Search results

1 – 10 of over 10000
Article
Publication date: 9 May 2023

Magnus Osahon Igbinovia and Bolanle Clifford Ishola

Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this…

Abstract

Purpose

Technological expansion and adoption in university libraries have precipitated cybercrimes and the need to equip library personnel with the required knowledge to combat this menace. Consequently, this study aims to examine cyber security in university libraries and its implication for Library and Information Science education.

Design/methodology/approach

The study adopted descriptive research design, while questionnaire and interview were used to elicit data from library personnel and heads of library schools, respectively. A total of 134 responses were elicited through structured questionnaire (administered online due to the closure of universities) while six heads of library schools were interviewed, one from each of the six geopolitical zones in Nigeria.

Findings

The data from the questionnaire which were descriptively analysed revealed that the perceived knowledge of cyber security among the librarians was moderately low. Also, the university libraries were exposed to various cyber threats, with cyber security/guideline been one of the critical measures to combat cybercrime. Also, the result showed that librarians displayed high level of adherence to cyber ethics. However, the disposition of library management towards cyber security issues was revealed to be the main challenge to the deployment of cyber security in university libraries, follow by poor password management. Majority of the librarians possess basic knowledge of cyber security, though with serious interest to learn more about it. They were not taught cyber security in library school and they indicated enthusiasm to learn about it. The result of the interview with heads of library schools showed majority of these schools do not offer cyber security course due to dearth in skilled manpower.

Originality/value

The study presents cybercrime as a menace, if not tackled, would affect the university libraries’ sustainability as information institution, compromising their ability to deliver quality services.

Details

Digital Library Perspectives, vol. 39 no. 3
Type: Research Article
ISSN: 2059-5816

Keywords

Article
Publication date: 1 June 2003

Hyun‐Soo Lee and Yung‐Ho Suh

This research aims at finding out how the efforts of Korean enterprises to convert data and information into knowledge are related to the use of information technology. It also…

2330

Abstract

This research aims at finding out how the efforts of Korean enterprises to convert data and information into knowledge are related to the use of information technology. It also aims to come up with plans to efficiently introduce external knowledge by applying information technology.This research was conducted focusing on the cases of enterprises that are carrying out knowledge management by applying information technology and the result shows that Korean enterprises place high value on the application of information technology in introducing knowledge management. However, the use of information technology is not common to all enterprises in four kinds of knowledge conversion. For an organization to efficiently acquire and apply valuable knowledge, the boundary of an enterprise should be extended, and for this, the enterprise should be changed into an extended knowledge enterprise, which is founded on the trust and compensation of all the interested parties. In an extended knowledge enterprise, its first consideration is to acquire knowledge that can efficiently manage and control the interests of customers, suppliers, public institutions, and competitors that exist in the surroundings and to acquire the core knowledge that can make those people and institutions participate. In addition, the organization should possess knowledge base and information communication technology that can smoothly convert data and information into knowledge, by efficiently connecting them.

Details

Business Process Management Journal, vol. 9 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 9 August 2021

Ruti Gafni and Tal Pavel

This paper aims to analyze the changes in cyberattacks against the health-care sector during the COVID-19 pandemic.

Abstract

Purpose

This paper aims to analyze the changes in cyberattacks against the health-care sector during the COVID-19 pandemic.

Design/methodology/approach

The changes in cyberattacks of the health-care sector are analyzed by examination of the number and essence of published news concerning cybersecurity attacks on the health-care sector during 2019 and compared them to those published during 2020, based on two main websites, which review such incidents.

Findings

This study found that there was a significant growth in reports of cyberattacks on the health-care sector. Moreover, the number of cyberattacks fit interestingly to the pattern of waves of the disease, which expanded worldwide. During the first wave the number of reports was doubled or even tripled, compared to the same period in 2019, a tendency that was slightly waned afterwards.

Practical implications

This study helps to deepen the awareness of information security implications of a potential global devastating crisis, even in the cybersecurity domain, and on the health-care sector, among various other affected sectors and domains.

