Search results
1 – 9 of 9Ifeyinwa Juliet Orji and Chukwuebuka Martinjoe U-Dominic
Cybersecurity has received growing attention from academic researchers and industry practitioners as a strategy to accelerate performance gains and social sustainability…
Abstract
Purpose
Cybersecurity has received growing attention from academic researchers and industry practitioners as a strategy to accelerate performance gains and social sustainability. Meanwhile, firms are usually prone to cyber-risks that emanate from their supply chain partners especially third-party logistics providers (3PLs). Thus, it is crucial to implement cyber-risks management in 3PLs to achieve social sustainability in supply chains. However, these 3PLs are faced with critical difficulties which tend to hamper the consistent growth of cybersecurity. This paper aims to analyze these critical difficulties.
Design/methodology/approach
Data were sourced from 40 managers in Nigerian 3PLs with the aid of questionnaires. A novel quantitative methodology based on the synergetic combination of interval-valued neutrosophic analytic hierarchy process (IVN-AHP) and multi-objective optimization on the basis of a ratio analysis plus the full multiplicative form (MULTIMOORA) is applied. Sensitivity analysis and comparative analysis with other decision models were conducted.
Findings
Barriers were identified from published literature, finalized using experts’ inputs and classified under organizational, institutional and human (cultural values) dimensions. The results highlight the most critical dimension as human followed by organizational and institutional. Also, the results pinpointed indigenous beliefs (e.g. cyber-crime spiritualism), poor humane orientation, unavailable specific tools for managing cyber-risks and skilled workforce shortage as the most critical barriers that show the highest potential to elicit other barriers.
Research limitations/implications
By illustrating the most significant barriers, this study will assist policy makers and industry practitioners in developing strategies in a coordinated and sequential manner to overcome these barriers and thus, achieve socially sustainable supply chains.
Originality/value
This research pioneers the use of IVN-AHP-MULTIMOORA to analyze cyber-risks management barriers in 3PLs for supply chain social sustainability in a developing nation.
Details
Keywords
Neha Chhabra Roy and Sreeleakha P.
This study addresses the ever-increasing cyber risks confronting the global banking sector, particularly in India, amid rapid technological advancements. The purpose of this study…
Abstract
Purpose
This study addresses the ever-increasing cyber risks confronting the global banking sector, particularly in India, amid rapid technological advancements. The purpose of this study is to de velop an innovative cyber fraud (CF) response system that effectively controls cyber threats, prioritizes fraud, detects early warning signs (EWS) and suggests mitigation measures.
Design/methodology/approach
The methodology involves a detailed literature review on fraud identification, assessment methods, prevention techniques and a theoretical model for fraud prevention. Machine learning-based data analysis, using self-organizing maps, is used to assess the severity of CF dynamically and in real-time.
Findings
Findings reveal the multifaceted nature of CF, emphasizing the need for tailored control measures and a shift from reactive to proactive mitigation. The study introduces a paradigm shift by viewing each CF as a unique “fraud event,” incorporating EWS as a proactive intervention. This innovative approach distinguishes the study, allowing for the efficient prioritization of CFs.
Practical implications
The practical implications of such a study lie in its potential to enhance the banking sector’s resilience to cyber threats, safeguarding stability, reputation and overall risk management.
Originality/value
The originality stems from proposing a comprehensive framework that combines machine learning, EWS and a proactive mitigation model, addressing critical gaps in existing cyber security systems.
Details
Keywords
Sri Lestari, Wiwiek Rabiatul Adawiyah, Arina Laksita Alhamidi, Joni Prayogi and Ronald Haryanto
The purpose of this study was to examine the relationship between online banking fraud experience and fear of cybercrime and distrust of online banking services, and to understand…
Abstract
Purpose
The purpose of this study was to examine the relationship between online banking fraud experience and fear of cybercrime and distrust of online banking services, and to understand how perceived usefulness of online banking moderates the relationship.
Design/methodology/approach
The number of respondents involved in this study was 271 people from the Central Java region, Indonesia. Statistical analysis was performed using Jeffreys’s Amazing Statistics Program software to examine the relationships and interactions between the variables studied.
Findings
Experience of online banking fraud is positively related to fear of cybercrime and distrust of online banking services. Perceived usefulness of online banking moderates the relationship between online banking fraud experience and fear of cybercrime and distrust of digital payments. Perceived usefulness is negatively related to the level of distrust of online banking services.
