Search results

1 – 10 of 107
Open Access
Article
Publication date: 11 June 2019

Raghda Elbahy

This paper aims to address the limitations of classical deterrence theory in dealing with violent non-state actors (VNSAs).

8807

Abstract

Purpose

This paper aims to address the limitations of classical deterrence theory in dealing with violent non-state actors (VNSAs).

Design/methodology/approach

The study uses qualitative methods.

Findings

It suggests that two measures must be applied; the first one is to rephrase the assumptions of the theory towards a broader definition. The second one is to theorize certain approaches for deterring VNSAs which shall remain a key component in, but not the cornerstone of, national security strategies.

Originality/value

In the aftermath of 9/11 attacks and US war on terrorism, the need arose to “revisit” the “Deterrence Theory” to address several changes such as rogue states, cyber threats and VNSAs, especially after the end of the Cold War, when the theory was originally developed. The recent research on VNSAs relates to the fourth wave of deterrence, which highlights its proper role in a new security environment.

Open Access
Article
Publication date: 14 March 2020

Nora Maher

This paper aims to examine the regional dynamics that further consolidated Israel’s national security in the Middle East in the aftermath of the Arab Spring, reflecting upon the…

7805

Abstract

Purpose

This paper aims to examine the regional dynamics that further consolidated Israel’s national security in the Middle East in the aftermath of the Arab Spring, reflecting upon the nuclear challenge between Iran and Israel and Iran's expanding activities in the region.

Design/methodology/approach

To prove the central argument, the study uses a conceptual framework that centers on deterrence as the main approach used by states to consolidate their influence in the Middle East region.

Findings

Iran's nuclear progress and influence in the region has strengthened Israel’s security and fostered an unprecedented open rapprochement led by USA efforts with the Gulf regimes.

Originality/value

The paper draws particular attention to the Iran–Israel nuclear competency, and the Israeli preferred policy options regarding Iranian activities in the region amid turbulent Middle East. In addition, the paper offers insight to the regional dynamics that further consolidated Israel’s national security in the region while maintaining a status of Arab vulnerability and backwardness.

Details

Review of Economics and Political Science, vol. 8 no. 3
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 6 January 2023

Richmond Kumi and Richard Kwasi Bannor

The paper aims to examine agrochemical traders’ tax morale in three Ghanaian regions.

1441

Abstract

Purpose

The paper aims to examine agrochemical traders’ tax morale in three Ghanaian regions.

Design/methodology/approach

Primary data were collected from 92 respondents using structured questionnaires. A multistage sampling technique was employed and used in selecting respondents.. Descriptive statistics, factor analysis and quantile regression analysis were used to analyse data obtained via the questionnaires.

Findings

The study found tax reporting knowledge, tax calculating knowledge and tax payment knowledge to be the keen factors influencing agrochemical traders’ tax knowledge. It was also revealed that age, religion and marriage positively influence the tax morale of traders. Inversely, gender, high level of education and monthly sales were found to affect tax morale negatively. Moreover, trust (respect, trustworthiness and expertise knowledge) negatively influenced tax morale. Authorities’ tax knowledge and power (sanction and lockdown) were revealed to impact tax morale positively. However, tax morale decreases amongst agrochemical traders with higher tax morale when sanction increases.

Originality/value

Unlike previous studies which focussed on tax morale amongst individuals and firms outside the agribusiness sector, this study examined the tax morale within the informal agrochemical trading sector, which has recently attracted colossal patronage due to the high usage of agrochemicals amongst farmers in Africa and Ghana. This study also assumed tax morale to be at different levels; hence the factors that affect the morale at different levels differ. Therefore, the study examined the factors influencing tax morale amongst agrochemical traders by segregating tax morale into quartiles. Relating to theory, the economic deterrence theory was used to ground the study, which is not usually used in most tax morale studies.

Details

Arab Gulf Journal of Scientific Research, vol. 41 no. 3
Type: Research Article
ISSN: 1985-9899

Keywords

Open Access
Article
Publication date: 17 December 2021

Alexandre Cappellozza, Gustavo Hermínio Salati Marcondes de Moraes, Gilberto Perez and Alessandra Lourenço Simões

This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established…

Abstract

Purpose

This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules.

Design/methodology/approach

The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intelligence with neural networks, based on information collected from 318 workers of organizational information systems.

Findings

The model provides a reasonable prediction regarding the intention to violate information security policies (ISP). The results revealed that the relationships of moral disengagement and perceived penalty significantly influence such an intention.

