Search results

1 – 10 of 200
Article
Publication date: 27 May 2024

Zhiwei Zhang, Zhe Liu, Yanzi Miao and Xiaoping Ma

This paper aims to develop a robust navigation enhancement framework to handle one of the most urgent needs for real applications of autonomous vehicles nowadays, as these corner…

Abstract

Purpose

This paper aims to develop a robust navigation enhancement framework to handle one of the most urgent needs for real applications of autonomous vehicles nowadays, as these corner cases act as the most commonly occurred risks in potential self-driving accidents.

Design/methodology/approach

In this paper, the main idea is to fully exploit the consistent features among spatio-temporal data and thus detect the anomalies and build residual channels to reconstruct the abnormal information. The authors first develop an anomaly detection algorithm, then followed by a corresponding disturbed information reconstruction network which has strong robustness to address both the nature disturbances and external attacks. Finally, the authors introduce a fully end-to-end resilient navigation performance enhancement framework to improve the driving performance of existing self-driving models under attacks and disturbances.

Findings

Comparison results on CARLA platform and real experiments demonstrate strong resilience of the authors’ approach which enhances the navigation performance under disturbances and attacks.

Originality/value

Reliable and resilient navigation performance under various nature disturbances and even external attacks is one of the most urgent needs for real applications of autonomous vehicles nowadays, as these corner cases act as the most commonly occurred risks in potential self-driving accidents. The information reconstruction approach provides a resilient navigation performance enhancement method for existing self-driving models.

Details

Robotic Intelligence and Automation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2754-6969

Keywords

Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. 37 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 March 2023

Hang Yin, Jishan Hou, Chengju Gong and Chen Xu

The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network…

Abstract

Purpose

The behavior of the entities in a small and medium-sized enterprise (SME) cooperation network is influenced by the core enterprise. Addressing the problem of how the network vulnerability changes when the core enterprise is attacked is a challenging topic. The purpose of this paper is to reveal the failure process of SME cooperation networks caused by the failure of the core SME from the perspective of cascading failure.

Design/methodology/approach

According to the Torch High Technology Industry Development Center, Ministry of Science & Technology in China, 296 SMEs in Jiangsu province were used to construct an SME cooperation network of technology-based SMEs and an under-loading cascading failure model. The weight-based attack strategy was selected to mimic a deliberate node attack and was used to analyze the vulnerability of the SME cooperation network.

Findings

Some important conclusions are obtained from the simulation analysis: (1) The minimum boundary of node enterprises has a negative relationship with networks' invulnerability, while the breakdown probability has an inverted-U relationship with networks' invulnerability. (2) The combined effect of minimum boundary and breakdown probability indicates that the vulnerability of networks is mainly determined by the breakdown probability; while, minimum boundary helps prevent cascading failure occur. Furthermore, according to the case study, adapting capital needs and resilience in the cooperation network is the core problem in improving the robustness of SME cooperation networks.

Originality/value

This research proposed an under-loading cascading failure model to investigate the under-loading failure process caused by the shortage of resources when the core enterprise fails or withdraws from the SME cooperation network. Two key parameters in the proposed model—minimum capacity and breakdown probability—could serve as a guide for research on the vulnerability of SME cooperation networks. Additionally, practical meanings for each parameter in the proposed model are given, to suggest novel insights regarding network protection to facilitate the robustness and vulnerability in real SME cooperation networks.

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

194

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 22 May 2024

Derek Friday, Steven Alexander Melnyk, Morris Altman, Norma Harrison and Suzanne Ryan

The vulnerability of customers to malware attacks through weak supplier links has prompted a need for collaboration as a strategic alternative in improving supply chain…

Abstract

Purpose

The vulnerability of customers to malware attacks through weak supplier links has prompted a need for collaboration as a strategic alternative in improving supply chain cybersecurity (SCC). Current studies overlook the fact that the effectiveness of cybersecurity strategies is dependent on the form of interfirm relationship mechanisms within which supply chain digital assets are embedded. This paper analyses the association between interfirm collaborative cybersecurity management capabilities (ICCMC) and cybersecurity parameters across a supply chain and proposes an agenda for future research.

