Search results
1 – 10 of 464Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…
Abstract
Purpose
Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.
Design/methodology/approach
For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.
Findings
The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.
Originality/value
Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.
Details
Keywords
Khurram Shahzad, Shakeel Ahmad Khan, Asfa Muhammed Din Javeed and Abid Iqbal
Cyberbullying is a visible and prominent issue in today’s society. This study aims to identify factors influencing cyberbullying, discover its consequences on society, learn…
Abstract
Purpose
Cyberbullying is a visible and prominent issue in today’s society. This study aims to identify factors influencing cyberbullying, discover its consequences on society, learn strategies and practices for dealing with cyberbullying and propose a framework to control cyberbullying in an online environment.
Design/methodology/approach
A systematic literature review was applied to meet the study’s objectives as the research methodology. A total of 27 peer-reviewed journal papers covering the study’s variables were included to carry out the systematic review.
Findings
The findings of the study revealed that social media, advancement of technology, lack of awareness, negative use of technology and smartphones affected cyberbullying in society. The study also showed the psychological disasters of cyberbullying. Prominent psychological dangers of the cyberbullying included emotional, psychiatric, psychosomatic, mental aggression, delinquency, depression, psychological distress, frustration, isolation, violence, unhappiness, suicidal tendencies, inferiority complex, embarrassment, negative emotions, self-harming attitudes and the passions of revenge. It also provided key strategies to stop and control cyberbullying activities. Key strategies included digital literacy, social support, emotional management, strict cyber laws and effective training sessions.
Originality/value
The study has provided a framework to stop and control cyber bullying for social survival. The study has offered significant theoretical, social and practical implications.
Details
Keywords
Hedaia-t-Allah Nabil Abd Al Ghaffar
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Abstract
Purpose
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Design/methodology/approach
The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.
Findings
The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.
Practical implications
Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.
Originality/value
The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.
Details
Keywords
Alireza Moghayedi, Kathy Michell, Bankole Awuzie and Unekwu Jonathan Adama
The purpose of this study is to explore the increased uptake of Artificial Intelligence (AI) technology by Facility Management (FM) organizations for enhanced operational…
Abstract
Purpose
The purpose of this study is to explore the increased uptake of Artificial Intelligence (AI) technology by Facility Management (FM) organizations for enhanced operational efficiency and competitive advantage. While AI adoption in FM has been widely reported, limited attempts have been made to assess its impact on the social well-being of FM employees. To contribute towards addressing this gap, this study established the essential employee social well-being factors mostly impacted by the adoption of AI in South African FM organizations.
Design/methodology/approach
A four-stage design comprising a comprehensive review of literature, expert interviews, questionnaire census and focus group discussion sessions was used to elicit data from a sample of participants drawn from 22 South African FM organizations. The data was analyzed using a combination of content analysis, relative importance index and interpretative structural modeling for various data sets toward achieving the study’s objectives.
Findings
Sixteen employee social well-being factors, classified under job satisfaction, social relationship and knowledge development categories, respectively, were identified as being impacted by AI adoption in FM organizations. Furthermore, it was established that job security, job autonomy and professional status, which belong to the job satisfaction social well-being factor category, were deemed by FM employees as being mostly impacted by AI adoption.
Practical implications
The enhanced understanding of the impact of AI adoption on FM employees’ social well-being factors will contribute to the development of a collaborative intelligence framework for managing AI adoption in FM organizations toward engendering optimal AI–FM employee relationships for improved productivity.
Originality/value
Besides being one of the foremost studies to investigate the impact of AI adoption on FM employees’ social well-being, this study introduces a hierarchical framework of understanding employee social well-being factors based on multi-stakeholder perspectives.
Details
Keywords
Alireza Moghayedi, Kathy Michell and Bankole Osita Awuzie
Facilities management (FM) organizations are pivotal in enhancing the resilience of buildings against climate change impacts. While existing research delves into the adoption of…
Abstract
Purpose
Facilities management (FM) organizations are pivotal in enhancing the resilience of buildings against climate change impacts. While existing research delves into the adoption of digital technologies by FM organizations, there exists a gap regarding the specific utilization of artificial intelligence (AI) to address climate challenges. This study aims to investigate the drivers and barriers influencing the adoption and utilization of AI by South African FM organizations in mitigating climate change challenges.
Design/methodology/approach
This study focuses on South Africa, a developing nation grappling with climate change’s ramifications on its infrastructure. Through a combination of systematic literature review and an online questionnaire survey, data was collected from representatives of 85 professionally registered FM organizations in South Africa. Analysis methods employed include content analysis, Relative Importance Index (RII), and Total Interpretative Structural Modeling (TISM).
