Search results

1 – 10 of over 4000
Article
Publication date: 17 January 2022

Yang Li, Jiaze Li, Qi Fan and Zhihong Wang

The teenager community is the most affected community by cybercrime in the COVID-19 era. Increasing social networks and facilitating teenager access to the Internet have increased…

Abstract

Purpose

The teenager community is the most affected community by cybercrime in the COVID-19 era. Increasing social networks and facilitating teenager access to the Internet have increased the probability of cybercrimes. On the other hand, entertainment such as mobile and computer games is top-rated among teenagers. Teenagers' tendency to cybercrime may be influenced by individual, parent, social, economic and political factors. Studying the impact of social networks, mobile games and parents' religious attitudes on teenagers' tendency to cybercrimes in the COVID-19 era is the primary goal of this paper.

Design/methodology/approach

The outbreak of COVID-19 caused a considerable change in the world and the lifestyle of all people. Information and Communication Technology (ICT) was also affected by the special conditions of this virus. Changes in ICT and rapid access to it have empowered individuals and organizations, and people have increased civic participation and interaction through ICT. However, the outbreak of COVID-19 has created new challenges for the government and citizens and may cause new crimes. Cybercrime is a type of crime that occurs in a cyber environment. These crimes range from invasions of privacy to crimes in which the offender vaguely paralyzes the macroeconomic. In this research, 265 students of high schools and universities are used for collecting data by utilizing a survey. Measuring actions have been done in all surveys employing a Likert scale. The causal pattern is assessed through a constructional equation modeling procedure to study the scheme's validity and reliability.

Findings

The outcomes have indicated that social networks have no significant relationship with teenagers' tendency to cybercrimes in the COVID-19 era. Mobile games have a mild effect on teenagers' tendency to cybercrimes in the COVID-19 era, and parents' religious attitudes significantly impact teenagers' tendency to cybercrimes in the COVID-19 era.

Research limitations/implications

Current research also has some restrictions that must be noticed in assessing the outcomes. First, sample research was selected from high schools and universities in one city. So, the size of the model is small, and the generalization of results is limited. Second, this research may have ignored other variables that affect the tendency of teenagers' to cybercrime. Future researchers intend to investigate the parents' upbringing system's impact on teenager's trend to cybercrime in the COVID-19 era. Future research can also examine practical factors such as parental upbringing, attitudes toward technology development and virtual addiction in the COVID-19 era.

Originality/value

In this study, teenagers' tendency to cybercrimes in the COVID-19 era is investigated, and a procedure is applied depending on a practical occasion. This article's offered sample provides a perfect framework for influencing parents' social networks, mobile games and religious attitudes on teenagers' tendency to cybercrimes in the COVID-19 era.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 19 April 2023

Adobi Jessica Timiyo and Samuel Foli

This paper aims to systematically review the literature on knowledge leakage through social networks in the past decade to find existing gaps, identify potential risk factors…

Abstract

Purpose

This paper aims to systematically review the literature on knowledge leakage through social networks in the past decade to find existing gaps, identify potential risk factors while, ultimately, proposing ways of mitigating these factors.

Design/methodology/approach

This study adopted Preferred Reporting Items for Systematic reviews and Meta-Analysis as guide for searching relevant scholarly publications. Subject-specific and -related research papers were obtained from three databases, namely, Scopus, Web of Science and EBSCOhost. The review data was generated from the search results while adopting specific criteria to either accept or reject a particular publication during the search process.

Findings

Technological, operational and human knowledge factors are some of the risks resulting from knowledge leakage. Highlights of the paper include strategies for mitigating these factors, including continuous training, creating awareness, banning social media usage at work and reinforcing nondisclosure policies. This study also found potential gaps from the literature, categorized as topical, geographical, industrial, theoretical, methodological and conceptual gaps while proposing ways of addressing these gaps using specific research questions. These questions set the direction for future studies on knowledge leakage and social networks.

Originality/value

Implications of the findings are laid out, particularly the idea of developing actionable managerial plans for preventing knowledge leakage from occurring in organizations in the first place. The systematic, rigorous, transparent and methodological procedures used throughout the entire research process strongly suggest that the findings and conclusions are legitimate. While the findings were not drawn arbitrarily, they potentially offer windows of opportunities for bridging the six potential gaps identified in this paper.

