Search results

1 – 10 of 571
Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 26 December 2022

James Crotty and Elizabeth Daniel

Consumers increasingly rely on organisations for online services and data storage while these same institutions seek to digitise the information assets they hold to create…

2879

Abstract

Purpose

Consumers increasingly rely on organisations for online services and data storage while these same institutions seek to digitise the information assets they hold to create economic value. Cybersecurity failures arising from malicious or accidental actions can lead to significant reputational and financial loss which organisations must guard against. Despite having some critical weaknesses, qualitative cybersecurity risk analysis is widely used in developing cybersecurity plans. This research explores these weaknesses, considers how quantitative methods might address the constraints and seeks the insights and recommendations of leading cybersecurity practitioners on the use of qualitative and quantitative cyber risk assessment methods.

Design/methodology/approach

The study is based upon a literature review and thematic analysis of in-depth qualitative interviews with 16 senior cybersecurity practitioners representing financial services and advisory companies from across the world.

Findings

While most organisations continue to rely on qualitative methods for cybersecurity risk assessment, some are also actively using quantitative approaches to enhance their cybersecurity planning efforts. The primary recommendation of this paper is that organisations should adopt both a qualitative and quantitative cyber risk assessment approach.

Originality/value

This work provides the first insight into how senior practitioners are using and combining qualitative and quantitative cybersecurity risk assessment, and highlights the need for in-depth comparisons of these two different approaches.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 1 February 2023

Benjamin Appiah Osei and Michael Cheng

The aim of this mixed methods study sought to investigate the preferences and challenges towards fourth industrial revolution (FIR) technologies adoption at hotels in Malaysia.

Abstract

Purpose

The aim of this mixed methods study sought to investigate the preferences and challenges towards fourth industrial revolution (FIR) technologies adoption at hotels in Malaysia.

Design/methodology/approach

The study adopted partially-mixed concurrent quantitative-dominant mixed methods. The quantitative part of the study examined the preferred FIR technologies for hotels; whiles the qualitative part explored the challenges towards their adoption.

Findings

The results revealed that Internet of things, big data, cloud computing, artificial intelligence and cyber physical systems were the preferred FIR technologies for hotels. The findings revealed significant relationships between respondents' socio-demographic characteristics (age, gender, working experience, etc.) and preferred FIR technologies. Penultimately, challenges that affect the adoption of FIR technologies including investment cost, migration cost, trust, etc., were discussed.

Originality/value

In effect, findings from this study provide valuable information for policy makers (i.e. hotel owners, management, technology providers and future researchers). Most especially, the study unearths specific FIR technologies preferred by the hospitality and tourism industry. Also, the significant interplay of these preferences vis a vis respondents' socio-demographic characteristics, as well as challenges influencing their adoption also have major implications for policy makers. Another valuable contribution of this study lies in the research method utilised, since most studies on technology adoption either use quantitative or qualitative. These contributions for theory and practice have been thoroughly discussed.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 1 March 2024

Mohan Thite and Ramanathan Iyer

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information…

Abstract

Purpose

Despite ongoing reports of insider-driven leakage of confidential data, both academic scholars and practitioners tend to focus on external threats and favour information technology (IT)-centric solutions to secure and strengthen their information security ecosystem. Unfortunately, they pay little attention to human resource management (HRM) solutions. This paper aims to address this gap and proposes an actionable human resource (HR)-centric and artificial intelligence (AI)-driven framework.

Design/methodology/approach

The paper highlights the dangers posed by insider threats and presents key findings from a Leximancer-based analysis of a rapid literature review on the role, nature and contribution of HRM for information security, especially in addressing insider threats. The study also discusses the limitations of these solutions and proposes an HR-in-the-loop model, driven by AI and machine learning to mitigate these limitations.

Findings

The paper argues that AI promises to offer many HRM-centric opportunities to fortify the information security architecture if used strategically and intelligently. The HR-in-the-loop model can ensure that the human factors are considered when designing information security solutions. By combining AI and machine learning with human expertise, this model can provide an effective and comprehensive approach to addressing insider threats.

