Tim Schürmann, Nina Gerber and Paul Gerber
Online privacy research has seen a focus on user behavior over the last decade, partly to understand and explain user decision-making and seeming inconsistencies regarding users'…
Abstract
Purpose
Online privacy research has seen a focus on user behavior over the last decade, partly to understand and explain user decision-making and seeming inconsistencies regarding users' stated preferences. This article investigates the level of modeling that contemporary approaches rely on to explain said inconsistencies and whether drawn conclusions are justified by the applied modeling methodology. Additionally, it provides resources for researchers interested in using computational modeling.
Design/methodology/approach
The article uses data from a pre-existing literature review on the privacy paradox (N = 179 articles) to identify three characteristics of prior research: (1) the frequency of references to computational-level theories of human decision-making and perception in the literature, (2) the frequency of interpretations of human decision-making based on computational-level theories, and (3) the frequency of actual computational-level modeling implementations.
Findings
After excluding unrelated articles, 44.1 percent of investigated articles reference at least one theory that has been traditionally interpreted on a computational level. 33.1 percent of all relevant articles make statements regarding computational properties of human cognition in online privacy scenarios. Meanwhile, 5.1 percent of all relevant articles apply formalized computational-level modeling to substantiate their claims.
Originality/value
The findings highlight the importance of formal, computational-level modeling in online privacy research, which has so far drawn computational-level conclusions without utilizing appropriate modeling techniques. Furthermore, this article provides an overview of said modeling techniques and their benefits to researchers, as well as references for model theories and resources for practical implementation.
Details
Keywords
Melanie Volkamer, Karen Renaud and Paul Gerber
Phishing is still a very popular and effective security threat, and it takes, on average, more than a day to detect new phish websites. Protection by purely technical means is…
Abstract
Purpose
Phishing is still a very popular and effective security threat, and it takes, on average, more than a day to detect new phish websites. Protection by purely technical means is hampered by this vulnerability window. During this window, users need to act to protect themselves. To support users in doing so, the paper aims to propose to first make users aware of the need to consult the address bar. Moreover, the authors propose to prune URL displayed in the address bar. The authors report on an evaluation of this proposal.
Design/methodology/approach
The paper opted for an online study with 411 participants, judging 16 websites – all with authentic design: half with legitimate and half with phish URLs. The authors applied four popular widely used types of URL manipulation techniques. The authors conducted a within-subject and between-subject study with participants randomly assigned to one of two groups (domain highlighting or pruning). The authors then tested both proposals using a repeated-measures multivariate analysis of variance.
Findings
The analysis shows a significant improvement in terms of phish detection after providing the hint to check the address bar. Furthermore, the analysis shows a significant improvement in terms of phish detection after the hint to check the address bar for uninitiated participants in the pruning group, as compared to those in the highlighting group.
Research limitations/implications
Because of the chosen research approach, the research results may lack generalisability. Therefore, researchers are encouraged to test the proposed propositions further.
Practical implications
This paper confirms the efficacy of URL pruning and of prompting users to consult the address bar for phish detection.
Originality/value
This paper introduces a classification for URL manipulation techniques used by phishers. We also provide evidence that drawing people’s attention to the address bar makes them more likely to spot phish websites, but does not impair their ability to identify authentic websites.
Details
Keywords
The greatest mistakes and delusions of human history have come about through logically drawing conclusions from an omissive set of premisses. Cybernetics, being the science of the…
Abstract
The greatest mistakes and delusions of human history have come about through logically drawing conclusions from an omissive set of premisses. Cybernetics, being the science of the study and redirection of feedback, is the science of consequences; its essential task is to recognize and deal with all feedback effects, including the consequences of such omissive conceptions – the so‐called blind spot. Gives some examples of the blind spot as it has manifested itself throughout history in the world of science. Concludes that cybernetics can defuse this blind spot which has perennially plagued human development, individually and societally.
Details
Keywords
The greatest mistakes and delusions of human history have come about through logically drawing conclusion from an omissive set of premises. Cybernetics, being the science of the…
Abstract
The greatest mistakes and delusions of human history have come about through logically drawing conclusion from an omissive set of premises. Cybernetics, being the science of the study and redirection of feedback, is the science of consequences; its essential task is to recognize and deal with all feedback effects, including the consequences of such omissive conceptions – the so‐called blind spot. Gives some examples of the blind spot as it has manifested itself throughout history in the world of science. Concludes that cybernetics can defuse this blind spot which has perennially plagued human development, individually and societally.
Details
Keywords
Arabella Kyprianides, Julia A. Yesberg, Jenna Milani, Ben Bradford, Paul Quinton and Oliver Clark–Darby
The range of tactical force options available to police is increasing, while public debate about police use of force is never far from the headlines. This paper aims to examine…
Abstract
Purpose
The range of tactical force options available to police is increasing, while public debate about police use of force is never far from the headlines. This paper aims to examine what factors shape how people accept police use of force.
