Search results

1 – 10 of 133
Article
Publication date: 22 March 2024

Hamada Elsaid Elmaasrawy and Omar Ikbal Tawfik

This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance…

Abstract

Purpose

This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance cybersecurity (CS).

Design/methodology/approach

The questionnaire was used to collect data for 97 internal auditors (IAu) from the Gulf Cooperation Council countries. The authors used partial least squares (PLS) to test the hypotheses.

Findings

The results show a positive effect of the ADRIA on each of the organisational proactive measures, human proactive measures and technical proactive measures to enhance CS. The study also found a positive effect of the confirmatory role of IA on both human proactive measures and technical proactive measures to enhance CS. No effect of the confirmatory role of IA on the organisational proactive measures is found.

Research limitations/implications

This study focused on only three proactive measures to enhance CS, and this study was limited to the opinions of IAu. In addition, the study was limited to using regression analysis according to the PLS method.

Practical implications

The results of this study show that managers need to consider the influential role of IA as a value-adding activity in reducing CS risks and activating proactive measures. Also, IAu must expand its capabilities, skills and knowledge in CS auditing to provide a bold view of cyber threats. At the same time, the institutions responsible for preparing IA standards should develop standards and guidelines that help IAu to play assurance and advisory roles.

Originality/value

To the best of the authors’ knowledge, this is the first study of its kind that deals with the impact of the assurance and ADRIA on proactive measures to enhance CS. In addition, the study determines the nature of the advisory role and the assurance role of IA to strengthen CS.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Open Access
Article
Publication date: 16 July 2021

Nikolay Andreevich Moldovyan and Dmitriy Nikolaevich Moldovyan

The practical purpose of this research is to propose a candidate for post-quantum signature standard that is free of significant drawback of the finalists of the NIST world…

Abstract

Purpose

The practical purpose of this research is to propose a candidate for post-quantum signature standard that is free of significant drawback of the finalists of the NIST world competition, which consists in the large size of the signature and the public key. The practical purpose is to propose a fundamentally new method for development of algebraic digital signature algorithms.

Design/methodology/approach

The proposed method is distinguished by the use of two different finite commutative associative algebras as a single algebraic support of the digital signature scheme and setting two different verification equation for a single signature. A single public key is computed as the first and the second public keys, elements of which are computed exponentiating two different generators of cyclic groups in each of the algebras.

Findings

Additionally, a scalar multiplication by a private integer is performed as final step of calculation of every element of the public key. The same powers and the same scalar values are used to compute the first and the second public keys by the same mathematic formulas. Due to such design, the said generators are kept in secret, providing resistance to quantum attacks. Two new finite commutative associative algebras, multiplicative group of which possesses four-dimensional cyclicity, have been proposed as a suitable algebraic support.

Originality/value

The introduced method is novel and includes new techniques for designing algebraic signature schemes that resist quantum attacks. On its base, a new practical post-quantum signature scheme with relatively small size of signature and public key is developed.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 26 April 2024

Mohammad Saeed Abdallah ALsheyab

The basis for this study on electronic transferable records (ETRs) in the context of digitalizing cross-border trade is established in this chapter. It illustrates how the growing…

Abstract

Purpose

The basis for this study on electronic transferable records (ETRs) in the context of digitalizing cross-border trade is established in this chapter. It illustrates how the growing trend toward paperless trade and technological improvements is changing trade operations. This chapter focuses on the need to look into ETRs because of their capacity to influence business transactions while navigating complex legal issues. The specific goals of the study are outlined, including a review of the advantages, legality, difficulties and best practices of ETRs. This study aims to shed light on the possible advantages and disadvantages of ETRs, the legal framework that controls their use and the best practices for their efficient implementation. This study also seeks to provide informative recommendations for businesses and people that are considering using ETRs.

Design/methodology/approach

This study explores the evolving world of ETRs and their crucial function in international trade. Multidimensional technique is used to examine the transformative potential of ETRs from a variety of research angles. The research design is based on a comprehensive evaluation of the literature that includes a wide range of reliable sources, including academic papers, business reports and legal documents. The comprehensive retrieval of essential material is ensured through keyword searches in renowned academic databases and industry resources. The qualitative synthesis of secondary sources further enhances this methodology and allows for a complex examination of the implications of ETRs. The case study analysis provides practical information on the benefits, hazards and practical applications of ETRs. Multifaceted aspects are uncovered via a thematic approach and qualitative investigation, including potential advantages, hazards, implementation plans and regulatory frameworks.

