Search results

1 – 10 of 252
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 13 March 2020

Tim Schürmann, Nina Gerber and Paul Gerber

Online privacy research has seen a focus on user behavior over the last decade, partly to understand and explain user decision-making and seeming inconsistencies regarding users'…

322

Abstract

Purpose

Online privacy research has seen a focus on user behavior over the last decade, partly to understand and explain user decision-making and seeming inconsistencies regarding users' stated preferences. This article investigates the level of modeling that contemporary approaches rely on to explain said inconsistencies and whether drawn conclusions are justified by the applied modeling methodology. Additionally, it provides resources for researchers interested in using computational modeling.

Design/methodology/approach

The article uses data from a pre-existing literature review on the privacy paradox (N = 179 articles) to identify three characteristics of prior research: (1) the frequency of references to computational-level theories of human decision-making and perception in the literature, (2) the frequency of interpretations of human decision-making based on computational-level theories, and (3) the frequency of actual computational-level modeling implementations.

Findings

After excluding unrelated articles, 44.1 percent of investigated articles reference at least one theory that has been traditionally interpreted on a computational level. 33.1 percent of all relevant articles make statements regarding computational properties of human cognition in online privacy scenarios. Meanwhile, 5.1 percent of all relevant articles apply formalized computational-level modeling to substantiate their claims.

Originality/value

The findings highlight the importance of formal, computational-level modeling in online privacy research, which has so far drawn computational-level conclusions without utilizing appropriate modeling techniques. Furthermore, this article provides an overview of said modeling techniques and their benefits to researchers, as well as references for model theories and resources for practical implementation.

Details

Journal of Intellectual Capital, vol. 21 no. 3
Type: Research Article
ISSN: 1469-1930

Keywords

Access Restricted. View access options
Article
Publication date: 10 October 2016

Melanie Volkamer, Karen Renaud and Paul Gerber

Phishing is still a very popular and effective security threat, and it takes, on average, more than a day to detect new phish websites. Protection by purely technical means is…

563

Abstract

Purpose

Phishing is still a very popular and effective security threat, and it takes, on average, more than a day to detect new phish websites. Protection by purely technical means is hampered by this vulnerability window. During this window, users need to act to protect themselves. To support users in doing so, the paper aims to propose to first make users aware of the need to consult the address bar. Moreover, the authors propose to prune URL displayed in the address bar. The authors report on an evaluation of this proposal.

Design/methodology/approach

The paper opted for an online study with 411 participants, judging 16 websites – all with authentic design: half with legitimate and half with phish URLs. The authors applied four popular widely used types of URL manipulation techniques. The authors conducted a within-subject and between-subject study with participants randomly assigned to one of two groups (domain highlighting or pruning). The authors then tested both proposals using a repeated-measures multivariate analysis of variance.

Findings

The analysis shows a significant improvement in terms of phish detection after providing the hint to check the address bar. Furthermore, the analysis shows a significant improvement in terms of phish detection after the hint to check the address bar for uninitiated participants in the pruning group, as compared to those in the highlighting group.

Research limitations/implications

Because of the chosen research approach, the research results may lack generalisability. Therefore, researchers are encouraged to test the proposed propositions further.

Practical implications

This paper confirms the efficacy of URL pruning and of prompting users to consult the address bar for phish detection.

Originality/value

This paper introduces a classification for URL manipulation techniques used by phishers. We also provide evidence that drawing people’s attention to the address bar makes them more likely to spot phish websites, but does not impair their ability to identify authentic websites.

Details

Information & Computer Security, vol. 24 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 1 October 1995

C. Musès

The greatest mistakes and delusions of human history have come about through logically drawing conclusions from an omissive set of premisses. Cybernetics, being the science of the…

63

Abstract

The greatest mistakes and delusions of human history have come about through logically drawing conclusions from an omissive set of premisses. Cybernetics, being the science of the study and redirection of feedback, is the science of consequences; its essential task is to recognize and deal with all feedback effects, including the consequences of such omissive conceptions – the so‐called blind spot. Gives some examples of the blind spot as it has manifested itself throughout history in the world of science. Concludes that cybernetics can defuse this blind spot which has perennially plagued human development, individually and societally.