Design/methodology/approach
The authors use two online experiments to test whether different force options affected judgments about the acceptability of police action and to explore the role of trust and legitimacy in people's judgments.
Findings
The authors found across both studies that respondents judged scenarios involving a weapon (baton, CS spray, Taser) as less acceptable compared to scenarios that did not (talking down, handcuffs), but they did not draw much distinction between the specific weapon used. In study 1, exposure to different police tactics had no effect on trust and legitimacy. In study 2, prior perceptions of trust were strong predictors of acceptability judgments.
Originality/value
There is a comparative paucity of British-based empirical research examining public attitudes toward different use of force resolutions by police. In this paper, the authors explore how use of force affects people's views of police at a time in which the nature and scope of force applications, how these are understood and indeed the basic enterprise of policing itself is being reconsidered and renegotiated.
Details
Keywords
This chapter describes, both from a personal and historical perspective, the ascendancy and incumbency of Leroy D. Baca as sheriff of Los Angeles County, comparing and contrasting…
Abstract
This chapter describes, both from a personal and historical perspective, the ascendancy and incumbency of Leroy D. Baca as sheriff of Los Angeles County, comparing and contrasting his leadership, ensconced in new age terminology, with that of his predecessors, Sherman Block and Peter J. Pitchess. Of immediate concern were his personal decisions, in particular the appointment of Paul Tanaka to be his undersheriff after many years serving as his campaign treasurer. What was considered a marginally functional merit-based promotional system was transformed into a political patronage model, with the attendant loss of organizational legitimacy and tarnished public reputation. The chapter will compare and contrast life within the “car,” as the term is commonly used within the Los Angeles County Sheriff’s Department, and life outside the car, through first-hand accounts, testimony from the Citizen’s Commission on Jail Violence, depositions, and published reports. Using the concept of representative bureaucracy, I will track organizational diversity as a performance measure, using the relative inclusion of all employee groups in the rank structure of the department and how each group fared under the Baca/Tanaka administration. In conclusion, this chapter will present different coping mechanisms utilized by employees confronting serious corruption issues that impacted them directly, and indirectly through the organization.
Details
Keywords
Melanie Stride, Carol K.H. Hon, Rui Liu and Bo Xia
Adoption of building information modelling (BIM) in facilities management (FM) provides an information platform to store and exchange asset data. Quantity Surveyors, with cost…
Abstract
Purpose
Adoption of building information modelling (BIM) in facilities management (FM) provides an information platform to store and exchange asset data. Quantity Surveyors, with cost management expertise, are increasingly involved in FM roles in the operation phase. However, no study has been conducted on how BIM may assist Quantity Surveyors when contracted in FM roles. This study aims to identify the potential benefits and challenges of using BIM by Quantity Surveyors in FM roles.
Design/methodology/approach
Interviews were conducted with eight professionals from an international built and natural asset design and management company and its FM business partner in Australia.
Findings
Lack of complete and accurate data was the main issue faced by Quantity Surveyors in FM. The benefits of BIM in FM were digitizing and storing asset information and developing a cost database that would be useful for Quantity Surveyors, whereas challenges included keeping model data up to date, cost, industry resistance to change and contractors' lack of model use.
Originality/value
This study contributes to revealing the niche adoption of BIM by Quantity Surveyors in FM and identifying the issues faced by Quantity Surveyors in FM roles using BIM. It contributes to the knowledge of BIM adoption in post-construction. Findings will be useful to develop strategies for adopting BIM in FM and supporting Quantity Surveyors' roles in FM.
Details
Keywords
This article discusses issues common to the pricing of both insurance and finance. These include increasing collaboration between insurance companies and banks, deregulation of…
Abstract
This article discusses issues common to the pricing of both insurance and finance. These include increasing collaboration between insurance companies and banks, deregulation of various insurance and finance markets, integrated risk management, and the emergence of financial engineering as a new profession. Rather than attempting to give an exhaustive exposition of the issues at hand, the author highlights developments that, from a methodological point of view, offer new insight into the comparison of pricing mechanisms between insurance and finance.
Ginger Collins and Julie A. Wolter
The purpose of this chapter is to focus on increasing the participation of students with language-based learning disabilities (LLD) in postsecondary transition planning and how…
Abstract
The purpose of this chapter is to focus on increasing the participation of students with language-based learning disabilities (LLD) in postsecondary transition planning and how the interprofessional teams that include a speech-language pathologist may work together to integrate and apply language, literacy, and related self-determinism goals in the secondary school curriculum. As students with LLD enter secondary school, the provision of needed language-literacy intervention services drastically declines, although these students often require these services to facilitate their postsecondary success. Secondary students are expected to read, write, and think at more complex levels than ever before to meet postgraduation workforce demands. The inclusion of self-determination strategies is found to be related to positive post-school outcomes and can be readily integrated into transition planning. The integration of SLPs into the interprofessional team may ideally support secondary school student language-literacy needs in transition planning by using self-determination strategies to help access the curriculum and experience postsecondary success.