Search results
1 – 10 of 163Godwin Thomas and Mary-Jane Sule
This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…
Abstract
Purpose
This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.
Design/methodology/approach
Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.
Findings
Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.
Originality/value
This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.
Details
Keywords
Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…
Abstract
Purpose
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.
Design/methodology/approach
MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.
Findings
This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.
Research limitations/implications
The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.
Originality/value
In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.
Details
Keywords
Jinghuan Zhang, Shan Wang, Wenfeng Zheng and Lei Wang
By drawing on the research paradigm of collective action that occurs in physical space, the present study aims to explore the antecedent predictors of network social mobilization…
Abstract
Purpose
By drawing on the research paradigm of collective action that occurs in physical space, the present study aims to explore the antecedent predictors of network social mobilization – feeling of injustice – and discuss the emotional mechanism of this prediction: mediating effect of anger and resentment.
Design/methodology/approach
Micro-blog postings about network social mobilization were collected to develop the dictionary of codes of fairness, anger and resentment. Then, according to the dictionary, postings on Sina Weibo were coded and analyzed.
Findings
The feeling of injustice predicted network social mobilization directly. The predictive value was 27% and 33%, respectively during two analyses. The feeling of injustice also predicted social mobilization indirectly via anger and resentment. In other words, anger and resentment account for the active mechanism in which the feeling of injustice predicts network social mobilization. Mediating effect value was 29.63% and 33.33% respectively.
Research limitations/implications
This study is our first exploration to use python language to collect data from human natural language pointing on micro-blog, a large number of comments of netizen about certain topic were crawled, but a small portion of the comments could be coded into analyzable data, which results in a doubt of the reliability of the study. Therefore, we should put the established model under further testing.
Practical implications
In the cyberspace, this study confirms the mechanism of network social mobilization, expands and enriches the research on social mobilization and deepens the understanding of social mobilization.
Social implications
This study provides an empirical evidence to understand the network social mobilization, and it gives us the clue to control the process of network social mobilization.
Originality/value
This study uses the Python language to write Web crawlers to obtain microblog data and analyze the microblog content for word segmentation and matching thesaurus. It has certain innovation.
Details
Keywords
To realise the shared development of the digital economy, people need to transcend the capital logic and advocate the logic of cooperative development, i.e. “co-construction…
Abstract
Purpose
To realise the shared development of the digital economy, people need to transcend the capital logic and advocate the logic of cooperative development, i.e. “co-construction, benefit-sharing and co-governance”. This study aims to discuss the aforementioned statement.
Design/methodology/approach
Platform economy is a new economic form produced by the transformation of the social production patterns in the era of digital capitalism. In the neo-imperialist stage, a new stage of capitalist development, capital logic promotes the global expansion of the platform economy and influences its development process, organisational form, contradictions and dilemmas and internal transcendence. Having the spatiotemporal chain of capital circulation repaired, the globalisation of the platform economy is reshaping how the means of production are combined with labour, affecting the local changes in the general relations of production and “international relations of production”.
Findings
In the accumulation of digital capitalism, the social contradictions and fundamental contradictions in the capitalist world have been further intensified, making exploitation, income distribution gap, monopoly and other problems increasingly severe. The imbalance and inequality in the global development of the digital economy are increasingly prominent.
Originality/value
Regarding the global governance of the digital economy, China, as a major responsible country, will strive to encourage all countries to co-build a community with a shared future in cyberspace. In the new international development pattern of digital economy globalisation, China must take effective measures to actively safeguard its national security and development interests to meet specific challenges.
Details
Keywords
Feng Yang, Shan Zhao and Xiaoqian Zhang
China’s globalizing Internet describes a situation where China is using the Internet as a tool or medium to transmit its voice on the world stage and enhance its influence over…
Abstract
Purpose
China’s globalizing Internet describes a situation where China is using the Internet as a tool or medium to transmit its voice on the world stage and enhance its influence over the global Internet governance system and the global digitalization process. Several concerns, however, exist regarding China’s globalizing Internet strategies. This paper aims to respond to these concerns and enhance the understanding of China’s globalizing Internet strategies.
Design/methodology/approach
This paper will use content analysis to trace the policy development trajectory of China’s globalizing Internet, including policy vision, policy-making agencies and policy tools.
Findings
The Chinese government has issued a considerable number of policies to regulate and promote the development of the Internet since 2014. The key trend that emerged from the analysis of China’s globalizing Internet policy is the cooperation among different agencies. Existing policies have comprehensively used the supply-oriented tools, the environment-oriented tools and the demand-oriented tools; and the last two tools have been used more frequently in recent years.
Originality/value
The analysis results contribute to understanding how China uses digital technology to enhance its influence over the global Internet governance system.
Details
Keywords
Yadong Huang, Yueting Chai, Yi Liu and Xiang Gu
The purpose of this paper is to study the architecture of holographic personalized portal, user modeling, commodity modeling and intelligent interaction.
Abstract
Purpose
The purpose of this paper is to study the architecture of holographic personalized portal, user modeling, commodity modeling and intelligent interaction.
Design/methodology/approach
In this paper, the authors propose crowd-science industrial ecological system based on holographic personalized portal and its interaction. The holographic personality portal is based on holographic enterprises, commodities and consumers, and the personalized portal consists of accurate ontology, reliable supply, intelligent demand and smart cyberspace.
