Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6197

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 13 May 2022

Francesca De Canio, Maria Fuentes-Blasco and Elisa Martinelli

This paper aims at shedding light on the competing extrinsic motivations behind the mobile shopping process of regular and occasional shoppers. Price and convenience, shopping…

2158

Abstract

Purpose

This paper aims at shedding light on the competing extrinsic motivations behind the mobile shopping process of regular and occasional shoppers. Price and convenience, shopping security, order delivery and post-sale service are investigated as antecedents of the mobile shopping attitude-intention path.

Design/methodology/approach

The empirical analysis is based on a multigroup structural equation model (SEM) developed on 903 online questionnaires collected among Chinese shoppers in a pre-Covid-19 pandemic retailing context.

Findings

Findings evidence contrary motivations behind the attitude – intention to shop using a mobile retail app of regular and occasional shoppers. While all the investigated aspects result to be positively relevant for regular m-shoppers, shopping security and post-sale service do not impact the attitude – intention path of occasional mobile shoppers. Results support retailers’ strategies in the context of mobile shopping growth.

Originality/value

The paper contributes to the emerging retailing literature on mobile shopping by offering a comparison of the motivations behind the mobile shopping intention of regular and occasional shoppers. Extrinsic motivations before, during and after the transaction are jointly investigated in the study.

Details

International Journal of Retail & Distribution Management, vol. 50 no. 8/9
Type: Research Article
ISSN: 0959-0552

Keywords

Open Access
Article
Publication date: 24 May 2022

Luis Hernan Contreras Pinochet, Cesar Alexandre de Souza, Adriana Backx Noronha Viana and Guillermo Rodríguez-Abitia

This research aims to propose the development of a model that identifies, in essential services, the determining factors affecting the technological advances offered by different…

4087

Abstract

Purpose

This research aims to propose the development of a model that identifies, in essential services, the determining factors affecting the technological advances offered by different smart technologies in supermarket retail channels that influence citizens' quality of life, amidst the coronavirus disease 2019 (COVID-19) pandemic.

Design/methodology/approach

The data were collected using a cross-sectional questionnaire survey (n = 469). The authors applied the structural equation modeling (SEM) technique to test the hypotheses, along with the partial least squares (PLS) method for estimating latent variables and combining with the necessary condition analysis (NCA) method.

Findings

According to the results of the NCA method, the results were adequate, and more attention should be paid to the quality of life construct after finding the bottleneck point of 50%. In this sense, adaptive resilience was characterized as the main necessary predictor construct for quality of life. In addition, Generation Z and Millennials have the highest frequency of use in all smart technologies, with “assisted purchase” being the most widely used.

Social implications

Finally, the effect of the pandemic changed the consumption routine with supermarkets, not being a mere option but a necessity in the context of a smart city.

Originality/value

As a result, the proposed model was consistent, showing that all direct and indirect SEM paths were validated, highlighting data security and privacy and resilience issues. In addition, the NCA method complemented the procedures performed in the SEM phase.

Details

Revista de Gestão, vol. 31 no. 1
Type: Research Article
ISSN: 1809-2276

Keywords

Open Access
Article
Publication date: 9 November 2022

Santhosh Srinivas and Huigang Liang

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is…

2943

Abstract

Purpose

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is essential to acknowledge, identify and address them. The purpose of this paper is to identify and emperically demonstrate the impact of such darksides of DT. While a firm's DT effort may have many dark sides, the authors identify data breaches as the most critical one and focus on proving their impact since it can inflict significant damage to the firm.

Design/methodology/approach

Through the lens of paradox theory, the authors argue that the DT efforts of a firm will lead to increased risk and severity of data breaches. The authors developed a one-of-a-kind longitudinal data set by combining data from multiple sources, including 3604 brands over a 10-year period, and employed a DT performance scorecard to evaluate a firm's DT effort across four key digital selling touchpoints: site, mobile, digital marketing and social media.

Findings

The findings of this study show that a firm's DT efforts pertaining to its mobile and digital marketing platforms significantly increase the likelihood and severity of a data breach event indicating that these two channels are most vulnerable and need heightened attention from firms. Furthermore, the findings suggest that the negative repercussions of some DT initiatives may be minimized as the firm becomes more innovative. The findings can help firms re-strategize their DT efforts by promoting security and also encouraging a balanced communication strategy.

Originality/value

This research is one of the first to identify, recognize and empirically illustrate the downsides of a DT effort that is otherwise thought to provide only benefits.

Details

Journal of Electronic Business & Digital Economics, vol. 1 no. 1/2
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Article
Publication date: 7 September 2021

Ming Qi, Jiawei Zhang, Jing Xiao, Pei Wang, Danyang Shi and Amuji Bridget Nnenna

In this paper the interconnectedness among financial institutions and the level of systemic risks of four types of Chinese financial institutions are investigated.

2223

Abstract

Purpose

In this paper the interconnectedness among financial institutions and the level of systemic risks of four types of Chinese financial institutions are investigated.

Design/methodology/approach

By the means of RAS algorithm, the interconnection among financial institutions are illustrated. Different methods, including Linear Granger, Systemic impact index (SII), vulnerability index (VI), CoVaR, and MES are used to measure the systemic risk exposures across different institutions.

