Search results

1 – 10 of 29
Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1020

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 2 May 2024

Amanuel Elias

Racism occurs in many ways and varies across countries, evolving and adapting to sociocultural history, as well as contemporary economic, political and technological changes. This…

Abstract

Racism occurs in many ways and varies across countries, evolving and adapting to sociocultural history, as well as contemporary economic, political and technological changes. This chapter discusses the multilevel dimensions of racism and its diverse manifestations across multiracial societies. It examines how different aspects of racism are mediated interpersonally, and embedded in institutions, social structures and processes, that produce and sustain racial inequities in power, resources and lived experiences. Furthermore, this chapter explores the direct and indirect ways racism is expressed in online and offline platforms and details its impacts on various groups based on their intersecting social and cultural identities. Targets of racism are those who primarily bear the adverse effects. However, racism also affects its perpetrators in many ways, including by limiting their social relations and attachments, and by imposing social and economic costs. This chapter thus analyses the many aspects of racism both from targets and perpetrators' perspectives.

Details

Racism and Anti-Racism Today
Type: Book
ISBN: 978-1-83753-512-5

Keywords

Book part
Publication date: 26 April 2024

Floyd D. Beachum and Yalitza Corcino-Davis

The evolution and trends of special education and educational leadership are evident, especially in recent years. The former has strived to provide equitable educational…

Abstract

The evolution and trends of special education and educational leadership are evident, especially in recent years. The former has strived to provide equitable educational opportunities to students with disabilities. The latter has dealt with how people in positions of authority in K-12 schools create policy, use resources, and influence other people to achieve educational goals. Together, these notions constitute an idea that school leaders and administrators can provide insight, oversight, assistance, and guidance toward creating educational environments for students with and without disabilities. This chapter examines the current state of special education and educational leadership by exploring the evolution of special education, relevant legal cases, and the enactment of inclusive education. Furthermore, this chapter addresses contemporary issues for leaders, such as the influence of the COVID-19 pandemic, while dealing with special education and the increasing pressure from families for equity for students with disabilities.

Details

Special Education
Type: Book
ISBN: 978-1-83753-467-8

Keywords

Book part
Publication date: 26 April 2024

Frederick J. Brigham, Christopher Claude, Jason Chow, Colleen Lloyd Eddy, Nicholas Gage and John William McKenna

Four reputed leaders for the coming years in the field of special education for individuals with emotional and behavioral disorders (EBD) each with a slightly different…

Abstract

Four reputed leaders for the coming years in the field of special education for individuals with emotional and behavioral disorders (EBD) each with a slightly different perspective on the field were asked to respond independently to a prompt asking what does special education mean for students with EBD and what is being done and how do we maintain tradition? The contributors' responses to the prompt are presented and then summarized across the essays. A remarkable consistency emerges across the independent essays. In addition to the tradition of providing a free and appropriate education in the least restrictive environment, the contributors identify needs to support teachers serving this population. Needs in teacher training and the expertise required to meet the needs of individuals with EBD are outlined as well as potential contributions of technology to carry out specific tasks. We conclude with a call for increased advocacy for use of the knowledge that we currently possess and that which will soon be discovered to support students with EBD as well as their teachers. We also note that the contributors' names are listed alphabetically to acknowledge the equality of each person to the final product.

Article
Publication date: 24 April 2024

Jan Mei Soon-Sinclair, Rounaq Nayak and Louise Manning

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used…

Abstract

Purpose

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used linear approaches to examine the root causes of the melamine milk scandal.

Design/methodology/approach

In the present study, we applied a systems approach to the melamine milk scandal to identify the complex systems-level failures across the supply chain leading to the incident and why food fraud incidents such as this occurred in the dairy sector. Additionally, systemic failures associated with food fraud vulnerability factors were considered (i.e. opportunities, motivation and control measures).

Findings

48 contributory factors of influence were identified and grouped across six sociotechnical levels across the Chinese dairy system, from government to equipment and surroundings. Lack of vertical integration (processes and communication) contributed to the failure. When viewed from a broader perspective, the melamine milk scandal can be linked to a series of human errors and organisational issues associated with government bodies, the dairy supply chain, individual organisations and management decisions and individual actions of staff or processes.

Practical implications

This approach is of value to policymakers and the industry as it supports public health investigations of food fraud incidents and proactive food safety management.

Originality/value

To the best of our knowledge, this is the first study to analyse a food safety or fraud incident using the AcciMap approach and the food fraud vulnerability assessment (FFVA) technique. AcciMap analysis is applied to both unintentional and intentional aspects of the incident.

Details

British Food Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0007-070X

Keywords

Book part
Publication date: 2 May 2024

Amanuel Elias

Anti-racism has been practiced in various ways, with varying degrees of effectiveness. This chapter engages with the body of scholarship that focuses on approaches aimed at…

Abstract

Anti-racism has been practiced in various ways, with varying degrees of effectiveness. This chapter engages with the body of scholarship that focuses on approaches aimed at promoting anti-racist actions, policies and social change. It discusses some of the main anti-racism strategies that have been deployed across different countries and examines anti-racism practices in interpersonal, intergroup and community settings. These approaches encompass civil rights campaigns, legislative and policy interventions, affirmative action, diversity and inclusion training, prejudice reduction, intergroup contact, organisational development and holistic anti-racism approaches. Some anti-racism practices and policies, such as awareness campaigns, social marketing and diversity training, also extend to digital platforms, with social media and multimedia networks deployed to broaden the reach and impact of anti-racist endeavours. This chapter specifically engages with local anti-racism movements and draws principles for broader implementation of anti-racism policy and practice. It concludes with a brief discussion of the effectiveness of contemporary anti-racism approaches.

Details

Racism and Anti-Racism Today
Type: Book
ISBN: 978-1-83753-512-5

Keywords

Open Access
Article
Publication date: 8 February 2024

Ana Isabel Lopes, Edward C. Malthouse, Nathalie Dens and Patrick De Pelsmacker

Engaging in webcare, i.e. responding to online reviews, can positively affect consumer attitudes, intentions and behavior. Research is often scarce or inconsistent regarding the…

Abstract

Purpose

Engaging in webcare, i.e. responding to online reviews, can positively affect consumer attitudes, intentions and behavior. Research is often scarce or inconsistent regarding the effects of specific webcare strategies on business performance. Therefore, this study tests whether and how several webcare strategies affect hotel bookings.

Design/methodology/approach

We apply machine learning classifiers to secondary data (webcare messages) to classify webcare variables to be included in a regression analysis looking at the effect of these strategies on hotel bookings while controlling for possible confounds such as seasonality and hotel-specific effects.

Findings

The strategies that have a positive effect on bookings are directing reviewers to a private channel, being defensive, offering compensation and having managers sign the response. Webcare strategies to be avoided are apologies, merely asking for more information, inviting customers for another visit and adding informal non-verbal cues. Strategies that do not appear to affect future bookings are expressing gratitude, personalizing and having staff members (rather than managers) sign webcare.

Practical implications

These findings help managers optimize their webcare strategy for better business results and develop automated webcare.

Originality/value

We look into several commonly used and studied webcare strategies that affect actual business outcomes, being that most previous research studies are experimental or look into a very limited set of strategies.

Details

Journal of Service Management, vol. 35 no. 6
Type: Research Article
ISSN: 1757-5818

Keywords

1 – 10 of 29