Matthew Warren and Shona Leitch
The information society has developed rapidly since the end of the twentieth century. Many countries (including Australia) have been looking at ways to protect their citizens…
Abstract
Purpose
The information society has developed rapidly since the end of the twentieth century. Many countries (including Australia) have been looking at ways to protect their citizens against the variety of risks associated with the continued evolution of the internet. The Australian Federal Government in 2013 proposed data retention as one possible method of protecting Australian society and aiding law enforcement agencies to investigate and prosecute cyber-crime.
Design/methodology/approach
The aim of this paper is to consider the issue of data retention from a stakeholder’s perspective by analysing the public submissions garnered by the Australian Federal Government and identify the key issues and concerns that were raised by these stakeholders. The paper used a qualitative approach to undertake theme analysis.
Findings
The paper shows the concerns and wishes that different stakes holders have regarding data retention within Australia.
Originality/value
This is a unique study into implementation of data retention at a national level, in terms of the paper focussing on Australia.
Matthew Warren and Richard Lucas
This paper aims to introduce a special section based on papers from Australasian Conference for Information Systems 2014.
Abstract
Purpose
This paper aims to introduce a special section based on papers from Australasian Conference for Information Systems 2014.
Design/methodology/approach
This paper comments on key contextualisation moments in relevant history.
Findings
This paper describes the initiative in Australia to widen Information and Communication Technology ethics awareness.
Originality/value
This is a new attempt to bring Ethics and Information Systems academics closer together.
Details
Keywords
Matthew Warren and Shona Leitch
The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.
Abstract
Purpose
The aim of the paper is to assess the hacktivist group called the Syrian Electronic Army and determine what their motivations in terms of ethical and poetical motivations.
Design/methodology/approach
This paper looks at chronological examples of Syrian Electronic Army activities and assess them using a developed hacktivist criteria to try and gain a greater understanding of the motivations of the Syrian Electronic Army. The paper uses a netnography research approach.
Findings
This paper determines that the Syrian Electronic Army is motivated to protect the Syrian Government. This protection is highlighted by the new media and social media organisations that the Syrian Electronic Army attacks online.
Research limitations/implications
This paper focuses only on one group the Syrian Electronic Army.
Practical implications
A greater understanding of the Syrian Electronic Army.
Social implications
A greater understanding of the development of hacktivism.
Originality/value
A unique study into the motivation of the Syrian Electronic Army.
Details
Keywords
Damien Hutchinson and Matthew Warren
As a continually growing financial service of electronic commerce, Internet banking requires the development and implementation of a sound security procedure. This involves…
Abstract
As a continually growing financial service of electronic commerce, Internet banking requires the development and implementation of a sound security procedure. This involves designing effective methods via which users can be authenticated in a remote environment. Specifically for Internet banking there is a real need for a way uniquely to identify and authenticate users without the possibility of their authenticity being cloned. Some technologies in use have been presented for meeting the security requirements for national, regional and global Internet banking assurance. However, there has been little research conducted particularly on the creation of secure and trusted pathways. Concentrates on presenting a security framework for Internet banking based on discovering and defining these pathways in terms of adequate authentication mechanisms. Proposes a framework concerning how to identify security requirements for Internet banking such that the transactions being conducted are secured within their respective environments.
Details
Keywords
Ishan Senarathna, Matthew Warren, William Yeoh and Scott Salzman
The purpose of this paper is to empirically examine the influence of different organisational cultures on e-commerce adoption maturity in small- and medium-sized enterprises…
Abstract
Purpose
The purpose of this paper is to empirically examine the influence of different organisational cultures on e-commerce adoption maturity in small- and medium-sized enterprises (SMEs).
Design/methodology/approach
The data for this study were gathered using postal survey questionnaire and analysed using quantitative analysis methods.
Findings
The result indicates a positive correlation between adhocracy culture and e-commerce adoption. However, those firms with hierarchy cultural characteristics indicate a negative correlation in relation to e-commerce adoption. The organisational culture differences explain these issues.
Research limitations/implications
The analysis is conducted in a single country (i.e. Sri Lanka). Initial findings provide a basis for further research in other country.
Practical implications
This research reveals the significance of organisational culture and how it influences e-commerce adoption maturity, both positively and negatively. The research findings are useful for SMEs that are planning or are in the process of implementing or reviewing their e-commerce, as well as for SMEs policy makers and business support community that engaged with e-commerce initiatives.
Originality/value
This study is the first to research the influence of different types of organisational cultures on e-commerce adoption maturity. It fills the research gap by advancing the understanding between the association of organisation cultures and e-commerce adoption.
