Search results

1 – 10 of 163
Open Access
Article
Publication date: 3 November 2022

Godwin Thomas and Mary-Jane Sule

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…

1737

Abstract

Purpose

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.

Design/methodology/approach

Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.

Findings

Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.

Originality/value

This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2281

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Open Access
Article
Publication date: 16 July 2019

Jinghuan Zhang, Shan Wang, Wenfeng Zheng and Lei Wang

By drawing on the research paradigm of collective action that occurs in physical space, the present study aims to explore the antecedent predictors of network social mobilization…

1031

Abstract

Purpose

By drawing on the research paradigm of collective action that occurs in physical space, the present study aims to explore the antecedent predictors of network social mobilization – feeling of injustice – and discuss the emotional mechanism of this prediction: mediating effect of anger and resentment.

Design/methodology/approach

Micro-blog postings about network social mobilization were collected to develop the dictionary of codes of fairness, anger and resentment. Then, according to the dictionary, postings on Sina Weibo were coded and analyzed.

Findings

The feeling of injustice predicted network social mobilization directly. The predictive value was 27% and 33%, respectively during two analyses. The feeling of injustice also predicted social mobilization indirectly via anger and resentment. In other words, anger and resentment account for the active mechanism in which the feeling of injustice predicts network social mobilization. Mediating effect value was 29.63% and 33.33% respectively.

Research limitations/implications

This study is our first exploration to use python language to collect data from human natural language pointing on micro-blog, a large number of comments of netizen about certain topic were crawled, but a small portion of the comments could be coded into analyzable data, which results in a doubt of the reliability of the study. Therefore, we should put the established model under further testing.

Practical implications

In the cyberspace, this study confirms the mechanism of network social mobilization, expands and enriches the research on social mobilization and deepens the understanding of social mobilization.

Social implications

This study provides an empirical evidence to understand the network social mobilization, and it gives us the clue to control the process of network social mobilization.

Originality/value

This study uses the Python language to write Web crawlers to obtain microblog data and analyze the microblog content for word segmentation and matching thesaurus. It has certain innovation.

Details

International Journal of Crowd Science, vol. 3 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 3 November 2022

Wenlong Han

To realise the shared development of the digital economy, people need to transcend the capital logic and advocate the logic of cooperative development, i.e. “co-construction…

Abstract

Purpose

To realise the shared development of the digital economy, people need to transcend the capital logic and advocate the logic of cooperative development, i.e. “co-construction, benefit-sharing and co-governance”. This study aims to discuss the aforementioned statement.

Design/methodology/approach

Platform economy is a new economic form produced by the transformation of the social production patterns in the era of digital capitalism. In the neo-imperialist stage, a new stage of capitalist development, capital logic promotes the global expansion of the platform economy and influences its development process, organisational form, contradictions and dilemmas and internal transcendence. Having the spatiotemporal chain of capital circulation repaired, the globalisation of the platform economy is reshaping how the means of production are combined with labour, affecting the local changes in the general relations of production and “international relations of production”.

Findings

In the accumulation of digital capitalism, the social contradictions and fundamental contradictions in the capitalist world have been further intensified, making exploitation, income distribution gap, monopoly and other problems increasingly severe. The imbalance and inequality in the global development of the digital economy are increasingly prominent.

Originality/value

Regarding the global governance of the digital economy, China, as a major responsible country, will strive to encourage all countries to co-build a community with a shared future in cyberspace. In the new international development pattern of digital economy globalisation, China must take effective measures to actively safeguard its national security and development interests to meet specific challenges.

Details

China Political Economy, vol. 5 no. 1
Type: Research Article
ISSN: 2516-1652

Keywords

Open Access
Article
Publication date: 9 August 2022

Feng Yang, Shan Zhao and Xiaoqian Zhang

China’s globalizing Internet describes a situation where China is using the Internet as a tool or medium to transmit its voice on the world stage and enhance its influence over…

Abstract

Purpose

China’s globalizing Internet describes a situation where China is using the Internet as a tool or medium to transmit its voice on the world stage and enhance its influence over the global Internet governance system and the global digitalization process. Several concerns, however, exist regarding China’s globalizing Internet strategies. This paper aims to respond to these concerns and enhance the understanding of China’s globalizing Internet strategies.

Design/methodology/approach

This paper will use content analysis to trace the policy development trajectory of China’s globalizing Internet, including policy vision, policy-making agencies and policy tools.

Findings

The Chinese government has issued a considerable number of policies to regulate and promote the development of the Internet since 2014. The key trend that emerged from the analysis of China’s globalizing Internet policy is the cooperation among different agencies. Existing policies have comprehensively used the supply-oriented tools, the environment-oriented tools and the demand-oriented tools; and the last two tools have been used more frequently in recent years.

Originality/value

The analysis results contribute to understanding how China uses digital technology to enhance its influence over the global Internet governance system.

Details

Digital Transformation and Society, vol. 1 no. 2
Type: Research Article
ISSN: 2755-0761

Keywords

Open Access
Article
Publication date: 12 June 2017

Yadong Huang, Yueting Chai, Yi Liu and Xiang Gu

The purpose of this paper is to study the architecture of holographic personalized portal, user modeling, commodity modeling and intelligent interaction.

1194

Abstract

Purpose

The purpose of this paper is to study the architecture of holographic personalized portal, user modeling, commodity modeling and intelligent interaction.

Design/methodology/approach

In this paper, the authors propose crowd-science industrial ecological system based on holographic personalized portal and its interaction. The holographic personality portal is based on holographic enterprises, commodities and consumers, and the personalized portal consists of accurate ontology, reliable supply, intelligent demand and smart cyberspace.

