Search results

1 – 5 of 5
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 9 April 2024

Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…

98

Abstract

Purpose

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.

Design/methodology/approach

Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.

Findings

Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.

Originality/value

Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.

Details

Journal of Systems and Information Technology, vol. 26 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Access Restricted. View access options
Article
Publication date: 27 March 2023

Dong-Heon Kwak, Derek L. Nazareth, Saerom Lee, Jinwoong Lee, Greta L. Polites and Deborah Erdos Knapp

Drawing upon the consistency literature, the theory of visual rhetoric and social judgment of warmth and competence, this study examines the determinants and impacts of perceived…

751

Abstract

Purpose

Drawing upon the consistency literature, the theory of visual rhetoric and social judgment of warmth and competence, this study examines the determinants and impacts of perceived interface design consistency in the context of charity websites.

Design/methodology/approach

To identify design factors of perceived interface design consistency, this study separates charity website interface design into two aspects: main appeal design (i.e. appeal quality) and peripheral design (i.e. image type). The authors designed a two (appeal quality: low vs high) × three (image type: control vs adults vs children) controlled lab experiment to investigate the effects of various interface choices. A total of 217 subjects participated in the experiment. The authors used structural equation model (SEM) analysis and analysis of covariance (ANCOVA) to test the research hypotheses.

Findings

This study found that appeal quality and human images increase perceived interface design consistency. The authors also found that the relationship between appeal quality and perceived interface design consistency is moderated by image type. Finally, the authors showed that perceived interface design consistency increases perceived warmth and competence of charity websites, which in turn affect intention to use the website for donations.

Originality/value

The authors’ findings provide novel insights for theory on consistency and interface design and practical implications for charity website designers by identifying determinants and consequences of perceived interface design consistency.

Details

Internet Research, vol. 33 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Access Restricted. View access options
Article
Publication date: 10 November 2014

Jae Choi and Derek L. Nazareth

The aim of this paper is to study the critical role of trust in electronic commerce extensively in the context of establishing initial trust between trading partners. Ongoing…

3041

Abstract

Purpose

The aim of this paper is to study the critical role of trust in electronic commerce extensively in the context of establishing initial trust between trading partners. Ongoing trust between partners can quickly be eroded through security or other trust violations. This paper examines whether customers are willing to transact with an eCommerce vendor in light of security and trust violations.

Design/methodology/approach

The paper draws upon research in professional trust relationships and adapts it to the e-commerce context to create a process view of trust violation and repair. Using a design science framework, this paper employs agent-based modeling as the simulation technique to study the implications of security and trust violations on the willingness of customers to continue transacting with the vendor. The simulations are conducted for a variety of trust violations and reconciliation actions.

Findings

While some of the results are predictable, the key finding for managers is that moderate reconciliation tactics are effective for all cases but the most severe trust violations, where trust is irrevocably broken. This has clear financial implications, particularly in cases where vendors may operate with small margins in competitive markets.

Originality/value

Given the increasing push toward mobile and Internet-based commerce, and the large range of possible trust violations and security incidents in online purchases, coupled with increasing competition among vendors, it becomes imperative for vendors to provide effective tactics to repair customer trust violations when they arise.

Details

Information Management & Computer Security, vol. 22 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 January 1983

R.G.B. Fyffe

This book is a policy proposal aimed at the democratic left. It is concerned with gradual but radical reform of the socio‐economic system. An integrated policy of industrial and…

11157

Abstract

This book is a policy proposal aimed at the democratic left. It is concerned with gradual but radical reform of the socio‐economic system. An integrated policy of industrial and economic democracy, which centres around the establishment of a new sector of employee‐controlled enterprises, is presented. The proposal would retain the mix‐ed economy, but transform it into a much better “mixture”, with increased employee‐power in all sectors. While there is much of enduring value in our liberal western way of life, gross inequalities of wealth and power persist in our society.

Details

International Journal of Sociology and Social Policy, vol. 3 no. 1/2
Type: Research Article
ISSN: 0144-333X

Keywords

Access Restricted. View access options
Article
Publication date: 27 May 2022

Brice Terpstra, Michael D. White and Henry F. Fradella

The purpose of this study is to outline components of a proposed screen-in (not out) hiring process for police.

993

Abstract

Purpose

The purpose of this study is to outline components of a proposed screen-in (not out) hiring process for police.

Design/methodology/approach

This study uses survey data collected from police officers of all ranks (n = 166) in one Arizona police department, exploring officer perceptions of the most important qualities necessary to be an exceptional police officer, as well as the optimal processes for finding people with those traits.

Findings

Results build on prior studies that have begun to identify sought-after traits including honesty, integrity, ethics, compassion, empathy, as well as communication and listening skills. Findings also suggest preliminary steps for finding good cops through expansion of existing screen-out processes to also screen-in desirable prospects, application of some academy training processes to the hiring pool, and more proactive recruitment efforts.

Originality/value

This study adds value to the extant literature on the characteristics of good policing and on identifying the qualities by which to “screen-in” officers during the hiring and recruitment process. Further, the authors expand this understanding by capturing perceptions of the best processes to identify individuals with desirable qualities during the hiring and recruitment process. The implications of these findings are used to initiate a discussion of foundational components of a screening-in hiring process for police, informed by both empirical research and community perspectives.

Details

Policing: An International Journal, vol. 45 no. 4
Type: Research Article
ISSN: 1363-951X

Keywords

1 – 5 of 5
Per page
102050