Details
Keywords
This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/02632779510795430. When citing the…
Abstract
This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/02632779510795430. When citing the article, please cite: William H. Johnson, Warren R. Matthews, (1995), “Disaster plan simulates plane crash into high-rise building”, Facilities, Vol. 13 Iss: 9/10, pp. 31 - 37.
Giannina Warren and Simona Grigaliūnaitė
This paper aims to delve into the interdependent connection between place branding and social capital, specifically focusing on how it contributes to uniting a city’s recovery…
Abstract
Purpose
This paper aims to delve into the interdependent connection between place branding and social capital, specifically focusing on how it contributes to uniting a city’s recovery efforts during times of crisis. By using the theoretical frameworks of social capital and cultural intermediation, the case study of Vilnius, Lithuania, exemplifies how cities can navigate through turbulent periods by prioritising the work of place marketers and their relationships in their strategic approach.
Design/methodology/approach
A qualitative, mixed method case study approach used four different methods of investigation, drawing on multiple sources of evidence, including a mix of interviews with key actors, content analysis, netnography and participant observation.
Findings
Go Vilnius, in collaboration with the City of Vilnius Municipality, leveraged existing stakeholder relationships and a strong common identification among political actors, promotional intermediaries, residents and city institutions to not only adapt to the unfolding crisis but to evolve its marketing, place-making, tourism and community engagement strategies to emerge as a more resilient, dynamic and animated city after the pandemic.
Practical implications
This case study demonstrates that a “network constellation” approach centralised around key stakeholder relationships held by marketing, tourism and promotional professionals is a crucial component in urban post-pandemic and emergency planning.
Social implications
By placing marketing professionals at the heart of crisis planning, cities can capitalise on the inherent social capital that is their key occupational resource and leverage their relationships with residents, the business community, international collaborators and the media for swift and maximum impact.
Originality/value
By identifying the “network constellations” that facilitated the institutionalisation of place branding activities in the face of both a local and global shutdown, this paper positions place marketers, acting as cultural intermediaries, at the centre of crisis planning and prevention strategies for anti-fragile cities of the post-pandemic future.
Details
Keywords
Steven M. Furnell and Matthew J. Warren
Examines the damaging effects that malicious computer abuse, such as hacking and viruses, can have on the development of an information‐based society. Computing and…
Abstract
Examines the damaging effects that malicious computer abuse, such as hacking and viruses, can have on the development of an information‐based society. Computing and telecommunications technologies are a key ingredient in the realization of this society, but are increasingly the targets of criminals and mischief makers. Highlights the apparent escalation in computer‐abuse incidents, as illustrated by a number of recent surveys, and examines the effects that these may have on the public perception of technology (and, hence, the smooth transition to the information society). Also presents some broad recommendations regarding what can be done to address the problem. This considers both technical measures to help safeguard systems and revised attitudes to computer abuse, to insure that incidents can be dealt with more effectively.
Matthew Warren and William Hutchinson
Supply chain management (SCM) is increasingly dependent on electronic systems. At the same time, the vulnerability of these systems to attack from malicious individuals or groups…
Abstract
Supply chain management (SCM) is increasingly dependent on electronic systems. At the same time, the vulnerability of these systems to attack from malicious individuals or groups is growing. This paper examines some of the forms such attacks can take, and their relevance to the supply function. Provides examples of attacks. Concludes that companies should consider the security aspects of electronic commerce before developing their systems.
Details
Keywords
Shona Leitch and Matthew Warren
The purpose of this study is to explore Australian public and stakeholders views towards the regulation of the Internet and its content. The federal government called for…
Abstract
Purpose
The purpose of this study is to explore Australian public and stakeholders views towards the regulation of the Internet and its content. The federal government called for submissions addressing their proposal, and this paper analyses these submissions for themes and provides clarity as to the Australian public and stakeholders key concerns in regards to the proposed policy.
Design/methodology/approach
The paper uses a qualitative approach to analyse the public consultations to the Australian Federal Government. These documents are coded and analysed to determine negative and positive viewpoints.
Findings
The research has shown, based upon the analysis of the consultation, that there was no public support for any of the measures put forward, that the Australian Federal Government in its response has not recognised this public feedback and instead has only utilised some of the qualitative feedback obtained through the public consultation process to try to justify its case to proceed with its proposals.
Research limitations/implications
The study is focussed on Australia.
Practical implications
The paper analyses a proposed national approach to filtering the content of the Internet and discussed the public reaction to such an approach.
Social implications
The paper looks at how different parts of Australian society view Internet filtering in a positive or negative manner.
Originality/value
The only study that directly looks at the viewpoint of the Australian public.