Findings

ETRs offer a range of potential advantages for cross-border trade, encompassing augmented efficiency, reduced costs and heightened security. Nonetheless, their implementation also presents legal challenges and risks, spanning security and privacy concerns, legal ambiguities and technical complexities. Consequently, it is crucial for individuals and businesses to meticulously assess and mitigate these risks through the integration of robust security protocols, staying informed about legal developments and adhering to pertinent regulatory stipulations. In spite of these hurdles, the trajectory of ETR adoption is anticipated to remain on an upward trajectory, driven by increasing recognition of their potential benefits and the concurrent evolution of legal frameworks and technical standards.

Research limitations/implications

Research limitations included the following: lack of adoption of ETRs internationally; and legal diversity and different legal systems results in different consideration of the ETRs. It makes reaching a unified ETR system more difficult.

Practical implications

It is necessary to develop clear policies and procedures and establish well-defined policies and procedures governing ETR use. These should encompass security guidelines, data protection measures and adherence to legal mandates. Regular review and updates are imperative. Stay current on legal developments: In light of the continuously evolving legal and regulatory landscape pertaining to ETRs, businesses and individuals must stay abreast of pertinent changes and seek professional counsel when necessary. Collaborate with partners and stakeholders: To ensure harmonization and standardization in ETR deployment, active collaboration with partners, regulators and industry associations is vital.

Social implications

Enhance awareness and education: Investment in awareness and educational initiatives is crucial. Decision-makers should organize training programs, workshops and seminars to enhance understanding of ETRs’ potential benefits in cross-border trade among stakeholders. Socially, the use of ETR can achieve several political advantages for the society. It minimizes risks of corruption through enhancing tracing and auditing abilities for relevant authorities making it more difficult to engage in corrupt practices. That can promote integrity within government and public procurement system.

Originality/value

The development of standardized technical frameworks and interoperable platforms for ETRs could enhance their seamless integration into existing trade systems. Additionally, investigating the integration of emerging technologies like blockchain, IoT and AI into ETR ecosystems could unlock innovative solutions to security, authenticity and data management concerns. This study examines how ETRs can radically alter how trade is conducted on a global scale. This paper examines ETRs’ role in improving cross-border trade digitization by examining their advantages, legal difficulties and implementation techniques. The conclusions will aid firms, decision-makers and attorneys in navigating the constantly changing world of trade agreements. The study’s ultimate goal is to offer takeaways that support effective, secure and legally compliant integration of ETRs, ensuring that they operate as a catalyst for improved global trade efficacy and efficiency.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 15 May 2024

Mohammad Omar Mohammad Alhejaili

This study aims to investigate the integration of smart contracts into the legal framework of Saudi Arabia, spotlighting the pivotal role of blockchain technology in…

Abstract

Purpose

This study aims to investigate the integration of smart contracts into the legal framework of Saudi Arabia, spotlighting the pivotal role of blockchain technology in revolutionizing contractual processes. It evaluates the capacity of smart contracts to enhance the efficiency, security and transparency of legal transactions, while critically examining the legal challenges their adoption presents.

Design/methodology/approach

Through qualitative analysis, this research explores the operational dynamics of smart contracts, with a focus on their autonomous execution and the digital codification of contractual terms. It scrutinizes the alignment of smart contracts with the Saudi legal system, concentrating on pivotal issues such as the establishment of mutual consent, the verification of contracting parties’ capacity and adherence to conventional legal doctrines.

Findings

This study uncovers the transformative potential of smart contracts in redefining the execution of contracts, highlighting their advantages in streamlining transactions and enhancing contractual reliability. However, it also identifies significant obstacles in the path of their full integration into Saudi Arabia’s legal landscape, notably the challenge of reconciling smart contracts’ technology-driven operations with established legal norms and rectifying potential legal inconsistencies.