Design/methodology/approach

A systematic literature review (SLR) is conducted, employing text mining software to analyse content extracted from 137 scholarly articles on SCC from January 2013 to January 2022.

Findings

The co-occurrence analysis strongly confirms the potential of ICCMC to reinforce SCC. Furthermore, we establish that relational factors could have multiple roles: as antecedents for ICCMC, and as factors that directly affect SCC parameters. The analysis reveals knowledge gaps in SCC theory grounding, including a fragmented and sparse representation of SCC parameters and the potential presence of an omitted variable – SCC – that could improve subsequent testing of causal relationships for theory development.

Originality/value

The paper’s contribution is at the intersection of interfirm collaboration and mandating cybersecurity requirements across a supply chain. Our paper contributes to closing a social-technical gap by introducing social aspects such as the Relational View and the importance of developing ICCMC to reinforce SCC. We offer a method for testing co-occurrences in SLRs, a comprehensive definition of SCC, and a framework with propositions for future research on increasing the effectiveness of collaborative cybersecurity management. We position collaboration as a necessary condition for the transition from cybersecurity of a firm to cybersecurity across a supply chain, and its ecosystem.

Details

International Journal of Physical Distribution & Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 24 April 2024

Hangyue Zhang, Yanchu Yang and Rong Cai

This paper aims to present numerical simulations for a series of flight processes for the postlaunching stage of the “balloon-borne UAV system.” It includes the balloon further…

Abstract

Purpose

This paper aims to present numerical simulations for a series of flight processes for the postlaunching stage of the “balloon-borne UAV system.” It includes the balloon further ascent motion after airborne launching. In terms of unmanned aerial vehicles (UAVs), the tailspin state and the charge-out process with an anti-tailspin parachute-assisted suspending are analyzed. Then, the authors conduct trajectory optimization simulations for the long-distance gliding process.

Design/methodology/approach

The balloon kinematics model and the parachute Kane multibody dynamic model are established. Using steady-state tailspin to reduced-order analysis and achieving change-out simulation by parachute suspension dynamic model. A reentry optimization control problem is developed and the Radau pseudo-spectral method is used to calculate the glide trajectory.

Findings

The established dynamic model and trajectory optimization method can effectively simulate the motion process of balloons and UAVs. The system mass reduction for launching UAVs will not cause damage to the balloon structure. The anti-tailspin parachute can reduce the UAV attack angles effectively. The UAV can glide to the designated target position by adjusting the attack angle and sideslip angle. The farthest flight distance after launching from 20 km height is 94 km and the gliding time is 40 min, which demonstrates the potential application advantage of high-altitude launching.

Practical implications

The research content and related conclusions of this article achieve a closed-loop analysis of the flight mission chain for the “balloon-borne UAV system,” which provides simulation references for relevant balloon launching experiments.

Originality/value

This paper establishes a complete set of numerical simulation models and can effectively analyze various postlaunching behaviors.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 4
Type: Research Article
ISSN: 1748-8842

Keywords

Book part
Publication date: 28 May 2024

Siddhartha Roy

For the past few years, in a purely competitive and dynamic environment, the supply chain plays a crucial role to adapt the business as it is very contingent on collaborative…

Abstract

For the past few years, in a purely competitive and dynamic environment, the supply chain plays a crucial role to adapt the business as it is very contingent on collaborative integration as well as flexibility. Many specialized applications are implemented to improve the flow control of the supply chain. One of the most important new technological applications in the supply chain is blockchain technology which has garnered the attention of many business owners as this technology can be quickly adapted to the dynamic business environment. Blockchain technology has been gaining importance and acceptability over the past few years. Blockchain technology has found significant success in all fields, including the banking and finance sector, health, manufacturing, transportation, and many others. Recently, the researchers have contributed significantly toward understanding blockchain technology and its application in the organizational and technology-specific factors that play a crucial role in driving its adoption in the supply chain. Blockchain technology plays a vital role to maintain trust among the stakeholder of the supply chain. The purpose of this chapter is to discuss a theoretical framework for blockchain adoption in the supply chain in business. The outcomes of this chapter endorse that companies invest in blockchain technology so that the supply chain becomes more transparent, flexible, and secure. In the end, this chapter has also given contemplations on the security issues of implementing blockchain in the field of collaboration and integration.

