Search results

1 – 7 of 7
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 22 March 2021

Julie M. Haney and Wayne G. Lutters

Cybersecurity advocates safeguard their organizations by promoting security best practices. This paper aims to describe the skills and characteristics of successful advocates.

775

Abstract

Purpose

Cybersecurity advocates safeguard their organizations by promoting security best practices. This paper aims to describe the skills and characteristics of successful advocates.

Design/methodology/approach

This study involved 28 in-depth interviews of cybersecurity advocates.

Findings

Effective advocates possess not only technical acumen but also interpersonal skills, communication skills context awareness and a customer service orientation.

Practical implications

Non-technical skills are deemphasized in cybersecurity training, limiting career progression into the cybersecurity advocate role for existing security professionals and those from other disciplines. This paper suggests improvements for professional development that encourage greater security workforce diversity.

Originality/value

To the best of the authors’ knowledge, this study is the first to define and enumerate competencies for the role of cybersecurity advocate.

Details

Information & Computer Security, vol. 29 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 5 June 2009

John R. Goodall, Wayne G. Lutters and Anita Komlodi

The paper seeks to provide a foundational understanding of the socio‐technical system that is computer network intrusion detection, including the nature of the knowledge work…

1622

Abstract

Purpose

The paper seeks to provide a foundational understanding of the socio‐technical system that is computer network intrusion detection, including the nature of the knowledge work, situated expertise, and processes of learning as supported by information technology.

Design/methodology/approach

The authors conducted a field study to explore the work of computer network intrusion detection using multiple data collection methods, including semi‐structured interviews, examination of security tools and resources, analysis of information security mailing list posts, and attendance at several domain‐specific user group meetings.

Findings

The work practice of intrusion detection analysts involves both domain expertise of networking and security and a high degree of situated expertise and problem‐solving activities that are not predefined and evolve with the dynamically changing context of the analyst's environment. This paper highlights the learning process needed to acquire these two types of knowledge, contrasting this work practice with that of computer systems administrators.

Research limitations/implications

The research establishes a baseline for future research into the domain and practice of intrusion detection, and, more broadly, information security.

Practical implications

The results presented here provide a critical examination of current security practices that will be useful to developers of intrusion detection support tools, information security training programs, information security management, and for practitioners themselves.

Originality/value

There has been no research examining the work or expertise development processes specific to the increasingly important information security practice of intrusion detection. The paper provides a foundation for future research into understanding this highly complex, dynamic work.

Details

Information Technology & People, vol. 22 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Access Restricted. View access options
Article
Publication date: 1 June 2003

Wayne G. Lutters and Mark S. Ackerman

The design of viable, small‐scale community spaces on the Net is often a hit‐or‐miss affair. To better understand promising approaches in this design space, it is necessary to go…

1517

Abstract

The design of viable, small‐scale community spaces on the Net is often a hit‐or‐miss affair. To better understand promising approaches in this design space, it is necessary to go back in time to examine an earlier community technology. A field study is presented of The Castle, a dial‐up bulletin board system, that focuses on Disneyland. As a “gathering place for Disney enthusiasts”, The Castle is a fascinating, albeit eccentric, online community. The Castle's centrality in the fans’ interest network allows it to function as a collecting point. Here people find similar enthusiasts and even those with insider knowledge. Yet, because of the cost structure of dial‐up access (an accidental side‐effect of the technology), participants are overwhelmingly geographically local, which has useful consequences for social maintenance. It is argued that the geographical locality and centrality of interest allow The Castle to thrive. Most importantly, however, the combination of the two together creates a powerful social dynamic which has been lost in most contemporary online communities.

Details

Information Technology & People, vol. 16 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Available. Content available
Article
Publication date: 1 June 2003

Eleanor H. Wynn and Edgar Whitley

248

Abstract

Details

Information Technology & People, vol. 16 no. 2
Type: Research Article
ISSN: 0959-3845

Access Restricted. View access options
Book part
Publication date: 6 August 2024

Jeffrey A. Hayes

This chapter covers two behaviors that greatly affect college students’ mental health and wellbeing: eating and sleeping. The chapter begins with a definition of eating disorders…

