Search results

1 – 10 of 139
Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. 37 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 22 December 2022

Reihaneh Alsadat Tabaeeian, Behzad Hajrahimi and Atefeh Khoshfetrat

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Abstract

Purpose

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Design/methodology/approach

This study used Scopus and PubMed databases for scientific records identification. A systematic review of the literature structured by PRISMA guidelines was conducted on 37 included papers published between 2009 and 2019. A qualitative approach was used to synthesize insights into using telemedicine by primary care professionals.

Findings

Three barriers were identified and classified: system quality, data quality and service quality barriers. System complexity in terms of usability, system unreliability, security and privacy concerns, lack of integration and inflexibility of systems-in-use are related to system quality. Data quality barriers are data inaccuracy, data timeliness issues, data conciseness concerns and lack of data uniqueness. Finally, service reliability concerns, lack of technical support and lack of user training have been categorized as service quality barriers.

Originality/value

This review identified and mapped emerging themes of barriers to the use of telemedicine systems. This paper also through a new conceptualization of telemedicine use from perspectives of the primary care professionals contributes to informatics literature and system usage practices.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 27 June 2023

Kristijan Mirkovski, Kamel Rouibah, Paul Lowry, Joanna Paliszkiewicz and Marzena Ganc

Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government…

Abstract

Purpose

Despite the major information technology investments made by public institutions, the reuse of e-government services remains an issue as citizens hesitate to use e-government websites regularly. The purpose of this study is to investigate the cross-country determinants of e-government reuse intention by proposing a theoretical model that integrates constructs from (1) the Delone and McLean IS success model (i.e. system quality, service quality, information quality, perceived value and user satisfaction); (2) the trust and risk models (i.e. citizen trust, overall risk, time risk, privacy risk and psychological risks); and (3) Hofstede's cultural model (i.e. uncertainty avoidance, masculinity, individualism and cross-cultural trust and risk).

Design/methodology/approach

Based on data from interviews with 81 Kuwaiti citizens and surveys of 1,829 Kuwaiti and Polish citizens, this study conducted comprehensive, cross-cultural and comparative analyses of e-government reuse intention in a cross-country setting.

Findings

The results show that trust is positively associated with citizens' intention to reuse e-government services, whereas risk is negatively associated with citizens' perceived value. This study also found that masculinity–femininity and uncertainty avoidance are positively associated with the intention to reuse e-government services and that individualism–collectivism has no significant relationship with reuse intention. This study's findings have important implications for researchers and practitioners seeking to understand and improve e-government success in cross-country settings.

Originality/value

This study developed a parsimonious model of quality, trust, risk, culture and technology reuse that captures country-specific cultural contexts and enables us to conduct a comprehensive, cross-cultural and comparative analysis of e-government reuse intention in the cross-country setting of Kuwait and Poland.

Details

Information Technology & People, vol. 37 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1076

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 28 February 2023

Sara Rashidian, Robin Drogemuller, Sara Omrani and Fereshteh Banakar

The application of integrated project delivery (IPD) in conjunction with building information modeling (BIM) and Lean Construction (LC) as the efficient method for improving…

Abstract

Purpose

The application of integrated project delivery (IPD) in conjunction with building information modeling (BIM) and Lean Construction (LC) as the efficient method for improving collaboration and delivering construction projects has been acknowledged by construction academics and professionals. Once organizations have fully embraced BIM, IPD and LC integration, a measurement tool such as a maturity model (MM) for benchmarking their progress and setting realistic goals for continuous improvement will be required. In the context of MMs literature, however, no comprehensive analysis of these three construction management methods has been published to reveal the current trends and common themes in which the models have approached each other.

Design/methodology/approach

Therefore, this study integrates systematic literature review (SLR) and thematic analysis techniques to review and categorize the related MMs; the key themes in which the interrelationship between BIM, IPD and LC MMs has been discussed and conceptualized in the attributes; the shared characteristics of the existing BIM, IPD and LC MMs, as well as their strengths and limitations. The Preferred Reporting Items for Systematic Reviews (PRISMA) method has been used as the primary procedure for article screening and reviewing published papers between 2007 and 2022.

Findings

Despite the growth of BIM, IPD and LC integration publications and acknowledgment in the literature, no MM has been established that holistically measures BIM, IPD and LC integration in an organization. This study identifies five interrelated and overlapping themes indicative of the collaboration of BIM, IPD and LC in existing MMs' structure, including customer satisfaction, waste minimization, Lean practices and cultural and legal aspects. Furthermore, the MMs' common characteristics, strengths and limitations are evaluated to provide a foundation for developing future BIM, IPD and LC-related MMs.

Practical implications

This paper examines the current status of research and the knowledge gaps around BIM, IPD and LC MMs. In addition, the highlighted major themes serve as a foundation for academics who intend to develop integrated BIM, IPD, and LC MMs. This will enable researchers to build upon these themes and establish a comprehensive list of maturity attributes fulfilling the BIM, IPD and LC requirements and principles. In addition, the MMs' BIM, IPD and LC compatibility themes, which go beyond themes' intended characteristics in silos, increase industry practitioners' awareness of the underlying factors of BIM, IPD and LC integration.

Originality/value

This review article is the first of a kind to analyze the interaction of IPD, BIM and LC in the context of MMs in current AEC literature. This study concludes that BIM, IPD and LC share several joint cornerstones according to the existing MMs.