Originality/value

The paper fills the research gap on the critical role of HR in securing and strengthening information security. It makes further contribution in identifying the limitations of HRM solutions in info security and how AI and machine learning can be leveraged to address these limitations to some extent.

Details

Personnel Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 22 March 2024

Hamada Elsaid Elmaasrawy and Omar Ikbal Tawfik

This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance…

Abstract

Purpose

This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance cybersecurity (CS).

Design/methodology/approach

The questionnaire was used to collect data for 97 internal auditors (IAu) from the Gulf Cooperation Council countries. The authors used partial least squares (PLS) to test the hypotheses.

Findings

The results show a positive effect of the ADRIA on each of the organisational proactive measures, human proactive measures and technical proactive measures to enhance CS. The study also found a positive effect of the confirmatory role of IA on both human proactive measures and technical proactive measures to enhance CS. No effect of the confirmatory role of IA on the organisational proactive measures is found.

Research limitations/implications

This study focused on only three proactive measures to enhance CS, and this study was limited to the opinions of IAu. In addition, the study was limited to using regression analysis according to the PLS method.

Practical implications

The results of this study show that managers need to consider the influential role of IA as a value-adding activity in reducing CS risks and activating proactive measures. Also, IAu must expand its capabilities, skills and knowledge in CS auditing to provide a bold view of cyber threats. At the same time, the institutions responsible for preparing IA standards should develop standards and guidelines that help IAu to play assurance and advisory roles.

Originality/value

To the best of the authors’ knowledge, this is the first study of its kind that deals with the impact of the assurance and ADRIA on proactive measures to enhance CS. In addition, the study determines the nature of the advisory role and the assurance role of IA to strengthen CS.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 26 September 2023

Upinder Kumar, Mahender Singh Kaswan, Rakesh Kumar, Rekha Chaudhary, Jose Arturo Garza-Reyes, Rajeev Rathi and Rohit Joshi

The main aim of this study is to review different aspects of Industry 5.0 (I5.0) along with Kaizen measures to foster this novel aspect of industrial sustainability. The study…

Abstract

Purpose

The main aim of this study is to review different aspects of Industry 5.0 (I5.0) along with Kaizen measures to foster this novel aspect of industrial sustainability. The study makes a comprehensive study to explore the implementation status of I5.0 in industries, key technologies, adoption level in different nations and barriers to I5.0 adoption together with mitigation actions.

Design/methodology/approach

To do a systematic study of the literature, the authors have used preferred reporting items for systematic reviews and meta-analysis (PRISMA) methodology to extract articles related to the field of the study.

Findings

It has been found that academic literature on the I5.0 is continuously growing as the wheel of time is running. Most of the studies on I5.0 are conceptual-based, and manufacturing and medical industries are the flag bearer in the adoption of this novel aspect. Further, due to I5.0's infancy, many organizations face difficulty to adopt the same due to financial burden, resistive nature, a well-designed standard for cyber-physical systems (CPS) and an effective mechanism for human–robot collaboration. Further studies also provide avenues for future research in terms of the identification of collaborative mechanisms between machines and wells, the establishment of different standards for comparison and the development of I5.0-enabled models for different industrial domains.

Originality/value

The study is the first of its kind that reviews different facets of I5.0in conjunction with Kaizen's measures and application areas and provides avenues for future research to improve an organization's environmental and social sustainability.

Details

The TQM Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-2731

Keywords

Article
Publication date: 21 June 2023

Stephen Oduro and Alessandro De Nisco

Informed by the resource-based view of the firm, dynamic capabilities theory and contingency theory, this study examines the impact of Industry 4.0 (IR4.0) technologies adoption…

Abstract

Purpose

Informed by the resource-based view of the firm, dynamic capabilities theory and contingency theory, this study examines the impact of Industry 4.0 (IR4.0) technologies adoption on firm performance (FP) while accounting for the mediating role of innovation ambidexterity (IA) and moderating roles of contextual and methodological factors that drive the performance gains of the phenomenon.

