Search results

1 – 10 of 45
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Book part
Publication date: 7 May 2019

Lily Popova Zhuhadar and Mark Ciampa

After the ex-National Security Agency contractor Edward Snowden1 disclosures of the National Security Agency surveillance of Americans’ online and phone communications, the Pew…

Abstract

After the ex-National Security Agency contractor Edward Snowden1 disclosures of the National Security Agency surveillance of Americans’ online and phone communications, the Pew Research Center2 administrated a panel survey to collect data concerning Americans’ opinions about privacy and security. This survey has mixed types of qualitative questions (closed and open-ended). In this context, to our knowledge, until today, no research has been applied on the open-ended part of these data. In this chapter, first the authors present their findings from applying sentiment analysis and topic extraction methods; second, the authors demonstrate their analysis to sentiments polarities; and finally, the authors interpret the semantic relationships between topics and their associated negativity, positivity, and neutral sentiments.

Details

Politics and Technology in the Post-Truth Era
Type: Book
ISBN: 978-1-78756-984-3

Keywords

Access Restricted. View access options
Article
Publication date: 25 November 2013

Mark Ciampa

Text-based passwords created by users are typically weak. A common mitigation is to provide meaningful feedback to users regarding the relative strength of their newly created…

1185

Abstract

Purpose

Text-based passwords created by users are typically weak. A common mitigation is to provide meaningful feedback to users regarding the relative strength of their newly created password. However, the effects of these feedback mechanisms on users to create stronger passwords have not been well studied. This study examined four different types of password feedback mechanisms to determine which, if any, are the most effective. The paper aims to discuss these issues.

Design/methodology/approach

Undergraduate student volunteers created four different passwords and then entered the passwords into four different online password feedback mechanisms. Participants were then asked whether the feedback persuaded them to change their original password.

Findings

In all cases, the feedback mechanisms significantly influenced users with lower password entropy to choose a more secure password. The password feedback mechanism that was most effective was the feedback of the estimated amount of time to break the password.

Research limitations/implications

Undergraduate students in an academic environment were the participants, which may limit external validity.

Practical implications

The implications are for designers of web sites and other applications that require users to create a text-based password: any feedback mechanism can influence users to create passwords with higher entropy, yet those that indicate the length of time it would take to crack the password are most effective.

Originality/value

There are a wide variety of password feedback mechanisms in use. However, their effects on influencing users to create stronger passwords have not been well studied.

Details

Information Management & Computer Security, vol. 21 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Available. Content available
Book part
Publication date: 7 May 2019

Abstract

Details

Politics and Technology in the Post-Truth Era
Type: Book
ISBN: 978-1-78756-984-3

Access Restricted. View access options

Abstract

Details

Politics and Technology in the Post-Truth Era
Type: Book
ISBN: 978-1-78756-984-3

Access Restricted. View access options
Article
Publication date: 12 October 2015

Martin Butler and Rika Butler

The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk…

1387

Abstract

Purpose

The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile. Online security remains a challenge to ensure safe transacting on the Internet. User authentication, a human-centric process, is regarded as the basis of computer security and hence secure access to online banking services. The increased use of technology to enforce additional actions has the ability to improve the quality of authentication and hence online security, but often at the expense of usability. The objective of this study was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile.

Design/methodology/approach

A web-based survey was designed to determine online consumers’ competence resecure online behaviour, and this was used to quantify the online behaviour as more or less secure. The browsers used by consumers as well as their demographical data were correlated with the security profile of respondents to test for any significant variance in practice that could inform differentiated authentication.

Findings

A statistical difference between behaviours based on some of the dependant variables was evident from the analysis. Based on the results, a case could be made to have different authentication methods for online banking customers based on both their browser selected (before individual identification) as well as demographical data (after identification) to ensure a safer online environment.

Originality/value

The research can be used by the financial services sector to improve online security, where required, without necessarily reducing usability for more “security inclined” customers.

Details

Information & Computer Security, vol. 23 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Book part
Publication date: 31 July 2023

Thalita Catarina Decome Poker

Background: The political participation of children and adolescents provided for in the United Nations Convention on the Rights of the Child and Brazil’s Statute of the Child and…

Abstract

Background: The political participation of children and adolescents provided for in the United Nations Convention on the Rights of the Child and Brazil’s Statute of the Child and Adolescent adopted in July 1990 has been proposed to ensure the effectiveness and guarantee of citizenship with regard to children and adolescents in adult-centered and adult-normative cultures.

Methods: This study aimed to understand the meaning of recognition in relation to the child as a subject of rights in the context of political participation in Brazil from 2001 to 2017 through the accounts of two adolescents who have been activists since childhood. The narratives were interpreted in light of the identity theory based on the critical social psychology and the sociology of childhood.

