Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Content available
Article
Publication date: 28 March 2019

Yen-Chiang Chang and Mehran Idris Khan

This study aims to explore why marine development and maritime security in Pakistan are significant and what the Chinese concerns are. Therefore, the objective of this research is…

3929

Abstract

Purpose

This study aims to explore why marine development and maritime security in Pakistan are significant and what the Chinese concerns are. Therefore, the objective of this research is to analyse a growing Pak–China bilateral interests, particularly at Gwadar, to achieve the geostrategic objectives of China–Pakistan Economic Corridor (CPEC).

Design/methodology/approach

The study adopts a qualitative means to discuss the significance of China’s ambitions towards the CPEC project concerning strategic deep-sea management and maritime regulations in the region, with a particular focus on the Gwadar Port.

Findings

The paper concludes that the Gwadar Port is a critical element for maritime security in the whole region. The study also provides an analysis of national and international, security and legal challenges associated with CPEC.

Originality/value

Most of the potential outcomes have already been discussed in public, though a limited academic discussion is available on the legal aspects. It is particularly so with regard to the development and capacity building in the maritime sector of Pakistan under this project. This study aims to explore why marine development and maritime security in Pakistan is significant and what the Chinese concerns are.

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6456

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 13 May 2022

Francesca De Canio, Maria Fuentes-Blasco and Elisa Martinelli

This paper aims at shedding light on the competing extrinsic motivations behind the mobile shopping process of regular and occasional shoppers. Price and convenience, shopping…

2204

Abstract

Purpose

This paper aims at shedding light on the competing extrinsic motivations behind the mobile shopping process of regular and occasional shoppers. Price and convenience, shopping security, order delivery and post-sale service are investigated as antecedents of the mobile shopping attitude-intention path.

Design/methodology/approach

The empirical analysis is based on a multigroup structural equation model (SEM) developed on 903 online questionnaires collected among Chinese shoppers in a pre-Covid-19 pandemic retailing context.

Findings

Findings evidence contrary motivations behind the attitude – intention to shop using a mobile retail app of regular and occasional shoppers. While all the investigated aspects result to be positively relevant for regular m-shoppers, shopping security and post-sale service do not impact the attitude – intention path of occasional mobile shoppers. Results support retailers’ strategies in the context of mobile shopping growth.

Originality/value

The paper contributes to the emerging retailing literature on mobile shopping by offering a comparison of the motivations behind the mobile shopping intention of regular and occasional shoppers. Extrinsic motivations before, during and after the transaction are jointly investigated in the study.

Details

International Journal of Retail & Distribution Management, vol. 50 no. 8/9
Type: Research Article
ISSN: 0959-0552

Keywords

Content available
Article
Publication date: 1 May 2020

Ali Gholizadeh, Seyedashkan Madani and Saba Saneinia

By combining geopolitical and economic factors and from a geoeconomic perspective, the importance of Gwadar to China and Pakistan is discussed in detail. By applying geoeconomic…

5485

Abstract

Purpose

By combining geopolitical and economic factors and from a geoeconomic perspective, the importance of Gwadar to China and Pakistan is discussed in detail. By applying geoeconomic approach and based on the historical approach, geographical and geopolitical conditions and international development trends of Gwadar port, the authors develop the analytical framework to analyze the Gwadar port and studied its importance in the development of China and Pakistan, as well as the positive influence on the economic growth of both countries.

Design/methodology/approach

A geoeconomic study is done to run a more profound and more comprehensive analysis of China–Pakistan economic relationship, as geoeconomic includes interrelations of geographical, geopolitical and economic factors in international relations.

Findings

The results show that Gwadar Port's development could enhance the economic security of both China and Pakistan. With the opening of Gwadar Port, oil and energy in the Middle East will be imported directly to China through Pakistan's oil pipeline. This is not only oil but also goods from Central Asia, and even Europe and the USA will land from Gwadar Port and enter China through the China–Pakistan Economic Corridor (CPEC). The development of Gwadar port under the CPEC program could also dramatically increase the capacity of Pakistan's maritime trade while reducing its dependence on the current largest port, Karachi, near the India border.

