Search results

1 – 10 of 394
Book part
Publication date: 14 December 2023

Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…

Abstract

The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.

In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.

In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.

Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.

Article
Publication date: 8 March 2024

Stephy K. Sunny and K. Ramasamy

The study aimed to assess the digital literacy skills of the students of Sacred Heart College, Chalakudy, to know whether they possess the digital literacy skills to perform well…

Abstract

Purpose

The study aimed to assess the digital literacy skills of the students of Sacred Heart College, Chalakudy, to know whether they possess the digital literacy skills to perform well in the digital environment. The study also analyzed how digital literacy skills were affected by various factors.

Design/methodology/approach

The study used stratified random sampling technique, and data were collected through a self-assessment survey using an online questionnaire designed based on DigComp 2.1: The Digital Competence Framework by the European Commission.

Findings

The results indicated that the college students needed training on digital literacy skills, as the majority students had only moderate to low digital literacy skills. It was proven that exposure to technology and the Internet will not necessarily yield skills to perform well in the digital environment. Also, digital literacy skills were not affected by various factors like age, level of study, etc.

Practical implications

The study helped to identify the digital literacy deficiencies in the students of Sacred Heart College, and it can serve as a valuable model for conducting similar investigations in diverse educational institutions. Conducting such studies offers institutions valuable insights, enabling them to create and implement personalized digital literacy training programs that can enhance students' abilities to navigate the digital landscape with proficiency and effectiveness. The study results can be insightful for educators, policymakers and the Kerala Government to reassess the current approaches and design an effective curriculum for integrating technology in education.

Originality/value

Although there are several studies that evaluated college students’ digital literacy in India and other countries, there are very few studies in the context of Kerala. Therefore, this study is distinctive and will serve as an example for all such studies in the future.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Book part
Publication date: 4 March 2024

Oswald A. J. Mascarenhas, Munish Thakur and Payal Kumar

We revisit the problem of redesigning the Master in Business Administration (MBA) program, curriculum, and pedagogy, focusing on understanding and seeking to tame its “wicked…

Abstract

Executive Summary

We revisit the problem of redesigning the Master in Business Administration (MBA) program, curriculum, and pedagogy, focusing on understanding and seeking to tame its “wicked problems,” as an intrinsic part and challenge of the MBA program venture, and to render it more realistic and relevant to address major problems and their consequences. We briefly review the theory of wicked problems and methods of dealing with their consequences from multiple perspectives. Most characterization of problems classifies them as simple (problems that have known formulations and solutions), complex (where formulations are known but not their resolutions), unstructured problems (where formulations are unknown, but solutions are estimated), and “wicked” (where both problem formulations and their resolutions are unknown but eventually partially tamable). Uncertainty, unpredictability, randomness, and ambiguity increase from simple to complex to unstructured to wicked problems. A redesigned MBA program should therefore address them effectively through the four semesters in two years. Most of these problems are real and affect life and economies, and hence, business schools cannot but incorporate them into their critical, ethical, and moral thinking.

Details

A Primer on Critical Thinking and Business Ethics
Type: Book
ISBN: 978-1-83753-312-1

Article
Publication date: 1 March 2024

Joshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam and Abubakar Gbambegu Umar

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Abstract

Purpose

This paper aims to identify the critical success factors in improving information security in Ghanaian firms.

Design/methodology/approach

Through an exploratory study of both public and private Ghanaian organizations. The study relied on a research model based on the technology–organization–environment (TOE) framework and a survey instrument to collect data from 525 employees. The data was analyzed using partial least squares-structural equation modeling (PLS-SEM).

Findings

The findings confirm the role of the technological, organizational and environmental contexts as significant determinants in the implementation of information security in Ghanaian organizations. Results from PLS-SEM analysis demonstrated a positive correlation between the technology component of information security initiative, organization’s internal efforts toward its acceptance and a successful implementation of information security in Ghanaian firms. Top management support and fund allocation among others will result in positive information security initiatives and positive attitudes toward securing the organization’s information assets.

Research limitations/implications

The authors discussed the implications of the authors’ findings for research, practice and policy.

Social implications

The results of this study will be useful for both governmental and non-governmental organizations in terms of best practices for increasing information security. Results from this study will aid organizations in developing countries to better understand their information security needs and identify the necessary procedures to address them.

Originality/value

This study contributes to filling the knowledge gap in organizational information security research and the TOE framework. Despite the TOE framework being one of the most influential theories in contemporary research of information system domains in an organizational context, there is not enough research linking the domains of information security and the TOE model.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 14 December 2023

Fevziye Bekar and M. Ferhat Özbek

Today, changing business systems, especially the COVID-19 epidemic, and the rapid development of technology have brought the phenomenon of spirituality to a new point. Cyber…

Abstract

Today, changing business systems, especially the COVID-19 epidemic, and the rapid development of technology have brought the phenomenon of spirituality to a new point. Cyber spirituality and dataism are also starting to become the focus of attention in this field. This situation also affects the issue of spirituality in the workplace. While the subject of spirituality in the workplace keeps up with innovations and expands in the literature, the relationship between religion and spirituality continues to be discussed and examined. For this reason, this study aims primarily to explain the relationship between the concept of religion and spirituality. In light of current developments, it is to mention the place of spirituality in the workplace between these two concepts.

Details

Spirituality Management in the Workplace
Type: Book
ISBN: 978-1-83753-450-0

Keywords

Article
Publication date: 7 July 2023

Natalie Booth, Gail Derefaka, Roxanne Khan and Gayle Brewer

This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult…

Abstract

Purpose

This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult attachment style, dispositional self-control and cyber intimate partner aggression (IPA) perpetration and victimization.

