Search results

1 – 10 of 464
Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. 37 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 13 September 2024

Frederic Lemieux

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-83549-098-3

Article
Publication date: 18 July 2024

Khurram Shahzad, Shakeel Ahmad Khan, Asfa Muhammed Din Javeed and Abid Iqbal

Cyberbullying is a visible and prominent issue in today’s society. This study aims to identify factors influencing cyberbullying, discover its consequences on society, learn…

Abstract

Purpose

Cyberbullying is a visible and prominent issue in today’s society. This study aims to identify factors influencing cyberbullying, discover its consequences on society, learn strategies and practices for dealing with cyberbullying and propose a framework to control cyberbullying in an online environment.

Design/methodology/approach

A systematic literature review was applied to meet the study’s objectives as the research methodology. A total of 27 peer-reviewed journal papers covering the study’s variables were included to carry out the systematic review.

Findings

The findings of the study revealed that social media, advancement of technology, lack of awareness, negative use of technology and smartphones affected cyberbullying in society. The study also showed the psychological disasters of cyberbullying. Prominent psychological dangers of the cyberbullying included emotional, psychiatric, psychosomatic, mental aggression, delinquency, depression, psychological distress, frustration, isolation, violence, unhappiness, suicidal tendencies, inferiority complex, embarrassment, negative emotions, self-harming attitudes and the passions of revenge. It also provided key strategies to stop and control cyberbullying activities. Key strategies included digital literacy, social support, emotional management, strict cyber laws and effective training sessions.

Originality/value

The study has provided a framework to stop and control cyber bullying for social survival. The study has offered significant theoretical, social and practical implications.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

8099

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 19 June 2024

Alireza Moghayedi, Kathy Michell, Bankole Awuzie and Unekwu Jonathan Adama

The purpose of this study is to explore the increased uptake of Artificial Intelligence (AI) technology by Facility Management (FM) organizations for enhanced operational…

Abstract

Purpose

The purpose of this study is to explore the increased uptake of Artificial Intelligence (AI) technology by Facility Management (FM) organizations for enhanced operational efficiency and competitive advantage. While AI adoption in FM has been widely reported, limited attempts have been made to assess its impact on the social well-being of FM employees. To contribute towards addressing this gap, this study established the essential employee social well-being factors mostly impacted by the adoption of AI in South African FM organizations.

Design/methodology/approach

A four-stage design comprising a comprehensive review of literature, expert interviews, questionnaire census and focus group discussion sessions was used to elicit data from a sample of participants drawn from 22 South African FM organizations. The data was analyzed using a combination of content analysis, relative importance index and interpretative structural modeling for various data sets toward achieving the study’s objectives.

Findings

Sixteen employee social well-being factors, classified under job satisfaction, social relationship and knowledge development categories, respectively, were identified as being impacted by AI adoption in FM organizations. Furthermore, it was established that job security, job autonomy and professional status, which belong to the job satisfaction social well-being factor category, were deemed by FM employees as being mostly impacted by AI adoption.

Practical implications

The enhanced understanding of the impact of AI adoption on FM employees’ social well-being factors will contribute to the development of a collaborative intelligence framework for managing AI adoption in FM organizations toward engendering optimal AI–FM employee relationships for improved productivity.

Originality/value

Besides being one of the foremost studies to investigate the impact of AI adoption on FM employees’ social well-being, this study introduces a hierarchical framework of understanding employee social well-being factors based on multi-stakeholder perspectives.

Details

Journal of Corporate Real Estate , vol. 26 no. 3
Type: Research Article
ISSN: 1463-001X

Keywords

Article
Publication date: 4 September 2024

Alireza Moghayedi, Kathy Michell and Bankole Osita Awuzie

Facilities management (FM) organizations are pivotal in enhancing the resilience of buildings against climate change impacts. While existing research delves into the adoption of…

Abstract

Purpose

Facilities management (FM) organizations are pivotal in enhancing the resilience of buildings against climate change impacts. While existing research delves into the adoption of digital technologies by FM organizations, there exists a gap regarding the specific utilization of artificial intelligence (AI) to address climate challenges. This study aims to investigate the drivers and barriers influencing the adoption and utilization of AI by South African FM organizations in mitigating climate change challenges.