Originality/value

Geo-economics theory is used to run a more profound and more comprehensive analysis of China–Pakistan economic relationship as geoeconomic includes interrelations of geographical, location, geopolitical and economic factors in international relations. By combining geopolitical and economic factors and from a geoeconomic perspective, this study seeks to analyze the Gwadar port development and its implications for both China and Pakistan.

Details

Maritime Business Review, vol. 5 no. 4
Type: Research Article
ISSN: 2397-3757

Keywords

Open Access
Article
Publication date: 24 May 2022

Luis Hernan Contreras Pinochet, Cesar Alexandre de Souza, Adriana Backx Noronha Viana and Guillermo Rodríguez-Abitia

This research aims to propose the development of a model that identifies, in essential services, the determining factors affecting the technological advances offered by different…

4237

Abstract

Purpose

This research aims to propose the development of a model that identifies, in essential services, the determining factors affecting the technological advances offered by different smart technologies in supermarket retail channels that influence citizens' quality of life, amidst the coronavirus disease 2019 (COVID-19) pandemic.

Design/methodology/approach

The data were collected using a cross-sectional questionnaire survey (n = 469). The authors applied the structural equation modeling (SEM) technique to test the hypotheses, along with the partial least squares (PLS) method for estimating latent variables and combining with the necessary condition analysis (NCA) method.

Findings

According to the results of the NCA method, the results were adequate, and more attention should be paid to the quality of life construct after finding the bottleneck point of 50%. In this sense, adaptive resilience was characterized as the main necessary predictor construct for quality of life. In addition, Generation Z and Millennials have the highest frequency of use in all smart technologies, with “assisted purchase” being the most widely used.

Social implications

Finally, the effect of the pandemic changed the consumption routine with supermarkets, not being a mere option but a necessity in the context of a smart city.

Originality/value

As a result, the proposed model was consistent, showing that all direct and indirect SEM paths were validated, highlighting data security and privacy and resilience issues. In addition, the NCA method complemented the procedures performed in the SEM phase.

Details

Revista de Gestão, vol. 31 no. 1
Type: Research Article
ISSN: 1809-2276

Keywords

Open Access
Article
Publication date: 9 November 2022

Santhosh Srinivas and Huigang Liang

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is…

3448

Abstract

Purpose

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is essential to acknowledge, identify and address them. The purpose of this paper is to identify and emperically demonstrate the impact of such darksides of DT. While a firm's DT effort may have many dark sides, the authors identify data breaches as the most critical one and focus on proving their impact since it can inflict significant damage to the firm.

Design/methodology/approach

Through the lens of paradox theory, the authors argue that the DT efforts of a firm will lead to increased risk and severity of data breaches. The authors developed a one-of-a-kind longitudinal data set by combining data from multiple sources, including 3604 brands over a 10-year period, and employed a DT performance scorecard to evaluate a firm's DT effort across four key digital selling touchpoints: site, mobile, digital marketing and social media.

Findings

The findings of this study show that a firm's DT efforts pertaining to its mobile and digital marketing platforms significantly increase the likelihood and severity of a data breach event indicating that these two channels are most vulnerable and need heightened attention from firms. Furthermore, the findings suggest that the negative repercussions of some DT initiatives may be minimized as the firm becomes more innovative. The findings can help firms re-strategize their DT efforts by promoting security and also encouraging a balanced communication strategy.

Originality/value

This research is one of the first to identify, recognize and empirically illustrate the downsides of a DT effort that is otherwise thought to provide only benefits.