Research limitations/implications
Overall, the implications of this study underscore the importance of dealing with the risks of cybercrime in online banking services. By focusing on security, user awareness and the role of perceived usefulness, banking service providers can create a safer and more trusting environment for users of online banking services. This also contributes to the development of more innovative services and can increase customer satisfaction and trust.
Practical implications
The practical application of these findings is important for financial institutions and online banking service providers. Companies must improve cybersecurity with the latest technology and provide education about online security practices. Transparent communication and better customer service will help overcome customer fears. Compliance with security regulations and technological innovation is also important to protect online banking services. With these steps, customer security and trust can be improved, and the adoption of online banking services will increase widely.
Social implications
The social implications of this research are increasing public awareness about cybersecurity, consumer protection and strengthening trust in online banking services. With joint efforts, a safer and more trusting environment in using online banking services can be realized.
Originality/value
The originality of this research lies in the use of perceived usefulness of online banking as a moderating variable to reduce the negative impact of online banking fraud experience. With a focus on the psychological effects of customers experiencing fraud, this research seeks to rebuild trust and improve the security of online banking services.
Details
Keywords
Adela Chen and Kristina Lemmer
This paper aims to examine the strength characteristics of a stressful event (i.e. novelty, disruption, and criticality) as factors that drive people’s social media use for…
Abstract
Purpose
This paper aims to examine the strength characteristics of a stressful event (i.e. novelty, disruption, and criticality) as factors that drive people’s social media use for seeking different types of supportive resources (i.e. emotional, appraisal, informational, and instrumental support) to facilitate emotion-focused and problem-focused coping. We further assess the impact of different types of social support obtained via social media use on people’s coping effectiveness.
Design/methodology/approach
Our study uses an online survey collecting data at two points in time from 291 social media users during the COVID-19 pandemic. Structural equation modeling was used for data analysis.
Findings
Empirical results reveal the usefulness and limitations of social media use as a coping mechanism. All three event strength characteristics influence people’s social media use for both emotion-focused and problem-focused coping. Event novelty motivates people’s pursuit of informational support on social media, event disruption drives social media use for seeking all four types of support, and event criticality motivates social media use for seeking emotional and informational support. However, only emotion-focused resources – emotional support and appraisal support – are found to significantly affect people’s coping effectiveness.
Originality/value
Our study contributes to a better understanding of the role played by social media when people cope with a stressful event. Applying the three characteristics of event strength allows us to identify people’s need for different supportive resources depending on how they perceive the event. Our analysis of the main and mediating effects of the four types of social support shows that not all types of social support can significantly enhance users’ coping effectiveness.
Details
Keywords
Morné Owen, Stephen V. Flowerday and Karl van der Schyff
Researchers looking for ways to change the insecure behaviour that results in phishing have considered multiple possible reasons for such behaviour. Therefore, the purpose of this…
Abstract
Purpose
Researchers looking for ways to change the insecure behaviour that results in phishing have considered multiple possible reasons for such behaviour. Therefore, the purpose of this paper is to understand the role of optimism bias (OB – defined as a cognitive bias), which characterises overly optimistic or unrealistic individuals, to ensure secure behaviour. Research that focused on issues such as personality traits, trust, attitude and Security, Education, Training and Awareness (SETA) was considered.
Design/methodology/approach
This study built on a recontextualized version of the theory of planned behaviour to evaluate the influence that optimism bias has on phishing susceptibility. To model the data, an analysis was performed on 226 survey responses from a South African financial services organisation using partial least squares (PLS) path modelling.
Findings
This study found that overly optimistic employees were inclined to behave insecurely, while factors such as attitude and trust significantly influenced the intention to behave securely.
Practical implications
Our contribution to practice seeks to enhance the effectiveness of SETA by identifying and addressing the optimism bias weakness to deliver a more successful training outcome.
Originality/value
Our study enriches the Information Systems literature by evaluating the effect of a cognitive bias on phishing susceptibility and offers a contextual explanation of the resultant behaviour.
