Search results

1 – 10 of 79
Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 12 June 2023

Mark Anthony Camilleri

Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking…

Abstract

Purpose

Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking forward to using Metaverse applications, as they want to benefit from its immersive three-dimensional capabilities. Therefore, the purpose of this study is to critically review the extant literature to investigate how, why, where and when the Metaverse can be used for educational purposes. This study also discusses opportunities, challenges and risks related to this disruptive technology.

Design/methodology/approach

A Preferred Reporting Items for Systematic Reviews and Meta-Analyses rigorous protocol is used to search, extract, scrutinize and synthesize content from high-impact articles focused on the use of the Metaverse technology in the realms of education. Afterwards, this study theorizes on the costs and benefits of using this interactive technology with students.

Findings

A number of researchers are already experimenting with virtual technologies that are very similar to the Metaverse, in different contexts. This research indicates that most students are lured by immersive multi-sensory three-dimensional environments as well as by virtual reality applications that could simulate real-life situations and provide engaging experiences with virtual representations of people, places and objects. On the other hand, this study reveals that educators ought to consider the potential pitfalls of the Metaverse, including privacy breaches and security risks, as well as possible addictions and the development of mental health issues, among others.

Practical implications

Students and educators can use the Metaverse to catapult themselves in a simulated digital universe that could reconfigure their sensory inputs, definitions of space, time and points of access to information. This research calls for the development of regulatory instruments, including sound principles, guidelines and procedures that are intended to safeguard and protect Metaverse users.

Originality/value

This contribution implies that there is scope for educators to continue developing the Metaverse’s virtual spaces to improve their students’ motivations, aptitudes and learning outcomes. This study clarifies that the use of the Metaverse in education can create infinite possibilities to enhance their knowledge, competences and abilities through its immersive applications. Yet this paper also raises awareness about possible challenges in the short term as well on other risks associated to the prolonged use of this captivating technology.

Details

Interactive Technology and Smart Education, vol. 21 no. 2
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 29 February 2024

Jeroen van der Heijden

By providing an overview of the existing knowledge on public governance in the context of Construction 4.0, this review serves as a valuable resource for researchers, policymakers…

Abstract

Purpose

By providing an overview of the existing knowledge on public governance in the context of Construction 4.0, this review serves as a valuable resource for researchers, policymakers and practitioners interested in understanding the current state of public governance in the context of Construction 4.0 and identifying avenues for future research and practical implementation.

Design/methodology/approach

This article presents a systematic and comprehensive review of the academic literature on public governance in the context of Construction 4.0. To ensure a systematic and rigorous selection of source material, the study adopts the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines.

Findings

By examining a wide range of scholarly works, the review identifies and discusses eight recurring themes that are crucial for understanding the role of public governance in Construction 4.0. These themes include policy and regulation, infrastructure and investment, skill development and education, digital inclusion and access, collaboration and partnerships, data governance and privacy, interactions with environmental and societal goals and the impact of Construction 4.0 on public governance itself. The review highlights a significant disparity between the normative debates on the importance of public governance in Construction 4.0 and the empirical knowledge available regarding its practical implementation. While the literature emphasizes the need for effective governance mechanisms to address the challenges and opportunities presented by Construction 4.0, there is a notable lack of empirical research examining the actual implementation and outcomes of public governance strategies.

Originality/value

This is the first systematic review of academic literature on public governance in the context of Construction 4.0.

Details

Smart and Sustainable Built Environment, vol. 13 no. 3
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 18 April 2024

Ahmad Samed Al-Adwan

The primary objective of this study is to explore consumers' non-adoption intentions towards meta-commerce (or metaverse retailing). Utilizing the Innovation Resistance Theory…

Abstract

Purpose

The primary objective of this study is to explore consumers' non-adoption intentions towards meta-commerce (or metaverse retailing). Utilizing the Innovation Resistance Theory (IRT) as the theoretical foundation, this study investigates the impact of diverse barriers on non-adoption intentions within the meta-commerce context.

Design/methodology/approach

A total of 356 responses were gathered to test the proposed hypotheses. Structural Equation Modelling (SEM) with SmartPLS 4 software was used to examine these hypotheses.

Findings

The findings of this study show that perceived cyber risk, perceived regulatory uncertainty, perceived switching cost and perceived technical uncertainty are significantly linked to non-adoption intention towards meta-commerce. Furthermore, the study suggests that the moderating influence of technostress on these connections is more pronounced for consumers with high technostress compared to those with low technostress.

Originality/value

This study makes a significant contribution to the current body of literature by providing valuable insights into the fundamental barriers that consumers encounter when contemplating the adoption of meta-commerce. This contribution is particularly noteworthy as it fills a gap in the existing literature, as no prior study has comprehensively examined the primary obstacles that shape consumer intentions towards meta-commerce adoption. This novel perspective offers scholars, businesses and policymakers a foundation for developing strategies to address these barriers effectively.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1033

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 25 April 2024

Mojtaba Rezaei, Marco Pironti and Roberto Quaglia

This study aims to identify and assess the key ethical challenges associated with integrating artificial intelligence (AI) in knowledge-sharing (KS) practices and their…

Abstract

Purpose

This study aims to identify and assess the key ethical challenges associated with integrating artificial intelligence (AI) in knowledge-sharing (KS) practices and their implications for decision-making (DM) processes within organisations.

Design/methodology/approach

The study employs a mixed-methods approach, beginning with a comprehensive literature review to extract background information on AI and KS and to identify potential ethical challenges. Subsequently, a confirmatory factor analysis (CFA) is conducted using data collected from individuals employed in business settings to validate the challenges identified in the literature and assess their impact on DM processes.

Findings

The findings reveal that challenges related to privacy and data protection, bias and fairness and transparency and explainability are particularly significant in DM. Moreover, challenges related to accountability and responsibility and the impact of AI on employment also show relatively high coefficients, highlighting their importance in the DM process. In contrast, challenges such as intellectual property and ownership, algorithmic manipulation and global governance and regulation are found to be less central to the DM process.

Originality/value

This research contributes to the ongoing discourse on the ethical challenges of AI in knowledge management (KM) and DM within organisations. By providing insights and recommendations for researchers, managers and policymakers, the study emphasises the need for a holistic and collaborative approach to harness the benefits of AI technologies whilst mitigating their associated risks.

Details

Management Decision, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 79