Search results

1 – 10 of 29
Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

125

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 18 December 2023

Orlando Troisi, Anna Visvizi and Mara Grimaldi

Industry 4.0 defines the application of digital technologies on business infrastructure and processes. With the increasing need to take into account the social and environmental…

1158

Abstract

Purpose

Industry 4.0 defines the application of digital technologies on business infrastructure and processes. With the increasing need to take into account the social and environmental impact of technologies, the concept of Society 5.0 has been proposed to restore the centrality of humans in the proper utilization of technology for the exploitation of innovation opportunities. Despite the identification of humans, resilience and sustainability as the key dimensions of Society 5.0, the definition of the key factors that can enable Innovation in the light of 5.0 principles has not been yet assessed.

Design/methodology/approach

An SLR, followed by a content analysis of results and a clustering of the main topics, is performed to (1) identify the key domains and dimensions of the Industry 5.0 paradigm; (2) understand their impact on Innovation 5.0; (3) discuss and reflect on the resulting implications for research, managerial practices and the policy-making process.

Findings

The findings allow the elaboration of a multileveled framework to redefine Innovation through the 5.0 paradigm by advancing the need to integrate ICT and technology (Industry 5.0) with the human-centric, social and knowledge-based dimensions (Society 5.0).

Originality/value

The study detects guidelines for managers, entrepreneurs and policy-makers in the adoption of effective strategies to promote human resources and knowledge management for the attainment of multiple innovation outcomes (from technological to data-driven and societal innovation).

Details

European Journal of Innovation Management, vol. 27 no. 9
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 10 January 2024

Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the…

164

Abstract

Purpose

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the adoption of IoT in university libraries, investigate the impact of IoT on university library services and identify challenges to adopt IoT applications in university libraries.

Design/methodology/approach

A systematic literature review was carried out to address the objectives of the study. The 40 most relevant research papers published in the world’s leading digital databases were selected to conduct the study.

Findings

The findings illustrated that rapid growth in technology, perceived benefits, the networked world and the changing landscape of librarianship positively influenced the adoption of IoT in university libraries. The study also displayed that IoT supported library professionals to initiate smart library services, assisted in service efficiency, offered context-based library services, provided tracking facilities and delivered effective management of library systems. Results also revealed that a lack of technical infrastructure, security and privacy concerns, a lack of technological skills and unavailability of policy and strategic planning caused barriers to the successful adoption of IoT applications in university libraries.

Originality/value

The study has provided theoretical implications through a valuable addition to the current literature. It has also offered managerial implications for policymakers to construct productive policies for the implementation of IoT applications in university libraries for the attainment of fruitful outcomes. Finally, the study provides a baseline for understanding the adoption of IoT in academic libraries.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 17 April 2024

Muhammad Mujtaba Asad and Aisha Malik

In today’s world, empowering individuals, promoting social cohesion and advancing economic development all hinge on access to high-quality education, prioritizing diversity…

Abstract

Purpose

In today’s world, empowering individuals, promoting social cohesion and advancing economic development all hinge on access to high-quality education, prioritizing diversity, inclusion and equality. Rethinking current educational strategies using cyber-physical learning assets is necessary to accommodate the learning inclusivity and equity and escalating demands of a globalized world. There is a pressing demand for evidence to support the efficacy of collaborative learning in transforming curriculum and fostering learner inclusion. However, it is recognized as a pedagogical technique within the quality education domain. This study aims to address this knowledge gap by investigating how hybridized cybergogy paradigms facilitate collaborative learning, focusing on diversity, equity and inclusion, to improve educational quality in higher education.

Design/methodology/approach

This study used a qualitative approach with an exploratory design guided by an interpretive philosophical perspective. The data was gathered from 60 prospective teachers from the public sector university of Sindh, Pakistan. Semi-structured interviews were conducted with participants. They were then analyzed using theme analysis to understand their views on the potential of hybridized cybergogy paradigms for collaborative learning to improve the quality of education provided at institutions.

Findings

The study results confirm that learners benefit from increased access to learning resources, improved critical thinking and problem-solving skills and a more diverse and inclusive classroom working together in a collaborative hybridized cybergogy setting. By fostering SDG 4 (Quality Education) and the 21st-century skills necessary for global marketplace engagement and competing in progressive environments, this creative method equips learners with the capabilities to face modern global challenges.

Practical implications

The study offers valuable practical suggestions to stakeholders in higher education, including faculty, policymakers and teacher education programs, for integrating hybridized cybergogy and collaborative learning to align curricula with sustainable development goals. Additionally, it bridges a significant gap in the existing literature, which will aid future researchers interested in exploring this area.

Originality/value

This study stands out as it explores an underexamined area while providing novel educational insights.