Details

Kybernetes, vol. 24 no. 7
Type: Research Article
ISSN: 0368-492X

Keywords

Access Restricted. View access options
Article
Publication date: 1 October 2002

C. Musès

The greatest mistakes and delusions of human history have come about through logically drawing conclusion from an omissive set of premises. Cybernetics, being the science of the…

193

Abstract

The greatest mistakes and delusions of human history have come about through logically drawing conclusion from an omissive set of premises. Cybernetics, being the science of the study and redirection of feedback, is the science of consequences; its essential task is to recognize and deal with all feedback effects, including the consequences of such omissive conceptions – the so‐called blind spot. Gives some examples of the blind spot as it has manifested itself throughout history in the world of science. Concludes that cybernetics can defuse this blind spot which has perennially plagued human development, individually and societally.

Details

Kybernetes, vol. 31 no. 7/8
Type: Research Article
ISSN: 0368-492X

Keywords

Access Restricted. View access options
Article
Publication date: 23 November 2020

Arabella Kyprianides, Julia A. Yesberg, Jenna Milani, Ben Bradford, Paul Quinton and Oliver Clark–Darby

The range of tactical force options available to police is increasing, while public debate about police use of force is never far from the headlines. This paper aims to examine…

2434

Abstract

Purpose

The range of tactical force options available to police is increasing, while public debate about police use of force is never far from the headlines. This paper aims to examine what factors shape how people accept police use of force.

Design/methodology/approach

The authors use two online experiments to test whether different force options affected judgments about the acceptability of police action and to explore the role of trust and legitimacy in people's judgments.

Findings

The authors found across both studies that respondents judged scenarios involving a weapon (baton, CS spray, Taser) as less acceptable compared to scenarios that did not (talking down, handcuffs), but they did not draw much distinction between the specific weapon used. In study 1, exposure to different police tactics had no effect on trust and legitimacy. In study 2, prior perceptions of trust were strong predictors of acceptability judgments.

Originality/value

There is a comparative paucity of British-based empirical research examining public attitudes toward different use of force resolutions by police. In this paper, the authors explore how use of force affects people's views of police at a time in which the nature and scope of force applications, how these are understood and indeed the basic enterprise of policing itself is being reconsidered and renegotiated.

Details

Policing: An International Journal, vol. 44 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Access Restricted. View access options
Book part
Publication date: 8 December 2016

Alexandro Villanueva

This chapter describes, both from a personal and historical perspective, the ascendancy and incumbency of Leroy D. Baca as sheriff of Los Angeles County, comparing and contrasting…

Abstract

This chapter describes, both from a personal and historical perspective, the ascendancy and incumbency of Leroy D. Baca as sheriff of Los Angeles County, comparing and contrasting his leadership, ensconced in new age terminology, with that of his predecessors, Sherman Block and Peter J. Pitchess. Of immediate concern were his personal decisions, in particular the appointment of Paul Tanaka to be his undersheriff after many years serving as his campaign treasurer. What was considered a marginally functional merit-based promotional system was transformed into a political patronage model, with the attendant loss of organizational legitimacy and tarnished public reputation. The chapter will compare and contrast life within the “car,” as the term is commonly used within the Los Angeles County Sheriff’s Department, and life outside the car, through first-hand accounts, testimony from the Citizen’s Commission on Jail Violence, depositions, and published reports. Using the concept of representative bureaucracy, I will track organizational diversity as a performance measure, using the relative inclusion of all employee groups in the rank structure of the department and how each group fared under the Baca/Tanaka administration. In conclusion, this chapter will present different coping mechanisms utilized by employees confronting serious corruption issues that impacted them directly, and indirectly through the organization.