Design/methodology/approach

This study focuses on South Africa, a developing nation grappling with climate change’s ramifications on its infrastructure. Through a combination of systematic literature review and an online questionnaire survey, data was collected from representatives of 85 professionally registered FM organizations in South Africa. Analysis methods employed include content analysis, Relative Importance Index (RII), and Total Interpretative Structural Modeling (TISM).

Findings

The findings reveal that regulatory compliance and a responsible supply chain serve as critical drivers for AI adoption among South African FM organizations. Conversely, policy constraints and South Africa’s energy crisis emerge as major barriers to AI adoption in combating climate change challenges within the FM sector.

Originality/value

This study contributes to existing knowledge by bridging the gap in understanding how AI technologies are utilized by FM organizations to address climate challenges, particularly in the context of a developing nation like South Africa. The research findings aim to inform policymakers on fostering a conducive environment for FM organizations to harness AI in fostering climate resilience in built assets.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 5 September 2024

Muhammad Mujtaba Asad and Syeda Sabika Fatima

Cyber violence is a global emerging issue which is growing with technology or online spaces, having a great influence on individual’s development. The purpose of this study is to…

Abstract

Purpose

Cyber violence is a global emerging issue which is growing with technology or online spaces, having a great influence on individual’s development. The purpose of this study is to identify the dominant factors of cyber violence and its influence on the cognitive development of female undergraduate students.

Design/methodology/approach

In this quantitative study, a questionnaire is used as a data collection tool. Moreover, this research is conducted on female undergraduate students (n = 300). Whereas, the purposive sampling technique is used and Statistical Package for Social Science (SPSS 27.0) software is used to analyze the data.

Findings

The findings of this study show that cyber bullying is the dominant factor of cyber violence, whereas cyber doxxing has high influence on cognitive development of female undergraduate students. In addition, the value of correlational coefficient is 0.683, which indicates a strong positive correlation. Therefore, it supports that the null hypothesis is rejected and alternative hypothesis is accepted.

Practical implications

The findings of this study are of great importance for policymakers to update the regulations for cyber violence and provide the protection laws for victims whereas it is helpful for the investigation agencies and cybercrime units to be more active and needs to take immediate actions on reported incidents to minimize its further spread and support victims of it. Also, it helps society to understand the influence of it on cognitive health, which helps them to create a safer environment. Similarly, parents and teachers need to make a safe and comfortable environment around children and keep an eye on them. Further, it is beneficial for companies or online platforms to keep their sites or apps more secure for the users. Moreover, future research studies could expand the topic by involving different genders and age group peoples by using different methodologies to explore in depth.

Originality/value

This study is unique as there are limited studies, which identify the factor of cyber violence and its influence on cognitive development. Also, fewer studies can be seen in the context of Pakistan.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 25 June 2024

Michael Herburger, Andreas Wieland and Carina Hochstrasser

Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material…

1224

Abstract

Purpose

Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material, information and financial flows and impacting the availability, integrity and confidentiality of SC assets. While SC resilience (SCRES) research has received much attention in recent years, the purpose of this study is to investigate specific capabilities for building SCRES to cyber risks. Based on a nuanced understanding of SC cyber risk characteristics, this study explores how to build SC cyber resilience (SCCR) using the perspective of dynamic capability (DC) theory.

Design/methodology/approach

Based on 79 in-depth interviews, this qualitative study examines 28 firms representing 4 SCs in Central Europe. The researchers interpret data from semistructured interviews and secondary data using the DC perspective, which covers sensing, seizing and transforming.

Findings

The authors identify SCRES capabilities, in general, and SCCR-specific capabilities that form the basis for the realignment of DCs for addressing cyber risks in SCs. The authors argue that SCRES capabilities should, in general, be combined with specific capabilities for SCCR to deal with SC cyber risks. Based on these findings, 10 propositions for future research are provided.

Practical implications

Practitioners should collaborate specifically to address cyber threats and risks in SCs, integrate new SC partners and use new approaches. Furthermore, this study shows that cyber risks need to be treated differently from traditional SC risks.

Originality/value

This empirical study enriches the SC management literature by examining SCRES to cyber risks through the insightful lens of DCs. It identifies DCs for building SCCR, makes several managerial contributions and is among the few that apply the DC approach to address specific SC risks.

Details

Supply Chain Management: An International Journal, vol. 29 no. 7
Type: Research Article
ISSN: 1359-8546

Keywords

1 – 10 of 464