Findings
The personalized portal can realize the information acquisition, characteristic analysis and holographic presentation. Then, the intelligent interaction, e.g. demand decomposition, personalized search, personalized presentation and demand prediction, will be implemented within the personalized portal.
Originality/value
The authors believe that their work on intelligent interaction based on holographic personalized portal, which has been first proposed in this paper, is innovation focusing on the interaction between intelligence and convenience.
Details
Keywords
Martina Neri, Federico Niccolini and Luigi Martino
Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…
Abstract
Purpose
Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known characteristics, the cybersecurity phenomenon goes beyond the detection of technological impacts, and encompasses all the dimensions of an organization. This study thus focusses on an additional set of organizational elements. The key elements of cybersecurity organizational readiness depicted here are cybersecurity awareness, cybersecurity culture and cybersecurity organizational resilience (OR). This study aims to qualitatively assess small and medium enterprises’ (SMEs) overall level of organizational cybersecurity readiness.
Design/methodology/approach
This study focused on conducting a cybersecurity organizational readiness assessment using a sample of 53 Italian SMEs from the information and communication technology sector. Informed mixed method research, this study was conducted consistent with the principles of the explanatory sequential mixed method design, and adopting a quanti-qualitative methodology. The quantitative data were collected through a questionnaire. Qualitative data were subsequently collected through semi-structured interviews.
Findings
Although many elements of the technical aspects of cybersecurity OR have yielded very encouraging results, there are still some areas that require improvement. These include those facets that constitute the foundation of cybersecurity awareness, and, thus, a cybersecurity culture. This result highlights that the areas in need of improvement are exactly those that are most important in fighting against cyber threats via organizational cybersecurity readiness.
Originality/value
Although the importance of SMEs is obvious, evidence of such organizations’ attitudes to cybersecurity are still limited. This research is an attempt to depict the organizational issue related to cybersecurity, i.e. overall cybersecurity organizational readiness.
Details
Keywords
Jianping Shen, Yadong Huang and Yueting Chai
This paper aims to study the node modeling, multi-agent architecture and addressing method for the material conscious information network (MCIN), which is a large-scaled…
Abstract
Purpose
This paper aims to study the node modeling, multi-agent architecture and addressing method for the material conscious information network (MCIN), which is a large-scaled, open-styled, self-organized and ecological intelligent network of supply–demand relationships.
Design/methodology/approach
This study models the MCIN by node model definition, multi-agent architecture design and addressing method presentation.
Findings
The prototype of novel E-commerce platform based on the MCIN shows the effectiveness and soundness of the MCIN modeling. By comparing to current internet, the authors also find that the MCIN has the advantages of socialization, information integration, collective intelligence, traceability, high robustness, unification of producing and consuming, high scalability and decentralization.
Research limitations/implications
Leveraging the dimensions of structure, character, knowledge and experience, a modeling approach of the basic information can fit all kinds of the MCIN nodes. With the double chain structure for both basic and supply–demand information, the MCIN nodes can be modeled comprehensively. The anima-desire-intention-based multi-agent architecture makes the federated agents of the MCIN nodes self-organized and intelligent. The MCIN nodes can be efficiently addressed by the supply–demand-oriented method. However, the implementation of the MCIN is still in process.
Practical implications
This paper lays the theoretical foundation for the future networked system of supply–demand relationship and the novel E-commerce platform.
Originality/value
The authors believe that the MCIN, first proposed in this paper, is a transformational innovation which facilitates the infrastructure of the future networked system of supply–demand relationship.
Details
Keywords
Marwa Mohammad Masood and Md. Mahmudul Haque
Critical digital pedagogy (CDP) is an emerging field in education. The basic tenet of CDP involves taking learners' experiences into account and engaging them in critical thinking…
Abstract
Purpose
Critical digital pedagogy (CDP) is an emerging field in education. The basic tenet of CDP involves taking learners' experiences into account and engaging them in critical thinking about social oppression. With the outbreak of the unprecedented COVID-19 pandemic, CDP has got more currency and appropriacy in the current paradigm shift in learning and teaching.
Design/methodology/approach
This paper scrutinizes different aspects of CDP including its origins, theoretical underpinnings and its implementation in different contexts. It also critically reviews Freire's (1972) problem-posing education and Morris and Stommel's (2017) model of CDP.
Findings
The article proposes a CDP model based on the previous ones, which includes the core concepts and criteria of CDP and focuses on EFL classrooms.
Research limitations/implications
One of the limitations of CDP is gaining the learners' approval in creating an environment of co-constructing knowledge moving away from traditional practices. In addition to that, the use of new media in the classroom can be intimidating for students and stakeholders alike. The lack of logistic support in many rural, remote and underdeveloped contexts cannot be ignored either
Practical implications
The paper provides recommendations for future research in CDP.
Originality/value
Critical pedagogy (CP) is a teaching approach in which the oppressed are basically focused and teachers and learners construct knowledge together. Recently, with the outbreak of the COVID-19 pandemic, global education had to go online. Consequently, traditional teaching and learning had to undergo a paradigm shift. Along with other changes in traditional teaching and learning practices, there has been a significant change in teaching philosophy. This is how the CDP finds its currency in this emerging unprecedented teaching and learning situation.
Details