Search results
1 – 10 of 107
This paper aims to address the limitations of classical deterrence theory in dealing with violent non-state actors (VNSAs).
Abstract
Purpose
This paper aims to address the limitations of classical deterrence theory in dealing with violent non-state actors (VNSAs).
Design/methodology/approach
The study uses qualitative methods.
Findings
It suggests that two measures must be applied; the first one is to rephrase the assumptions of the theory towards a broader definition. The second one is to theorize certain approaches for deterring VNSAs which shall remain a key component in, but not the cornerstone of, national security strategies.
Originality/value
In the aftermath of 9/11 attacks and US war on terrorism, the need arose to “revisit” the “Deterrence Theory” to address several changes such as rogue states, cyber threats and VNSAs, especially after the end of the Cold War, when the theory was originally developed. The recent research on VNSAs relates to the fourth wave of deterrence, which highlights its proper role in a new security environment.
Details
Keywords
This paper aims to examine the regional dynamics that further consolidated Israel’s national security in the Middle East in the aftermath of the Arab Spring, reflecting upon the…
Abstract
Purpose
This paper aims to examine the regional dynamics that further consolidated Israel’s national security in the Middle East in the aftermath of the Arab Spring, reflecting upon the nuclear challenge between Iran and Israel and Iran's expanding activities in the region.
Design/methodology/approach
To prove the central argument, the study uses a conceptual framework that centers on deterrence as the main approach used by states to consolidate their influence in the Middle East region.
Findings
Iran's nuclear progress and influence in the region has strengthened Israel’s security and fostered an unprecedented open rapprochement led by USA efforts with the Gulf regimes.
Originality/value
The paper draws particular attention to the Iran–Israel nuclear competency, and the Israeli preferred policy options regarding Iranian activities in the region amid turbulent Middle East. In addition, the paper offers insight to the regional dynamics that further consolidated Israel’s national security in the region while maintaining a status of Arab vulnerability and backwardness.
Details
Keywords
Richmond Kumi and Richard Kwasi Bannor
The paper aims to examine agrochemical traders’ tax morale in three Ghanaian regions.
Abstract
Purpose
The paper aims to examine agrochemical traders’ tax morale in three Ghanaian regions.
Design/methodology/approach
Primary data were collected from 92 respondents using structured questionnaires. A multistage sampling technique was employed and used in selecting respondents.. Descriptive statistics, factor analysis and quantile regression analysis were used to analyse data obtained via the questionnaires.
Findings
The study found tax reporting knowledge, tax calculating knowledge and tax payment knowledge to be the keen factors influencing agrochemical traders’ tax knowledge. It was also revealed that age, religion and marriage positively influence the tax morale of traders. Inversely, gender, high level of education and monthly sales were found to affect tax morale negatively. Moreover, trust (respect, trustworthiness and expertise knowledge) negatively influenced tax morale. Authorities’ tax knowledge and power (sanction and lockdown) were revealed to impact tax morale positively. However, tax morale decreases amongst agrochemical traders with higher tax morale when sanction increases.
Originality/value
Unlike previous studies which focussed on tax morale amongst individuals and firms outside the agribusiness sector, this study examined the tax morale within the informal agrochemical trading sector, which has recently attracted colossal patronage due to the high usage of agrochemicals amongst farmers in Africa and Ghana. This study also assumed tax morale to be at different levels; hence the factors that affect the morale at different levels differ. Therefore, the study examined the factors influencing tax morale amongst agrochemical traders by segregating tax morale into quartiles. Relating to theory, the economic deterrence theory was used to ground the study, which is not usually used in most tax morale studies.
Details
Keywords
Alexandre Cappellozza, Gustavo Hermínio Salati Marcondes de Moraes, Gilberto Perez and Alessandra Lourenço Simões
This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established…
Abstract
Purpose
This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules.
Design/methodology/approach
The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems.
Findings
The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention.
Research limitations/implications
This research presents a multi-analytical approach that expands the robustness of the results by the complementarity of each analysis technique. In addition, it offers scientific evidence of the factors that reinforce the cognitive processes that involve workers’ decision-making in security breaches.
Practical implications
The practical recommendation is to improve organizational communication to mitigate information security vulnerabilities in several ways, namely, training actions that simulate daily work routines; exposing the consequences of policy violations; disseminating internal newsletters with examples of inappropriate behavior.