Abstract

This chapter covers two behaviors that greatly affect college students’ mental health and wellbeing: eating and sleeping. The chapter begins with a definition of eating disorders and distinguishes clinically disordered eating from other forms of problematic eating. The chapter describes common eating disorders among college students: anorexia nervosa, bulimia nervosa, avoidant restrictive food intake disorder (ARFID) and binge eating disorder. The chapter then discusses measures of problematic eating among college students, including the SCOFF, the Eating Disorder Inventory and the Eating Concerns subscale of the Counseling Center Assessment of Psychological Symptoms (CCAPS). Next, the chapter discusses the prevalence of problematic eating among college students. Cultural considerations are described, with particular attention paid to gender, sexual orientation and ethnicity. Causes of problematic eating among college students are discussed, and the consequences of problematic eating are explored, from shame to medical complications to death. Treatment options are detailed, as are barriers to seeking professional help. The chapter follows a similar structure in covering healthy and problematic sleep behaviors among college students. In particular, the chapter explores measures of sleep quality, the prevalence of problematic sleep among college students, their causes and consequences, as well as strategies for correcting poor sleep and interventions for promoting healthy sleep habits.

Access Restricted. View access options
Article
Publication date: 1 August 1936

SEPTEMBER this year will be unique in the history of the librarian in England in that for the first time in nearly sixty years the annual conference of the Library Association has…

29

Abstract

SEPTEMBER this year will be unique in the history of the librarian in England in that for the first time in nearly sixty years the annual conference of the Library Association has already become a memory only. There are those who profess to believe that the conference should be restored to the autumn months. It may be suggested on the other hand that the attendance at Margate lent no assistance to that point of view; indeed, the Margate conference was one of the most pleasant, one of the most successful, of which we have record. Nevertheless, if it can be proved that any large body of librarians was unable to be present owing to the change of month, it appears to us that the matter should be considered sympathetically. Although no one holds any longer the view that one week's attendance at a conference will teach more than many months' study in hermit‐like seclusion—the words and sentiments are those of James Duff Brown—because to‐day there is much more intimate communication between librarians than there was when that sentiment was expressed, there is enormous value, and the adjective is not an exaggeration, in one large meeting of librarians in body in the year. It is an event to which every young librarian looks forward as the privilege to be his when he reaches a high enough position in the service; attendance is a privilege that no librarian anywhere would forego. And this, in spite of the fact that there is usually a grumble because the day is so full of meetings that there is very little chance of such recreation as a seaside, or indeed any other, place visited, usually provides for the delegates.

Details

New Library World, vol. 39 no. 2
Type: Research Article
ISSN: 0307-4803

Available. Open Access. Open Access
Article
Publication date: 16 September 2024

Jan A. Pfister, David Otley, Thomas Ahrens, Claire Dambrin, Solomon Darwin, Markus Granlund, Sarah L. Jack, Erkki M. Lassila, Yuval Millo, Peeter Peda, Zachary Sherman and David Sloan Wilson

The purpose of this multi-voiced paper is to propose a prosocial paradigm for the field of performance management and management control systems. This new paradigm suggests…

3049

Abstract

Purpose

The purpose of this multi-voiced paper is to propose a prosocial paradigm for the field of performance management and management control systems. This new paradigm suggests cultivating prosocial behaviour and prosocial groups in organizations to simultaneously achieve the objectives of economic performance and sustainability.

Design/methodology/approach

The authors share a common concern about the future of humanity and nature. They challenge the influential assumption of economic man from neoclassical economic theory and build on evolutionary science and the core design principles of prosocial groups to develop a prosocial paradigm.

Findings

Findings are based on the premise of the prosocial paradigm that self-interested behaviour may outperform prosocial behaviour within a group but that prosocial groups outperform groups dominated by self-interest. The authors explore various dimensions of performance management from the prosocial perspective in the private and public sectors.

Research limitations/implications

The authors call for theoretical, conceptual and empirical research that explores the prosocial paradigm. They invite any approach, including positivist, interpretive and critical research, as well as those using qualitative, quantitative and interventionist methods.

Practical implications

This paper offers implications from the prosocial paradigm for practitioners, particularly for executives and managers, policymakers and educators.

Originality/value

Adoption of the prosocial paradigm in research and practice shapes what the authors call the prosocial market economy. This is an aspired cultural evolution that functions with market competition yet systematically strengthens prosociality as a cultural norm in organizations, markets and society at large.

Details

Qualitative Research in Accounting & Management, vol. 21 no. 5
Type: Research Article
ISSN: 1176-6093

Keywords

1 – 7 of 7
Per page
102050