between malicious insiders’ characteristics and the different types of attack.
Design/methodology/approach
The authors investigated the relationship between personality characteristics and different types of malicious attacks. For the personality characteristics, the authors use the same method as Liang et al. (2016), which extracted these characteristics based on a keyword-characteristic dictionary. For different types of malicious attacks, two raters rated each case based on criteria modified from criminology research to determine the degree of expressiveness and instrumentality.
Findings
The results show that malicious insiders who are manipulative or seeking personal gain tend to carry out instrumental attacks. Malicious insiders who are arrogant tend to conduct expressive attacks.
Research limitations/implications
This study uses third party articles to identify the personality characteristics of known malicious insiders. As such, not all personality characteristics may have been reported. Data availability was an issue.
Practical implications
Understanding if different personality characteristics lead different types of attacks can help managers identify employees who exhibit them and mitigate an attack before it occurs.
Social implications
Malicious insider attacks can have devastating results on businesses and employees. Help to identify potential malicious insiders before they act, may prevent undue harm.
Originality/value
This study used 132 cases of none malicious insiders to examine their attack objectives. No other study that the authors know of used that many cases.
Details
Keywords
Forough Nasirpouri Shadbad and David Biros
This study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to…
Abstract
Purpose
This study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to investigate how technostress resulting from employees' constant interaction with IT influences the likelihood of security incidents. Although past research studied the concept of security-related technostress, the effect of IT use itself on employees’ extra-role activities such as security-related behaviors is unanswered. Thus, this paper aims to provide an understanding of the negative impact of technostress on employee information security policy (ISP) compliance.
Design/methodology/approach
Drawing on technostress literature, this research develops a research model that investigates the effect of technostress on employee intention to violate ISPs. It also extends the dimensionality of technostress construct by adding a new dimension called “techno-unreliability” that shows promising results. The authors use online survey data from a sample of 356 employees who have technology-based professions. We apply the structural equation modeling technique to evaluate the proposed research model.
Findings
Findings showed that IT use imposes high-level perceptions of a set of technostress creators, which makes users rationalize their ISP violations and engage in non-compliant behaviors. Further analysis of each dimension of technostress showed that techno-complexity, techno-invasion and techno-insecurity account for higher ISP non-compliant behaviors.
Originality/value
This study provides a new understanding of technostress to the context of information security and emphasizes on its negative impact on employee ISP compliance behaviors.
Details
Keywords
The nature of technologies that are recognised as Artificial Intelligence (AI) has continually changed over time to be something more advanced than other technologies. Despite the…
Abstract
The nature of technologies that are recognised as Artificial Intelligence (AI) has continually changed over time to be something more advanced than other technologies. Despite the fluidity of understanding of AI, the most common theme that has stuck with AI is ‘human-like decision making’. Advancements in processing power, coupled with big data technologies, gave rise to highly accurate prediction algorithms. Analytical techniques which use multi-layered neural networks such as machine learning and deep learning have emerged as the drivers of these AI-based applications. Due to easy access and growing information workforce, these algorithms are extensively used in a plethora of industries ranging from healthcare, transportation, finance, legal systems, to even military. AI-tools have the potential to transform industries and societies through automation. Conversely, the undesirable or negative consequences of AI-tools have harmed their respective organisations in social, financial and legal spheres. As the use of these algorithms propagates in the industry, the AI-based decisions have the potential to affect large portions of the population, sometimes involving vulnerable groups in society. This chapter presents an overview of AI’s use in organisations by discussing the following: first, it discusses the core components of AI. Second, the chapter discusses common goals organisations can achieve with AI. Third, it examines different types of AI. Fourth, it discusses unintended consequences that may take place in organisations due to the use of AI. Fifth, it discusses vulnerabilities that may arise from AI systems. Lastly, this chapter offers some recommendations for industries to consider regarding the development and implementation of AI systems.
