Search results

1 – 10 of 181
Article
Publication date: 2 January 2023

Deepak Choudhary

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…

Abstract

Purpose

As the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive information, like user names, locations, phone numbers and even how they usually use energy, it is very important to protect users' privacy and security. IoT technology will be hard to use on the client side because IoT-enabled devices do not have clear privacy and security controls.

Design/methodology/approach

IoT technology would be harder to use on the client side if the IoT did not offer enough well-defined ways to protect users’ privacy and security. The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate the best keys for the ElGamal public key cryptosystem (EGPKC). The EGPKC-OAFA approach puts the most weight on the IEEE 802.15.4 standard for MAC, which is the most important part of the standard. The security field is part of the MAC header of this standard. In addition, the MAC header includes EGPKC, which makes it possible to make authentication keys as quickly as possible.

Findings

With the proliferation of IoT devices, privacy and security have become major concerns in the academic world. Security and privacy are of the utmost importance due to the large amount of personally identifiable information acquired by IoT devices, such as name, location, phone numbers and energy use. Client-side deployment of IoT technologies will be hampered by the absence of well-defined privacy and security solutions afforded by the IoT. The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy within the context of the IoT. The EGPKC-OAFA approach is concerned with the MAC standard defined by the IEEE 802.15.4 standard, which includes the security field in its MAC header. Also, the MAC header incorporates EGPKC, which enables the fastest possible authentication key generation. In addition, the best methodology award goes to the OAFA strategy, which successfully implements the optimum EGPKC selection strategy by combining opposition-based (OBL) and standard AFA ideas. The EGPKC-OAFA method has been proved to effectively analyze performance in a number of simulations, with the results of various functions being identified.

Originality/value

In light of the growing prevalence of the IoT, an increasing number of people are becoming anxious about the protection and confidentiality of the personal data that they save online. This is especially true in light of the fact that more and more things are becoming connected to the internet. The IoT is capable of gathering personally identifiable information such as names, addresses and phone numbers, as well as the quantity of energy that is used. It will be challenging for customers to adopt IoT technology because of worries about the security and privacy of the data generated by users. In this work, the EGPKC is paired with adversarial artificial flora, which leads in an increase to the privacy security provided by EGPKC for the IoT (EGPKC-OAFA). The MAC security field that is part of the IEEE 802.15.4 standard is one of the areas that the EGPKC-OAFA protocol places a high focus on. The Authentication Key Generation Protocol Key Agreement, also known as EGPKCA, is used in MAC headers. The abbreviation for this protocol is EGPKCA. The OAFA technique, also known as the combination of OBL and AFA, is the most successful method for selecting EGPKCs. This method is recognized by its acronym, OAFA. It has been shown via a variety of simulations that the EGPKC-OAFA technique is a very useful instrument for carrying out performance analysis.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 18 July 2023

Stephen Mujeye

This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.

Abstract

Purpose

This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.

Design/methodology/approach

A survey was used to investigate the differences in behaviors and practices of security-conscious users (group A) and regular users (group B) on mobile devices. Each group will have 50 participants for a total of 100.

Findings

The analysis revealed differences in the behaviors and practices of security-conscious and regular users. The results indicated that security-conscious users engage in behaviors and practices that are more secure on mobile devices when compared with regular users.

Research limitations/implications

The results will help recommend the best behaviors and practices for mobile device users, increasing mobile device security.

Social implications

The results will help society to be more aware of security behaviors and practices on mobile devices.

Originality/value

This study answers the call for addressing the weaknesses and vulnerabilities in mobile device security. It develops a research instrument to measure the differences in behaviors and practices of security-conscious and regular mobile device users.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 19 July 2023

Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Abstract

Purpose

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.

Design/methodology/approach

This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.

Findings

This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.

Originality/value

Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 26 February 2024

Himanshu Joshi and Deepak Chawla

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in…

Abstract

Purpose

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in mobile wallets enhances user trust (TR), attitude (ATT) and intention (INT). Using a multiple and serial mediation model, both TR and ATT were found to mediate the relationship between PS and BI.

Design/methodology/approach

Drawing on the stimulus-organism-response (S-O-R) theory, the proposed conceptual model comprises PS, TR, ATT and BI. An online survey was conducted with a cross-sectional sample of 744 mobile wallet users in India. Partial least squares structural equation modeling (PLS-SEM) was used to analyze the hypothesized relationships and test the mediation effects.

Findings

Results show that the stimulus, PS, has a positive and significant influence on TR and ATT, which eventually has a positive influence on BI. The research model explains 64.4 percent of the variance in BI. Further, both TR and ATT independently and parallelly mediate the relationship PS and BI. Lastly, gender is found to moderate the relationship between TR and BI and ATT and BI.

Practical implications

The research showed the importance of PS, TR and ATT towards mobile wallet adoption INTs. Further, the findings support the idea that developing TR and ATT is essential for shaping INTs. This suggests that mobile wallet service providers should invest in methods that not just enhance user TR but also reinforce a positive ATT towards the platform. To demonstrate TR, mobile wallet providers must ensure the confidentiality and privacy of user data, keep customer interests in mind and fulfill commitments. Lastly, for strengthening customer TR, excellent customer support is extremely important.