Results: This helped identify (1) the systemic unpreparedness when dealing with adolescents as persons who advocate for the civil rights of children and adolescents; (2) the attempts by education professionals to restrict adolescent activists to schools and family institutions to delegitimize them from their representative potential; and (3) that political participation could help raise the interviewed adolescents’ awareness of the power relations inherent in the social structure.

Conclusions: The effectiveness of political participation is considered a challenge, regardless of official documents being made use of, given the need for a paradigm shift with regard to the universalist theories that consider the institution of childhood exclusively as a progressive preparation for the adult world.

Details

The Social Construction of Adolescence in Contemporaneity
Type: Book
ISBN: 978-1-80117-449-7

Keywords

Access Restricted. View access options
Article
Publication date: 1 July 2006

Eileen Drew and Catherine Healy

The objectives of this study were to investigate the degree to which quality initiatives, including quality standards, have been adopted in Irish organisations and to provide…

2126

Abstract

Purpose

The objectives of this study were to investigate the degree to which quality initiatives, including quality standards, have been adopted in Irish organisations and to provide comparisons with survey results of surveys in 1995/1996.

Design/methodology/approach

A national survey was conducted in 2002 of Irish employers in manufacturing/services within the private and public sectors. The questionnaire was sent to 2,487 organisations – 932 questionnaires were returned representing a 34 per cent response rate from the private sector organisations and 47 per cent in the public sector.

Findings

The survey illustrates the continuing importance of, and reliance upon, standards. Among organisations that had been awarded ISO 9000 certification, 93 per cent believed that it had improved their reputation and 90 per cent that it resulted in better products or services. Nearly two‐thirds of respondent organisations had adopted a total quality approach compared with less than one‐third in 1995/1996. The results demonstrate that total quality organisations did not differ significantly from non‐TQ organisations in relation to having been awarded ISO 9000. However, there were statistically significant differences between TQ and non‐TQM organisations in relation to: a commitment to quality, quality structures, measures to evaluate effectiveness in relation to customers, employees and suppliers, team working, quality assurance systems, use of quality tools and techniques and investment in training.

Originality/value

This study shows that interest and adoption of quality improvement in Irish organisations is growing rapidly, particularly since the mid‐1990s that has marked a distinct period of economic growth in the Irish economy.

Details

The TQM Magazine, vol. 18 no. 4
Type: Research Article
ISSN: 0954-478X

Keywords

Available. Content available
Book part
Publication date: 24 November 2017

Guido Stein

Free Access. Free Access

Abstract

Details

And Now What?
Type: Book
ISBN: 978-1-78743-525-4

Access Restricted. View access options
Book part
Publication date: 14 July 2015

Ladislau Ribeiro do Nascimento and Sigmar Malvezzi

Mergers and acquisitions (M&As) are today common options for business survival and development. They imply the adaptation of enterprises to new conditions being one of them, the…

Abstract

Mergers and acquisitions (M&As) are today common options for business survival and development. They imply the adaptation of enterprises to new conditions being one of them, the integration of the enterprises involved in the deal. That integration is achieved through strategic actions in organizational processes and structures, as well as through the management of the subjective conditions that support human performance. One of these conditions is the individual and team identities. The identity plays a crucial mediating role in the adaptation and integration because the mutual acknowledgment of the self and the other in any social interaction has the power to influence the social interaction. The acknowledgment of “Who am I?” or “Who are you?” is a mandatory information of social interactions. The concept of identity is revised in its complexity and applied in the understanding of the integration of teams and individuals in M&As. The chapter ends concluding that the management of M&As comprises management of team and individuals identities.

Details

Advances in Mergers and Acquisitions
Type: Book
ISBN: 978-1-78560-090-6

Keywords

Access Restricted. View access options
Article
Publication date: 14 January 2025

Guo Li and Mark Xuefang Zhu

This study aims to investigate the impact of ChatGPT on users’ continuous knowledge contributions in online question-and-answer (Q&A) communities based on social exchange theory…

51

Abstract

Purpose

This study aims to investigate the impact of ChatGPT on users’ continuous knowledge contributions in online question-and-answer (Q&A) communities based on social exchange theory and stimulus-organism-response (SOR) theory.

Design/methodology/approach

Data were collected from a Chinese online Q&A community, and the difference-in-differences (DID) model was employed to verify the proposed hypotheses.

Findings

The results show that ChatGPT negatively impacts users’ continuous knowledge contributions in online Q&A communities, with variations observed across different knowledge domains.

Originality/value

This study is the first attempt to examine the impact of ChatGPT on users’ continuous knowledge contributions in online Q&A communities. The findings provide valuable insights for community managers to develop strategies for mitigating the effects of ChatGPT on online Q&A communities.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

1 – 10 of 45
Per page
102050