Details
Keywords
S. Außerhofer, O. Bíró and K. Preis
The purpose of this paper is to describe a method for solving eddy current problems. Discontinuous basis functions are applied to conducting regions in eddy‐current problems. This…
Abstract
Purpose
The purpose of this paper is to describe a method for solving eddy current problems. Discontinuous basis functions are applied to conducting regions in eddy‐current problems. This results in a block‐diagonal mass matrix allowing explicit time stepping without having to solve large algebraic systems.
Design/methodology/approach
The effect of the basis functions in the conducting region is limited to the respective finite element. This yields to a block‐diagonal mass matrix, whereas each block in this matrix belongs to one finite element. In the nonconducting region, traditional finite elements are used which leads to well‐conditioned system matrices. For the two regions, different time steps are used.
Findings
To avoid instability, a term which penalizes the tangential jump of the magnetic vector potential A has to be added. A value for weighting this term is suggested and tested on a simple two dimensional example.
Originality/value
The proposed method leads to a potentially fast method for solving eddy‐current problems.
Details
Keywords
S. Rainer O. Bíró and A. Stermecki
Different solution methods, using finite element method in continuous and discrete frequency domain, are compared with each other in order to find the most appropriate method for…
Abstract
Purpose
Different solution methods, using finite element method in continuous and discrete frequency domain, are compared with each other in order to find the most appropriate method for the estimation of steady state vibrations in linear structural and mechanical problems. The purpose of this paper is to describe the procedures.
Design/methodology/approach
The continuous and some relevant discrete frequency domain solution methods are compared by an analytical investigation as well as by the numerical examination of a simple model. Finally, results for a more relevant example using finite elements are presented.
Findings
It is shown that the steady state computation using the continuous frequency domain system description delivers the exact solution for a given system.
Originality/value
Based on the presented results, the use of continuous frequency domain system description is recommendable in most cases.
Details
Keywords
Karl Hollaus, Oszkár Bíró, Gernot Matzenauer, Christian Stockreiter, Bernhard Weiß, Peter Caldera and Gerhard Paoli
The purpose of this paper is to study the extraction of scattering parameters (SPs) from simple structures on a printed circuit board (PCB) by the finite difference time domain…
Abstract
Purpose
The purpose of this paper is to study the extraction of scattering parameters (SPs) from simple structures on a printed circuit board (PCB) by the finite difference time domain (FDTD) method with the aid of a surface impedance boundary condition (SIBC).
Design/methodology/approach
The incorporation of SIBC into the FDTD method is described for the general case. The excitation of a field problem by a field pattern and the transition from the field solution to a circuit representation by SPs is discussed.
Findings
SPs obtained by FDTD with SIBC are validated with semi‐analytic solutions and compared with results obtained by different numerical methods. Results of a microstrip with a discontinuity considering losses are presented demonstrating the capability of the present method.
Originality/value
The comparison of numerical results obtained by different methods demonstrates the capability of the present method to extract SPs from PCBs very efficiently.
Details
Keywords
Gergely Koczka, Stefan Außerhofer, Oszkár Bíró and Kurt Preis
The purpose of the paper is to present a method for efficiently obtaining the steady‐state solution of the quasi‐static Maxwell's equations in case of nonlinear material…
Abstract
Purpose
The purpose of the paper is to present a method for efficiently obtaining the steady‐state solution of the quasi‐static Maxwell's equations in case of nonlinear material properties and periodic excitations.
Design/methodology/approach
The fixed‐point method is used to take account of the nonlinearity of the material properties. The harmonic balance principle and a time periodic technique give the periodic solution in all nonlinear iterations. Owing to the application of the fixed‐point technique the harmonics are decoupled. The optimal parameter of the fixed‐point method is determined to accelerate its convergence speed. It is shown how this algorithm works with iterative linear equation solvers.
Findings
The optimal parameter of the fixed‐point method is determined and it is also shown how this method works if the equation systems are solved iteratively.
Originality/value
The convergence criterion of the iterative linear equation solver is determined. The method is used to solve three‐dimensional problems.