Design/methodology/approach

A random-effect model in comprehensive meta-analysis (CMA) is used to synthesize 113 studies in 115 independent samples with 192,188 observations.

Findings

This analysis demonstrates that IR4.0 digital technologies are directly related to financial and non-financial performance, disclosing that the performance effect on non-financial is the largest. Moreover, there is a complementary partial mediation role of the impacts of IR4.0 on FP by IA. Furthermore, this focal relationship is moderated by boundary-spanning conditions: contextual factors – firm size, business type, economic development, industry sector and methodological factors – proxy of FP, sample size and study type.

Practical implications

The results imply that IR4.0 produces financial and non-financial benefits by enabling firms to develop dynamic capabilities like innovation ambidexterity, which informs managers and practitioners that unless IR4.0 technologies and IA strategies are combined together to generate superior FP, IR4.0, in and of itself, would produce a less positive impact on FP than the combined impact of IR4.0 and IA. Therefore, managers should focus on converting IR4.0 resources to dynamic capabilities like IA by leveraging open innovation strategies or building IR4.0-based coordination mechanisms by creating cross-unit business synergies.

Originality/value

To the best of the authors' knowledge, per the literature review, this is the first meta-analysis structural equation modeling study on the interplay between IR4.0, innovation ambidexterity and firm performance.

Details

European Journal of Innovation Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 9 June 2023

Anuradha Yadav, Rajesh Kumar Singh, Ruchi Mishra and Surajit Bag

With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying…

Abstract

Purpose

With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying, etc. while engaging with online communities. Not only this, anonymity of the participants, stress and racism are also big challenges in online communities' interaction. Online harassers' attack tactics have changed over time. In addition, there are challenges like quality of discussion, inequality in participation of the users, etc. may scale online communities towards incitement and activism. Therefore, this study will try to analyse these challenges for overall benefit of the society.

Design/methodology/approach

The underlying fuzzy set theory is employed to handle the fuzziness of users' perceptions since the attributes are expressed in linguistic preferences. Through exhaustive literature review, the authors have identified 15 challenges. These challenges are further categorised as cause and effect by using DEMATEL (Decision-Making Trial and Evaluation Laboratory) approach.

Findings

Lack of strategic planning and uninspired discussions between users has emerged as a major challenge in cause category. This study further demonstrates how individual challenge can be managed and developed to navigate the online communities to maintain a healthy environment in society.

Research limitations/implications

Results are based on limited dataset. Therefore, findings cannot be generalised for all online communities.

Originality/value

The research findings offer a suitable direction to policymakers to formulate and design policies, laws and regulations to increase user engagement in the online community. The study is beneficial to firms and researchers in understanding the factors influencing effective management of online communities.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 5 July 2023

Manoj Kumar Kamila and Sahil Singh Jasrotia

This study aims to analyse the ethical implications associated with the development of artificial intelligence (AI) technologies and to examine the potential ethical ramifications…

1599

Abstract

Purpose

This study aims to analyse the ethical implications associated with the development of artificial intelligence (AI) technologies and to examine the potential ethical ramifications of AI technologies.

Design/methodology/approach

This study undertakes a thorough examination of existing academic literature pertaining to the ethical considerations surrounding AI. Additionally, it conducts in-depth interviews with individuals to explore the potential benefits and drawbacks of AI technology operating as autonomous ethical agents. A total of 20 semi-structured interviews were conducted, and the data were transcribed using grounded theory methodology.

Findings

The study asserts the importance of fostering an ethical environment in the progress of AI and suggests potential avenues for further investigation in the field of AI ethics. The study finds privacy and security, bias and fairness, trust and reliability, transparency and human–AI interactions as major ethical concerns.

Research limitations/implications

The implications of the study are far-reaching and span across various domains, including policy development, design of AI systems, establishment of trust, education and training, public awareness and further research. Notwithstanding the potential biases inherent in purposive sampling, the constantly evolving landscape of AI ethics and the challenge of extrapolating findings to all AI applications and contexts, limitations may still manifest.

