Search results
1 – 10 of 561Kashmira Ganji and Nikhat Afshan
In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a…
Abstract
Purpose
In response to the growing interest in Internet of Things (IoT) technology and its profound implications for businesses and individuals, this bibliometric study focuses on a critical yet understudied aspect, i.e. cybersecurity. As IoT adoption grows, so do concerns regarding user privacy and data security. This study aims to provide a comprehensive understanding of the current research in this vital area, shedding light on research trends, gaps and emerging themes.
Design/methodology/approach
The study conducted a bibliometric analysis and systematic review of literature spanning over two decades (2013–2023). Bibliometric analysis is conducted using Biblioshiny which is R-software-based advanced analytical tool. Further, VOSviewer is used to conduct network analysis. The study highlights the evolving landscape of IoT cybersecurity, emphasizing interdisciplinary intersections and the ethical dimensions of IoT technologies.
Findings
The study uncovers crucial concerns related to IoT adoption, emphasizing the urgent need for comprehensive cybersecurity protocols. It identifies emerging themes such as artificial intelligence and blockchain integration, indicating a shift toward interdisciplinary solutions. Furthermore, the research highlights ethical gaps in current IoT discussions, emphasizing the importance of responsible innovation.
Research limitations/implications
Businesses can bolster their cybersecurity strategies, policymakers can craft informed regulations and researchers are encouraged to explore IoT’s ethical dimensions.
Originality/value
This study pioneers a nuanced analysis of IoT cybersecurity, filling a crucial gap in the existing business and management literature. By synthesizing a decade of scholarly work, it provides foundational insights for researchers, businesses and policymakers. The research not only informs academic discourse but also offers practical guidance for enhancing IoT security measures and fostering ethical innovation.
Details
Keywords
The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the…
Abstract
Purpose
The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the countermeasures is to improve the cyber hygiene of the end-users. Serious games or game-based learning has emerged as a promising approach for implementing security education, training and awareness program. In this paper, the researchers propose a tabletop card game called Cyber Suraksha to increase threat awareness and motivate users to adopt recommended security controls for smartphone users. Cyber Suraksha provides an active learning environment for the players. This paper aims to provide the details of the design and evaluation of the game using a between-subjects design.
Design/methodology/approach
The researchers have used constructive learning theory and the Fogg behaviour model (FBM) to design a tabletop card game called Cyber Suraksha. The researchers evaluated the game using a between-subjects design. The participants' responses in the control and intervention groups were collected using the risk behaviour diagnosis scale. Pearson’s Chi-Square test with a 5% significance level was used to test the hypotheses.
Findings
The results indicate that the game is enjoyable and fun. Cyber Suraksha game effectively motivates users to adopt the recommended security control for the targeted behaviour. The results indicate that the participants in the intervention group are 2.65 times more likely to adopt recommended behaviour. The findings of this study provide evidence for the effectiveness of hope and fear appeals in improving cybersecurity awareness.
Research limitations/implications
The generalizability of the study is limited because the sample size is small compared to the total number of smartphone users in India, and only students from computer/IT UG programs in India are used as participants in this study.
Practical implications
This study uses hope and a fear appeal to design an effective serious game. It also demonstrates using the FBM and constructive learning principles for effective serious game design. Cyber Suraksha is effective for the student group and may be tested with other age groups.
Originality/value
To the researchers' knowledge, there are no serious games for cybersecurity awareness focusing on the threats faced by smartphone users based on FBM and constructive learning theory. This research used hope along with a fear appeal to motivate smartphone users to adopt recommended security controls.
Details
Keywords
Tze Yin Khaw, Azlan Amran and Ai Ping Teoh
This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity…
Abstract
Purpose
This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.
Design/methodology/approach
This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study’s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.
Findings
This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.
Originality/value
This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.
Details
Keywords
Peter Dornheim and Ruediger Zarnekow
The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…
Abstract
Purpose
The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.
Design/methodology/approach
Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.
Findings
Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.
Originality/value
This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.
Details
Keywords
Evaluating existing literature can lead to a better understanding of a scientific journal's state of the art. In this sense, this study aims to analyze the global research…
Abstract
Purpose
Evaluating existing literature can lead to a better understanding of a scientific journal's state of the art. In this sense, this study aims to analyze the global research evolution of the Revista Europea de Dirección y Economia de la Empresa (REDEE) and the European Journal of Management and Business Economics (EJMBE).