Social implications
Results indicate that information security does not depend on the employees’ commitment to the organization; system vulnerabilities can be explored even by employees committed to the companies.
Originality/value
The study expands the knowledge about the individual factors that make information security in companies vulnerable, one of the few in the literature which aims to offer an in-depth perspective on which individual antecedent factors affect the violation of ISP.
Details
Keywords
Over a decade since the Special Criminal Court (SCC) was established in Cameroon, hundreds of individuals have been indicted, tried and convicted. Sentences have been imposed…
Abstract
Purpose
Over a decade since the Special Criminal Court (SCC) was established in Cameroon, hundreds of individuals have been indicted, tried and convicted. Sentences have been imposed, most of which include a term of imprisonment (principal punishment/penalty) and confiscation as accessory penalty or punishment. Research focus has not been directed at the sentences which, as argued in this paper, are inconsistent, incommensurate with the amounts of money stolen and a significant departure from the Penal Code. This paper aims to explore the aspect of sentencing by the SCC.
Design/methodology/approach
To identify, highlight and discuss the issue of sentencing, the paper looks at a blend of primary and secondary materials: primary materials here include but not limited to the judgements of the SCC and other courts in Cameroon and the Penal Code. Secondary materials shall include the works of scholars in the fields of criminal law, criminal justice and penal reform.
Findings
A few findings were made: first, the judges are inconsistent in the manner in which they determine the appropriate sentence. Second, in making that determination, the judges would have been oblivious to the prescripts in the Penal Code, which provides the term of imprisonment, and in the event of a mitigating circumstance, the prescribed minimum to be applied. Yet, the default imposition of an aggravating circumstance (being a civil servant) was not explored by the SCC. Finally, whether the sentences imposed are commensurate with the amounts of monies stolen.
Research limitations/implications
This research unravels key insights into the functioning of the SCC. It advances the knowledge thereon and adds to the literature on corruption in Cameroon.
Practical implications
The prosecution and judges at the SCC should deepen their knowledge of Cameroonian criminal law, especially on the nature of liberty given to judges to determine within the prescribed range of the sentence to be imposed but also consider the existence of an aggravating factor – civil servant. They must also consider whether the sentences imposed befit the crime for which they are convicted.
Originality/value
The paper is an original contribution with new insights on the manner in which sentencing should be approached by the SCC.
Details
Keywords
Michael Olalekan Adeoti, Faridahwati Mohd Shamsudin and AlHamwan Mousa Mohammad
The purpose of the present study was twofold: (1) to examine the direct effect of the dimensions of opportunity (i.e. ethical climate and institutional policy) and dimensions of…
Abstract
Purpose
The purpose of the present study was twofold: (1) to examine the direct effect of the dimensions of opportunity (i.e. ethical climate and institutional policy) and dimensions of job pressure (i.e. workload and work pressure) on workplace deviance (i.e. organisational and interpersonal deviance) and (2) to assess the mediation of neutralisation in the relationship between the dimensions of opportunity, job pressure and workplace deviance.
Design/methodology/approach
The present study drew from the fraud triangle theory (FTT; Cressey, 1950) and the theory of neutralisation (Sykes and Matza, 1957) to achieve the research objectives. Survey data from 356 full-time faculty members in Nigerian public universities were collected. Partial least square-structural equation modelling (PLS-SEM) was employed to analyse the data.
Findings
The results indicated that opportunity and job pressure significantly affected workplace deviance. As expected, neutralisation was found to mediate the negative relationship between ethical climate and interpersonal deviance and the positive relationship between workload, work pressure and interpersonal deviance. Contrary to expectation, neutralisation did not mediate the relationship between opportunity, pressure and organisational deviance.
Research limitations/implications
The sample was drawn from academics in public universities and the cross-sectional nature of this study means that the findings have limited generalisations.
Practical implications
This study offers insights into the management of Nigerian public universities on the need to curb workplace deviance amongst faculty members. This study recommends that the management improve the work environment by enhancing the ethical climate and institutional policies and reviewing the existing workload that may constitute pressure to the faculty members.
Originality/value
The present study provides empirical support for the fraud triangle theory and theory of neutralisation to explain workplace deviance.
