Search results

1 – 10 of 129
Article
Publication date: 11 February 2019

Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis and George J. Pangalos

The purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of…

Abstract

Purpose

The purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of cyber threat information sharing.

Design/methodology/approach

This paper uses a quantitative methodology to identify the most popular cyber threat intelligence (CTI) elements and introduces a lightweight approach to correlate those with potential forensic value, resulting in the quick and accurate triaging and identification of patterns of malicious activities.

Findings

While threat intelligence exchange steadily becomes a common practice for the prevention or detection of security incidents, the proposed approach highlights its usefulness for the digital forensics (DF) domain.

Originality/value

The proposed model can help organizations to improve their DFR posture, and thus minimize the time and cost of cybercrime incidents.

Details

Information & Computer Security, vol. 27 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 10 May 2022

Ammar Aamer, Chelinka Rafiesta Sahara and Mohammed Ali Al-Awlaqi

There is an increasing interest in the supply chain’s digitalization, yet the topic is still in the preliminary stages of academic research. The academic literature has no…

2085

Abstract

Purpose

There is an increasing interest in the supply chain’s digitalization, yet the topic is still in the preliminary stages of academic research. The academic literature has no consensus and is still limited to research assessing the supply chain’s digitalization of organizations. This study aims to explore the supply chain digitalization drivers to understand the emerging phenomena. More specifically, the authors devised from the literature the most common factors in assessing the readiness in scaling supply chain digitalization.

Design/methodology/approach

This study followed a five-phased systematic literature review (SLR) methodology in this research: designing, analyzing, conducting, writing and assessing the quality of the review. The SLR is beneficial for justifying future research regardless of the complex process that requires dealing with high-level databases, information filtering and relevancies of the content. Through analysis of 347 titles and abstracts and 40 full papers, the authors showed and discussed the supply chain digitalization: transformation factors.

Findings

The results generated three main themes: technology, people and processes. The study also generated ten subthemes/primary drivers for assessing the readiness for supply chain digitalization in organizations: IT infrastructure, cybersecurity systems, digitalization reskilling and upskilling, digitalization culture, top management support, digitalization and innovation strategy, integrated supply chain, digital innovation management, big data management and data analytics and government regulations. The importance of each factor was discussed, and future research agenda was presented.

Research limitations/implications

While the key drivers of the supply chain digitalization were identified, there is still a need to study the statistical correlation to confirm the interrelationships among factors. This study is also limited by the articles available in the databases and content extraction.

Practical implications

This study supports decision-makers in understanding the critical drivers in digitalizing the supply chain. Once these factors are studied and comprehended, managers and decision-makers could better anticipate and allocate the proper resources to embark on the digitalization journey and make informed decisions.

Originality/value

The digitalization of the supply chain is more critical nowadays due to the global disruptions caused by the Coronavirus (COVID-19) pandemic and the surge of organizations moving toward the digital economy. There is a gap between the digital transformation pilot studies and implementation. The themes and factors unearthed in this study will serve as a foundation and guidelines for further theoretical research and practical implications.

Details

Journal of Science and Technology Policy Management, vol. 14 no. 4
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 22 August 2019

Arash Asiaei and Nor Zairah Ab. Rahim

The purpose of this study is to develop a model to understand the relationships among technology, organizational and environmental (TOE) contexts, intention to adopt cloud…

2321

Abstract

Purpose

The purpose of this study is to develop a model to understand the relationships among technology, organizational and environmental (TOE) contexts, intention to adopt cloud computing (IACC) and actual usage of cloud computing (AUCC) in small and medium enterprises (SMEs) in Malaysia as a developing country. More specifically, this paper seeks to explore the mediation effect of IACC on the relationship between TOE context and AUCC.

Design/methodology/approach

A positivist research approach was selected for this study. Drawing largely upon the TOE framework, this study uses survey data from 209 Malaysian SMEs. Structural equation modelling (SEM) based on partial least squares (PLS) was used to assess the structural relations of the research model.

Findings

The results of the structural model show that data security, technology readiness, top management support, competitive pressure and innovativeness are the most significant factors in predicting the adoption of cloud computing in Malaysian SMEs. Further, the results indicate that intention to adopt cloud computing can play a mediating role between TOE factors and the actual usage of cloud computing.

Research limitations/implications

The focus upon Malaysian SMEs may diminish the generalizability of the findings. This study provides profound insight into the management and foundation of cloud computing, different types of cloud services and deployment models that could facilitate the management of enterprise strategic resources and contribute to the performance improvement. This study also provides another important implication for practitioners regarding the absolute necessity of value drivers’ identification within enterprise and understand the causal relationships, which are vital in driving those values.

Practical implications

This study provides several practical guidance for practitioners in deploying cloud services which are most suitable option for their specific technology requirement in their enterprise to enjoy the full benefits of their intangible assets. Another significant implication of this study lies in the fact that it may require a different emphasis on nature and adoption design when there is a higher level of stress on technology-related and cloud computing resources.