Originality/value

Offering fresh perspectives on the confluence of technology and law, this paper illuminates the complex task of implementing smart contracts within a legal framework that is in the process of adapting to digital innovation. It advocates for a sophisticated strategy of regulatory adjustment that promotes the legal system's evolution alongside technological progress, ensuring the effective and legally sound utilization of smart contracts.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 1 April 2024

Zoubeir Lafhaj, Slim Rebai, Olfa Hamdi, Rateb Jabbar, Hamdi Ayech and Pascal Yim

This study aims to introduce and evaluate the COPULA framework, a construction project monitoring solution based on blockchain designed to address the inherent challenges of…

Abstract

Purpose

This study aims to introduce and evaluate the COPULA framework, a construction project monitoring solution based on blockchain designed to address the inherent challenges of construction project monitoring and management. This research aims to enhance efficiency, transparency and trust within the dynamic and collaborative environment of the construction industry by leveraging the decentralized, secure and immutable nature of blockchain technology.

Design/methodology/approach

This paper employs a comprehensive approach encompassing the formulation of the COPULA model, the development of a digital solution using the ethereum blockchain and extensive testing to assess performance in terms of execution cost, time, integrity, immutability and security. A case analysis is conducted to demonstrate the practical application and benefits of blockchain technology in real-world construction project monitoring scenarios.

Findings

The findings reveal that the COPULA framework effectively addresses critical issues such as centralization, privacy and security vulnerabilities in construction project management. It facilitates seamless data exchange among stakeholders, ensuring real-time transparency and the creation of a tamper-proof communication channel. The framework demonstrates the potential to significantly enhance project efficiency and foster trust among all parties involved.

Research limitations/implications

While the study provides promising insights into the application of blockchain technology in construction project monitoring, future research could explore the integration of COPULA with existing project management methodologies to broaden its applicability and impact. Further investigations into the solution’s scalability and adaptation to various construction project types and sizes are also suggested.

Originality/value

This research offers a comprehensive blockchain solution specifically tailored for the construction industry. Unlike prior studies focusing on theoretical aspects, this paper presents a practical, end-to-end solution encompassing model formulation, digital implementation, proof-of-concept testing and validation analysis. The COPULA framework marks a significant advancement in the digital transformation of construction project monitoring, providing a novel approach to overcoming longstanding industry challenges.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 13 June 2023

Anita Cerić and Ivona Ivić

As climate change has become a growing concern, sustainable development has become increasingly important. Emissions reduction is a key step for more efficient energy use. In the…

Abstract

Purpose

As climate change has become a growing concern, sustainable development has become increasingly important. Emissions reduction is a key step for more efficient energy use. In the last few years, the residential building sector in Croatia has received financial support for multi-dwelling building energy efficiency retrofits (EERs). However, some of these projects encountered difficulties due to information asymmetry between the key participants. This study aims to address the problem from the perspective of the principal-agent theory, which is concerned with information asymmetry and the asymmetry's repercussions.

Design/methodology/approach

A social network analysis is conducted to reflect the operation and management (OM) details of Croatian multi-dwelling buildings. The key stakeholders of EER are mapped, along with the contractual and communication ties between them. Using the Gephi software, relationship data are visually represented and statistically evaluated.

Findings

The analysis indicated two different clusters or groups of stakeholders in EERs in Croatia and enabled the mapping of key relationships between stakeholders. The findings stress the importance of the key relationship between owner representatives (ORs) and property managers (PMs).

Originality/value

The contribution of this study is the development of framework for blockchain implementation in EERs, which can be adapted for use in different markets and/or projects. Blockchain is proposed for minimization of information asymmetry between different stakeholders. Blockchain enables communication and cooperation during project development and enhances trust among stakeholders.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 26 February 2024

Himanshu Joshi and Deepak Chawla

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in…

Abstract

Purpose

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in mobile wallets enhances user trust (TR), attitude (ATT) and intention (INT). Using a multiple and serial mediation model, both TR and ATT were found to mediate the relationship between PS and BI.

Design/methodology/approach

Drawing on the stimulus-organism-response (S-O-R) theory, the proposed conceptual model comprises PS, TR, ATT and BI. An online survey was conducted with a cross-sectional sample of 744 mobile wallet users in India. Partial least squares structural equation modeling (PLS-SEM) was used to analyze the hypothesized relationships and test the mediation effects.

Findings

Results show that the stimulus, PS, has a positive and significant influence on TR and ATT, which eventually has a positive influence on BI. The research model explains 64.4 percent of the variance in BI. Further, both TR and ATT independently and parallelly mediate the relationship PS and BI. Lastly, gender is found to moderate the relationship between TR and BI and ATT and BI.