Details

VINE Journal of Information and Knowledge Management Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 16 July 2024

Michael J Rooney, Yair Levy, Wei Li and Ajoy Kumar

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password…

Abstract

Purpose

The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put individuals and organizations at risk, resulting in a data breach. This paper aims to engage IS users and Subject Matter Experts (SMEs), focused on designing, developing and empirically validating the Password Workaround Cybersecurity Risk Taxonomy (PaWoCyRiT) – a 2x2 taxonomy constructed by aggregated scores of perceived cybersecurity risks from Password Workarounds (PWWAs) techniques and their usage frequency.

Design/methodology/approach

This research study was a developmental design conducted in three phases using qualitative and quantitative methods: (1) A set of 10 PWWAs that were identified from the literature were validated by SMEs along with their perspectives on the PWWAs usage and risk for data breach; (2) A pilot study was conducted to ensure reliability and validity and identify if any measurement issues would have hindered the results and (3) The main study data collection was conducted with a large group of IS users, where also they reported on coworkers' engagement frequencies related to the PWWAs.

Findings

The results indicate that statistically significant differences were found between SMEs and IS users in their aggregated perceptions of risks of the PWWAs in causing a data breach, with IS users perceiving higher risks. Engagement patterns varied between the two groups, as well as factors like years of IS experience, gender and job level had statistically significant differences among groups.

Practical implications

The PaWoCyRiT taxonomy that the we have developed and empirically validated is a handy tool for organizational cyber risk officers. The taxonomy provides organizations with a quantifiable means to assess and ultimately mitigate cybersecurity risks.

Social implications

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. Thus, the taxonomy that the authors have developed and empirically validated provides broader implications for society, as it assists organizations in all industries with the ability to mitigate the risks of data breaches that can result from PWWAs.

Originality/value

The taxonomy the we have developed and validated, the PaWoCyRiT, provides organizations with insights into password-related risks and behaviors that may lead to data breaches.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 June 2024

Xing Zhang, Yongtao Cai, Fangyu Liu and Fuli Zhou

This paper aims to propose a solution for dissolving the “privacy paradox” in social networks, and explore the feasibility of adopting a synergistic mechanism of “deep-learning…

Abstract

Purpose

This paper aims to propose a solution for dissolving the “privacy paradox” in social networks, and explore the feasibility of adopting a synergistic mechanism of “deep-learning algorithms” and “differential privacy algorithms” to dissolve this issue.

Design/methodology/approach

To validate our viewpoint, this study constructs a game model with two algorithms as the core strategies.

Findings

The “deep-learning algorithms” offer a “profit guarantee” to both network users and operators. On the other hand, the “differential privacy algorithms” provide a “security guarantee” to both network users and operators. By combining these two approaches, the synergistic mechanism achieves a balance between “privacy security” and “data value”.

Practical implications

The findings of this paper suggest that algorithm practitioners should accelerate the innovation of algorithmic mechanisms, network operators should take responsibility for users’ privacy protection, and users should develop a correct understanding of privacy. This will provide a feasible approach to achieve the balance between “privacy security” and “data value”.

Originality/value

These findings offer some insights into users’ privacy protection and personal data sharing.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 16 October 2023

Chien-Wen Shen and Phung Phi Tran

This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news…

Abstract

Purpose

This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news articles. This study displays the developmental status of each subject based on the interrelationships of each topic cluster by analyzing high-frequency keywords extracted from the collected data. Moreover, applying above methodologies will help understanding top research topics, authors, venues, institutes and countries. The differences of blockchain research and new are identified.

Design/methodology/approach

To identify and find blockchain development linkages, researchers have used search terms such as co-occurrence, bibliographic coupling, co-citation and co-authorship to help us understand the top research topics, authors, venues, institutes and countries. This study also used text mining analysis to identify blockchain articles' primary concepts and semantic structures.

Findings

The findings show the fundamental topics based on each topic cluster's links. While “technology”, “transaction”, “privacy and security”, “environment” and “consensus” were most strongly associated with blockchain in research, “platform”, “big data and cloud”, “network”, “healthcare and business” and “authentication” were closely tied to blockchain news. This article classifies blockchain principles into five patterns: hardware and infrastructure, data, networking, applications and consensus. These statistics helped the authors comprehend the top research topics, authors, venues, publication institutes and countries.

Research limitations/implications

Since Web of Science (WoS) and LexisNexis Academic data are used, the study has few sources. Others advise merging foreign datasets. WoS is one of the world's largest and most-used databases for assessing scientific papers.

