Search results

1 – 10 of 111
Article
Publication date: 16 July 2024

Michael J Rooney, Yair Levy, Wei Li and Ajoy Kumar

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password…

Abstract

Purpose

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put individuals and organizations at risk, resulting in a data breach. This paper aims to engage IS users and Subject Matter Experts (SMEs), focused on designing, developing and empirically validating the Password Workaround Cybersecurity Risk Taxonomy (PaWoCyRiT) – a 2x2 taxonomy constructed by aggregated scores of perceived cybersecurity risks from Password Workarounds (PWWAs) techniques and their usage frequency.

Design/methodology/approach

This research study was a developmental design conducted in three phases using qualitative and quantitative methods: (1) A set of 10 PWWAs that were identified from the literature were validated by SMEs along with their perspectives on the PWWAs usage and risk for data breach; (2) A pilot study was conducted to ensure reliability and validity and identify if any measurement issues would have hindered the results and (3) The main study data collection was conducted with a large group of IS users, where also they reported on coworkers' engagement frequencies related to the PWWAs.

Findings

The results indicate that statistically significant differences were found between SMEs and IS users in their aggregated perceptions of risks of the PWWAs in causing a data breach, with IS users perceiving higher risks. Engagement patterns varied between the two groups, as well as factors like years of IS experience, gender and job level had statistically significant differences among groups.

Practical implications

The PaWoCyRiT taxonomy that the we have developed and empirically validated is a handy tool for organizational cyber risk officers. The taxonomy provides organizations with a quantifiable means to assess and ultimately mitigate cybersecurity risks.

Social implications

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. Thus, the taxonomy that the authors have developed and empirically validated provides broader implications for society, as it assists organizations in all industries with the ability to mitigate the risks of data breaches that can result from PWWAs.

Originality/value

The taxonomy the we have developed and validated, the PaWoCyRiT, provides organizations with insights into password-related risks and behaviors that may lead to data breaches.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 29 August 2012

Andrew Bruce, John Wills Lloyd and Michael J. Kennedy

Self-monitoring has become one of the most widely employed self-control procedures in special education for students with learning disabilities and emotional or behavioral…

Abstract

Self-monitoring has become one of the most widely employed self-control procedures in special education for students with learning disabilities and emotional or behavioral disorders. Although its success has been documented across age groups, settings, and diverse applications, researchers have continued to study the question of whether focusing self-monitoring on certain target behaviors – particularly attention to task or academic performance – will yield superior outcomes for students. We review 11 available studies that have examined this issue, classifying each study according to the ways in which the researchers had students monitor their own behavior. The results show only small differences among the different methods and indicate a need for teachers to continue exercising professional judgment in planning the use of self-monitoring.

Details

Classroom Behavior, Contexts, and Interventions
Type: Book
ISBN: 978-1-78052-972-1

Book part
Publication date: 26 November 2018

Pooja B. Vijayakumar, Michael J. Morley, Noreen Heraty, Mark E. Mendenhall and Joyce S. Osland

In this contribution, we systematically review the extant global leadership literature to identify important bibliometric and thematic patterns in evidence in this evolving field…

Abstract

In this contribution, we systematically review the extant global leadership literature to identify important bibliometric and thematic patterns in evidence in this evolving field of scholarship. Conceptualizing the phenomenon to include leaders/managers/supervisors who hold global, expatriate, or international positions, we draw out insights accumulated from a total of 327 published articles in key management and organizational behavior journals listed in Scopus. Our analysis proceeds in two sequential phases. Our bibliometric analysis first identifies the most cited articles, most published first authors, country bases of first authors, and frequently publishing journals in this field. This characterizes both the diversity and innovative nature of scholarship in the field. Our thematic content analysis, generated through Nvivo 11, isolates two dominant overarching themes that represent the wellspring for the body of literature, namely global leader development and global leader effectiveness. These themes of development and effectiveness are further explicated through six distinct lenses namely cultural, cognitive, learning, personality trait, social/relational, and political. These lenses are underpinned by a suite of theoretical perspectives encompassing individual, system, and contextual considerations. In combination, these sets of analyses bring added systematics to the field and serve as a point of departure for future inquiry.

Details

Advances in Global Leadership
Type: Book
ISBN: 978-1-78754-297-6

Keywords

Abstract

Details

Disaster Planning and Preparedness in the Hotel Industry
Type: Book
ISBN: 978-1-78769-938-0

Article
Publication date: 8 October 2018

Declan Dunne, Nikhil Lal, Nagarajan Pranesh, Michael Spry, Christopher Mcfaul and Paul Rooney

A clinical audit is a key component of the clinical governance framework. The rate of audit completion in general surgery has not been investigated. The purpose of this paper is…

Abstract

Purpose

A clinical audit is a key component of the clinical governance framework. The rate of audit completion in general surgery has not been investigated. The purpose of this paper is to assess the rates of audit activity and completion and explore the barriers to successful audit completion.