Research limitations/implications

This research presents a multi-analytical approach that expands the robustness of the results by the complementarity of each analysis technique. In addition, it offers scientific evidence of the factors that reinforce the cognitive processes that involve workers’ decision-making in security breaches.

Practical implications

The practical recommendation is to improve organizational communication to mitigate information security vulnerabilities in several ways, namely, training actions that simulate daily work routines; exposing the consequences of policy violations; disseminating internal newsletters with examples of inappropriate behavior.

Social implications

Results indicate that information security does not depend on the employees’ commitment to the organization; system vulnerabilities can be explored even by employees committed to the companies.

Originality/value

The study expands the knowledge about the individual factors that make information security in companies vulnerable, one of the few in the literature which aims to offer an in-depth perspective on which individual antecedent factors affect the violation of ISP.

Open Access
Article
Publication date: 28 March 2023

Avitus Agbor Agbor

Over a decade since the Special Criminal Court (SCC) was established in Cameroon, hundreds of individuals have been indicted, tried and convicted. Sentences have been imposed…

Abstract

Purpose

Over a decade since the Special Criminal Court (SCC) was established in Cameroon, hundreds of individuals have been indicted, tried and convicted. Sentences have been imposed, most of which include a term of imprisonment (principal punishment/penalty) and confiscation as accessory penalty or punishment. Research focus has not been directed at the sentences which, as argued in this paper, are inconsistent, incommensurate with the amounts of money stolen and a significant departure from the Penal Code. This paper aims to explore the aspect of sentencing by the SCC.

Design/methodology/approach

To identify, highlight and discuss the issue of sentencing, the paper looks at a blend of primary and secondary materials: primary materials here include but not limited to the judgements of the SCC and other courts in Cameroon and the Penal Code. Secondary materials shall include the works of scholars in the fields of criminal law, criminal justice and penal reform.

Findings

A few findings were made: first, the judges are inconsistent in the manner in which they determine the appropriate sentence. Second, in making that determination, the judges would have been oblivious to the prescripts in the Penal Code, which provides the term of imprisonment, and in the event of a mitigating circumstance, the prescribed minimum to be applied. Yet, the default imposition of an aggravating circumstance (being a civil servant) was not explored by the SCC. Finally, whether the sentences imposed are commensurate with the amounts of monies stolen.

Research limitations/implications

This research unravels key insights into the functioning of the SCC. It advances the knowledge thereon and adds to the literature on corruption in Cameroon.

Practical implications

The prosecution and judges at the SCC should deepen their knowledge of Cameroonian criminal law, especially on the nature of liberty given to judges to determine within the prescribed range of the sentence to be imposed but also consider the existence of an aggravating factor – civil servant. They must also consider whether the sentences imposed befit the crime for which they are convicted.

Originality/value

The paper is an original contribution with new insights on the manner in which sentencing should be approached by the SCC.

Open Access
Article
Publication date: 2 October 2020

Michael Olalekan Adeoti, Faridahwati Mohd Shamsudin and AlHamwan Mousa Mohammad

The purpose of the present study was twofold: (1) to examine the direct effect of the dimensions of opportunity (i.e. ethical climate and institutional policy) and dimensions of…

3361

Abstract

Purpose

The purpose of the present study was twofold: (1) to examine the direct effect of the dimensions of opportunity (i.e. ethical climate and institutional policy) and dimensions of job pressure (i.e. workload and work pressure) on workplace deviance (i.e. organisational and interpersonal deviance) and (2) to assess the mediation of neutralisation in the relationship between the dimensions of opportunity, job pressure and workplace deviance.

Design/methodology/approach

The present study drew from the fraud triangle theory (FTT; Cressey, 1950) and the theory of neutralisation (Sykes and Matza, 1957) to achieve the research objectives. Survey data from 356 full-time faculty members in Nigerian public universities were collected. Partial least square-structural equation modelling (PLS-SEM) was employed to analyse the data.

Findings

The results indicated that opportunity and job pressure significantly affected workplace deviance. As expected, neutralisation was found to mediate the negative relationship between ethical climate and interpersonal deviance and the positive relationship between workload, work pressure and interpersonal deviance. Contrary to expectation, neutralisation did not mediate the relationship between opportunity, pressure and organisational deviance.

Research limitations/implications

The sample was drawn from academics in public universities and the cross-sectional nature of this study means that the findings have limited generalisations.

Practical implications

This study offers insights into the management of Nigerian public universities on the need to curb workplace deviance amongst faculty members. This study recommends that the management improve the work environment by enhancing the ethical climate and institutional policies and reviewing the existing workload that may constitute pressure to the faculty members.