Design/methodology/approach
A bibliometric analysis was conducted to acknowledge the most contributing authors, impactful articles, publication trends, keyword analysis, co-occurrence networks and collaboration networks. A total of 454 articles published between 2006 and 2022 were analyzed.
Findings
The results suggest that the international strategy set in 2014 has resulted in a steadily growing number of publications and a significant increment in citations. Relationship marketing and the connections between innovation, performance and entrepreneurship are topics of interest for the EJMBE.
Originality/value
Mapping existing EJMBE research through identifying the contributing authors, most impactful articles, publication trends, keyword analysis, co-occurrence networks and collaboration networks is missing to encourage new research projects.
Details
Keywords
Tulsi Pawan Fowdur and Lavesh Babooram
The purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to classify…
Abstract
Purpose
The purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to classify network traffic into different classes and predict network traffic parameters.
Design/methodology/approach
The classifier models include k-nearest neighbour (KNN), multilayer perceptron (MLP) and support vector machine (SVM), while the regression models studied are multiple linear regression (MLR) as well as MLP. The analytics were performed on both a local server and a servlet hosted on the international business machines cloud. Moreover, the local server could aggregate data from multiple devices on the network and perform collaborative ML to predict network parameters. With optimised hyperparameters, analytical models were incorporated in the cloud hosted Java servlets that operate on a client–server basis where the back-end communicates with Cloudant databases.
Findings
Regarding classification, it was found that KNN performs significantly better than MLP and SVM with a comparative precision gain of approximately 7%, when classifying both Wi-Fi and long term evolution (LTE) traffic.
Originality/value
Collaborative regression models using traffic collected from two devices were experimented and resulted in an increased average accuracy of 0.50% for all variables, with a multivariate MLP model.
Details
Keywords
Shireesha Manchem, Malathi Gottumukkala and K. Naga Sundari
Purpose: This chapter aims to enlighten the stakeholders on the role and contribution and the issues and challenges of large-scale industries in the wake of the globally unified…
Abstract
Purpose: This chapter aims to enlighten the stakeholders on the role and contribution and the issues and challenges of large-scale industries in the wake of the globally unified economies.
Need for the study: Large-scale industries are one of the pillars of any nation and can exercise an immense impact on the numerous facets of the economy of any country. Their role and contribution can benefit all the stakeholders, especially in today’s integrated and interdependent world economies. Hence, there is an absolute need to highlight the issues and challenges and suggest measures to overcome them to promote a resilient global economy.
Methodology: The study gathered data from secondary sources like textbooks, articles, and the internet.
Findings: The findings of the study state that large-scale industries are enormous contributors to employment creation, development of the economy, growth of revenue, research and development (R&D) and innovation, export promotion, and infrastructure. The significant challenges include regulatory compliance, workforce management, economic volatility, political instability, supply chain management, environmental compliance, and technology and infrastructure.
Protectionism, deregulation, public–private partnership, privatisation, and environmental regulation are significant government decisions that affect large-scale industries. The study identifies tax incentives, easy access to financing, and domestic and international trade policies to safeguard large-scale industries’ interests.
Practical implications: Large-scale industries contribute towards the growth of global economic resilience in terms of employment generation, technological advancements, and innovation, fostering international trade in today’s interconnected world.
Details
Keywords
Ranjit Roy Ghatak and Jose Arturo Garza-Reyes
The research explores the shift to Quality 4.0, examining the move towards a data-focussed transformation within organizational frameworks. This transition is characterized by…
Abstract
Purpose
The research explores the shift to Quality 4.0, examining the move towards a data-focussed transformation within organizational frameworks. This transition is characterized by incorporating Industry 4.0 technological innovations into existing quality management frameworks, signifying a significant evolution in quality control systems. Despite the evident advantages, the practical deployment in the Indian manufacturing sector encounters various obstacles. This research is dedicated to a thorough examination of these impediments. It is structured around a set of pivotal research questions: First, it seeks to identify the key barriers that impede the adoption of Quality 4.0. Second, it aims to elucidate these barriers' interrelations and mutual dependencies. Thirdly, the research prioritizes these barriers in terms of their significance to the adoption process. Finally, it contemplates the ramifications of these priorities for the strategic advancement of manufacturing practices and the development of informed policies. By answering these questions, the research provides a detailed understanding of the challenges faced. It offers actionable insights for practitioners and policymakers implementing Quality 4.0 in the Indian manufacturing sector.