Details

Contemporary Issues in International Trade
Type: Book
ISBN: 978-1-83797-321-7

Keywords

Article
Publication date: 22 August 2023

Dan Jin, Han Chen and Rui Qi

Drawing from cognitive dissonance theory (CDT) and attribution ambiguity theory (AAT), this paper aims to examine how employees interact with queer customers within the…

Abstract

Purpose

Drawing from cognitive dissonance theory (CDT) and attribution ambiguity theory (AAT), this paper aims to examine how employees interact with queer customers within the hospitality service and the ways that queer representations regulate emotions when discriminated against by normative gender roles.

Design/methodology/approach

This study used a mixed method. Study 1 used firm-level secondary data to analyze hospitality firms’ efforts in diversity, equity and inclusion (DEI) and the effects on firms’ profit margins and customer satisfaction. In Study 2, an experimental design was used to understand how employees’ assailing behavior toward queer customers interacts with employee feelings of guilt and impacts their sabotage and organizational citizenship behavior via self-serving bias. Study 3 further explored how queer customer victimization interacts with stress to influence their perceptions of organization DEI authenticity and corporate social responsibility (CSR) through resilience.

Findings

Hospitality firms’ DEI efforts were associated with varying outcomes, including higher profit margins but lower customer satisfaction, while guilt weakened the impact of employees’ assailing behavior on their outcomes and customer stress amplified the effect of assailing behavior on queer customers’ perceptions of DEI authenticity and CSR through resilience.

Research limitations/implications

Hospitality organizations should take proactive measures to address self-serving bias among employees. Moreover, fostering an inclusive culture is crucial, with managers playing a pivotal role in facilitating discussions and creating an environment that values diversity, inclusivity and respect for all employees.

Originality/value

The study makes a remarkable contribution to hospitality literature by focusing on CDT and AAT in providing valuable implications for DEI advocators to be aware of the tensions between heteronormativity and queer representations in service encounters.

Details

International Journal of Contemporary Hospitality Management, vol. 36 no. 6
Type: Research Article
ISSN: 0959-6119

Keywords

Open Access
Article
Publication date: 24 May 2024

Morné Owen, Stephen V. Flowerday and Karl van der Schyff

Researchers looking for ways to change the insecure behaviour that results in phishing have considered multiple possible reasons for such behaviour. Therefore, the purpose of this…

Abstract

Purpose

Researchers looking for ways to change the insecure behaviour that results in phishing have considered multiple possible reasons for such behaviour. Therefore, the purpose of this paper is to understand the role of optimism bias (OB – defined as a cognitive bias), which characterises overly optimistic or unrealistic individuals, to ensure secure behaviour. Research that focused on issues such as personality traits, trust, attitude and Security, Education, Training and Awareness (SETA) was considered.

Design/methodology/approach

This study built on a recontextualized version of the theory of planned behaviour to evaluate the influence that optimism bias has on phishing susceptibility. To model the data, an analysis was performed on 226 survey responses from a South African financial services organisation using partial least squares (PLS) path modelling.

Findings

This study found that overly optimistic employees were inclined to behave insecurely, while factors such as attitude and trust significantly influenced the intention to behave securely.

Practical implications

Our contribution to practice seeks to enhance the effectiveness of SETA by identifying and addressing the optimism bias weakness to deliver a more successful training outcome.

Originality/value

Our study enriches the Information Systems literature by evaluating the effect of a cognitive bias on phishing susceptibility and offers a contextual explanation of the resultant behaviour.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 200