Details

The Dark Side of Leadership: Identifying and Overcoming Unethical Practice in Organizations
Type: Book
ISBN: 978-1-78635-499-0

Keywords

Access Restricted. View access options
Book part
Publication date: 22 April 2021

Sandra Schamroth Abrams and Hannah R. Gerber

Abstract

Details

Videogames, Libraries, and the Feedback Loop: Learning Beyond the Stacks
Type: Book
ISBN: 978-1-80071-505-9

Access Restricted. View access options
Article
Publication date: 18 July 2020

Melanie Stride, Carol K.H. Hon, Rui Liu and Bo Xia

Adoption of building information modelling (BIM) in facilities management (FM) provides an information platform to store and exchange asset data. Quantity Surveyors, with cost…

1360

Abstract

Purpose

Adoption of building information modelling (BIM) in facilities management (FM) provides an information platform to store and exchange asset data. Quantity Surveyors, with cost management expertise, are increasingly involved in FM roles in the operation phase. However, no study has been conducted on how BIM may assist Quantity Surveyors when contracted in FM roles. This study aims to identify the potential benefits and challenges of using BIM by Quantity Surveyors in FM roles.

Design/methodology/approach

Interviews were conducted with eight professionals from an international built and natural asset design and management company and its FM business partner in Australia.

Findings

Lack of complete and accurate data was the main issue faced by Quantity Surveyors in FM. The benefits of BIM in FM were digitizing and storing asset information and developing a cost database that would be useful for Quantity Surveyors, whereas challenges included keeping model data up to date, cost, industry resistance to change and contractors' lack of model use.

Originality/value

This study contributes to revealing the niche adoption of BIM by Quantity Surveyors in FM and identifying the issues faced by Quantity Surveyors in FM roles using BIM. It contributes to the knowledge of BIM adoption in post-construction. Findings will be useful to develop strategies for adopting BIM in FM and supporting Quantity Surveyors' roles in FM.

Details

Engineering, Construction and Architectural Management, vol. 27 no. 8
Type: Research Article
ISSN: 0969-9988

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 2000

PAUL EMBRECHTS

This article discusses issues common to the pricing of both insurance and finance. These include increasing collaboration between insurance companies and banks, deregulation of…

1354

Abstract

This article discusses issues common to the pricing of both insurance and finance. These include increasing collaboration between insurance companies and banks, deregulation of various insurance and finance markets, integrated risk management, and the emergence of financial engineering as a new profession. Rather than attempting to give an exhaustive exposition of the issues at hand, the author highlights developments that, from a methodological point of view, offer new insight into the comparison of pricing mechanisms between insurance and finance.

Details

The Journal of Risk Finance, vol. 1 no. 4
Type: Research Article
ISSN: 1526-5943

Access Restricted. View access options
Book part
Publication date: 26 November 2019

Ginger Collins and Julie A. Wolter

The purpose of this chapter is to focus on increasing the participation of students with language-based learning disabilities (LLD) in postsecondary transition planning and how…

Abstract

The purpose of this chapter is to focus on increasing the participation of students with language-based learning disabilities (LLD) in postsecondary transition planning and how the interprofessional teams that include a speech-language pathologist may work together to integrate and apply language, literacy, and related self-determinism goals in the secondary school curriculum. As students with LLD enter secondary school, the provision of needed language-literacy intervention services drastically declines, although these students often require these services to facilitate their postsecondary success. Secondary students are expected to read, write, and think at more complex levels than ever before to meet postgraduation workforce demands. The inclusion of self-determination strategies is found to be related to positive post-school outcomes and can be readily integrated into transition planning. The integration of SLPs into the interprofessional team may ideally support secondary school student language-literacy needs in transition planning by using self-determination strategies to help access the curriculum and experience postsecondary success.

Details

Special Education Transition Services for Students with Disabilities
Type: Book
ISBN: 978-1-83867-977-4

Keywords

1 – 10 of 252
Per page
102050