Search results

1 – 10 of 125
Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7396

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 17 April 2024

Elham Rostami and Fredrik Karlsson

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for…

Abstract

Purpose

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs.

Design/methodology/approach

A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. The authors extracted 890 sentences from these ISPs that included one or more of the analyzed keywords. These sentences were analyzed using the new metric – keyword loss of specificity – to assess to what extent the selected keywords were used for pinpointing and guiding actionable advice. Thus, the authors classified the extracted sentences as either actionable advice or other information, depending on the type of information conveyed.

Findings

The results show a significant keyword loss of specificity in relation to pieces of actionable advice in ISPs provided by Swedish public agencies. About two-thirds of the sentences in which the analyzed keywords were used focused on information other than actionable advice. Such dual use of keywords reduces the possibility of pinpointing and communicating clear, actionable advice.

Research limitations/implications

The suggested metric provides a means to assess the quality of how keywords are used in ISPs for different purposes. The results show that more research is needed on how keywords are used in ISPs.

Practical implications

The authors recommended that ISP designers exercise caution when using keywords in ISPs and maintain coherency in their use of keywords. ISP designers can use the suggested metrics to assess the quality of actionable advice in their ISPs.

Originality/value

The keyword loss of specificity metric adds to the few quantitative metrics available to assess ISP quality. To the best of the authors’ knowledge, applying this metric is a first attempt to measure the quality of actionable advice in ISPs.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 20 July 2023

Martina Neri, Federico Niccolini and Luigi Martino

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…

2395

Abstract

Purpose

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known characteristics, the cybersecurity phenomenon goes beyond the detection of technological impacts, and encompasses all the dimensions of an organization. This study thus focusses on an additional set of organizational elements. The key elements of cybersecurity organizational readiness depicted here are cybersecurity awareness, cybersecurity culture and cybersecurity organizational resilience (OR). This study aims to qualitatively assess small and medium enterprises’ (SMEs) overall level of organizational cybersecurity readiness.

Design/methodology/approach

This study focused on conducting a cybersecurity organizational readiness assessment using a sample of 53 Italian SMEs from the information and communication technology sector. Informed mixed method research, this study was conducted consistent with the principles of the explanatory sequential mixed method design, and adopting a quanti-qualitative methodology. The quantitative data were collected through a questionnaire. Qualitative data were subsequently collected through semi-structured interviews.

Findings

Although many elements of the technical aspects of cybersecurity OR have yielded very encouraging results, there are still some areas that require improvement. These include those facets that constitute the foundation of cybersecurity awareness, and, thus, a cybersecurity culture. This result highlights that the areas in need of improvement are exactly those that are most important in fighting against cyber threats via organizational cybersecurity readiness.

Originality/value

Although the importance of SMEs is obvious, evidence of such organizations’ attitudes to cybersecurity are still limited. This research is an attempt to depict the organizational issue related to cybersecurity, i.e. overall cybersecurity organizational readiness.

Open Access
Article
Publication date: 2 April 2024

Koraljka Golub, Osma Suominen, Ahmed Taiye Mohammed, Harriet Aagaard and Olof Osterman

In order to estimate the value of semi-automated subject indexing in operative library catalogues, the study aimed to investigate five different automated implementations of an…

Abstract

Purpose

In order to estimate the value of semi-automated subject indexing in operative library catalogues, the study aimed to investigate five different automated implementations of an open source software package on a large set of Swedish union catalogue metadata records, with Dewey Decimal Classification (DDC) as the target classification system. It also aimed to contribute to the body of research on aboutness and related challenges in automated subject indexing and evaluation.

Design/methodology/approach

On a sample of over 230,000 records with close to 12,000 distinct DDC classes, an open source tool Annif, developed by the National Library of Finland, was applied in the following implementations: lexical algorithm, support vector classifier, fastText, Omikuji Bonsai and an ensemble approach combing the former four. A qualitative study involving two senior catalogue librarians and three students of library and information studies was also conducted to investigate the value and inter-rater agreement of automatically assigned classes, on a sample of 60 records.