Social implications

COVID-19 pandemic created long-term wide-range changes that affect every individual and sector, mainly owing to the shift to remote working model, which impose long-term new cybersecurity changes, among them to the health-care industry.

Originality/value

This paper extends the existing information on implication of remote working model on information security and of the COVID-19 pandemic on the cybersecurity of health-care institutions around the world.

Details

Information & Computer Security, vol. 30 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 3 June 2008

Sunwoong Kim

The basic structure of Korea's formal education system is 6-3-3-4. This school system, which was established soon after its independence from Japan after World War II, has not…

Abstract

The basic structure of Korea's formal education system is 6-3-3-4. This school system, which was established soon after its independence from Japan after World War II, has not been changed very much until recently. Primary education covers grades 1–6. Kindergarten has not been a part of the official school system until now, although making it a part of the pubic school system has been under discussion for some years. In the secondary education sector, there are two levels of schools: middle schools covering grades 7–9, and high schools covering grades 10–12. After 12 years of formal education, students advance to higher education. Typically, undergraduate degree (B.A. or B.S.) takes four years.

Details

The Worldwide Transformation of Higher Education
Type: Book
ISBN: 978-0-7623-1487-4

Article
Publication date: 14 June 2011

Seema Arif and Maryam Ilyas

By studying the leadership role of management and faculty in a Pakistani University to find out gaps in the delivery of technology integrated services in enrolment and advisory…

3155

Abstract

Purpose

By studying the leadership role of management and faculty in a Pakistani University to find out gaps in the delivery of technology integrated services in enrolment and advisory capacity offered at the beginning of every new term at the University of Central Punjab in Lahore, Pakistan, this paper seeks to find the impact of the process of service delivery on customer loyalty and positive word of mouth, the key objectives for attaining quality.

Design/methodology/approach

A mixed methods approach, comprising survey and interviews were used to investigate customer satisfaction. Factorial analysis and SEM modeling was applied to quantitative data, whereas coding and interpretive analysis were used for qualitative data.

Findings

The results highlight the differences in leadership style adopted by management and faculty. The SEM model suggests that, as long as students lack autonomy and perceive a lack of empowerment of faculty, their satisfaction with the enrolment and advisory services will be affected negatively and will result in negative outcomes on word of mouth.

Research limitations/implications

The small sample and contextual nature of study limit the scope of generalization. However, the analysis contributes toward improving the leadership approach of Pakistani management and faculty at private universities.

Originality/value

The study identifies the challenges faced by the management in providing customer satisfaction with the services by approaching the problem from a different angle, i.e. leaders' use of their cognitive resources and their relationship focusing on customer satisfaction. It extends the research literature on leadership styles as being applicable to student services available.

Article
Publication date: 25 January 2021

Raphael Ebiefung and Airen Adetimirin

This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information resources…

Abstract

Purpose

This study aims to investigate the adherence to cyber ethics by undergraduates in public universities in Akwa Ibom state, Nigeria when using electronic information resources (EIRs).

Design/methodology/approach

Descriptive survey research design was used for this study. A total of 7,771 undergraduates of University of Uyo (UNIUYO) and Akwa Ibom State University (AKSU), Nigeria constitute the study population. The sampling technique used for the study is the multistage technique. A sampling fraction of 5% was used to arrive at a sample size of 389.

Findings

This study revealed that in UNIUYO, more than four-fifths of the undergraduates – 55 (84.6%) in science, 55 (82.1%) in engineering and 61 (81.3%) in education – noted that they used the internet on a daily basis, and in AKSU, almost all the respondents in science (50, 90.9%) and about four-fifths in engineering (45, 80.4%) observed that they also used the internet on a daily basis for academic work. Adherence to cyber ethics guidelines was high at UNIUYO in education (44.2) and science (43.0) and at AKSU in engineering (42.9) and science (44.7).

