Search results

1 – 10 of 12
Article
Publication date: 19 April 2024

Chin Wei Liew and Nor Aziati Abdul Hamid

This study aims to collect empirical data and observe the type of influences that were causing impact to the implementation of information technology governance (ITG) mechanisms…

Abstract

Purpose

This study aims to collect empirical data and observe the type of influences that were causing impact to the implementation of information technology governance (ITG) mechanisms in Malaysia’s technical universities. This study enhanced the understanding on the status of ITG implementation and revealed internal and external influences that were shaping the types of ITG mechanisms implemented within universities and present a new perspective through the lens of resource-based view and continuous improvement.

Design/methodology/approach

This study focused on two Malaysia’s technical universities belongs under same university’s network. Five IT leaders involved in the implementations of ITG from each university were interviewed. Qualitative content analysis was used as the main analyzing method to extract categories and themes from the transcripts. Final results were produced after multiple efforts of refining categories and themes in ITG implementations.

Findings

The findings revealed that both Malaysia’s technical universities had more soundly implementations in structure mechanisms than relational and process mechanisms. The shaping of implemented mechanisms was influenced by environment surrounding the universities, internally and externally. The findings proposed that the internal and external factors are best addressed with the growth of internal ITG expertise.

Research limitations/implications

This research was conducted on two of Malaysia’s technical universities that were under a university network. Although both universities had presented the exact trend in the type of ITG mechanisms implemented in the universities, more empirical data were needed to further solidify the findings from this study. Other than that, the major respondents for this research were middle-level IT officers and leaders in the universities. Further research could be conducted specifically on top-level managements to further understand the point of views of top managements in the aspect of ITG mechanisms implementations in universities.

Originality/value

This study discussed how each factor could influence the types of ITG mechanisms implemented in Malaysia’s technical universities and concluded the attentions needed to improve the overall environment for ITG implementations in universities through the lens of resource-based view and continuous improvement.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 22 March 2024

Hamada Elsaid Elmaasrawy and Omar Ikbal Tawfik

This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance…

Abstract

Purpose

This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance cybersecurity (CS).

Design/methodology/approach

The questionnaire was used to collect data for 97 internal auditors (IAu) from the Gulf Cooperation Council countries. The authors used partial least squares (PLS) to test the hypotheses.

Findings

The results show a positive effect of the ADRIA on each of the organisational proactive measures, human proactive measures and technical proactive measures to enhance CS. The study also found a positive effect of the confirmatory role of IA on both human proactive measures and technical proactive measures to enhance CS. No effect of the confirmatory role of IA on the organisational proactive measures is found.

Research limitations/implications

This study focused on only three proactive measures to enhance CS, and this study was limited to the opinions of IAu. In addition, the study was limited to using regression analysis according to the PLS method.

Practical implications

The results of this study show that managers need to consider the influential role of IA as a value-adding activity in reducing CS risks and activating proactive measures. Also, IAu must expand its capabilities, skills and knowledge in CS auditing to provide a bold view of cyber threats. At the same time, the institutions responsible for preparing IA standards should develop standards and guidelines that help IAu to play assurance and advisory roles.

Originality/value

To the best of the authors’ knowledge, this is the first study of its kind that deals with the impact of the assurance and ADRIA on proactive measures to enhance CS. In addition, the study determines the nature of the advisory role and the assurance role of IA to strengthen CS.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 1 March 2024

Joshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam and Abubakar Gbambegu Umar

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Abstract

Purpose

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Design/methodology/approach

Through an exploratory study of both public and private Ghanaian organizations. The study relied on a research model based on the technology–organization–environment (TOE) framework and a survey instrument to collect data from 525 employees. The data was analyzed using partial least squares-structural equation modeling (PLS-SEM).

Findings

The findings confirm the role of the technological, organizational and environmental contexts as significant determinants in the implementation of information security in Ghanaian organizations. Results from PLS-SEM analysis demonstrated a positive correlation between the technology component of information security initiative, organization’s internal efforts toward its acceptance and a successful implementation of information security in Ghanaian firms. Top management support and fund allocation among others will result in positive information security initiatives and positive attitudes toward securing the organization’s information assets.