Originality/value

The novelty of the study is attributed to its comprehensive methodology, which encompasses a wide range of stakeholder perspectives on the ethical implications of AI in the corporate sector. The ultimate goal is to promote the development of AI systems that exhibit responsibility, transparency and accountability.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 26 March 2024

Bernardo Nicoletti and Andrea Appolloni,

The logistics industry has undergone a tremendous transformation. This transformation is necessary to cope with the fundamental changes in customer expectations and the need for…

Abstract

Purpose

The logistics industry has undergone a tremendous transformation. This transformation is necessary to cope with the fundamental changes in customer expectations and the need for digitalization imposed by the pandemic, changes in the socioeconomic world, and innovative technology solutions. This paper aims to present digital transformation as an integrated framework for transforming the operating model and applying advanced solutions to the ecosystem of a quintile logistics (5PL) company. 5PL operators are typically an ecosystem. Loosely coupled or self-organized entities that collaborate in a symbiotic relationship represent this ecosystem. They aim to jointly develop capabilities, create innovative services or solutions, share knowledge, facilitate transactions, and leverage network synergies in a logistics environment to provide optimized or novel customer- or partner-centric solutions (Lamberjohann and Otto, 2020).

Design/methodology/approach

Currently, there is no single definition of an integrated logistics operations model in 5PL practice, so the qualitative method used in this paper allows for investigation from an exploratory perspective. The paper follows a qualitative research methodology, collecting and analyzing data/facts through interviews and visits to subject matter experts, industry practitioners, and academic researchers, combined with an extensive review of academic publications, industry reports, and written and media content from established organizations in the marketplace. This paper follows a qualitative research methodology, as it is an inquiry rather than a statistical study. The qualitative method allows the study of the concepts of phenomena and definitions, their characteristics, and the defining features that serve as the basis (Berg, 2007). It emphasizes generalized interpretation and deeper understanding of concepts, which would be more difficult in quantitative, statistically based research. Fact-finding was conducted in two ways: in-depth interviews with experts from academia, information and communication technology organizations, and key players in the logistics industry; and academic publications, industry reports, and written and media content from established national and international organizations in the market.

Findings

The operations model introduced considers six aspects: persons, processes, platforms, partners, protection and preservation. A virtual team approach can support the personal side of the 5PL ecosystem’s digital transformation. Managing a 5PL ecosystem should be based on collaborative planning, forecasting, and replenishment methods (Parsa et al., 2020). A digital platform can support trust among the stakeholders in the ecosystem. A blockchain solution can powerfully support the 5PL ecosystem from partner relationships’ points of view. The implementation of a cybersecurity reference model is important for protection (Bandari, 2023). Reverse logistics and an integrated approach support the preservation of the ecosystem.

Research limitations/implications

While the author has experience applying the different components of the operations model presented, it would be interesting to find a 5PL that would use all the components presented in an integrated way. The operations model presented applies to any similar ecosystem with minor adaptations.

Practical implications

This paper addresses operations models and digital transformation challenges for optimizing 5PL operators. It provides several opportunities and considerations for 5PL operators interested in improving their management and operations to cope with the growing challenges of today’s world.

Social implications

The competitiveness and long-term performance of 5PL operators depend on selecting and carefully implementing their operations models. This paper emphasizes the importance of using advanced operations models.

Originality/value

The operations model derives from the author’s personal experiences in research and the innovative application of these models to logistics operators (DHL, UPS, Poste Italiane and others). This paper brings together academic and industry perspectives and operations models in an integrated business digital transformation. This paper defines an original optimal operations model for a 5PL operator and can add sustainable value to organizations and society. In doing so, it outlines different solution requirements, the critical success factors and the challenges for solutions and brings logistical performance objectives when implementing a digital business transformation.

Details

Journal of Global Operations and Strategic Sourcing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5364

Keywords

1 – 10 of 571