Practical implications

The use of EIRs in universities has brought enormous changes, especially on how information are accessed and used by undergraduates. As EIRs have become important component in university libraries and continuously used by undergraduates for academic work, there is the possibility that frequent accessibility and utilization could increase the chances of unethical usage. This study is therefore significant in taming the tide of abuse and misuse of e-information resources in universities.

Originality/value

The correlation between adherence to ethics guidelines and the use of EIRs was positively significant at both UNIUYO (r = 0.139*; df = 206; p < 0.05) and AKSU (r = 0.136*; df = 168; p < 0.05). A high level of adherence to cyber ethics by the undergraduates can be encouraged and maintained through the formulation of cyber ethics policy in the universities by academic librarians.

Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 March 2016

Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis and Theodoros Apostolopoulos

The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the…

2392

Abstract

Purpose

The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the States’ need to effectively protect themselves against these attacks. The existing legal framework seem inadequate to deal effectively with cyber operations and, from a strictly legal standpoint, it indicates that addressing cyber attacks does not fall within the jurisdiction of just one legal branch. This is mainly because of the fact that the concept of cyber warfare itself is open to many different interpretations, ranging from cyber operations performed by the States within the context of armed conflict, under International Humanitarian Law, to illicit activities of all kinds performed by non-State actors including cybercriminals and terrorist groups. The paper initially presents major cyber-attack incidents and their impact on the States. On this basis, it examines the existing legal framework at the European and international levels. Furthermore, it approaches “cyber warfare” from the perspective of international law and focuses on two major issues relating to cyber operations, i.e. “jurisdiction” and “attribution”. The multi-layered process of attribution in combination with a variety of jurisdictional bases in international law makes the successful tackling of cyber attacks difficult. The paper aims to identify technical, legal and, last but not least, political difficulties and emphasize the complexity in applying international law rules in cyber operations.

Design/methodology/approach

The paper focuses on the globalization of the “cyber warfare phenomenon” by observing its evolutionary process from the early stages of its appearance until today. It examines the scope, duration and intensity of major cyber-attacks throughout the years in relation to the reactions of the States that were the victims. Having this as the base of discussion, it expands further by exemplifying “cyber warfare” from the perspective of the existing European and International legal framework. The main aim of this part is to identify and analyze major obstacles that arise, for instance in terms of “jurisdiction” and “attribution” in applying international law rules to “cyber warfare”.

Findings

The absence of a widely accepted legal framework to regulate jurisdictional issues of cyber warfare and the technical difficulties in identifying, with absolute certainty, the perpetrators of an attack, make the successful tackling of cyber attacks difficult.

Originality/value

The paper fulfills the need to identify difficulties in applying international law rules in cyber warfare and constitutes the basis for the creation of a method that will attempt to categorize and rank cyber operations in terms of their intensity and seriousness.

Details

Information & Computer Security, vol. 24 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 7 January 2019

Monica T. Whitty

This paper aims to develop a theoretical framework to predict susceptibility to cyber-fraud victimhood.

12537

Abstract

Purpose

This paper aims to develop a theoretical framework to predict susceptibility to cyber-fraud victimhood.

Design/methodology/approach

A survey was constructed to examine whether personality, socio-demographic characteristics and online routine activities predicted one-off and repeat victimhood of cyber-fraud. Overall, 11,780 participants completed a survey (one-off victims, N = 728; repeat victims = 329).

Findings

The final saturated model revealed that psychological and socio-demographic characteristics and online routine activities should be considered when predicting victimhood. Consistent with the hypotheses, victims of cyber-frauds were more likely to be older, score high on impulsivity measures of urgency and sensation seeking, score high on addictive measures and engage in more frequent routine activities that place them at great risk of becoming scammed. There was little distinction between one-off and repeat victims of cyber-frauds.

Originality/value

This work uniquely combines psychological, socio-demographic and online behaviours to develop a comprehensive theoretical framework to predict susceptibility to cyber-frauds. Importantly, the work here challenges the current utility of government websites to protect users from becoming scammed and provides insights into methods that might be used to protect users from becoming scammed.

Details

Journal of Financial Crime, vol. 26 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of over 10000