Details

Journal of Electronic Business & Digital Economics, vol. 1 no. 1/2
Type: Research Article
ISSN: 2754-4214

Keywords

Content available
Article
Publication date: 21 March 2023

Abel Yeboah-Ofori and Francisca Afua Opoku-Boateng

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their…

Abstract

Purpose

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their Internet with small and medium scale enterprises (SMEs) and third-party vendors to improve business growth and increase global market share, including changing organizational requirements and business process collaborations. Benefits include a reduction in the cost of production, online services, online payments, product distribution channels and delivery in a supply chain environment. However, the integration has led to an exponential increase in cybercrimes, with adversaries using various attack methods to penetrate and exploit the organizational network. Thus, identifying the attack vectors in the event of cyberattacks is very important in mitigating cybercrimes effectively and has become inevitable. However, the invincibility nature of cybercrimes makes it challenging to detect and predict the threat probabilities and the cascading impact in an evolving organization landscape leading to malware, ransomware, data theft and denial of service attacks, among others. The paper explores the cybercrime threat landscape, considers the impact of the attacks and identifies mitigating circumstances to improve security controls in an evolving organizational landscape.

Design/methodology/approach

The approach follows two main cybercrime framework design principles that focus on existing attack detection phases and proposes a cybercrime mitigation framework (CCMF) that uses detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface. The methods and implementation processes were derived by identifying an organizational goal, attack vectors, threat landscape, identification of attacks and models and validation of framework standards to improve security. The novelty contribution of this paper is threefold: first, the authors explore the existing threat landscapes, various cybercrimes, models and the methods that adversaries are deploying on organizations. Second, the authors propose a threat model required for mitigating the risk factors. Finally, the authors recommend control mechanisms in line with security standards to improve security.

Findings

The results show that cybercrimes can be mitigated using a CCMF to detect, assess, analyze, evaluate and respond to cybercrimes to improve security in an evolving organizational threat landscape.

Research limitations/implications

The paper does not consider the organizational size between large organizations and SMEs. The challenges facing the evolving organizational threat landscape include vulnerabilities brought about by the integrations of various network nodes. Factor influencing these vulnerabilities includes inadequate threat intelligence gathering, a lack of third-party auditing and inadequate control mechanisms leading to various manipulations, exploitations, exfiltration and obfuscations.

Practical implications

Attack methods are applied to a case study for the implementation to evaluate the model based on the design principles. Inadequate cyber threat intelligence (CTI) gathering, inadequate attack modeling and security misconfigurations are some of the key factors leading to practical implications in mitigating cybercrimes.

Social implications

There are no social implications; however, cybercrimes have severe consequences for organizations and third-party vendors that integrate their network systems, leading to legal and reputational damage.

Originality/value

The paper’s originality considers mitigating cybercrimes in an evolving organization landscape that requires strategic, tactical and operational management imperative using the proposed framework phases, including detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface, which is currently inadequate.

Details

Continuity & Resilience Review, vol. 5 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Open Access
Article
Publication date: 7 September 2021

Ming Qi, Jiawei Zhang, Jing Xiao, Pei Wang, Danyang Shi and Amuji Bridget Nnenna

In this paper the interconnectedness among financial institutions and the level of systemic risks of four types of Chinese financial institutions are investigated.

2301

Abstract

Purpose

In this paper the interconnectedness among financial institutions and the level of systemic risks of four types of Chinese financial institutions are investigated.

Design/methodology/approach

By the means of RAS algorithm, the interconnection among financial institutions are illustrated. Different methods, including Linear Granger, Systemic impact index (SII), vulnerability index (VI), CoVaR, and MES are used to measure the systemic risk exposures across different institutions.

Findings

The results illustrate that big banks are more interconnected and hold the biggest scales of inter-bank transactions in the financial network. The institutions which have larger size tend to have more connection with others. Insurance and security companies contribute more to the systemic risk where as other institutions, such as trusts, financial companies, etc. may bring about severe loss and endanger the financial system as a whole.

Practical implications

Since other institutions with low levels of regulation may bring about higher extreme loss and suffer the whole system, it deserves more attention by regulators considering the contagion of potential risks in the financial system.

Originality/value

This study builds a valuable contribution by examine the systemic risks from the perspectives of both interconnection and tail risk measures. Furthermore; Four types financial institutions are investigated in this paper.

Details

Kybernetes, vol. 51 no. 13
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of over 1000