Findings
The findings reveal that regulatory compliance and a responsible supply chain serve as critical drivers for AI adoption among South African FM organizations. Conversely, policy constraints and South Africa’s energy crisis emerge as major barriers to AI adoption in combating climate change challenges within the FM sector.
Originality/value
This study contributes to existing knowledge by bridging the gap in understanding how AI technologies are utilized by FM organizations to address climate challenges, particularly in the context of a developing nation like South Africa. The research findings aim to inform policymakers on fostering a conducive environment for FM organizations to harness AI in fostering climate resilience in built assets.
Details
Keywords
Muhammad Mujtaba Asad and Syeda Sabika Fatima
Cyber violence is a global emerging issue which is growing with technology or online spaces, having a great influence on individual’s development. The purpose of this study is to…
Abstract
Purpose
Cyber violence is a global emerging issue which is growing with technology or online spaces, having a great influence on individual’s development. The purpose of this study is to identify the dominant factors of cyber violence and its influence on the cognitive development of female undergraduate students.
Design/methodology/approach
In this quantitative study, a questionnaire is used as a data collection tool. Moreover, this research is conducted on female undergraduate students (n = 300). Whereas, the purposive sampling technique is used and Statistical Package for Social Science (SPSS 27.0) software is used to analyze the data.
Findings
The findings of this study show that cyber bullying is the dominant factor of cyber violence, whereas cyber doxxing has high influence on cognitive development of female undergraduate students. In addition, the value of correlational coefficient is 0.683, which indicates a strong positive correlation. Therefore, it supports that the null hypothesis is rejected and alternative hypothesis is accepted.
Practical implications
The findings of this study are of great importance for policymakers to update the regulations for cyber violence and provide the protection laws for victims whereas it is helpful for the investigation agencies and cybercrime units to be more active and needs to take immediate actions on reported incidents to minimize its further spread and support victims of it. Also, it helps society to understand the influence of it on cognitive health, which helps them to create a safer environment. Similarly, parents and teachers need to make a safe and comfortable environment around children and keep an eye on them. Further, it is beneficial for companies or online platforms to keep their sites or apps more secure for the users. Moreover, future research studies could expand the topic by involving different genders and age group peoples by using different methodologies to explore in depth.
Originality/value
This study is unique as there are limited studies, which identify the factor of cyber violence and its influence on cognitive development. Also, fewer studies can be seen in the context of Pakistan.
Details
Keywords
Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia
The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.
Abstract
Purpose
The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.
Design/methodology/approach
This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?
Findings
In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.
Research limitations/implications
This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.
Practical implications
Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.
Social implications
Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.
Originality/value
Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.
Details
Keywords
Miguel Calvo and Marta Beltrán
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Abstract
Purpose
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.
Design/methodology/approach
The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.
Findings
The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.
Originality/value
The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.
Details
Keywords
Michael Herburger, Andreas Wieland and Carina Hochstrasser
Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material…
Abstract
Purpose
Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material, information and financial flows and impacting the availability, integrity and confidentiality of SC assets. While SC resilience (SCRES) research has received much attention in recent years, the purpose of this study is to investigate specific capabilities for building SCRES to cyber risks. Based on a nuanced understanding of SC cyber risk characteristics, this study explores how to build SC cyber resilience (SCCR) using the perspective of dynamic capability (DC) theory.
Design/methodology/approach
Based on 79 in-depth interviews, this qualitative study examines 28 firms representing 4 SCs in Central Europe. The researchers interpret data from semistructured interviews and secondary data using the DC perspective, which covers sensing, seizing and transforming.
Findings
The authors identify SCRES capabilities, in general, and SCCR-specific capabilities that form the basis for the realignment of DCs for addressing cyber risks in SCs. The authors argue that SCRES capabilities should, in general, be combined with specific capabilities for SCCR to deal with SC cyber risks. Based on these findings, 10 propositions for future research are provided.
Practical implications
Practitioners should collaborate specifically to address cyber threats and risks in SCs, integrate new SC partners and use new approaches. Furthermore, this study shows that cyber risks need to be treated differently from traditional SC risks.
Originality/value
This empirical study enriches the SC management literature by examining SCRES to cyber risks through the insightful lens of DCs. It identifies DCs for building SCCR, makes several managerial contributions and is among the few that apply the DC approach to address specific SC risks.
Details