Research limitations/implications

The authors discussed the implications of the authors’ findings for research, practice and policy.

Social implications

The results of this study will be useful for both governmental and non-governmental organizations in terms of best practices for increasing information security. Results from this study will aid organizations in developing countries to better understand their information security needs and identify the necessary procedures to address them.

Originality/value

This study contributes to filling the knowledge gap in organizational information security research and the TOE framework. Despite the TOE framework being one of the most influential theories in contemporary research of information system domains in an organizational context, there is not enough research linking the domains of information security and the TOE model.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 December 2023

Helmi Hentati and Neila Boulila

This study aims to develop a maturity model designed for assessing the current state of digitization in accounting firms.

Abstract

Purpose

This study aims to develop a maturity model designed for assessing the current state of digitization in accounting firms.

Design/methodology/approach

The authors have developed this index where the maturity levels are defined from the life cycle theory. For the items of a maturity measure, the authors have adopted a multimethodological approach. That approach allows to identify 27 measurement items to cover the three dimensions of audit, reporting and taxation.

Findings

This research proposes a diagnostic tool specific to accounting firms. The authors have tested this index in the Tunisian context. The results show that there are two types of accounting firms. This study found the first firm in the embryonic phase and the other in the growth phase. This points out the active role of Tunisian accounting firms in technology integration.

Research limitations/implications

This study highlights the integration of technology in the accounting field. Specifically, it aims to address technology management in accounting firms by measuring the degree of digitization of accounting firms. This research projects the use of information technologies (artificial intelligence, cloud, big data, etc.) in auditing, reporting and taxation.

Practical implications

On a practical level, this research provides an organizational diagnostic tool to assess the status of their accounting firms in terms of digitization. This will motivate practitioners to make frequent assessments, thus contributing to continuous improvement toward digitization.

Originality/value

The theoretical foundation of this research is based on the theory of the life cycle of technologies. This study is using this theory to identify and describe the current phase of the organization. And that is by indicating the overall scores on the technological capabilities of the accounting firms.

Details

Journal of Accounting & Organizational Change, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1832-5912

Keywords

Article
Publication date: 10 April 2024

Tze Yin Khaw, Azlan Amran and Ai Ping Teoh

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity…

Abstract

Purpose

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.

Design/methodology/approach

This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study’s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.

Findings

This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.

Originality/value

This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Open Access
Article
Publication date: 20 November 2023

Shadrack Katuu

This paper aims to examine the concept of standardization beyond its traditional use in generating and implementing standards and good practice guidelines (S&GPG) by looking at…

1380

Abstract

Purpose

This paper aims to examine the concept of standardization beyond its traditional use in generating and implementing standards and good practice guidelines (S&GPG) by looking at existing and emerging trends.

Design/methodology/approach

This paper utilizes two primary approaches to categorizing S&GPG for better comprehension: categorization based on provenance as well as based on subject matter.

Findings

A significant concern related to categorizing S&GPG based on provenance or subject is the constant proliferation of standards being developed and introduced every year. This rapid growth in standards requires frequent re-categorization to keep up with the dynamic nature of this field. To tackle this problem, this paper explores emerging concepts such as ontological representation and frameworks that offer archives and records management (ARM) professionals.

Practical implications

Standardization refers to establishing uniform rules through mutual agreement to ensure consistency. The study of standardization goes beyond the development of individual S&GPG, encompassing their practical application in work settings. Categorizing standards alone may not fully capture their actual use. However, abstraction mechanisms like ontological representations, models and frameworks can demonstrate how these standards have been leveraged. This paper provides illustrative examples rather than an exhaustive list to showcase how these mechanisms have been applied in research projects or as practical tools.

Originality/value

This paper explores the emerging topic of standardization from the perspective of ontological representations and models or frameworks. In addition, it also contributes to the discussion of the 2022 version of ARMA International’s Information Governance Implementation Model and the 2020 version of the World Bank Group's Records Management Roadmap, providing unique insights into these topics.