Details
Keywords
Dien Van Tran, Phuong Van Nguyen, Demetris Vrontis, Sam Thi Ngoc Nguyen and Phuong Uyen Dinh
Government employees must comply with policies on information security regulations, online security practices, social networking usage, internet addiction, online cyberthreats and…
Abstract
Purpose
Government employees must comply with policies on information security regulations, online security practices, social networking usage, internet addiction, online cyberthreats and other related habits. These activities are considered cybersecurity behaviors. Government social media (GSM) accounts are increasingly used to educate employees about cybersecurity risks. To support the effectiveness of cybersecurity practices in government organizations, the purpose of this study is to investigate the impacts of GSM and organizational policy compliance on employees’ cybersecurity awareness, motivation and behaviors.
Design/methodology/approach
Data were obtained by administering a questionnaire survey to public personnel in Vietnam. A total of 330 valid responses were obtained, and the research hypotheses were tested using partial least squares–structural equation modeling.
Findings
First, cybersecurity awareness enhances information protection motivation and employee protective behavior. Second, GSM has positive impacts on cybersecurity knowledge and information protection motivation. Third, there is a strong positive association between information protection motivation and employee protective behavior. Finally, while organizational compliance significantly increases cybersecurity awareness, its impact on employee protective behavior is ind irect.
Originality/value
This research enhances the literature on the behavioral dimension of cybersecurity. The primary objective of this study is to assess the influence of cybersecurity awareness on protective behaviors rather than intents and attitudes alone. Furthermore, this research integrates protection motivation theory and cultivation theory to provide a more thorough assessment of cybersecurity awareness and protective behavior. By investigating the impact of GSM on the level of cybersecurity awareness among employees within government organizations, this study provides valuable insights into the efficacy of recent governmental initiatives aimed at fostering cybersecurity.
Details
Keywords
Enforcing employee compliance with information systems security policies (ISSP) is a herculean task for organizations as security breaches due to non-compliance continue to soar…
Abstract
Purpose
Enforcing employee compliance with information systems security policies (ISSP) is a herculean task for organizations as security breaches due to non-compliance continue to soar. To improve this situation, researchers have employed fear appeals that are based on protection motivation theory (PMT) to induce compliance behavior. However, extant research on fear appeals has yielded mixed findings. To help explain these mixed findings, the authors contend that efficacy formation is a cognitive process that is impacted by the cognitive load exerted by the design of fear appeal messages.
Design/methodology/approach
The study draws on cognitive load theory (CLT) to examine the effects of intrinsic cognitive load, extraneous cognitive load and germane cognitive load on stimulating an individual’s efficacy and coping appraisals. The authors designed a survey to collect data from 359 respondents and tested the model using partial least squares.
Findings
The analysis showed significant relationships between cognitive load (intrinsic, extraneous, and germane) and fear, maladaptive rewards, response costs, self-efficacy and response efficacy.
Originality/value
This provides support for the assertion that fear appeals impact the cognitive processes of individuals that then in turn can potentially affect the efficacy of fear and coping appraisals. These findings demonstrate the need to further investigate how individual cognition is impacted by fear appeal design and the resulting effects on compliance intention and behavior.
Details
Keywords
Marcus Gerdin, Ella Kolkowska and Åke Grönlund
Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research…
Abstract
Purpose
Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and its potential effect on these results. This study aims to add to this discussion by investigating discrepancies between what the authors claim to measure (theoretical properties of variables) and what they actually measure (respondents’ interpretations of the operationalized variables). This study asks: How well do respondents’ interpretations of variables correspond to their theoretical definitions? What are the characteristics of any discrepancies between variable definitions and respondent interpretations?
Design/methodology/approach
This study is based on in-depth interviews with 17 respondents from the Swedish public sector to understand how they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior.
Findings
The authors found that respondents’ interpretations in many cases differ substantially from the theoretical definitions. Overall, the authors found four principal ways in which respondents interpreted measurement items – referred to as property contextualization, extension, alteration and oscillation – each implying more or less (dis)alignment with the intended theoretical properties of the two variables examined.
Originality/value
The qualitative method used proved vital to better understand respondents’ interpretations which, in turn, is key for improving self-reporting measurement instruments. To the best of the authors’ knowledge, this study is a first step toward understanding how precise and uniform definitions of variables’ theoretical properties can be operationalized into effective measurement items.
Details
Keywords
Andreas Skalkos, Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis
Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…
Abstract
Purpose
Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs.
Design/methodology/approach
This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide.
Findings
The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE.
Research limitations/implications
Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study.
Practical implications
The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools.
Social implications
This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE.
Originality/value
This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.
Details