Design/methodology/approach

This was a multi-centre study evaluating current surgical audit practice. A standardised audit proforma was designed. All clinical audits in general surgery during a two-year period were identified and retrospectively reviewed. Data held by the audit departments were collated, and individual audit teams were contacted to verify the data accuracy. Audit teams failing to complete the full audit cycle with a re-audit were asked to explain the underlying reasons behind this.

Findings

Of the six trusts approached, two refused to participate, and one failed to initiate the project. A total of 39 audits were registered across three surgical directorates. Only 15 out of 39 audits completed at least one audit cycle, with 4 deemed of no value to re-audit. Only seven audits were completed to re-audit. Achieving a publication or a presentation was the most cited reason for not completing the audit loop.

Originality/value

This study demonstrates that the poor rates of audit completion rate found in other areas of clinical medicine pervade general surgery. Improved completion of an audit is essential and strategies to achieve this are urgently needed.

Details

International Journal of Health Care Quality Assurance, vol. 31 no. 8
Type: Research Article
ISSN: 0952-6862

Keywords

Article
Publication date: 28 October 2010

Joshua Doane, Judy A. Lane and Michael J. Pisani

Volume 25 celebrates the 25th year of publication for the American Journal of Business (AJB). Launched by eight MAC schools of business in March 1986, the Journal has featured…

Abstract

Volume 25 celebrates the 25th year of publication for the American Journal of Business (AJB). Launched by eight MAC schools of business in March 1986, the Journal has featured more than 700 authors who have contributed more than 330 research articles at the intersection of theory and practice. From accounting to marketing, management to finance, the Journal prominently covers the breadth of the business disciplines as a general business outlet intended for both practitioners and academics. As the Journal reaches out beyond the MAC in sponsorship, authorship, and readership, we assess the Journal’s first quarter century of impact.

Details

American Journal of Business, vol. 25 no. 2
Type: Research Article
ISSN: 1935-519X

Keywords

Content available
Book part
Publication date: 17 October 2017

Abstract

Details

Reflections on Sociology of Sport
Type: Book
ISBN: 978-1-78714-643-3

Book part
Publication date: 18 November 2013

Abstract

Details

Intellectual Capital and Public Sector Performance
Type: Book
ISBN: 978-1-78350-169-4

Book part
Publication date: 6 September 2021

Paul J. Liquorie and Michael R. Ward

Acts of mass violence are not a new phenomenon in the United States. Law enforcement and homeland security officials prepare, prevent, respond, investigate, and assist in…

Abstract

Acts of mass violence are not a new phenomenon in the United States. Law enforcement and homeland security officials prepare, prevent, respond, investigate, and assist in prosecuting offenders in these events. How then can the greater homeland security community effectively avert future acts of mass violence with its even broader mission set? Physical and technological security countermeasures are not enough to prevent these types of incidents from occurring. The purpose of this chapter is to briefly give an overview of some of the research into the indicators and traits exhibited by perpetrators of mass violence and the best practices that have evolved to intervene as a result. Recognizing the common traits and behaviors displayed by past attackers, their surrounding influences and the common traumas most of them have experienced, is an essential first step in developing effective strategies to prevent acts of mass violence.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Article
Publication date: 24 June 2022

Grant Samkin

This paper applies Bhabha’s concept of the third space to frame an understanding of Prem Sikka’s use of digital media to bridge the academic–activist binary. In doing this, the…

Abstract

Purpose

This paper applies Bhabha’s concept of the third space to frame an understanding of Prem Sikka’s use of digital media to bridge the academic–activist binary. In doing this, the paper makes two contributions. First, it conceptualises Sikka’s engagement, and second, through the lens of the third space, it analyses it to establish whether, in the era of the neoliberal corporatised university, public intervention has the potential to generate new perspectives and new knowledge.

Design/methodology/approach

Sikka’s articles and blogs for the period 20 February 2002 to 15 April 2020 were analysed using Leximancer, a textual analysis software programme that displays the output visually. A discriminant analysis was used to identify where each year of the study is situated in the overall semantic analysis. Netnography, the examination of archived published texts, was then used to analyse the responses by members of the public, academics, accountants and auditors, tax experts, policy makers and regulators to Sikka’s digital media engagement.

Findings

As a third space practitioner, Sikka has overcome some of the shortcomings associated with academic research to challenge the activities of professional accounting firms, regulatory bodies and multinational corporations. Through extending the boundaries of accounting and accountability, he has facilitated new radical alliances aiming to create a just and equitable society. The paper also finds that by opening up a third space of engagement, academic activists’ work can play an essential part in social transformation and emancipatory change framed in terms of social justice and equity.

Originality/value

This is one of the few papers to provide an in-depth examination of the activities of an accounting activist over twenty years.

Details

Accounting, Auditing & Accountability Journal, vol. 36 no. 2
Type: Research Article
ISSN: 0951-3574

Keywords

1 – 10 of 111