Search results

1 – 10 of 173
Article
Publication date: 19 February 2020

Joseph York Thomas and David P. Biros

The study of deception and the theories, which have been developed have relied heavily on laboratory experiments in controlled environments, using American college students…

Abstract

Purpose

The study of deception and the theories, which have been developed have relied heavily on laboratory experiments in controlled environments, using American college students participating in mock scenarios. The purpose of this paper is to validate previous deception detection research in a real-world, high stakes environment where the unit of analysis is the question–response pair.

Design/methodology/approach

The study used previously confirmed linguistic and paralinguistic speech cues and the constructs of deception in an attempt to validate a leading deception theory, interpersonal deception theory (IDT). A combination of descriptive and predictive analysis was conducted to best understand the relationship between speech cues and changes in the subjects’ behavior.

Findings

The result validates IDT with mixed results on individual measures and their constructs. However, there is clear evidence across the 711 question-response pairs that not only was it possible to differentiate truth from deceptive behavior but also patterns of behavior can be seen over time.

Research limitations/implications

Because of the real-world nature of the study, it is difficult to generalize the results to a larger population. However, one implication for future research is the development of methods to capture, process and prepare raw speech into data ready for analysis.

Originality/value

This paper attempts to fill the gap between the controlled mock scenarios and the harsh reality of real-world deception.

Details

Journal of Criminal Psychology, vol. 10 no. 3
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 27 June 2020

Fletcher Glancy, David P. Biros, Nan Liang and Andy Luse

The authors argue that the current studies about malicious insiders confuse the fact that malicious attacks belong to two different categories, namely, those that launch…

Abstract

Purpose

The authors argue that the current studies about malicious insiders confuse the fact that malicious attacks belong to two different categories, namely, those that launch instrumental attacks and expressive attacks. The authors collect malicious insider data from publicly available sources and use text-mining techniques to analyze the association between malicious insiders’ characteristics and the different types of attack.

Design/methodology/approach

The authors investigated the relationship between personality characteristics and different types of malicious attacks. For the personality characteristics, the authors use the same method as Liang et al. (2016), which extracted these characteristics based on a keyword-characteristic dictionary. For different types of malicious attacks, two raters rated each case based on criteria modified from criminology research to determine the degree of expressiveness and instrumentality.

Findings

The results show that malicious insiders who are manipulative or seeking personal gain tend to carry out instrumental attacks. Malicious insiders who are arrogant tend to conduct expressive attacks.

Research limitations/implications

This study uses third party articles to identify the personality characteristics of known malicious insiders. As such, not all personality characteristics may have been reported. Data availability was an issue.

Practical implications

Understanding if different personality characteristics lead different types of attacks can help managers identify employees who exhibit them and mitigate an attack before it occurs.

Social implications

Malicious insider attacks can have devastating results on businesses and employees. Help to identify potential malicious insiders before they act, may prevent undue harm.

Originality/value

This study used 132 cases of none malicious insiders to examine their attack objectives. No other study that the authors know of used that many cases.

Details

Journal of Criminal Psychology, vol. 10 no. 3
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 28 December 2020

Forough Nasirpouri Shadbad and David Biros

This study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to…

1292

Abstract

Purpose

This study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to investigate how technostress resulting from employees' constant interaction with IT influences the likelihood of security incidents. Although past research studied the concept of security-related technostress, the effect of IT use itself on employees’ extra-role activities such as security-related behaviors is unanswered. Thus, this paper aims to provide an understanding of the negative impact of technostress on employee information security policy (ISP) compliance.

Design/methodology/approach

Drawing on technostress literature, this research develops a research model that investigates the effect of technostress on employee intention to violate ISPs. It also extends the dimensionality of technostress construct by adding a new dimension called “techno-unreliability” that shows promising results. The authors use online survey data from a sample of 356 employees who have technology-based professions. We apply the structural equation modeling technique to evaluate the proposed research model.

Findings

Findings showed that IT use imposes high-level perceptions of a set of technostress creators, which makes users rationalize their ISP violations and engage in non-compliant behaviors. Further analysis of each dimension of technostress showed that techno-complexity, techno-invasion and techno-insecurity account for higher ISP non-compliant behaviors.

Originality/value

This study provides a new understanding of technostress to the context of information security and emphasizes on its negative impact on employee ISP compliance behaviors.

Details

Information Technology & People, vol. 35 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 11 June 2021

Madhav Sharma and David Biros

The nature of technologies that are recognised as Artificial Intelligence (AI) has continually changed over time to be something more advanced than other technologies. Despite the…

Abstract

The nature of technologies that are recognised as Artificial Intelligence (AI) has continually changed over time to be something more advanced than other technologies. Despite the fluidity of understanding of AI, the most common theme that has stuck with AI is ‘human-like decision making’. Advancements in processing power, coupled with big data technologies, gave rise to highly accurate prediction algorithms. Analytical techniques which use multi-layered neural networks such as machine learning and deep learning have emerged as the drivers of these AI-based applications. Due to easy access and growing information workforce, these algorithms are extensively used in a plethora of industries ranging from healthcare, transportation, finance, legal systems, to even military. AI-tools have the potential to transform industries and societies through automation. Conversely, the undesirable or negative consequences of AI-tools have harmed their respective organisations in social, financial and legal spheres. As the use of these algorithms propagates in the industry, the AI-based decisions have the potential to affect large portions of the population, sometimes involving vulnerable groups in society. This chapter presents an overview of AI’s use in organisations by discussing the following: first, it discusses the core components of AI. Second, the chapter discusses common goals organisations can achieve with AI. Third, it examines different types of AI. Fourth, it discusses unintended consequences that may take place in organisations due to the use of AI. Fifth, it discusses vulnerabilities that may arise from AI systems. Lastly, this chapter offers some recommendations for industries to consider regarding the development and implementation of AI systems.