Originality/value

While prior researchers have majorly used technology acceptance model (TAM) and unified theory of acceptance and use of technology (UTAUT) models to explain adoption INTs, this study examines the relationship between PS, TR, ATT and BI through the lens of the SOR framework.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Book part
Publication date: 18 January 2024

Tulsi Pawan Fowdur, Visham Hurbungs and Lavesh Babooram

Intelligent real-time systems are significantly impacting several of the UN Sustainable Development Goals (SDGs) by revolutionising processes in several areas such as Industry…

Abstract

Intelligent real-time systems are significantly impacting several of the UN Sustainable Development Goals (SDGs) by revolutionising processes in several areas such as Industry 4.0, smart cities, transportation, agriculture, renewable energy, climate change and other economic activities. Given that much of the work to achieve the SDGs relies on information and communication technology, cybersecurity has a potentially immense role to play towards achieving these outcomes. Moreover, cyberattacks have emerged as a new functional threat for interconnected, smart manufacturers and digital supply networks, employed in intelligent real-time systems for the Fourth Industrial Revolution. The effects of cyberattacks can be much more widespread than ever before due to the interconnected nature of Industry 4.0-driven operations. Blockchain can be really useful in such situations as it provides edge protection and allows authentication of the machine-to-machine and human–machine operations, stable data share, life cycle management, access control compliance of devices and self-sustaining operations. Moreover, blockchain can be applied for tracking and tracing transactions through devices, which are performed during the operation, as well as to encrypt and transmit data securely. It is vital to establish complete trust in a technology that is being adopted so that its full potential can be exploited. It is consequently critical that the organisational and information technology strategy fully integrates secure, vigilant and resilient cybersecurity strategies such as blockchain. This will ensure that cyber risks are properly managed in the age of Industry 4.0. This chapter, therefore, analyses the application of blockchain in intelligent real-time systems such as Industry 4.0 so that the opportunities these systems present for the SDGs can be exploited safely with minimum risks to society.

Details

Artificial Intelligence, Engineering Systems and Sustainable Development
Type: Book
ISBN: 978-1-83753-540-8

Keywords

Article
Publication date: 17 August 2023

P.S. JosephNg

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that…

57

Abstract

Purpose

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that empowers hotel users to get to the room using a mobile access key. Advancing secured facilities, mobile phone “Near Field Communication” (NFC) innovation as the entrance device by carrying out an application containing an imitated mobile key for explicit verification access is used.

Design/methodology/approach

The proposed system is evaluated by triangulation of experimental, numerical and rational evaluation using partial least square structural equation modeling (PLS-SEM) with Malaysian hotel guests and employees.

Findings

The discoveries with the hypothesis supported validated that the suggested solution can eliminate physical cards, boost protection and encourage a contactless ecosystem. Theoretical, management and societal contributions are discussed here.

Research limitations/implications

This experiment comes with the constraints that it was conducted in only two hotels and does not fully reflect the choices of a wider range of travellers. Secondly, the cost of existing NFC smart locks is still relatively high, and along with the development of technology, the price will decrease when supply exceeds demand.

Practical implications

To promote high-security attributes, NFC technology as the access system by implementing an application containing an emulated smart key for specific authentication access is used. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Social implications

To promote high-security attributes, NFC technology is used as the access system by implementing an application containing an emulated smart key for specific authentication access. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Originality/value

The novelty of this study comes from the use of commonly available smartphone NFC features that are yet to be applied in the tourism ecosystem. The research provokes the applied concept of mobile smartkeys.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 19 May 2023

Abhishek Behl, Vijay Pereira, Achint Nigam, Samuel Wamba and Rahul Sindhwani

The purpose of this paper is to investigate the potential of NFTs in revolutionizing innovation management and information systems. Innovations done by firms are blatantly used by…

Abstract

Purpose

The purpose of this paper is to investigate the potential of NFTs in revolutionizing innovation management and information systems. Innovations done by firms are blatantly used by other firms to develop cheap knock-off. This leads to huge economic loses to the firm investing in research and development activities. Firms are in need of trusted, immutable and verifiable means of storing information which cannot be used by others, even if publically available without their consent. Non-fungible tokens (NFTs) appear to be one such solution to this problem that has recently attracted a lot of investor interest. Using NFTs the information is tokenized and is stored in a secure manner.

Design/methodology/approach

Through this scoping review, the authors investigate the influence of NFTs towards the innovation management from the dual aspects of management and information systems. This scoping review is underpinned by the five-stage framework by Arksey and O’Malley. The five stages of Arksey and O’Malley’s framework were used in this analysis to classify the literature through five stages of identifying the initial research questions; locating relevant studies; study selection; charting the data; and compiling, summarizing and reporting the results.

Findings

This study suggests that NFTs on the blockchain have significant potential to revolutionize innovation management and information systems. Theoretical frameworks used in investigating the role of digital tokens in blockchain management are mainly based on contracts, diversity theory, portfolio theory and faking likelihood theory. The study reveals gaps in the literature, particularly in the under-researched areas of behavioural psychology and social psychology theories. The appropriate regulation and regulation authority for different types of digital tokens are required. The study also presents archetypes that represent patterns in the current landscape of blockchain tokens, which have significant potential for future research and practical applications.

Originality/value

This study is unique in its approach to assessing the future of NFTs in the field of innovation and information management. While many existing reviews have focused on describing the progress and development of NFTs in the past, this study takes a forward-looking perspective and projects the future potential of NFTs. This innovative approach allows for a deeper understanding of the potential impact of NFTs in various fields such as entrepreneurship, innovation management and tokenomics. Therefore, this study contributes to the literature on NFTs by providing insights and recommendations for future research and practical applications.

Details

Journal of Knowledge Management, vol. 28 no. 1
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 181