Details

Interactive Technology and Smart Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 16 August 2022

Khadija Echefaj, Abdelkabir Charkaoui, Anass Cherrafi, Anil Kumar and Sunil Luthra

The purpose of this study is to identify and prioritize capabilities and practices to ensure a resilient supply chain during an unexpected disruption. In addition, this study…

Abstract

Purpose

The purpose of this study is to identify and prioritize capabilities and practices to ensure a resilient supply chain during an unexpected disruption. In addition, this study ranks maturity factors that influence the main capabilities identified.

Design/methodology/approach

This paper is conducted in three stages. First, capabilities and practices are extracted through a literature review. Second, capabilities and practices are ranked using the analytical hierarchical process method. Third, a gray technique for order preference by similarity to ideal solution method is used to rank maturity factors influencing capabilities.

Findings

The findings indicate that responsiveness, readiness, flexibility and adaptability are the most important capabilities for supply chain resilience. Also, commitment and communication are the highest maturity factors influencing resilience capabilities.

Research limitations/implications

The findings provide a hierarchical vision of capabilities and practices for industries to increase resilience. Limitations of the paper are related to capabilities, practices and number of experts consulted.

Practical implications

This paper highlights the importance of high-maturity practices in resilience capability adoption. The findings of this study will encourage decisions-makers to increase maturity practices to build resilience against disruption.

Originality/value

The paper reveals that developing powerful capabilities, good practices and a high level of maturity improve supply chain resilience.

Details

Journal of Global Operations and Strategic Sourcing, vol. 17 no. 2
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 21 March 2024

Nanda Kumar Karippur, Pushpa Rani Balaramachandran and Elvin John

This paper aims at identifying the key factors influencing the adoption intention of data analytics for predictive maintenance (PdM) from the lens of the…

Abstract

Purpose

This paper aims at identifying the key factors influencing the adoption intention of data analytics for predictive maintenance (PdM) from the lens of the Technology–Organization–Environment (TOE) framework in the Singapore Process Industries context. The research model aids practitioners and researchers in developing a holistic maintenance strategy for large-scale asset-heavy process industries.

Design/methodology/approach

The TOE framework has been used in this study to consider a wide set of TOE factors and develop a research model with the support of literature. A survey is undertaken and the structural equation modelling (SEM) technique is adopted to test the hypotheses of the proposed model.

Findings

This research highlights the significant roles of digital infrastructure readiness, security and privacy, top management support, organizational competence, partnership with external consultants and government support in influencing adoption intention of data analytics for PdM. Perceived challenges related to organizational restructuring and process automation are not found significant in influencing the adoption intention.

Practical implications

This paper reports valuable insights on adoption intention of data analytics for PdM with relevant implications for the various stakeholders such as the leaders and senior managers of process manufacturing industry companies, government agencies, technology consultants and service providers.

Originality/value

This research uniquely validates the model for the adoption of data analytics for PdM in the process industries using the TOE framework. It reveals the significant technology, organizational and environmental factors influencing the adoption intention and highlights the relevant insights and implications for stakeholders.

Details

Journal of Manufacturing Technology Management, vol. 35 no. 3
Type: Research Article
ISSN: 1741-038X

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1002

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 May 2023

Denise Jackson and Christina Allen

Technology is widely recognised to be revolutionising the accounting profession, allowing accountants to focus on professional skills and technical knowledge that deliver value…

Abstract

Purpose

Technology is widely recognised to be revolutionising the accounting profession, allowing accountants to focus on professional skills and technical knowledge that deliver value for organisational success. Despite the known benefits, it is reported that accountants are not fully leveraging the potential value of certain technologies. To understand why, this study aims to draw on the technology adoption model (TAM) and investigates accounting professionals’ perceptions towards technology, and how these may influence adoption at work.

Design/methodology/approach

The study gathered online survey data from 585 accounting managers from organisations of varying sizes and in different sectors in Australia and parts of Southeast Asia. Qualitative data were thematically analysed, and quantitative data were analysed using both descriptive and multivariate techniques.

Findings

The study highlighted the pivotal role of staff perceptions on the importance and ease of using technology on the uptake and successful usage. Findings emphasised important opportunities for organisations to educate accounting staff on the value of technology and optimise their confidence and skills through training and support initiatives, particularly smaller businesses. Marked differences in the orientation towards technology among Australian and Southeast Asian participants illuminate how national work culture and practice can influence technology adoption.

Originality/value

The study makes a practical contribution by advancing the understanding of the relative importance and value of certain technologies in different regions and organisation types in the accounting profession. It extends the theoretical understanding of the role of TAM’s core elements to the accounting context, exploring staff’s notions of perceived usefulness and perceived ease of use from the manager’s perspective.

Details

Journal of Accounting & Organizational Change, vol. 20 no. 2
Type: Research Article
ISSN: 1832-5912

Keywords

1 – 10 of 29