Details

Smart and Sustainable Built Environment, vol. 13 no. 3
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 14 March 2024

Bilge Nur Öztürk

The psychological foundations of consumers’ reasons for product choices are analyzed in the field of marketing. The purpose of this research is to identify the implicit reasons…

Abstract

Purpose

The psychological foundations of consumers’ reasons for product choices are analyzed in the field of marketing. The purpose of this research is to identify the implicit reasons for white meat consumption in the UK and Turkey.

Design/methodology/approach

In the scope of the means-end chain theory, in-depth interviews were conducted with individuals, and the reasons for consumers’ product preferences were revealed by moving from concrete to abstract.

Findings

It has been determined that the white meat consumption of Muslims in the UK is primarily shaped by their religious approach. In Turkey, on the contrary, both consumption patterns and reasons for preference are changing. It has been found that white meat consumption is associated with values such as security needs, satisfaction with life, self-fulfillment and happiness.

Research limitations/implications

This research has contributed to the marketing literature by examining consumers’ implicit consumption reasons for white meat in the context of religion and culture.

Practical implications

Marketing strategies should focus on building trust in halal certification, particularly in the UK. Brands should associate their promotion strategies with feelings of security and happiness, which are associated in the minds of consumers.

Originality/value

This study is a new study in terms of revealing the connotations of consumers about consuming chicken and fish and showing the implicit needs that the brands can emotionally associate with.

Details

Journal of Islamic Marketing, vol. 15 no. 5
Type: Research Article
ISSN: 1759-0833

Keywords

Open Access
Article
Publication date: 29 February 2024

Rosemarie Santa González, Marilène Cherkesly, Teodor Gabriel Crainic and Marie-Eve Rancourt

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and…

Abstract

Purpose

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and cut off from health-care services.

Design/methodology/approach

This research combines an integrated literature review and an instrumental case study. The literature review comprises two targeted reviews to provide insights: one on conflict zones and one on mobile clinics. The case study describes the process and challenges faced throughout a mobile clinic deployment during and after the Iraq War. The data was gathered using mixed methods over a two-year period (2017–2018).

Findings

Armed conflicts directly impact the populations’ health and access to health care. Mobile clinic deployments are often used and recommended to provide health-care access to vulnerable populations cut off from health-care services. However, there is a dearth of peer-reviewed literature documenting decision support tools for mobile clinic deployments.

Originality/value

This study highlights the gaps in the literature and provides direction for future research to support the development of valuable insights and decision support tools for practitioners.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 26 January 2023

Afiqah R. Radzi, Nur Farhana Azmi, Syahrul Nizam Kamaruzzaman, Rahimi A. Rahman and Eleni Papadonikolaki

Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result…

Abstract

Purpose

Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result, industry professionals reject DT even in BIM-based construction projects due to reluctance to innovate. Furthermore, researchers have repeatedly developed tools and techniques with the same goals using DT and BIM to assist practitioners in construction projects. Therefore, this study aims to assist industry professionals and researchers in understanding the relationship between DT and BIM and synthesize existing works on DT and BIM.

Design/methodology/approach

A systematic review was conducted on published articles related to DT and BIM. A total record of 54 journal articles were identified and analyzed.

Findings

The analysis of the selected journal articles revealed four types of relationships between DT and BIM: BIM is a subset of DT, DT is a subset of BIM, BIM is DT, and no relationship between BIM and DT. The existing research on DT and BIM in construction projects targets improvements in five areas: planning, design, construction, operations and maintenance, and decommissioning. In addition, several areas have emerged, such as developing geo-referencing approaches for infrastructure projects, applying the proposed methodology to other construction geometries and creating 3D visualization using color schemes.

Originality/value

This study contributed to the existing body of knowledge by overviewing existing research related to DT and BIM in construction projects. Also, it reveals research gaps in the body of knowledge to point out directions for future research.

Details

Construction Innovation , vol. 24 no. 3
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 9 June 2023

Anuradha Yadav, Rajesh Kumar Singh, Ruchi Mishra and Surajit Bag

With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying…

Abstract

Purpose

With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying, etc. while engaging with online communities. Not only this, anonymity of the participants, stress and racism are also big challenges in online communities' interaction. Online harassers' attack tactics have changed over time. In addition, there are challenges like quality of discussion, inequality in participation of the users, etc. may scale online communities towards incitement and activism. Therefore, this study will try to analyse these challenges for overall benefit of the society.

Design/methodology/approach

The underlying fuzzy set theory is employed to handle the fuzziness of users' perceptions since the attributes are expressed in linguistic preferences. Through exhaustive literature review, the authors have identified 15 challenges. These challenges are further categorised as cause and effect by using DEMATEL (Decision-Making Trial and Evaluation Laboratory) approach.

Findings

Lack of strategic planning and uninspired discussions between users has emerged as a major challenge in cause category. This study further demonstrates how individual challenge can be managed and developed to navigate the online communities to maintain a healthy environment in society.

Research limitations/implications

Results are based on limited dataset. Therefore, findings cannot be generalised for all online communities.

Originality/value

The research findings offer a suitable direction to policymakers to formulate and design policies, laws and regulations to increase user engagement in the online community. The study is beneficial to firms and researchers in understanding the factors influencing effective management of online communities.

Details

Benchmarking: An International Journal, vol. 31 no. 4
Type: Research Article
ISSN: 1463-5771

Keywords

Access

Year

Last week (139)

Content type

Article (139)
1 – 10 of 139