Insider ethnographic analysis is used to analyze change processes in an engineering department. Distributed leadership theory is used as conceptual framework.
DOCUMENT
Climate change is one of the key societal challenges of our times, and its debate takes place across scientific disciplines and into the public realm, traversing platforms, sources, and fields of study. The analysis of such mediated debates has a strong tradition, which started in communication science and has since then been applied across a wide range of academic disciplines.So-called ‘content analysis’ provides a means to study (mass) media content in many media shapes and formats to retrieve signs of the zeitgeist, such as cultural phenomena, representation of certain groups, and the resonance of political viewpoints. In the era of big data and digital culture, in which websites and social media platforms produce massive amounts of content and network this through hyperlinks and social media buttons, content analysis needs to become adaptive to the many ways in which digital platforms and engines handle content.This book introduces Networked Content Analysis as a digital research approach, which offers ways forward for students and researchers who want to work with digital methods and tools to study online content. Besides providing a thorough theoretical framework, the book demonstrates new tools and methods for research through case studies that study the climate change debate with search engines, Twitter, and the encyclopedia project of Wikipedia.
MULTIFILE
From the article: This paper describes the external IT security analysis of an international corporate organization, containing a technical and a social perspective, resulting in a proposed repeatable approach and lessons learned for applying this approach. Part of the security analysis was the utilization of a social engineering experiment, as this could be used to discover employee related risks. This approach was based on multiple signals that indicated a low IT security awareness level among employees as well as the results of a preliminary technical analysis. To carry out the social engineering experiment, two techniques were used. The first technique was to send phishing emails to both the system administrators and other employees of the company. The second technique comprised the infiltration of the office itself to test the physical security, after which two probes were left behind. The social engineering experiment proved that general IT security awareness among employees was very low. The results allowed the research team to infiltrate the network and have the possibility to disable or hamper crucial processes. Social engineering experiments can play an important role in conducting security analyses, by showing security vulnerabilities and raising awareness within a company. Therefore, further research should focus on the standardization of social engineering experiments to be used in security analyses and further development of the approach itself. This paper provides a detailed description of the used methods and the reasoning behind them as a stepping stone for future research on this subject. van Liempd, D., Sjouw, A., Smakman, M., & Smit, K. (2019). Social Engineering As An Approach For Probing Organizations To Improve It Security: A Case Study At A Large International Firm In The Transport Industry. 119-126. https://doi.org/10.33965/es2019_201904l015
MULTIFILE