Search results
1 – 10 of 394Mustafa Özgün Atalay, Yusuf Erdem Tunç and Hazel Ceren Erkengel
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents…
Abstract
The concept of cyber-spirituality and digital security has recently emerged due to the increasing dependence on technology. Using technology in spiritual contexts presents opportunities for enhanced spiritual experiences and risks that can compromise one's digital security. It emphasizes how the intersection of spirituality and technology can potentially result in a more fulfilling spiritual practice while adding to the existing concerns about data security.
In contemporary times, the impact of technology on mental health has emerged as a critical concern that demands ethical conduct in cyberspace. People are increasingly invested in fostering interfaith dialogues, achieving social equity, and promoting fair play within online communities. This chapter highlights the imperative need to approach technology with mindfulness while prioritizing digital safety in the fast-paced world.
In today's interconnected world, internet users are constantly exposed to a host of risks, including cyberattacks, cyberbullying, cyber-victimizations, and privacy violations. This chapter critically examines these severe threats to personal safety as well as overall societal well-being caused by increasing digitization. Focusing on critical factors such as digital literacy, digital citizenship, cybersecurity practices, and the legal framework concerning data protection, it stresses responsible conduct in the virtual space through informed decision-making by individuals.
Overall, this chapter aims to investigate how cyber-spirituality intersects with digital security in the context of the workplace. Accordingly, it advocates for an introspective attitude toward technology usage that underscores responsible behavior while helping us strike a balanced relationship with digital tools. Through this approach, we can not only safeguard against potential threats but also enhance our emotional well-being.
Details
Keywords
Stephy K. Sunny and K. Ramasamy
The study aimed to assess the digital literacy skills of the students of Sacred Heart College, Chalakudy, to know whether they possess the digital literacy skills to perform well…
Abstract
Purpose
The study aimed to assess the digital literacy skills of the students of Sacred Heart College, Chalakudy, to know whether they possess the digital literacy skills to perform well in the digital environment. The study also analyzed how digital literacy skills were affected by various factors.
Design/methodology/approach
The study used stratified random sampling technique, and data were collected through a self-assessment survey using an online questionnaire designed based on DigComp 2.1: The Digital Competence Framework by the European Commission.
Findings
The results indicated that the college students needed training on digital literacy skills, as the majority students had only moderate to low digital literacy skills. It was proven that exposure to technology and the Internet will not necessarily yield skills to perform well in the digital environment. Also, digital literacy skills were not affected by various factors like age, level of study, etc.
Practical implications
The study helped to identify the digital literacy deficiencies in the students of Sacred Heart College, and it can serve as a valuable model for conducting similar investigations in diverse educational institutions. Conducting such studies offers institutions valuable insights, enabling them to create and implement personalized digital literacy training programs that can enhance students' abilities to navigate the digital landscape with proficiency and effectiveness. The study results can be insightful for educators, policymakers and the Kerala Government to reassess the current approaches and design an effective curriculum for integrating technology in education.
Originality/value
Although there are several studies that evaluated college students’ digital literacy in India and other countries, there are very few studies in the context of Kerala. Therefore, this study is distinctive and will serve as an example for all such studies in the future.
Details
Keywords
Oswald A. J. Mascarenhas, Munish Thakur and Payal Kumar
We revisit the problem of redesigning the Master in Business Administration (MBA) program, curriculum, and pedagogy, focusing on understanding and seeking to tame its “wicked…
Abstract
Executive Summary
We revisit the problem of redesigning the Master in Business Administration (MBA) program, curriculum, and pedagogy, focusing on understanding and seeking to tame its “wicked problems,” as an intrinsic part and challenge of the MBA program venture, and to render it more realistic and relevant to address major problems and their consequences. We briefly review the theory of wicked problems and methods of dealing with their consequences from multiple perspectives. Most characterization of problems classifies them as simple (problems that have known formulations and solutions), complex (where formulations are known but not their resolutions), unstructured problems (where formulations are unknown, but solutions are estimated), and “wicked” (where both problem formulations and their resolutions are unknown but eventually partially tamable). Uncertainty, unpredictability, randomness, and ambiguity increase from simple to complex to unstructured to wicked problems. A redesigned MBA program should therefore address them effectively through the four semesters in two years. Most of these problems are real and affect life and economies, and hence, business schools cannot but incorporate them into their critical, ethical, and moral thinking.
Joshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam and Abubakar Gbambegu Umar
This paper aims to identify the critical success factors in improving information security in Ghanaian firms.
Abstract
Purpose
This paper aims to identify the critical success factors in improving information security in Ghanaian firms.
Design/methodology/approach
Through an exploratory study of both public and private Ghanaian organizations. The study relied on a research model based on the technology–organization–environment (TOE) framework and a survey instrument to collect data from 525 employees. The data was analyzed using partial least squares-structural equation modeling (PLS-SEM).
Findings
The findings confirm the role of the technological, organizational and environmental contexts as significant determinants in the implementation of information security in Ghanaian organizations. Results from PLS-SEM analysis demonstrated a positive correlation between the technology component of information security initiative, organization’s internal efforts toward its acceptance and a successful implementation of information security in Ghanaian firms. Top management support and fund allocation among others will result in positive information security initiatives and positive attitudes toward securing the organization’s information assets.
Research limitations/implications
The authors discussed the implications of the authors’ findings for research, practice and policy.
Social implications
The results of this study will be useful for both governmental and non-governmental organizations in terms of best practices for increasing information security. Results from this study will aid organizations in developing countries to better understand their information security needs and identify the necessary procedures to address them.
Originality/value
This study contributes to filling the knowledge gap in organizational information security research and the TOE framework. Despite the TOE framework being one of the most influential theories in contemporary research of information system domains in an organizational context, there is not enough research linking the domains of information security and the TOE model.
Details
Keywords
Fevziye Bekar and M. Ferhat Özbek
Today, changing business systems, especially the COVID-19 epidemic, and the rapid development of technology have brought the phenomenon of spirituality to a new point. Cyber…
Abstract
Today, changing business systems, especially the COVID-19 epidemic, and the rapid development of technology have brought the phenomenon of spirituality to a new point. Cyber spirituality and dataism are also starting to become the focus of attention in this field. This situation also affects the issue of spirituality in the workplace. While the subject of spirituality in the workplace keeps up with innovations and expands in the literature, the relationship between religion and spirituality continues to be discussed and examined. For this reason, this study aims primarily to explain the relationship between the concept of religion and spirituality. In light of current developments, it is to mention the place of spirituality in the workplace between these two concepts.
Details
Keywords
Natalie Booth, Gail Derefaka, Roxanne Khan and Gayle Brewer
This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult…
Abstract
Purpose
This study aims to build on existing literature on face-to-face aggression in intimate relationships and adopts Finkel’s I3 theory to investigate the relationship between adult attachment style, dispositional self-control and cyber intimate partner aggression (IPA) perpetration and victimization.
Design/methodology/approach
Participants (N = 173) 20–52 years of age (M = 32.75 years, SD = 7.73, mode = 29 years) completed a series of standardized online measures to assess anxious and avoidant attachment, dispositional self-control and experience of cyber IPA (psychological, sexual and stalking), as both a perpetrator and victim.
Findings
Avoidant attachment was associated with increased perpetration of stalking and psychological abuse. Those high on avoidant attachment were also more likely to report that they were victims of cyber IPA psychological abuse and stalking. Self-control did not predict experience of cyber IPA, as a perpetrator or victim. Interactions between self-control and attachment were also non-significant.
Originality/value
This study addressed the paucity of cyber IPA research conducted with adult populations, by examining processes and factors to improve understanding of the experiences of online perpetration and victimization. The study also found evidence for the importance of impellance factors but not inhibiting factors (Finkel, 2008).
Details
Keywords
Arne Roar Nygård and Sokratis K. Katsikas
This paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital…
Abstract
Purpose
This paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital supply chain of critical infrastructure operators.
Design/methodology/approach
A thorough review and analysis of existing relevant literature was performed to establish the current state of knowledge in the field. Ethical frameworks proposed for other areas/disciplines and identified pertinent ethical principles have been used to inform the proposed framework’s development.
