Search results

1 – 10 of 104
Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

125

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 April 2024

Muhammad Mujtaba Asad and Aisha Malik

In today’s world, empowering individuals, promoting social cohesion and advancing economic development all hinge on access to high-quality education, prioritizing diversity…

Abstract

Purpose

In today’s world, empowering individuals, promoting social cohesion and advancing economic development all hinge on access to high-quality education, prioritizing diversity, inclusion and equality. Rethinking current educational strategies using cyber-physical learning assets is necessary to accommodate the learning inclusivity and equity and escalating demands of a globalized world. There is a pressing demand for evidence to support the efficacy of collaborative learning in transforming curriculum and fostering learner inclusion. However, it is recognized as a pedagogical technique within the quality education domain. This study aims to address this knowledge gap by investigating how hybridized cybergogy paradigms facilitate collaborative learning, focusing on diversity, equity and inclusion, to improve educational quality in higher education.

Design/methodology/approach

This study used a qualitative approach with an exploratory design guided by an interpretive philosophical perspective. The data was gathered from 60 prospective teachers from the public sector university of Sindh, Pakistan. Semi-structured interviews were conducted with participants. They were then analyzed using theme analysis to understand their views on the potential of hybridized cybergogy paradigms for collaborative learning to improve the quality of education provided at institutions.

Findings

The study results confirm that learners benefit from increased access to learning resources, improved critical thinking and problem-solving skills and a more diverse and inclusive classroom working together in a collaborative hybridized cybergogy setting. By fostering SDG 4 (Quality Education) and the 21st-century skills necessary for global marketplace engagement and competing in progressive environments, this creative method equips learners with the capabilities to face modern global challenges.

Practical implications

The study offers valuable practical suggestions to stakeholders in higher education, including faculty, policymakers and teacher education programs, for integrating hybridized cybergogy and collaborative learning to align curricula with sustainable development goals. Additionally, it bridges a significant gap in the existing literature, which will aid future researchers interested in exploring this area.

Originality/value

This study stands out as it explores an underexamined area while providing novel educational insights.

Details

Interactive Technology and Smart Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-5659

Keywords

Open Access
Article
Publication date: 16 August 2023

Matthew Ikuabe, Clinton Aigbavboa, Chimay Anumba and Ayodeji Emmanuel Oke

Through its advanced computational capabilities, cyber–physical systems (CPS) proffer solutions to some of the cultural challenges plaguing the effective delivery of facilities…

Abstract

Purpose

Through its advanced computational capabilities, cyber–physical systems (CPS) proffer solutions to some of the cultural challenges plaguing the effective delivery of facilities management (FM) mandates. This study aims to explore the drivers for the uptake of CPS for FM functions using a qualitative approach – the Delphi technique.

Design/methodology/approach

Using the Delphi technique, the study selected experts through a well-defined process entailing a pre-determined set of criteria. The experts gave their opinions in two iterations which were subjected to statistical analyses such as the measure of central tendency and interquartile deviation in ascertaining consensus among the experts and the Mann–Whitney U test in establishing if there is a difference in the opinions given by the experts.

Findings

The study’s findings show that six of the identified drivers of the uptake of CPS for FM were attributed to be of very high significance, while 12 were of high significance. Furthermore, it was revealed that there is no significant statistical difference in the opinions given by experts in professional practice and academia.

Practical implications

The study’s outcome provides the requisite insight into the propelling measures for the uptake of CPS for FM by organisations and, by extension, aiding digital transformation for effective FM delivery.

Originality/value

To the best of the authors’ knowledge, evidence from the literature suggests that no study has showcased the drivers of the incorporation of CPS for FM. Hence, this study fills this gap in knowledge by unravelling the significant propelling measures of the integration of CPS for FM functions.

Details

Construction Innovation , vol. 24 no. 7
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 10 January 2024

Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the…

164

Abstract

Purpose

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the adoption of IoT in university libraries, investigate the impact of IoT on university library services and identify challenges to adopt IoT applications in university libraries.

Design/methodology/approach

A systematic literature review was carried out to address the objectives of the study. The 40 most relevant research papers published in the world’s leading digital databases were selected to conduct the study.

