Search results

1 – 10 of 240
Open Access
Article
Publication date: 27 February 2024

Ghadi Saad

The purpose of this study is to investigate the impact of terrorist attacks on the volatility and returns of the stock market in Tunisia.

Abstract

Purpose

The purpose of this study is to investigate the impact of terrorist attacks on the volatility and returns of the stock market in Tunisia.

Design/methodology/approach

The employed sample comprises 1250 trading day from the Tunisian stock index (Tunindex) and stock closing prices of 64 firms listed on the Tunisian stock market (TSM) from January 2011 to October 2015. The research opts for the general autoregressive conditional heteroscedasticity (GARCH) and exponential generalized conditional heteroscedasticity (EGARCH) models framework in addition to the event study method to further assess the effect of terrorism on the Tunisian equity market.

Findings

The baseline results document a substantive impact of terrorism on the returns and volatility of the TSM index. In more details, the findings of the event study method show negative significant effects on mean abnormal returns with different magnitudes over the events dates. The outcomes propose that terrorism profoundly altered the behavior of the stock market and must receive sufficient attention in order to protect the financial market in Tunisia.

Originality/value

Very few evidence is found on the financial effects of terrorism over transition to democracy cases. This paper determines the salient reaction of the stock market to terrorism during democratic transition. The findings of this study shall have relevant implications for stock market participants and policymakers.

Details

LBS Journal of Management & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0972-8031

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6503

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7296

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 20 July 2023

Martina Neri, Federico Niccolini and Luigi Martino

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…

2288

Abstract

Purpose

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known characteristics, the cybersecurity phenomenon goes beyond the detection of technological impacts, and encompasses all the dimensions of an organization. This study thus focusses on an additional set of organizational elements. The key elements of cybersecurity organizational readiness depicted here are cybersecurity awareness, cybersecurity culture and cybersecurity organizational resilience (OR). This study aims to qualitatively assess small and medium enterprises’ (SMEs) overall level of organizational cybersecurity readiness.

Design/methodology/approach

This study focused on conducting a cybersecurity organizational readiness assessment using a sample of 53 Italian SMEs from the information and communication technology sector. Informed mixed method research, this study was conducted consistent with the principles of the explanatory sequential mixed method design, and adopting a quanti-qualitative methodology. The quantitative data were collected through a questionnaire. Qualitative data were subsequently collected through semi-structured interviews.

Findings

Although many elements of the technical aspects of cybersecurity OR have yielded very encouraging results, there are still some areas that require improvement. These include those facets that constitute the foundation of cybersecurity awareness, and, thus, a cybersecurity culture. This result highlights that the areas in need of improvement are exactly those that are most important in fighting against cyber threats via organizational cybersecurity readiness.

Originality/value

Although the importance of SMEs is obvious, evidence of such organizations’ attitudes to cybersecurity are still limited. This research is an attempt to depict the organizational issue related to cybersecurity, i.e. overall cybersecurity organizational readiness.

Open Access
Article
Publication date: 17 January 2023

Angelo Rosa, Teresa Angela Trunfio, Giuliano Marolla, Antonietta Costantino, Davide Nardella and Olivia McDermott

Cardiovascular diseases are the leading cause of death worldwide. In Italy, acute myocardial infarction (AMI) is a major cause of hospitalization and healthcare costs. AMI is a…

1381

Abstract

Purpose

Cardiovascular diseases are the leading cause of death worldwide. In Italy, acute myocardial infarction (AMI) is a major cause of hospitalization and healthcare costs. AMI is a myocardial necrosis event caused by an unstable ischemic syndrome. The Italian government has defined an indicator called “AMI: 30-day mortality” to assess the quality of the overall care pathway of the heart attacked patient. In order to guarantee high standards, all hospitals had to implement techniques to increase the quality of care pathway. The aim of the paper is to identify the root cause and understand the mortality rate for AMI and redesign the patient management process in order to improve it.

Design/methodology/approach

A Lean Six Sigma (LSS) approach was used in this study to analyze the patient flow in order to reduce 30-days mortality rate from AMI registered by Complex Operative Unit (COU) of Cardiology of an Italian hospital. Value stream mapping (VSM) and Ishikawa diagrams were implemented as tools of analysis.