Design/methodology/approach

Participants (N = 173) 20–52 years of age (M = 32.75 years, SD = 7.73, mode = 29 years) completed a series of standardized online measures to assess anxious and avoidant attachment, dispositional self-control and experience of cyber IPA (psychological, sexual and stalking), as both a perpetrator and victim.

Findings

Avoidant attachment was associated with increased perpetration of stalking and psychological abuse. Those high on avoidant attachment were also more likely to report that they were victims of cyber IPA psychological abuse and stalking. Self-control did not predict experience of cyber IPA, as a perpetrator or victim. Interactions between self-control and attachment were also non-significant.

Originality/value

This study addressed the paucity of cyber IPA research conducted with adult populations, by examining processes and factors to improve understanding of the experiences of online perpetration and victimization. The study also found evidence for the importance of impellance factors but not inhibiting factors (Finkel, 2008).

Details

Journal of Criminal Psychology, vol. 13 no. 4
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 15 January 2024

Arne Roar Nygård and Sokratis K. Katsikas

This paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital…

Abstract

Purpose

This paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital supply chain of critical infrastructure operators.

Design/methodology/approach

A thorough review and analysis of existing relevant literature was performed to establish the current state of knowledge in the field. Ethical frameworks proposed for other areas/disciplines and identified pertinent ethical principles have been used to inform the proposed framework’s development.

Findings

The proposed framework provides actionable guidance to security professionals engaged with such activities to support them in assessing whether an HRE project conforms to ethical principles. Recommendations on action needed to complement the framework are also proposed. According to the proposed framework, reverse engineering is neither unethical nor illegal if performed honourably. Collaboration with vendors and suppliers at an industry-wide level is critical for appropriately endorsing the proposed framework.

Originality/value

To the best of the authors’ knowledge, no ethical framework currently guides cybersecurity research, far less of cybersecurity vulnerability research and reverse engineering.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 July 2023

Javier Gracia-Calandín and Leonardo Suárez-Montoya

The purpose of this paper is to present a quantitative and qualitative synthesis of the diverse academic proposals and initiatives for preventing and eliminating hate speech on…

Abstract

Purpose

The purpose of this paper is to present a quantitative and qualitative synthesis of the diverse academic proposals and initiatives for preventing and eliminating hate speech on the internet.

Design/methodology/approach

The foundation for this study is a systematic review of papers devoted to the analysis of hate speech. It has been conducted using the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) protocol and applied to an initial corpus of 436 academic texts. Having implemented the suitability, screening and inclusion criteria, this corpus was refined to a sample of 74 articles.

Findings

The main subject categories studied in this corpus of academic research are legal issues and social media. In the majority of the articles, the use of hate speech via social media is associated with five typologies: religion, cyber racism, political slurs, misogyny and attacks on the LGTBI community. The absence of ethical reflection is one of the major shortcomings of IT-focused research and analysis devoted to online hate speech.

Practical implications

To date various systematic reviews have been presented, and they focus on detecting or describing hate speech. These have used either the search appraisal synthesis analysis framework or the Cochrane network. The PRISMA protocol was applied for this study, and both Scopus and texts in German were included. To date no major, rigorous systematic review has been undertaken of proposals to combat hate speech.

Originality/value

The link between hate speech and poverty has not been studied in depth within the academic sphere. Tolerance and ethical compassion are not granted the attention they merit when it comes to analysing the phenomenon of hate speech.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 9 January 2023

Mohammed Al Shamsi, Deborah Smith and Kimberly Gleason

The purpose of this paper is to describe how non-fungible tokens (NFTs) can be used in the commission of financial crime, including money laundering and crypto-fraud schemes…

Abstract

Purpose

The purpose of this paper is to describe how non-fungible tokens (NFTs) can be used in the commission of financial crime, including money laundering and crypto-fraud schemes, using the framework of the Space Transition Theory.

Design/methodology/approach

A literature review relating the Space Transition Theory to crime vulnerabilities related to NFTs is conducted and practical examples illustrating NFT schemes are provided.

Findings

The authors find that the Space Transition Theory explains the evolution of financial crimes into the NFT space. The transformation of the art industry from the physical to the virtual space through NFTs underlies the criminal activity surrounding them. NFTs enable crime because of the flexibility, dissociative anonymity, lack of deterrence and anonymity.

Research limitations/implications

Criminals can easily take advantage of the users’ limited knowledge of blockchain to defraud them of their money or tokens. These risks accentuate the need to adopt appropriate measures to augment the accountability of NFT transactions. Until such interventions are implemented, the NFT market remains a highly viable space for the perpetration of financial crimes.

Practical implications

The dynamic nature of the cyberspace and fast-past underlying technology provide a greater chance to escape than crimes committed in the physical space. The state of security on NFT platforms has elicited concerns from diverse quotas. NFTs pose significant money laundering risks because of the lack of appropriate regulatory mechanisms, generating a need for enhanced oversight and enforcement of sectors of the economy in physical space vulnerable to abuse in the NFT space, including entities such as art galleries, museums, sports teams and luxury brands.

Social implications

The Space Transition Theory is also supported in that norms and values regarding ethics and criminal actions in the physical space do not transfer to cyber space.

Originality/value

The novelty aspect of this research is in applying the Space Transition Theory to financial crime schemes based on NFTs.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 12 February 2024

Kate-Riin Kont

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates…

Abstract

Purpose

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.

Design/methodology/approach

The data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.

Findings

The research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.

Originality/value

The cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.

Details

Library Management, vol. 45 no. 1/2
Type: Research Article
ISSN: 0143-5124

Keywords

1 – 10 of 394