Practical implications

The research showed the importance of PS, TR and ATT towards mobile wallet adoption INTs. Further, the findings support the idea that developing TR and ATT is essential for shaping INTs. This suggests that mobile wallet service providers should invest in methods that not just enhance user TR but also reinforce a positive ATT towards the platform. To demonstrate TR, mobile wallet providers must ensure the confidentiality and privacy of user data, keep customer interests in mind and fulfill commitments. Lastly, for strengthening customer TR, excellent customer support is extremely important.

Originality/value

While prior researchers have majorly used technology acceptance model (TAM) and unified theory of acceptance and use of technology (UTAUT) models to explain adoption INTs, this study examines the relationship between PS, TR, ATT and BI through the lens of the SOR framework.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 22 March 2024

Ghulam Mustafa, Waqas Rafiq, Naveed Jhamat, Zeeshan Arshad and Farhana Aziz Rana

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and…

Abstract

Purpose

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and adherence to existing laws.

Design/methodology/approach

The paper explores blockchain’s potential in e-government, focusing on legal, ethical and governance aspects. It conducts an in-depth analysis of blockchain’s integration into data governance, emphasizing legal compliance and resilient security protocols.

Findings

The study comprehensively evaluates blockchain’s implementation, covering privacy, interoperability, consensus mechanisms, scalability and regulatory alignment. It highlights governance’s critical role in ensuring legal compliance within blockchain paradigms.

Research limitations/implications

Ethical and legal concerns arising from blockchain adoption remain unresolved. The study underscores how blockchain challenges its core principles of anonymity and decentralization in e-government settings.

Practical implications

The framework outlined offers potential for diverse technological environments, albeit raising ethical and legal queries. It emphasizes governance’s pivotal role in achieving legal compliance in blockchain adoption.

Social implications

Blockchain’s impact on legal and ethical facets necessitates further exploration to align with its core principles while addressing governance in e-government settings.

Originality/value

This study presents a robust framework for assessing blockchain’s viability in e-government, emphasizing legal compliance, despite ethical and legal intricacies that challenge its fundamental principles.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 26 December 2023

Manaf Al-Okaily, Dmaithan Al-Majali, Aws Al-Okaily and Tha’er Majali

The recent progress of digital accounting has significantly affected businesses’ sustainable production process. Businesses generally use digital accounting applications to…

Abstract

Purpose

The recent progress of digital accounting has significantly affected businesses’ sustainable production process. Businesses generally use digital accounting applications to automate their operational procedures and increase their corporate efficiencies through improved output quality and sustainability. Consequently, the purpose of this study is to look into the antecedent factors that directly and indirectly influence blockchain technology adoption in the context of digital accounting systems.

Design/methodology/approach

The data of the current study were obtained from 346 accountants working in information technology companies. Partial least squares structural equation modeling was used to test the research proposal model.

Findings

The empirical results confirmed that the adoption of blockchain technology is most considerably impacted by perceived usefulness, whereby it was also revealed that perceived ease of use has a direct and indirect effect on blockchain technology adoption.

Originality/value

According to the researchers’ knowledge, this study addresses a vital research gap in the literature by suggesting a comprehensive research model that can help garner enhanced usage of blockchain technology and its implications in digital accounting systems in the Jordanian context.

Article
Publication date: 24 June 2022

Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah and Kamal Gulati

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates…

Abstract

Purpose

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates endorsed through CA to substantiate users for the barter of encoded communications is one of the most significant constraints for the extensive recognition of PKC, as the technique takes too much time and susceptible to error. PKC’s certificate and key management operating costs are reduced with IBC. IBE is a crucial primeval in IBC. The thought behind presenting the IBE scheme was to diminish the complexity of certificate and key management, but it also gives rise to key escrow and key revocation problem, which provides access to unauthorised users for the encrypted information.

Design/methodology/approach

This paper aims to compare the result of IIBES with the existing system and to provide security analysis for the same and the proposed system can be used for the security in federated learning.

Findings

Furthermore, it can be implemented using other encryption/decryption algorithms like elliptic curve cryptography (ECC) to compare the execution efficiency. The proposed system can be used for the security in federated learning.

Originality/value

As a result, a novel enhanced IBE scheme: IIBES is suggested and implemented in JAVA programming language using RSA algorithm, which eradicates the key escrow problem through eliminating the need for a KGC and key revocation problem by sing sub-KGC (SKGC) and a shared secret with nonce. IIBES also provides authentication through IBS as well as it can be used for securing the data in federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 133