Details

Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress
Type: Book
ISBN: 978-1-83909-812-3

Keywords

Content available
Article
Publication date: 7 September 2015

Oszkár Bíró, David A. Lowther and Piergiorgio Alotto

137

Abstract

Details

COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering, vol. 34 no. 5
Type: Research Article
ISSN: 0332-1649

Content available
Book part
Publication date: 11 June 2021

Abstract

Details

Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress
Type: Book
ISBN: 978-1-83909-812-3

Article
Publication date: 10 July 2009

S. Außerhofer, O. Bíró and K. Preis

The purpose of this paper is to describe a method for solving eddy current problems. Discontinuous basis functions are applied to conducting regions in eddy‐current problems. This…

Abstract

Purpose

The purpose of this paper is to describe a method for solving eddy current problems. Discontinuous basis functions are applied to conducting regions in eddy‐current problems. This results in a block‐diagonal mass matrix allowing explicit time stepping without having to solve large algebraic systems.

Design/methodology/approach

The effect of the basis functions in the conducting region is limited to the respective finite element. This yields to a block‐diagonal mass matrix, whereas each block in this matrix belongs to one finite element. In the nonconducting region, traditional finite elements are used which leads to well‐conditioned system matrices. For the two regions, different time steps are used.

Findings

To avoid instability, a term which penalizes the tangential jump of the magnetic vector potential A has to be added. A value for weighting this term is suggested and tested on a simple two dimensional example.

Originality/value

The proposed method leads to a potentially fast method for solving eddy‐current problems.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 28 no. 4
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 10 July 2009

S. Rainer O. Bíró and A. Stermecki

Different solution methods, using finite element method in continuous and discrete frequency domain, are compared with each other in order to find the most appropriate method for…

Abstract

Purpose

Different solution methods, using finite element method in continuous and discrete frequency domain, are compared with each other in order to find the most appropriate method for the estimation of steady state vibrations in linear structural and mechanical problems. The purpose of this paper is to describe the procedures.

Design/methodology/approach

The continuous and some relevant discrete frequency domain solution methods are compared by an analytical investigation as well as by the numerical examination of a simple model. Finally, results for a more relevant example using finite elements are presented.

Findings

It is shown that the steady state computation using the continuous frequency domain system description delivers the exact solution for a given system.

Originality/value

Based on the presented results, the use of continuous frequency domain system description is recommendable in most cases.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 28 no. 4
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 10 July 2009

Karl Hollaus, Oszkár Bíró, Gernot Matzenauer, Christian Stockreiter, Bernhard Weiß, Peter Caldera and Gerhard Paoli

The purpose of this paper is to study the extraction of scattering parameters (SPs) from simple structures on a printed circuit board (PCB) by the finite difference time domain…

Abstract

Purpose

The purpose of this paper is to study the extraction of scattering parameters (SPs) from simple structures on a printed circuit board (PCB) by the finite difference time domain (FDTD) method with the aid of a surface impedance boundary condition (SIBC).

Design/methodology/approach

The incorporation of SIBC into the FDTD method is described for the general case. The excitation of a field problem by a field pattern and the transition from the field solution to a circuit representation by SPs is discussed.

Findings

SPs obtained by FDTD with SIBC are validated with semi‐analytic solutions and compared with results obtained by different numerical methods. Results of a microstrip with a discontinuity considering losses are presented demonstrating the capability of the present method.

Originality/value

The comparison of numerical results obtained by different methods demonstrates the capability of the present method to extract SPs from PCBs very efficiently.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 28 no. 4
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 10 July 2009

Gergely Koczka, Stefan Außerhofer, Oszkár Bíró and Kurt Preis

The purpose of the paper is to present a method for efficiently obtaining the steady‐state solution of the quasi‐static Maxwell's equations in case of nonlinear material…

Abstract

Purpose

The purpose of the paper is to present a method for efficiently obtaining the steady‐state solution of the quasi‐static Maxwell's equations in case of nonlinear material properties and periodic excitations.

Design/methodology/approach

The fixed‐point method is used to take account of the nonlinearity of the material properties. The harmonic balance principle and a time periodic technique give the periodic solution in all nonlinear iterations. Owing to the application of the fixed‐point technique the harmonics are decoupled. The optimal parameter of the fixed‐point method is determined to accelerate its convergence speed. It is shown how this algorithm works with iterative linear equation solvers.

Findings

The optimal parameter of the fixed‐point method is determined and it is also shown how this method works if the equation systems are solved iteratively.

Originality/value

The convergence criterion of the iterative linear equation solver is determined. The method is used to solve three‐dimensional problems.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 28 no. 4
Type: Research Article
ISSN: 0332-1649

Keywords

1 – 10 of 173