Originality/value

This study has several uses and benefits. First, key concept discoveries can help academics understand blockchain research trends so they can prioritize research initiatives. Second, bibliographic coupling links academic papers on blockchain. It helps information seekers search and classify the material. Co-citation analysis results can help researchers identify potential partners and leaders in their field. The network's key organizations or countries should be proactive in discovering, proposing and creating new relationships with other organizations or countries, especially those from the journal network's border, to make the overall network more integrated and linked. Prominent members help recruit new authors to organizations or countries and link them to the co-authorship network. This study also used concept-linking analysis to identify blockchain articles' primary concepts and semantic structures. This may lead to new authors developing research ideas or subjects in primary disciplines of inquiry.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 7 August 2023

Iván Manuel De la Vega Hernández and Juan Diáz Amorin

The purpose of this study is to analyze the technological change under development linked to the convergence of the Internet of Things (IoT) and digital transformation (DT) from…

Abstract

Purpose

The purpose of this study is to analyze the technological change under development linked to the convergence of the Internet of Things (IoT) and digital transformation (DT) from the perspective of a scientific mapping in a context marked by the occurrence of an unexpected event that accelerated this process such as the SARS-CoV-2 pandemic and its variants.

Design/methodology/approach

The study was developed under the longitudinal scientific mapping approach and considered the period 1990–2021 using as a basis the descriptors DT and IoT. The steps followed were identification and selection of keywords; design and application of an algorithm to identify these selected keywords in titles, abstracts and keywords using terms in Web of Science (WoS) to contrast them; and performing a data processing based on the journals in the Journal Citation Report during 2022. The longitudinal study uses scientific mapping to analyze the evolution of the scientific literature that seeks to understand the acceleration in the integration of technology and its impact on the human factor, processes and organizational culture.

Findings

This study showed that the technologies converging around IoT form the basis of the main DT processes being experienced on a global scale; furthermore, it was shown that the pandemic accelerated the convergence and application of new technologies to support the major changes required for a world with new needs. Finally, China and the USA differ significantly in the production of scientific knowledge with respect to the first eight followers.

Originality/value

The knowledge gap addressed by this study is to identify the production of scientific knowledge related to IoT and its impact on DT processes at the scale of individuals, organizations and the new way of delivering value to society. This knowledge about researchers, institutions, countries and the derivation is multiple indicators allows improving decision-making at multiple scales on these issues.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 19 August 2022

Anjali More and Dipti Rana

Referred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of…

Abstract

Purpose

Referred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of imbalanced intrusion detection benchmark knowledge discovery in database (KDD) data set. KDD data set is most preferably used by many researchers for experimentation and analysis. The proposed algorithm improvised random forest classification with error tuning factors (IRFCETF) deals with experimentation on KDD data set and evaluates the performance of a complete set of network traffic features through IRFCETF.

Design/methodology/approach

In the current era of applications, the attention of researchers is immersed by a diverse number of existing time applications that deals with imbalanced data classification (ImDC). Real-time application areas, artificial intelligence (AI), Industrial Internet of Things (IIoT), etc. are dealing ImDC undergo with diverted classification performance due to skewed data distribution (SkDD). There are numerous application areas that deal with SkDD. Many of the data applications in AI and IIoT face the diverted data classification rate in SkDD. In recent advancements, there is an exponential expansion in the volume of computer network data and related application developments. Intrusion detection is one of the demanding applications of ImDC. The proposed study focusses on imbalanced intrusion benchmark data set, KDD data set and other benchmark data set with the proposed IRFCETF approach. IRFCETF justifies the enriched classification performance on imbalanced data set over the existing approach. The purpose of this work is to review imbalanced data applications in numerous application areas including AI and IIoT and tuning the performance with respect to principal component analysis. This study also focusses on the out-of-bag error performance-tuning factor.

Findings

Experimental results on KDD data set shows that proposed algorithm gives enriched performance. For referred intrusion detection data set, IRFCETF classification accuracy is 99.57% and error rate is 0.43%.

Research limitations/implications

This research work extended for further improvements in classification techniques with multiple correspondence analysis (MCA); hierarchical MCA can be focussed with the use of classification models for wide range of skewed data sets.

Practical implications

The metrics enhancement is measurable and helpful in dealing with intrusion detection systems–related imbalanced applications in current application domains such as security, AI and IIoT digitization. Analytical results show improvised metrics of the proposed approach than other traditional machine learning algorithms. Thus, error-tuning parameter creates a measurable impact on classification accuracy is justified with the proposed IRFCETF.

Social implications

Proposed algorithm is useful in numerous IIoT applications such as health care, machinery automation etc.