Details
Keywords
Linlin Xie, Ting Xu, Tianhao Ju and Bo Xia
The alienation of megaproject environmental responsibility (MER) behavior is destructive, but its mechanism has not been clearly depicted. Based on fraud triangle theory and the…
Abstract
Purpose
The alienation of megaproject environmental responsibility (MER) behavior is destructive, but its mechanism has not been clearly depicted. Based on fraud triangle theory and the fuzzy set qualitative comparative analysis (fsQCA) method, this study explored the combined effect of antecedent factors on alienation of MER behavior.
Design/methodology/approach
Based on the fraud triangle theory and literature review, eight influencing factors associated with the alienation of MER behavior were first identified. Subsequently, the fuzzy-set qualitative comparative analysis was used in this study to reveal configurations influencing alienation of MER behavior.
Findings
The study found nine configurations of MER behavioral alienation antecedent factors, integrated into three types of driving modes, i.e. “economic pressure + learning effect,” “institutional defect + moral rejection,” and “information asymmetry + economic pressure + expectation pressure.”
Originality/value
By analyzing the configuration effects of various induced conditions, this study puts forward a comprehensive analysis framework to solve the alienation of MER behavior in the megaprojects and a practical strategy to control alienation of MER behavior.
Details
Keywords
Kristian Kannelønning and Sokratis K. Katsikas
Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this…
Abstract
Purpose
Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown attacker. Whatever the reason, naïve-, unintentional- or intentional behavior of a member of an organization, the result of an incident can have a considerable impact. A security policy with guidelines for best practices and rules should guide the behavior of the organization’s members. However, this is often not the case. This paper aims to provide answers to how cybersecurity-related behavior is assessed.
Design/methodology/approach
Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. The SLR initially identified 2,153 articles, and the paper reviews and reports on 26 articles.
Findings
The assessment of cybersecurity-related behavior can be classified into three components, namely, data collection, measurement scale and analysis. The findings show that subjective measurements from self-assessment questionnaires are the most frequently used method. Measurement scales are often composed based on existing literature and adapted by the researchers. Partial least square analysis is the most frequently used analysis technique. Even though useful insight and noteworthy findings regarding possible differences between manager and employee behavior have appeared in some publications, conclusive answers to whether such differences exist cannot be drawn.
Research limitations/implications
Research gaps have been identified, that indicate areas of interest for future work. These include the development and employment of methods for reducing subjectivity in the assessment of cybersecurity-related behavior.
Originality/value
To the best of the authors’ knowledge, this is the first SLR on how cybersecurity-related behavior can be assessed. The SLR analyzes relevant publications and identifies current practices as well as their shortcomings, and outlines gaps that future research may bridge.
Details
Keywords
Elham Rostami, Fredrik Karlsson and Ella Kolkowska
The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…
Abstract
Purpose
The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about.
Design/methodology/approach
The results are based on a literature review of ISP management research published between 1990 and 2017.
Findings
Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.
Research limitations/implications
Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.
Practical implications
The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.
Originality/value
Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.
Details
Keywords
Stef Schinagl and Abbas Shahim
This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate…
Abstract
Purpose
This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate and the current body of knowledge on ISG.
Design/methodology/approach
The intention of the authors was to conduct a systematic literature review. However, owing to limited empirical papers in ISG research, this paper is more conceptually organised.
Findings
This paper shows that security has shifted from a narrow-focused isolated issue towards a strategic business issue with “from the basement to the boardroom” implications. The key takeaway is that protecting the organisation is important, but organizations must also develop strategies to ensure resilient businesses to take advantage of the opportunities that digitalization can bring.
Research limitations/implications
The concept of DSG is a new research territory that addresses the limitations and gaps of traditional ISG approaches in a digital context. To this extent, organisational theories are suggested to help build knowledge that offers a deeper understanding than that provided by the too often used practical approaches in ISG research.
Practical implications
This paper supports practitioners and decision makers by providing a deeper understanding of how organisations and their security approaches are actually affected by digitalisation.
Social implications
This paper helps individuals to understand that they have increasing rights with regard to privacy and security and a say in what parties they assign business to.
Originality/value
This paper makes a novel contribution to ISG research. To the authors’ knowledge, this is the first attempt to review and structure the ISG literature.
Details