Findings

The best results were achieved using the ensemble approach that achieved 66.82% accuracy on the three-digit DDC classification task. The qualitative study confirmed earlier studies reporting low inter-rater agreement but also pointed to the potential value of automatically assigned classes as additional access points in information retrieval.

Originality/value

The paper presents an extensive study of automated classification in an operative library catalogue, accompanied by a qualitative study of automated classes. It demonstrates the value of applying semi-automated indexing in operative information retrieval systems.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 14 May 2024

Ying Hu and Feng’e Zheng

The ancient town of Lijiang is a representative place of ethnic minorities in China’s southwest border area jointly built by many ethnic groups. Its rich and diversified history…

Abstract

Purpose

The ancient town of Lijiang is a representative place of ethnic minorities in China’s southwest border area jointly built by many ethnic groups. Its rich and diversified history, culture and architecture as well as its artistic and spiritual values need to be better retained and explored.

Design/methodology/approach

The protection and inheritance of Lijiang’s cultural heritage will be improved through the construction of digital memory resources. To guide Lijiang’s digital memory construction, this study explores strategies of digital memory construction by analyzing four case studies of well-known memory projects from China and America.

Findings

From the case studies analysis, factors of digital memory construction were identified and compared. Factors led to the discussion of strategies for constructing the digital memory of Lijiang within its design, construction and service phases.

Originality/value

The ancient town of Lijiang is a famous historical and cultural city in China, and it is also a representative place of ethnic minorities in the border area jointly built by many ethnic groups. The rich culture should be preserved and digitalized to offer better use for the whole nation.

Details

Digital Transformation and Society, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2755-0761

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1260

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 21 May 2024

Matthew Tickle, Sarah Schiffling and Gaurav Verma

This paper aims to explore the impact of fourth-party logistics (4PL) adoption on the agility, adaptability and alignment (AAA) capabilities within humanitarian supply chains…

Abstract

Purpose

This paper aims to explore the impact of fourth-party logistics (4PL) adoption on the agility, adaptability and alignment (AAA) capabilities within humanitarian supply chains (HSCs).

Design/methodology/approach

Semi-structured interviews with individuals from a large non-government organisation were combined with secondary data to assess the influence of 4PL adoption on AAA capabilities in HSCs.

Findings

The results indicate that HSCs exhibit some of the AAA antecedents but not all are fully realised. While 4PL positively affects the AAA capabilities of HSCs, its adoption faces challenges such as the funding environment, data security/confidentiality and alignment with humanitarian principles. The study suggests an AAA antecedent realignment, positioning alignment as a precursor to agility and adaptability. It also identifies three core antecedents in HSCs: flexibility, speed and environmental uncertainty.

Practical implications

The study shows the positive impact 4PL adoption can have on the AAA capabilities of HSCs. The findings have practical relevance for those wishing to optimise HSC performance through 4PL adoption, by identifying the inhibiting factors to its adoption as well as strategies to address them.

Originality/value

This research empirically explores 4PL’s impact on AAA capabilities in HSCs, highlighting the facilitating and hindering factors of 4PL adoption in this environment as well as endorsing a realignment of AAA antecedents. It also contributes to the growing research on SC operations in volatile settings.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 12 March 2021

Kafferine Yamagishi, Cecil Gantalao and Lanndon Ocampo

This study aims to draw observations on the current status and potentials of the Philippines as a farm tourism destination and identify the underlying factors that inhibit farm…

76756

Abstract

Purpose

This study aims to draw observations on the current status and potentials of the Philippines as a farm tourism destination and identify the underlying factors that inhibit farm tourism development. It intends to gauge the challenges that Filipino farmers face in diversifying farms and operating farm sites and uses these challenges in crafting strategies and policies for relevant stakeholders. It also provides Philippine farm tourism literature to address the limitations of references in the topic.