Originality/value

This research work addressed classification metric enhancement approach IRFCETF. The proposed method yields a test set categorization for each case with error reduction mechanism.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran and Kamal Gulati

The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…

Abstract

Purpose

The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with multiple gateways. It entails IoMT devices and wearables connecting to exchange sensitive data with a sensor node which performs the aggeration process and then communicates the data using a Fog server. If the aggregator sensor loses the connection from the Fog server, it will be unable to submit data directly to the Fog server. The node transmits encrypted information with a neighboring sensor and sends it to the Fog server integrated with federated learning, which encrypts data to the existing data. The fog server performs the operations on the measured data, and the values are stored in the local storage area and later it is updated to the cloud server.

Design/methodology/approach

SHDCT uses an Internet-of-things (IoT)-based monitoring network, making it possible for smart devices to connect and interact with each other. The main purpose of the monitoring network has been in the collection of biological data and additional information from mobile devices to the patients. The monitoring network is composed of three different types of smart devices that is at the heart of the IoT.

Findings

It has been addressed in this work how to design an architecture for safe data aggregation in heterogeneous IoT-federated learning-enabled wireless sensor networks (WSNs), which makes use of basic encoding and data aggregation methods to achieve this. The authors suggest that the small gateway node (SGN) captures all of the sensed data from the SD and uses a simple, lightweight encoding scheme and cryptographic techniques to convey the data to the gateway node (GWN). The GWN gets all of the medical data from SGN and ensures that the data is accurate and up to date. If the data obtained is trustworthy, then the medical data should be aggregated and sent to the Fog server for further processing. The Java programming language simulates and analyzes the proposed SHDCT model for deployment and message initiation. When comparing the SHDCT scheme to the SPPDA and electrohydrodynamic atomisation (EHDA) schemes, the results show that the SHDCT method performs significantly better. When compared with the SPPDA and EHDA schemes, the suggested SHDCT plan necessitates a lower communication cost. In comparison to EHDA and SPPDA, SHDCT achieves 4.72% and 13.59% less, respectively. When compared to other transmission techniques, SHDCT has a higher transmission ratio. When compared with EHDA and SPPDA, SHDCT achieves 8.47% and 24.41% higher transmission ratios, respectively. When compared with other ways it uses less electricity. When compared with EHDA and SPPDA, SHDCT achieves 5.85% and 18.86% greater residual energy, respectively.

Originality/value

In the health care sector, a series of interconnected medical devices collect data using IoT networks in the health care domain. Preventive, predictive, personalized and participatory care is becoming increasingly popular in the health care sector. Safe data collection and transfer to a centralized server is a challenging scenario. This study presents a mechanism for SHDCT. The mechanism consists of Smart healthcare IoT devices working on federated learning that link up with one another to exchange health data. Health data is sensitive and needs to be exchanged securely and efficiently. In the mechanism, the sensing devices send data to a SGN. This SGN uses a lightweight encoding scheme and performs cryptography techniques to communicate the data with the GWN. The GWN gets all the health data from the SGN and makes it possible to confirm that the data is validated. If the received data is reliable, then aggregate the medical data and transmit it to the Fog server for further process. The performance parameters are compared with the other systems in terms of communication costs, transmission ratio and energy use.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 19 February 2024

Kashmira Ganji and Nikhat Afshan

In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a…

Abstract

Purpose

In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a critical yet understudied aspect, i.e. cybersecurity. As IoT adoption grows, so do concerns regarding user privacy and data security. This study aims to provide a comprehensive understanding of the current research in this vital area, shedding light on research trends, gaps and emerging themes.

Design/methodology/approach

The study conducted a bibliometric analysis and systematic review of literature spanning over two decades (2013–2023). Bibliometric analysis is conducted using Biblioshiny which is R-software-based advanced analytical tool. Further, VOSviewer is used to conduct network analysis. The study highlights the evolving landscape of IoT cybersecurity, emphasizing interdisciplinary intersections and the ethical dimensions of IoT technologies.

Findings

The study uncovers crucial concerns related to IoT adoption, emphasizing the urgent need for comprehensive cybersecurity protocols. It identifies emerging themes such as artificial intelligence and blockchain integration, indicating a shift toward interdisciplinary solutions. Furthermore, the research highlights ethical gaps in current IoT discussions, emphasizing the importance of responsible innovation.

Research limitations/implications

Businesses can bolster their cybersecurity strategies, policymakers can craft informed regulations and researchers are encouraged to explore IoT’s ethical dimensions.

Originality/value

This study pioneers a nuanced analysis of IoT cybersecurity, filling a crucial gap in the existing business and management literature. By synthesizing a decade of scholarly work, it provides foundational insights for researchers, businesses and policymakers. The research not only informs academic discourse but also offers practical guidance for enhancing IoT security measures and fostering ethical innovation.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

1 – 10 of over 4000