Search results

1 – 10 of 60
Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1049

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 29 February 2024

Jeroen van der Heijden

By providing an overview of the existing knowledge on public governance in the context of Construction 4.0, this review serves as a valuable resource for researchers, policymakers…

Abstract

Purpose

By providing an overview of the existing knowledge on public governance in the context of Construction 4.0, this review serves as a valuable resource for researchers, policymakers and practitioners interested in understanding the current state of public governance in the context of Construction 4.0 and identifying avenues for future research and practical implementation.

Design/methodology/approach

This article presents a systematic and comprehensive review of the academic literature on public governance in the context of Construction 4.0. To ensure a systematic and rigorous selection of source material, the study adopts the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines.

Findings

By examining a wide range of scholarly works, the review identifies and discusses eight recurring themes that are crucial for understanding the role of public governance in Construction 4.0. These themes include policy and regulation, infrastructure and investment, skill development and education, digital inclusion and access, collaboration and partnerships, data governance and privacy, interactions with environmental and societal goals and the impact of Construction 4.0 on public governance itself. The review highlights a significant disparity between the normative debates on the importance of public governance in Construction 4.0 and the empirical knowledge available regarding its practical implementation. While the literature emphasizes the need for effective governance mechanisms to address the challenges and opportunities presented by Construction 4.0, there is a notable lack of empirical research examining the actual implementation and outcomes of public governance strategies.

Originality/value

This is the first systematic review of academic literature on public governance in the context of Construction 4.0.

Details

Smart and Sustainable Built Environment, vol. 13 no. 3
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 27 November 2023

Yirui Chen, Qianhu Chen, Yiling Xu, Elisa Arrigo and Pantaleone Nespoli

In the post-pandemic era urban ecosystem planning has become critically important. Given the emphasis on relevant issues concerning the complex interactions between human…

Abstract

Purpose

In the post-pandemic era urban ecosystem planning has become critically important. Given the emphasis on relevant issues concerning the complex interactions between human civilizations and natural systems within urban environments in the new normal, this article aims to enrich the field of knowledge management developing a cross-cultural analysis for clarifying the role of knowledge in planning and urban ecosystems.

Design/methodology/approach

This paper is conceptual in nature. Based on a theoretical foundation built by a critical literature review and data from the China Statistical Yearbook and China’s National Bureau of Statistics, this paper introduces some emerging real-impact topics regarding the connections between humanistic knowledge and urban planning. A comparative analysis between the capital city of Chang’an in the Tang dynasty of China and the capital city of Athens in Ancient Greek was used for explaining the influence of knowledge on successful urban planning.

Findings

The understanding the role of cross-cultural differences in knowledge management and practices for urban ecosystems offer the opportunities for rethinking consolidated approach to the interaction among social, economic, and environmental dimensions in urban settings.

Originality/value

This paper implies a new inter-disciplinary research field of great interest for the real impact KM community by illuminating how knowledge management is central in urban planning and across cultures.

Details

Journal of Knowledge Management, vol. 28 no. 4
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 23 August 2023

Musediq Tunji Bashorun, Yusuf Ayodeji Ajani and Olaronke Oyinlola Fagbola

This paper aims to explore the deep Web as a solution for displacement and replacement challenges in libraries, addressing the challenges, benefits, strategies and case studies.

Abstract

Purpose

This paper aims to explore the deep Web as a solution for displacement and replacement challenges in libraries, addressing the challenges, benefits, strategies and case studies.

Design/methodology/approach

The paper synthesizes existing literature on deep Web integration in libraries, providing a comprehensive analysis of insights from scholarly articles, case studies and expert opinions.

Findings

The deep Web grants libraries access to unique content, improving information access, fostering collaboration and enabling personalized content. However, security, privacy, ethics and data protection must be considered.

Originality/value

This paper contributes to the literature by providing a comprehensive examination of deep Web integration in libraries, offering valuable recommendations for navigating the changing landscape and leveraging the deep Web’s potential.

Details

Library Hi Tech News, vol. 41 no. 3
Type: Research Article
ISSN: 0741-9058

Keywords

Open Access
Article
Publication date: 13 March 2024

Tjaša Redek and Uroš Godnov

The Internet has changed consumer decision-making and influenced business behaviour. User-generated product information is abundant and readily available. This paper argues that…

Abstract

Purpose

The Internet has changed consumer decision-making and influenced business behaviour. User-generated product information is abundant and readily available. This paper argues that user-generated content can be efficiently utilised for business intelligence using data science and develops an approach to demonstrate the methods and benefits of the different techniques.

Design/methodology/approach

Using Python Selenium, Beautiful Soup and various text mining approaches in R to access, retrieve and analyse user-generated content, we argue that (1) companies can extract information about the product attributes that matter most to consumers and (2) user-generated reviews enable the use of text mining results in combination with other demographic and statistical information (e.g. ratings) as an efficient input for competitive analysis.

Findings

The paper shows that combining different types of data (textual and numerical data) and applying and combining different methods can provide organisations with important business information and improve business performance.

Research limitations/implications

The paper shows that combining different types of data (textual and numerical data) and applying and combining different methods can provide organisations with important business information and improve business performance.

Originality/value

The study makes several contributions to the marketing and management literature, mainly by illustrating the methodological advantages of text mining and accompanying statistical analysis, the different types of distilled information and their use in decision-making.

Details

Kybernetes, vol. 53 no. 13
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 13 March 2024

Abdulrazaq Kayode AbdulKareem and Kazeem Adebayo Oladimeji

This study aims to examine the role of trust and digital literacy in influencing citizens’ adoption of e-government services.

Abstract

Purpose

This study aims to examine the role of trust and digital literacy in influencing citizens’ adoption of e-government services.

Design/methodology/approach

Grounded in the technology acceptance model (TAM), a research model was developed focusing on e-filing services adoption. Hypotheses were formulated to assess the moderating effect of digital literacy on the relationship between trust and the key TAM determinants of perceived usefulness and perceived ease of use. A questionnaire-based survey of 876 citizens who have used e-filing using the snow-ball sampling technique was adopted to generate data. The data was analyzed using PLS-SEM through the aid of SmartPLS 4 to assess the measurement model and structural relationships.

Findings

Trust positively influences perceived usefulness and ease of use, which in turn drive adoption. Additionally, digital literacy significantly moderates the impact of trust on usefulness and ease of use perceptions – the effect is stronger for higher digital literacy.

Research limitations/implications

The study adopted a single country developing economy context limiting cross-cultural applicability. Second, the focus on e-filing adoption precludes insights across other e-government services. Third, the reliance on perceptual measures risks respondent biases and fourth, the study is a cross-sectional survey design.

Practical implications

The findings emphasize multifaceted strategies to accelerate e-government adoption. Nurturing citizen trust in e-government systems through enhanced reliability, security and transparency remains vital. Simultaneously, initiatives to cultivate digital access, skills and proficiencies across population segments need to be undertaken.

Originality/value

This study integrates trust and digital literacy within the theoretical model to provide a more holistic understanding of adoption determinants. It highlights the need for balanced technology-enabled and social interventions to foster acceptance of e-government services.

Details

Transforming Government: People, Process and Policy, vol. 18 no. 2
Type: Research Article
ISSN: 1750-6166

Keywords

Access

Year

Last month (60)

Content type

Article (60)
1 – 10 of 60