Originality/value

The present study provides empirical support for the fraud triangle theory and theory of neutralisation to explain workplace deviance.

Details

European Journal of Management and Business Economics, vol. 30 no. 2
Type: Research Article
ISSN: 2444-8451

Keywords

Open Access
Article
Publication date: 15 April 2022

Linlin Xie, Ting Xu, Tianhao Ju and Bo Xia

The alienation of megaproject environmental responsibility (MER) behavior is destructive, but its mechanism has not been clearly depicted. Based on fraud triangle theory and the…

1521

Abstract

Purpose

The alienation of megaproject environmental responsibility (MER) behavior is destructive, but its mechanism has not been clearly depicted. Based on fraud triangle theory and the fuzzy set qualitative comparative analysis (fsQCA) method, this study explored the combined effect of antecedent factors on alienation of MER behavior.

Design/methodology/approach

Based on the fraud triangle theory and literature review, eight influencing factors associated with the alienation of MER behavior were first identified. Subsequently, the fuzzy-set qualitative comparative analysis was used in this study to reveal configurations influencing alienation of MER behavior.

Findings

The study found nine configurations of MER behavioral alienation antecedent factors, integrated into three types of driving modes, i.e. “economic pressure + learning effect,” “institutional defect + moral rejection,” and “information asymmetry + economic pressure + expectation pressure.”

Originality/value

By analyzing the configuration effects of various induced conditions, this study puts forward a comprehensive analysis framework to solve the alienation of MER behavior in the megaprojects and a practical strategy to control alienation of MER behavior.

Details

Engineering, Construction and Architectural Management, vol. 30 no. 7
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 20 April 2023

Kristian Kannelønning and Sokratis K. Katsikas

Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this…

5733

Abstract

Purpose

Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown attacker. Whatever the reason, naïve-, unintentional- or intentional behavior of a member of an organization, the result of an incident can have a considerable impact. A security policy with guidelines for best practices and rules should guide the behavior of the organization’s members. However, this is often not the case. This paper aims to provide answers to how cybersecurity-related behavior is assessed.

Design/methodology/approach

Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. The SLR initially identified 2,153 articles, and the paper reviews and reports on 26 articles.

Findings

The assessment of cybersecurity-related behavior can be classified into three components, namely, data collection, measurement scale and analysis. The findings show that subjective measurements from self-assessment questionnaires are the most frequently used method. Measurement scales are often composed based on existing literature and adapted by the researchers. Partial least square analysis is the most frequently used analysis technique. Even though useful insight and noteworthy findings regarding possible differences between manager and employee behavior have appeared in some publications, conclusive answers to whether such differences exist cannot be drawn.

Research limitations/implications

Research gaps have been identified, that indicate areas of interest for future work. These include the development and employment of methods for reducing subjectivity in the assessment of cybersecurity-related behavior.

Originality/value

To the best of the authors’ knowledge, this is the first SLR on how cybersecurity-related behavior can be assessed. The SLR analyzes relevant publications and identifies current practices as well as their shortcomings, and outlines gaps that future research may bridge.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 8 January 2020

Elham Rostami, Fredrik Karlsson and Ella Kolkowska

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…

1422

Abstract

Purpose

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about.

Design/methodology/approach

The results are based on a literature review of ISP management research published between 1990 and 2017.

Findings

Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.

Research limitations/implications

Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.

Practical implications

The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.

Originality/value

Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 25 January 2020

Stef Schinagl and Abbas Shahim

This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate…

11629

Abstract

Purpose

This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate and the current body of knowledge on ISG.

Design/methodology/approach

The intention of the authors was to conduct a systematic literature review. However, owing to limited empirical papers in ISG research, this paper is more conceptually organised.

Findings

This paper shows that security has shifted from a narrow-focused isolated issue towards a strategic business issue with “from the basement to the boardroom” implications. The key takeaway is that protecting the organisation is important, but organizations must also develop strategies to ensure resilient businesses to take advantage of the opportunities that digitalization can bring.

Research limitations/implications

The concept of DSG is a new research territory that addresses the limitations and gaps of traditional ISG approaches in a digital context. To this extent, organisational theories are suggested to help build knowledge that offers a deeper understanding than that provided by the too often used practical approaches in ISG research.

Practical implications

This paper supports practitioners and decision makers by providing a deeper understanding of how organisations and their security approaches are actually affected by digitalisation.

Social implications

This paper helps individuals to understand that they have increasing rights with regard to privacy and security and a say in what parties they assign business to.

Originality/value

This paper makes a novel contribution to ISG research. To the authors’ knowledge, this is the first attempt to review and structure the ISG literature.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 107