Findings

Process improvement using LSS methodology made it possible to reduce the overall times from 115 minutes to 75 minutes, with a reduction of 35%. In addition, the corrective actions such as the activation of a post-discharge outpatient clinic and telephone contacts allowed the 30-day mortality rate to be lowered from 16% before the project to 8% after the project. In this way, the limit value set by the Italian government was reached.

Research limitations/implications

The limitation of the study is that it is single-centered and was applied to a facility with a limited number of cases.

Practical implications

The LSS approach has brought significant benefits to the process of managing patients with AMI. Corrective actions such as the activation of an effective shared protocol or telephone interview with checklist can become the gold standard in reducing mortality. The limitation of the study is that it is single-centered and was applied to a facility with a limited number of cases.

Originality/value

LSS, applied for the first time to the management of cardiovascular diseases in Italy, is a methodology which has proved to be strategic for the improvement of healthcare process. The simple solutions implemented could serve as a guide for other hospitals to pursue the national AMI mortality target.

Details

The TQM Journal, vol. 35 no. 9
Type: Research Article
ISSN: 1754-2731

Keywords

Open Access
Article
Publication date: 21 February 2024

Mehrgan Malekpour, Federica Caboni, Mohsen Nikzadask and Vincenzo Basile

This paper aims to identify the combination of innovation determinants driving the creation of innovative products amongst market leaders and market followers in food and beverage…

Abstract

Purpose

This paper aims to identify the combination of innovation determinants driving the creation of innovative products amongst market leaders and market followers in food and beverage (F&B) firms.

Design/methodology/approach

This research is based on the case study methodology by using two types of data sources: (1) semi-structured interviews with industry experts and (2) in-depth interviews with managers. In addition, a questionnaire adapted from prior research was used to consider market and firm types.

Findings

Suggesting an integrated theoretical framework based on firm-based factors and market-based factors, this study identified a combination of determinants significantly impacting innovative products in the market. Specifically, these determinants are competition intensity and innovation capability (a combination of research and development (R&D) investment and marketing capabilities). The study also examined how these determinants vary depending on whether the firms are market leaders or market followers.

Practical implications

This research provides practical insights for managers working in the F&B industry by using case studies and exploring the determinants of developing innovative products. In doing so, suitable strategies can be selected according to the market and firm situations.

Originality/value

The originality of the study is shown by focussing on how different combinations of market and firm factors could be applied in creating successful innovative products in the food sector.

Details

British Food Journal, vol. 126 no. 13
Type: Research Article
ISSN: 0007-070X

Keywords

Open Access
Article
Publication date: 27 February 2024

Mehmet Emin Bakir, Tracie Farrell and Kalina Bontcheva

The authors investigate how COVID-19 has influenced the amount, type or topics of abuse that UK politicians receive when engaging with the public.

Abstract

Purpose

The authors investigate how COVID-19 has influenced the amount, type or topics of abuse that UK politicians receive when engaging with the public.

Design/methodology/approach

This work covers the first year of COVID-19 in the UK, from March 2020 to March 2021 and analyses Twitter abuse in replies to UK MPs. The authors collected and analysed 17.9 million reply tweets to the MPs. The authors present overall abuse levels during different key moments of the pandemic, analysing reactions to MPs by gender and the relationship between online abuse and topics such as Brexit, the government’s COVID-19 response and policies, and social issues.

Findings

The authors have found that abuse levels towards UK MPs were at an all-time high in December 2020. Women (particularly those from non-White backgrounds) receive unusual amounts of abuse, targeting their credibility and capacity to do their jobs. Similar to other large events like general elections and Brexit, COVID-19 has elevated abuse levels, at least temporarily.

Originality/value

Previous studies analysed abuse levels towards MPs in the run-up to the 2017 and 2019 UK General Elections and during the first four months of the COVID-19 pandemic in the UK. The authors compare previous findings with those of the first year of COVID-19, as the pandemic persisted, and Brexit was forthcoming. This research not only contributes to the longitudinal comparison of abuse trends against UK politicians but also presents new findings, corroborates, further clarifies and raises questions about the previous findings.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-07-2022-0392

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Access

Only content I have access to

Year

Last 6 months (240)

Content type

1 – 10 of 240