Findings

The personalized portal can realize the information acquisition, characteristic analysis and holographic presentation. Then, the intelligent interaction, e.g. demand decomposition, personalized search, personalized presentation and demand prediction, will be implemented within the personalized portal.

Originality/value

The authors believe that their work on intelligent interaction based on holographic personalized portal, which has been first proposed in this paper, is innovation focusing on the interaction between intelligence and convenience.

Details

International Journal of Crowd Science, vol. 1 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 20 July 2023

Martina Neri, Federico Niccolini and Luigi Martino

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…

2175

Abstract

Purpose

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known characteristics, the cybersecurity phenomenon goes beyond the detection of technological impacts, and encompasses all the dimensions of an organization. This study thus focusses on an additional set of organizational elements. The key elements of cybersecurity organizational readiness depicted here are cybersecurity awareness, cybersecurity culture and cybersecurity organizational resilience (OR). This study aims to qualitatively assess small and medium enterprises’ (SMEs) overall level of organizational cybersecurity readiness.

Design/methodology/approach

This study focused on conducting a cybersecurity organizational readiness assessment using a sample of 53 Italian SMEs from the information and communication technology sector. Informed mixed method research, this study was conducted consistent with the principles of the explanatory sequential mixed method design, and adopting a quanti-qualitative methodology. The quantitative data were collected through a questionnaire. Qualitative data were subsequently collected through semi-structured interviews.

Findings

Although many elements of the technical aspects of cybersecurity OR have yielded very encouraging results, there are still some areas that require improvement. These include those facets that constitute the foundation of cybersecurity awareness, and, thus, a cybersecurity culture. This result highlights that the areas in need of improvement are exactly those that are most important in fighting against cyber threats via organizational cybersecurity readiness.

Originality/value

Although the importance of SMEs is obvious, evidence of such organizations’ attitudes to cybersecurity are still limited. This research is an attempt to depict the organizational issue related to cybersecurity, i.e. overall cybersecurity organizational readiness.

Open Access
Article
Publication date: 6 March 2017

Jianping Shen, Yadong Huang and Yueting Chai

This paper aims to study the node modeling, multi-agent architecture and addressing method for the material conscious information network (MCIN), which is a large-scaled…

1658

Abstract

Purpose

This paper aims to study the node modeling, multi-agent architecture and addressing method for the material conscious information network (MCIN), which is a large-scaled, open-styled, self-organized and ecological intelligent network of supply–demand relationships.

Design/methodology/approach

This study models the MCIN by node model definition, multi-agent architecture design and addressing method presentation.

Findings

The prototype of novel E-commerce platform based on the MCIN shows the effectiveness and soundness of the MCIN modeling. By comparing to current internet, the authors also find that the MCIN has the advantages of socialization, information integration, collective intelligence, traceability, high robustness, unification of producing and consuming, high scalability and decentralization.

Research limitations/implications

Leveraging the dimensions of structure, character, knowledge and experience, a modeling approach of the basic information can fit all kinds of the MCIN nodes. With the double chain structure for both basic and supply–demand information, the MCIN nodes can be modeled comprehensively. The anima-desire-intention-based multi-agent architecture makes the federated agents of the MCIN nodes self-organized and intelligent. The MCIN nodes can be efficiently addressed by the supply–demand-oriented method. However, the implementation of the MCIN is still in process.

Practical implications

This paper lays the theoretical foundation for the future networked system of supply–demand relationship and the novel E-commerce platform.

Originality/value

The authors believe that the MCIN, first proposed in this paper, is a transformational innovation which facilitates the infrastructure of the future networked system of supply–demand relationship.

Details

International Journal of Crowd Science, vol. 1 no. 1
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 7 July 2021

Marwa Mohammad Masood and Md. Mahmudul Haque

Critical digital pedagogy (CDP) is an emerging field in education. The basic tenet of CDP involves taking learners' experiences into account and engaging them in critical thinking…

3041

Abstract

Purpose

Critical digital pedagogy (CDP) is an emerging field in education. The basic tenet of CDP involves taking learners' experiences into account and engaging them in critical thinking about social oppression. With the outbreak of the unprecedented COVID-19 pandemic, CDP has got more currency and appropriacy in the current paradigm shift in learning and teaching.

Design/methodology/approach

This paper scrutinizes different aspects of CDP including its origins, theoretical underpinnings and its implementation in different contexts. It also critically reviews Freire's (1972) problem-posing education and Morris and Stommel's (2017) model of CDP.

Findings

The article proposes a CDP model based on the previous ones, which includes the core concepts and criteria of CDP and focuses on EFL classrooms.

Research limitations/implications

One of the limitations of CDP is gaining the learners' approval in creating an environment of co-constructing knowledge moving away from traditional practices. In addition to that, the use of new media in the classroom can be intimidating for students and stakeholders alike. The lack of logistic support in many rural, remote and underdeveloped contexts cannot be ignored either

Practical implications

The paper provides recommendations for future research in CDP.

Originality/value

Critical pedagogy (CP) is a teaching approach in which the oppressed are basically focused and teachers and learners construct knowledge together. Recently, with the outbreak of the COVID-19 pandemic, global education had to go online. Consequently, traditional teaching and learning had to undergo a paradigm shift. Along with other changes in traditional teaching and learning practices, there has been a significant change in teaching philosophy. This is how the CDP finds its currency in this emerging unprecedented teaching and learning situation.

Details

Saudi Journal of Language Studies, vol. 1 no. 1
Type: Research Article
ISSN: 2634-243X

Keywords

1 – 10 of 163