Search results

1 – 10 of over 131000

Abstract

Details

Environmental Security in Greece
Type: Book
ISBN: 978-1-80071-360-4

Book part
Publication date: 30 June 2004

Georges A. Tanguay and Marie-Christine Therrien

We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and the…

Abstract

We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and the United States. Next, we discuss the options of status quo and adoption of a common security perimeter relative to sovereignty and security. We show that efficient border policies could require cooperation among countries but motivating such collaboration may be difficult since joint border security policies may involve a prisoners’ dilemma problem. On the other hand, we show that the likelihood of joint increased security will be higher if there are country-specific benefits for a country improving security at its border. If this is the case, we demonstrate it is possible to reach optimal security using independent border policies.

Details

North American Economic and Financial Integration
Type: Book
ISBN: 978-0-76231-094-4

Book part
Publication date: 15 October 2005

Michael D. Intriligator

The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a leading role…

Abstract

The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a leading role in contributing to global security or it can play a major role in undermining global security. The next section will present an interpretation of the nature of global security, followed by a discussion of recent changes in the global situation. Next, the current position of Russia in the global system and how that position has changed will be considered. Finally, the global security agenda and the contribution that Russia can make to this agenda will be examined. It will be shown that Russia can play a major role in the achievement of global security.

Details

Eurasia
Type: Book
ISBN: 978-1-84950-011-1

Open Access
Article
Publication date: 27 May 2024

Moza Tahnoon Al Nahyan, Jawaher Majdi Al Ahbabi, Mesheal Abdulmohsen Alabdulrahman, Ibrahim Alhosani, Fauzia Jabeen and Sherine Farouk

Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19…

Abstract

Purpose

Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19 pandemic. It also examines the moderating effects of perceived organizational support and psychological capital on well-being and performance.

Design/methodology/approach

Using a two-wave time-lagged design, data were collected from 279 frontline employees in public service organizations in Saudi Arabia.

Findings

The study’s results show that perceived job security significantly affects job performance. Employee well-being significantly and positively influences job performance and partially mediates the relationship between perceived job security and job performance. Additionally, perceived organizational support and psychological capital positively moderated the relationship between employee well-being and job performance during the pandemic.

Practical implications

This study suggests that policymakers and practitioners need to prioritize addressing the job security concerns and well-being of frontline employees during a pandemic to enhance employee performance.

Originality/value

Our findings present significant implications for policymakers in the context of job security and performance within public organizations in emerging countries.

研究目的

本研究以社會認知生涯理論為基礎,去探討在2019冠狀病毒病疫情期間,僱員對職業保障和福祉的看法如何影響他們的工作績效; 研究亦擬探討感知組織支持和心理資本對福祉和工作績效所起的調節作用。

研究方法

研究人員使用雙波時間遞延設計收集數據; 數據取自於沙特阿拉伯的公共服務組織內工作的279名一線員工。

研究結果

研究結果顯示,僱員的感知職業保障會對他們的工作績效有顯著的影響; 另外,僱員的福祉會正面和顯著地影響他們的工作績效; 而且,僱員的福祉也會局部地調節感知職業保障與工作績效之間的關係。再者,研究人員發現,在大流行期間,感知組織支持和心理資本正面調節了僱員福祉與工作績效之間的關係。

研究的啟示

研究結果建議政策制定者和從業人員必須於大流行肆虐期間,優先處理有關職業保障的關注和一線員工的福祉,俾能提升僱員的工作績效。

研究的原創性

本研究的結果為政策制定者提供了重要的啟示,幫助他們於公共組織的環境內,能更有效地處理關於職業保障和僱員工作績效的事宜。

Article
Publication date: 7 May 2024

Dien Van Tran, Phuong V. Nguyen, Linh Phuong Le and Sam Thi Ngoc Nguyen

This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to…

Abstract

Purpose

This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to explore the complex correlation between the level of awareness about cybersecurity measures and attitudes towards compliance with these measures. Additionally, it looks at how these factors collectively impact employees’ behaviour to protect organisational assets and information.

Design/methodology/approach

This study uses a quantitative research methodology in which primary data are gathered using a survey questionnaire distributed to personnel employed at Vietnamese organisations. The data are analysed, and the validity of the measurement and structural equation model is assessed using a partial least squares–structural equation model approach after the collection of all the survey responses.

Findings

The provision of policies and security education, training and awareness programmes are strongly and positively associated with cybersecurity awareness. Moreover, cybersecurity awareness plays an important role in shaping attitudes and intentions towards information security policy compliance (ISPC). Attitude is positively associated with intention towards ISPC and employee protective behaviour. Finally, the intention towards ISPC is significant in shaping employee protective behaviour.

Originality/value

This study contributes to the understanding of the antecedents of cybersecurity in developing countries such as Vietnam. Furthermore, it provides a comprehensive framework for understanding intention and protective behaviour through cybersecurity awareness and compliance attitudes. By combining the theory of planned behaviour and protection motivation theory with institutional governance, this study extends previous research on the effects of these variables on employee protective behaviour.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 30 April 2024

Hafiez Sofyani and Emile Satia Darma

This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The…

Abstract

Purpose

This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The investigation was situated within the framework of a hacker attack that compromised the security of customer data at one of Indonesia’s largest Islamic bank.

Design/methodology/approach

A survey questionnaire method was used, and the sample population comprised users of Islamic bank in Indonesia. The respondents were then selected purposively with the criteria of individuals who were using mobile banking services. Furthermore, data collection in this study was carried out by distributing questionnaires online. To validate the questionnaire, consultation and validation were conducted by engaging four experts and conducting a pilot study. Hypothesis testing was performed using the structural equation modeling method based on partial least squares.

Findings

The results of the partial least square structural model assessment showed that application efficiency and data security positively influenced the intention to continue using Islamic bank, while application architecture had no effect. Furthermore, data security could not moderate the relationship between application architecture and efficiency toward the intention to continue using Islamic bank.

Practical implications

The results of this study suggested that Islamic banking practitioners must prioritize the enhancement of digital banking services, with a specific focus on improving application efficiency and ensuring robust data security. These two dimensions were critical determinants influencing the intention to continue using Islamic bank.

Originality/value

This study addressed the issue of data security as a moderator, particularly in the context of hacker attacks targeting a major Islamic bank in Indonesia. Furthermore, this current report expounded on the study conducted by Mir et al. (2022) by introducing novel dimensions to the e-service quality of internet banking.

Details

Journal of Islamic Marketing, vol. 15 no. 6
Type: Research Article
ISSN: 1759-0833

Keywords

Article
Publication date: 9 April 2024

Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…

Abstract

Purpose

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.

Design/methodology/approach

Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.

Findings

Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.

Originality/value

Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.

Details

Journal of Systems and Information Technology, vol. 26 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 March 2024

Mohan Thite and Ramanathan Iyer

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…

Abstract

Purpose

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.

Design/methodology/approach

The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.

Findings

The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.

Originality/value

The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 131000