Open Access
Article
Publication date: 12 April 2024

Aleš Zebec and Mojca Indihar Štemberger

Although businesses continue to take up artificial intelligence (AI), concerns remain that companies are not realising the full value of their investments. The study aims to…

Abstract

Purpose

Although businesses continue to take up artificial intelligence (AI), concerns remain that companies are not realising the full value of their investments. The study aims to provide insights into how AI creates business value by investigating the mediating role of Business Process Management (BPM) capabilities.

Design/methodology/approach

The integrative model of IT Business Value was contextualised, and structural equation modelling was applied to validate the proposed serial multiple mediation model using a sample of 448 organisations based in the EU.

Findings

The results validate the proposed serial multiple mediation model according to which AI adoption increases organisational performance through decision-making and business process performance. Process automation, organisational learning and process innovation are significant complementary partial mediators, thereby shedding light on how AI creates business value.

Research limitations/implications

In pursuing a complex nomological framework, multiple perspectives on realising business value from AI investments were incorporated. Several moderators presenting complementary organisational resources (e.g. culture, digital maturity, BPM maturity) could be included to identify behaviour in more complex relationships. The ethical and moral issues surrounding AI and its use could also be examined.

Practical implications

The provided insights can help guide organisations towards the most promising AI activities of process automation with AI-enabled decision-making, organisational learning and process innovation to yield business value.

Originality/value

While previous research assumed a moderated relationship, this study extends the growing literature on AI business value by empirically investigating a comprehensive nomological network that links AI adoption to organisational performance in a BPM setting.

Details

Business Process Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 28 December 2023

Cláudia Rafaela Saraiva de Melo Simões Nascimento, Adiel Teixeira de Almeida-Filho and Rachel Perez Palha

This paper proposes selecting a construction project portfolio in the context of a public institution, which makes it possible to assess quantitative and qualitative criteria…

Abstract

Purpose

This paper proposes selecting a construction project portfolio in the context of a public institution, which makes it possible to assess quantitative and qualitative criteria, thereby meeting the needs of the institution and the existing constraints.

Design/methodology/approach

The research design follows a framework using technique for order preference by similarity to ideal solution (TOPSIS) associated with integer linear programming.

Findings

The method involves a flow of assessments allowing criteria and weights to be elicited where outcomes are based on the experts' intra-criteria assessment of alternatives and decision-makers' inter-criteria assessment. This is of utmost interest to public organizations, where selections must result in benefits and lower costs, integrating the experts' technical and management perspectives.

Social implications

Public institutions are characterized by having limited financial and personnel resources for project development despite having a high demand for requests not associated with profits, making it essential to have a framework that enables using multiple criteria to better evaluate the benefits related to these decisions.

Originality/value

The main contributions of this article are: (1) the proposition of a framework for selecting construction project portfolios considering the organization's strategic needs; (2) identifying quantitative and qualitative assessment criteria for project selection; (3) integrating TOPSIS with an optimization process for selecting the construction project portfolios and (4) providing a structured decision process for selecting the portfolio that best represents the interests of the institution within its limited resources and personnel.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 26 December 2023

Manaf Al-Okaily, Dmaithan Al-Majali, Aws Al-Okaily and Tha’er Majali

The recent progress of digital accounting has significantly affected businesses’ sustainable production process. Businesses generally use digital accounting applications to…

Abstract

Purpose

The recent progress of digital accounting has significantly affected businesses’ sustainable production process. Businesses generally use digital accounting applications to automate their operational procedures and increase their corporate efficiencies through improved output quality and sustainability. Consequently, the purpose of this study is to look into the antecedent factors that directly and indirectly influence blockchain technology adoption in the context of digital accounting systems.

Design/methodology/approach

The data of the current study were obtained from 346 accountants working in information technology companies. Partial least squares structural equation modeling was used to test the research proposal model.

Findings

The empirical results confirmed that the adoption of blockchain technology is most considerably impacted by perceived usefulness, whereby it was also revealed that perceived ease of use has a direct and indirect effect on blockchain technology adoption.

Originality/value

According to the researchers’ knowledge, this study addresses a vital research gap in the literature by suggesting a comprehensive research model that can help garner enhanced usage of blockchain technology and its implications in digital accounting systems in the Jordanian context.

1 – 10 of 12