Findings
The proposed framework provides actionable guidance to security professionals engaged with such activities to support them in assessing whether an HRE project conforms to ethical principles. Recommendations on action needed to complement the framework are also proposed. According to the proposed framework, reverse engineering is neither unethical nor illegal if performed honourably. Collaboration with vendors and suppliers at an industry-wide level is critical for appropriately endorsing the proposed framework.
Originality/value
To the best of the authors’ knowledge, no ethical framework currently guides cybersecurity research, far less of cybersecurity vulnerability research and reverse engineering.
Details
Keywords
Javier Gracia-Calandín and Leonardo Suárez-Montoya
The purpose of this paper is to present a quantitative and qualitative synthesis of the diverse academic proposals and initiatives for preventing and eliminating hate speech on…
Abstract
Purpose
The purpose of this paper is to present a quantitative and qualitative synthesis of the diverse academic proposals and initiatives for preventing and eliminating hate speech on the internet.
Design/methodology/approach
The foundation for this study is a systematic review of papers devoted to the analysis of hate speech. It has been conducted using the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) protocol and applied to an initial corpus of 436 academic texts. Having implemented the suitability, screening and inclusion criteria, this corpus was refined to a sample of 74 articles.
Findings
The main subject categories studied in this corpus of academic research are legal issues and social media. In the majority of the articles, the use of hate speech via social media is associated with five typologies: religion, cyber racism, political slurs, misogyny and attacks on the LGTBI community. The absence of ethical reflection is one of the major shortcomings of IT-focused research and analysis devoted to online hate speech.
Practical implications
To date various systematic reviews have been presented, and they focus on detecting or describing hate speech. These have used either the search appraisal synthesis analysis framework or the Cochrane network. The PRISMA protocol was applied for this study, and both Scopus and texts in German were included. To date no major, rigorous systematic review has been undertaken of proposals to combat hate speech.
Originality/value
The link between hate speech and poverty has not been studied in depth within the academic sphere. Tolerance and ethical compassion are not granted the attention they merit when it comes to analysing the phenomenon of hate speech.
Details
Keywords
Mohammed Al Shamsi, Deborah Smith and Kimberly Gleason
The purpose of this paper is to describe how non-fungible tokens (NFTs) can be used in the commission of financial crime, including money laundering and crypto-fraud schemes…
Abstract
Purpose
The purpose of this paper is to describe how non-fungible tokens (NFTs) can be used in the commission of financial crime, including money laundering and crypto-fraud schemes, using the framework of the Space Transition Theory.
Design/methodology/approach
A literature review relating the Space Transition Theory to crime vulnerabilities related to NFTs is conducted and practical examples illustrating NFT schemes are provided.
Findings
The authors find that the Space Transition Theory explains the evolution of financial crimes into the NFT space. The transformation of the art industry from the physical to the virtual space through NFTs underlies the criminal activity surrounding them. NFTs enable crime because of the flexibility, dissociative anonymity, lack of deterrence and anonymity.
Research limitations/implications
Criminals can easily take advantage of the users’ limited knowledge of blockchain to defraud them of their money or tokens. These risks accentuate the need to adopt appropriate measures to augment the accountability of NFT transactions. Until such interventions are implemented, the NFT market remains a highly viable space for the perpetration of financial crimes.
Practical implications
The dynamic nature of the cyberspace and fast-past underlying technology provide a greater chance to escape than crimes committed in the physical space. The state of security on NFT platforms has elicited concerns from diverse quotas. NFTs pose significant money laundering risks because of the lack of appropriate regulatory mechanisms, generating a need for enhanced oversight and enforcement of sectors of the economy in physical space vulnerable to abuse in the NFT space, including entities such as art galleries, museums, sports teams and luxury brands.
Social implications
The Space Transition Theory is also supported in that norms and values regarding ethics and criminal actions in the physical space do not transfer to cyber space.
Originality/value
The novelty aspect of this research is in applying the Space Transition Theory to financial crime schemes based on NFTs.
Details
Keywords
This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates…
Abstract
Purpose
This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.
Design/methodology/approach
The data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.
Findings
The research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.
Originality/value
The cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.
Details