Design/methodology/approach

The study adopts an exploratory type of inquiry method and secondary data collection from various sources, such as published journal articles, news articles and reports, to gain insights and relevant information on farm tourism. The study also uses a threats, opportunities, weaknesses and strengths analysis approach to develop competitive farm tourism strategies.

Findings

The Philippines, with vast agricultural land, has the necessary base for farm tourism, and the enactment of the Farm Tourism Development Act of 2016 bridges this potential. With low agricultural outputs, the country draws relevance for farm tourism as a farm diversification strategy to supplement income in rural communities. While having these potentials, crucial initiatives in physical characteristics, product development, education and training, management and entrepreneurship, marketing and customer relations and government support must be implemented. Farmers' lack of skills, training and capital investment potential to convert their farms into farm tourism sites serves as the major drawback. Thus, developing entrepreneurial and hospitality skills is crucial.

Originality/value

This work presents a historical narrative of initiatives and measures of the Philippine farm tourism sector. It also provides a holistic discussion and in-depth analysis of the current state, potentials, strategies and forward insights for farm tourism development.

Details

Journal of Tourism Futures, vol. 10 no. 1
Type: Research Article
ISSN: 2055-5911

Keywords

Open Access
Article
Publication date: 29 February 2024

Rosemarie Santa González, Marilène Cherkesly, Teodor Gabriel Crainic and Marie-Eve Rancourt

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and…

Abstract

Purpose

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and cut off from health-care services.

Design/methodology/approach

This research combines an integrated literature review and an instrumental case study. The literature review comprises two targeted reviews to provide insights: one on conflict zones and one on mobile clinics. The case study describes the process and challenges faced throughout a mobile clinic deployment during and after the Iraq War. The data was gathered using mixed methods over a two-year period (2017–2018).

Findings

Armed conflicts directly impact the populations’ health and access to health care. Mobile clinic deployments are often used and recommended to provide health-care access to vulnerable populations cut off from health-care services. However, there is a dearth of peer-reviewed literature documenting decision support tools for mobile clinic deployments.

Originality/value

This study highlights the gaps in the literature and provides direction for future research to support the development of valuable insights and decision support tools for practitioners.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 28 November 2023

Qian Qin

This research explores the intricate dynamics of national interests realised through Japan's official development assistance (ODA) to China. It aims to deepen the understanding of…

Abstract

Purpose

This research explores the intricate dynamics of national interests realised through Japan's official development assistance (ODA) to China. It aims to deepen the understanding of these mechanisms, detailing the extent to which Japan has accomplished its national interests.

Design/methodology/approach

The paper applies the role theory and narrative analysis to elucidate Japan's national role conception and its categories of national interests with regards to its ODA policy. It utilises both qualitative and quantitative methods to examine the success rate in achieving Japan's diplomatic objectives and how those interests have manifested over time.

Findings

The findings suggest a mixed outcome. Whilst Japan's ODA to China has helped in expanding trade and fostering mutual understanding and cooperation, it has been less successful in promoting democratic governance in China or effectively counterbalancing China's regional power. Hence, the realisation of national interests through ODA is a complex process contingent upon numerous factors.

Originality/value

This study stands out for its multifaceted approach in examining Japan's ODA policy towards China, integrating both quantitative and qualitative methodologies and applying the role theory in the context of international development aid. It fills a significant gap in the literature by analysing the interplay between national interests and foreign aid, providing nuanced insights into the successes and challenges of Japan's pursuit of its diplomatic objectives. The study's findings have important implications for understanding the complexity of international aid dynamics and can inform future policy decisions in the realm of international relations and foreign aid.

Details

International Trade, Politics and Development, vol. 8 no. 1
Type: Research Article
ISSN: 2586-3932

Keywords

Access

Only content I have access to

Year

Last 3 months (125)

Content type

1 – 10 of 125