Findings

The results illustrate that big banks are more interconnected and hold the biggest scales of inter-bank transactions in the financial network. The institutions which have larger size tend to have more connection with others. Insurance and security companies contribute more to the systemic risk where as other institutions, such as trusts, financial companies, etc. may bring about severe loss and endanger the financial system as a whole.

Practical implications

Since other institutions with low levels of regulation may bring about higher extreme loss and suffer the whole system, it deserves more attention by regulators considering the contagion of potential risks in the financial system.

Originality/value

This study builds a valuable contribution by examine the systemic risks from the perspectives of both interconnection and tail risk measures. Furthermore; Four types financial institutions are investigated in this paper.

Details

Kybernetes, vol. 51 no. 13
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 14 February 2024

Chao Lu and Xiaohai Xin

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…

Abstract

Purpose

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.

Design/methodology/approach

For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.

Findings

The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.

Research limitations/implications

This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.

Originality/value

The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2071-1395

Keywords

Open Access
Article
Publication date: 27 March 2018

Jamie Stone and Shahin Rahimifard

Resilience in agri-food supply chains (AFSCs) is an area of significant importance due to growing supply chain volatility. While the majority of research exploring supply chain…

24181

Abstract

Purpose

Resilience in agri-food supply chains (AFSCs) is an area of significant importance due to growing supply chain volatility. While the majority of research exploring supply chain resilience has originated from a supply chain management perspective, many other disciplines (such as environmental systems science and the social sciences) have also explored the topic. As complex social, economic and environmental constructs, the priority of resilience in AFSCs goes far beyond the company specific focus of supply chain management works and would conceivably benefit from including more diverse academic disciplines. However, this is hindered by inconsistencies in terminology and the conceptual components of resilience across different disciplines. The purpose of this study is to use a systematic literature review to identify which multidisciplinary aspects of resilience are applicable to AFSCs and to generate a novel AFSC resilience framework.

Design/methodology/approach

This paper uses a structured and multidisciplinary review of 137 articles in the resilience literature followed by critical analysis and synthesis of findings to generate new knowledge in the form of a novel AFSC resilience framework.

Findings

Findings indicate that the complexity of AFSCs and subsequent exposure to almost constant external interference means that disruptions cannot be seen as a one-off event; thus, resilience must concern the ability to not only maintain core function but also adapt to changing conditions.

Practical implications

A number of resilience elements can be used to enhance resilience, but their selection and implementation must be carefully matched to relevant phases of disruption and assessed on their broader supply chain impacts. In particular, the focus must be on overall impact on the ability of the supply chain as a whole to provide food security rather than to boost individual company performance.

Originality/value

The research novelty lies in the utilisation of wider understandings of resilience from various research fields to propose a rigorous and food-specific resilience framework with end consumer food security as its main focus.

Details

Supply Chain Management: An International Journal, vol. 23 no. 3
Type: Research Article
ISSN: 1359-8546

Keywords

Open Access
Article
Publication date: 22 July 2020

Nsikak P. Owoh and M. Mahinderjit Singh

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of…

2076

Abstract

The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effectively secured, users’ privacy can be violated due to eavesdropping and information disclosure. In this paper, we demonstrated the possibility of unauthorized access to location information of a user during sensing due to the ineffective security mechanisms in most sensing applications. We analyzed 40 apps downloaded from Google Play Store and results showed a 100% success rate in traffic interception and disclosure of sensitive information of users. As a countermeasure, a security scheme which ensures encryption and authentication of sensed data using Advanced Encryption Standard 256-Galois Counter Mode was proposed. End-to-end security of location and motion data from smartphone sensors are ensured using the proposed security scheme. Security analysis of the proposed scheme showed it to be effective in protecting Android based sensor data against eavesdropping, information disclosure and data modification.

Details

Applied Computing and Informatics, vol. 18 no. 1/2
Type: Research Article
ISSN: 2210-8327

Keywords

Open Access
Article
Publication date: 28 February 2022

Giada Salvietti, Cristina Ziliani, Christoph Teller, Marco Ieva and Silvia Ranfagni

The study aims to propose a comprehensive overview of the Omnichannel phenomenon by identifying its theoretical foundations as well as future research directions.

9534

Abstract

Purpose

The study aims to propose a comprehensive overview of the Omnichannel phenomenon by identifying its theoretical foundations as well as future research directions.

Design/methodology/approach

In order to systematize Omnichannel-centered contributions and identify future research directions for post-Covid-19, this study adopted a mixed-method study, combining a systematic literature review, a bibliometric co-citation analysis and a panel discussion by field experts.

Findings

In Study 1, the authors traced extant literature on Omnichannel back to its theoretical foundations, which led to the identification of four research areas in which the concept of Omnichannel is rooted. Contributions pertaining to the aforesaid research areas were discussed and submitted to a panel of experts (Study 2) after the lockdown periods. The experts gave various insights into both the past and future of Omnichannel research. Finally, a framework synthesizing theoretical foundations of Omnichannel, literature gaps and opportunities for future research is provided.

Originality/value

To our knowledge, this is the first attempt to combine mixed methods study in Omnichannel research and to involve a panel of experts in order to discuss the findings of a literature review and evaluate future research directions. This choice allowed us to investigate both incumbent academic and managerial challenges raised by Omnichannel and to provide guidance for the post-pandemic recovery.

Details

International Journal of Retail & Distribution Management, vol. 50 no. 8/9
Type: Research Article
ISSN: 0959-0552

Keywords

1 – 10 of over 1000