Findings

The findings illustrated that rapid growth in technology, perceived benefits, the networked world and the changing landscape of librarianship positively influenced the adoption of IoT in university libraries. The study also displayed that IoT supported library professionals to initiate smart library services, assisted in service efficiency, offered context-based library services, provided tracking facilities and delivered effective management of library systems. Results also revealed that a lack of technical infrastructure, security and privacy concerns, a lack of technological skills and unavailability of policy and strategic planning caused barriers to the successful adoption of IoT applications in university libraries.

Originality/value

The study has provided theoretical implications through a valuable addition to the current literature. It has also offered managerial implications for policymakers to construct productive policies for the implementation of IoT applications in university libraries for the attainment of fruitful outcomes. Finally, the study provides a baseline for understanding the adoption of IoT in academic libraries.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Open Access
Article
Publication date: 21 March 2023

Matthew Ikuabe, Clinton Ohis Aigbavboa, Chimay Anumba and Ayodeji Emmanuel Oke

The quest for improved facilities management (FM) delivery is receiving immense focus through the incorporation of innovative technologies such as cyber-physical systems (CPS)…

1117

Abstract

Purpose

The quest for improved facilities management (FM) delivery is receiving immense focus through the incorporation of innovative technologies such as cyber-physical systems (CPS). The system’s high computational capabilities can aid in the abatement of some of the challenges plaguing FM functions. However, the requisite ingredients for the uptake of the system for FM have still not gained scholarly attention. Because performance measurement is a vital index in determining the outcome of FM methods, this study aims to investigate the influence of performance measurement indicators that are influential to the uptake of CPS for delivering FM functions.

Design/methodology/approach

A qualitative technique was adopted using the Delphi technique. The panel of experts for the study was selected through a well-defined process based on stipulated criteria. The experts gave their opinions in two rounds before consensus was attained on the identified performance measurement indicators, whereas methods of data analysis were measures of central tendency, inter-quartile deviation and Mann–Whitney U test.

Findings

Results from this study showed that 11 of the performance indicators were of very high significance in the determination of the uptake of CPS for FM functions, whereas 5 of the indicators were proven to be of high significance. Furthermore, there was no statistical difference in the opinions of the experts based on their affiliation with academic institutions and professional practice.

Practical implications

The findings of this study contribute practically by aiding policymakers, facility managers and relevant stakeholders with the vital knowledge of delivery mandates for efficient FM services that can spur the uptake of digital technologies such as CPS.

Originality/value

This study contributes to the body of knowledge as it unveils a roadmap of the expected performance output and its accompanying evaluation that would drive the adoption of a promising technology such as CPS in the delivery of FM tasks.

Details

Construction Innovation , vol. 24 no. 7
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 18 April 2024

Ahmad Samed Al-Adwan

The primary objective of this study is to explore consumers' non-adoption intentions towards meta-commerce (or metaverse retailing). Utilizing the Innovation Resistance Theory…

Abstract

Purpose

The primary objective of this study is to explore consumers' non-adoption intentions towards meta-commerce (or metaverse retailing). Utilizing the Innovation Resistance Theory (IRT) as the theoretical foundation, this study investigates the impact of diverse barriers on non-adoption intentions within the meta-commerce context.

Design/methodology/approach

A total of 356 responses were gathered to test the proposed hypotheses. Structural Equation Modelling (SEM) with SmartPLS 4 software was used to examine these hypotheses.

Findings

The findings of this study show that perceived cyber risk, perceived regulatory uncertainty, perceived switching cost and perceived technical uncertainty are significantly linked to non-adoption intention towards meta-commerce. Furthermore, the study suggests that the moderating influence of technostress on these connections is more pronounced for consumers with high technostress compared to those with low technostress.

Originality/value

This study makes a significant contribution to the current body of literature by providing valuable insights into the fundamental barriers that consumers encounter when contemplating the adoption of meta-commerce. This contribution is particularly noteworthy as it fills a gap in the existing literature, as no prior study has comprehensively examined the primary obstacles that shape consumer intentions towards meta-commerce adoption. This novel perspective offers scholars, businesses and policymakers a foundation for developing strategies to address these barriers effectively.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

1 – 10 of 104