Design/methodology/approach
Employing Interpretive Structural Modelling and Matrix Impact of Cross Multiplication Applied to Classification, the authors probe the interdependencies amongst fourteen identified barriers inhibiting Quality 4.0 adoption. These barriers were categorized according to their driving power and dependence, providing a richer understanding of the dynamic obstacles within the Technology–Organization–Environment (TOE) framework.
Findings
The study results highlight the lack of Quality 4.0 standards and Big Data Analytics (BDA) tools as fundamental obstacles to integrating Quality 4.0 within the Indian manufacturing sector. Additionally, the study results contravene dominant academic narratives, suggesting that the cumulative impact of organizational barriers is marginal, contrary to theoretical postulations emphasizing their central significance in Quality 4.0 assimilation.
Practical implications
This research provides concrete strategies, such as developing a collaborative platform for sharing best practices in Quality 4.0 standards, which fosters a synergistic relationship between organizations and policymakers, for instance, by creating a joint task force, comprised of industry leaders and regulatory bodies, dedicated to formulating and disseminating comprehensive guidelines for Quality 4.0 adoption. This initiative could lead to establishing industry-wide standards, benefiting from the pooled expertise of diverse stakeholders. Additionally, the study underscores the necessity for robust, standardized Big Data Analytics tools specifically designed to meet the Quality 4.0 criteria, which can be developed through public-private partnerships. These tools would facilitate the seamless integration of Quality 4.0 processes, demonstrating a direct route for overcoming the barriers of inadequate standards.
Originality/value
This research delineates specific obstacles to Quality 4.0 adoption by applying the TOE framework, detailing how these barriers interact with and influence each other, particularly highlighting the previously overlooked environmental factors. The analysis reveals a critical interdependence between “lack of standards for Quality 4.0” and “lack of standardized BDA tools and solutions,” providing nuanced insights into their conjoined effect on stalling progress in this field. Moreover, the study contributes to the theoretical body of knowledge by mapping out these novel impediments, offering a more comprehensive understanding of the challenges faced in adopting Quality 4.0.
Details
Keywords
Shiyi Wang, Abhijeet Ghadge and Emel Aktas
Digital transformation using Industry 4.0 technologies can address various challenges in food supply chains (FSCs). However, the integration of emerging technologies to achieve…
Abstract
Purpose
Digital transformation using Industry 4.0 technologies can address various challenges in food supply chains (FSCs). However, the integration of emerging technologies to achieve digital transformation in FSCs is unclear. This study aims to establish how the digital transformation of FSCs can be achieved by adopting key technologies such as the Internet of Things (IoTs), cloud computing (CC) and big data analytics (BDA).
Design/methodology/approach
A systematic literature review (SLR) resulted in 57 articles from 2008 to 2022. Following descriptive and thematic analysis, a conceptual framework based on the diffusion of innovation (DOI) theory and the context-intervention-mechanism-outcome (CIMO) logic is established, along with avenues for future research.
Findings
The combination of DOI theory and CIMO logic provides the theoretical foundation for linking the general innovation process to the digital transformation process. A novel conceptual framework for achieving digital transformation in FSCs is developed from the initiation to implementation phases. Objectives and principles for digitally transforming FSCs are identified for the initiation phase. A four-layer technology implementation architecture is developed for the implementation phase, facilitating multiple applications for FSC digital transformation.
Originality/value
The study contributes to the development of theory on digital transformation in FSCs and offers managerial guidelines for accelerating the growth of the food industry using key Industry 4.0 emerging technologies. The proposed framework brings clarity into the “neglected” intermediate stage of data management between data collection and analysis. The study highlights the need for a balanced integration of IoT, CC and BDA as key Industry 4.0 technologies to achieve digital transformation successfully.
Details