Originality/value

This study contributes to the extant literature by developing an integrative model to identify how a wide set of contextual factors can determine the intention to adopt cloud computing and, in turn, influence the actual usage of cloud computing in SMEs in Malaysia as a developing country.

Details

Journal of Science and Technology Policy Management, vol. 10 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Book part
Publication date: 11 November 2019

Teresina Torre and Daria Sarti

This chapter aims to build a systematization of the current theoretical and empirical academic contributions on smart working (SW) in the organization studies domain and to…

Abstract

This chapter aims to build a systematization of the current theoretical and empirical academic contributions on smart working (SW) in the organization studies domain and to examine which are the main paths that researchers are concerning themselves with, with specific attention being paid to the new meaning that the work itself has acquired in the model proposed by SW. Particular consideration is devoted to an analysis of the characteristics of the present debate on this construct and the meaning of SW, identifying two different – and contrasting – approaches: one considers it as a totally new concept; the other is notable for its continuity with previous arrangements such as telework. Further, some relevant concepts, strictly related to that of SW in working environments are considered. In the last part of the chapter, some key points for further research are proposed to create stimuli for discussion in the community of organization studies and HRM scholars and among practitioners, given from the perspective of deepening the change in progress, the relevance for which there is general consensus.

Details

HRM 4.0 For Human-Centered Organizations
Type: Book
ISBN: 978-1-78973-535-2

Keywords

Article
Publication date: 6 June 2022

Alex McCord, Philip Birch and Lewis A. Bizo

Global evidence suggests a potential displacement of youth offending from the physical to the digital landscape, requiring revision of existing detection and intervention methods…

Abstract

Purpose

Global evidence suggests a potential displacement of youth offending from the physical to the digital landscape, requiring revision of existing detection and intervention methods. This study aims to explore pathways from harmful to illegal online activity perpetrated by young people, legislation and police perspectives, current detection methods and interventions.

Design/methodology/approach

This perspective paper examines issues observed within a larger systematic literature review on digital youth offending.

Findings

A trajectory from acceptable to harmful and subsequently illegal behaviour was identified, with a particular pathway from unethical video game activity to digitally dependent offending. Legislation and police perspectives vary by jurisdiction, with a common theme that increased officer education is key to the level of preparedness to investigate cases. Machine learning and automatic prevention show promise as detection and disruption processes, with education recommended for young people as a deterrent and redirection of skills to positive outcomes.

Research limitations/implications

Recommendations for further research include a broad survey of school students to include all identified areas of digital offending, which could drive the development of targeted education by law enforcement and partner agencies for young people.

Practical implications

The shift in youth offending requires the justice and educational systems to adjust how they respond to youth crime. Policy and practise shifts can include further exploration of investigative hacking, education for law enforcement and educational prevention and redirection programmes aimed at youth.

Originality/value

The digital displacement of youth offending is a progressively emerging concept. This paper examines the current state of response from educational and law enforcement agencies and discusses the next steps based on what is currently known.

Details

The Journal of Forensic Practice, vol. 24 no. 3
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 3 November 2021

James Pérez-Morón

The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a…

Abstract

Purpose

The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global governance.

Design/methodology/approach

A comprehensive literature review was conducted on Clarivate Analytics’ Web of Science, in Social Sciences Citation Index journals, Scopus and Google Scholar, published between 2010–2021. A systematic review of practitioner literature was also conducted.

Findings

Chinese SCs have become a matter of national security, especially in the era of cyber warfare. The risks to SC have been outlined. Cybersecurity regulations are increasing as China aims to build a robust environment for cyberspace development. Using the Technology-organization-environment (TOE) framework, the results show that the top five factors influencing the adoption process in firms are as follows: relative advantage and technological readiness (Technology context); top management support and firm size (Organization context) and government policy and regulations (Environment context).

Research limitations/implications

This review focuses on cyberattacks on Chinese SCs and great care was taken when selecting search terms. However, the author acknowledges that the choice of databases/terms may have excluded a few articles on cyberattacks from this review.

Practical implications

This review provides managerial insights for SC practitioners into how cyberattacks have the potential to disrupt the global SC network.

Originality/value

Past researchers proposed a taxonomic approach to evaluate progress with SC integration into Industry 4.0; in contrast, this study is one of the first steps toward an enhanced understanding of cyberattacks on Chinese SCs and their contribution to the global SC network using the TOE framework.

Details

Journal of Asia Business Studies, vol. 16 no. 2
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 14 August 2023

Usman Tariq, Ranjit Joy, Sung-Heng Wu, Muhammad Arif Mahmood, Asad Waqar Malik and Frank Liou

This study aims to discuss the state-of-the-art digital factory (DF) development combining digital twins (DTs), sensing devices, laser additive manufacturing (LAM) and subtractive…

Abstract

Purpose

This study aims to discuss the state-of-the-art digital factory (DF) development combining digital twins (DTs), sensing devices, laser additive manufacturing (LAM) and subtractive manufacturing (SM) processes. The current shortcomings and outlook of the DF also have been highlighted. A DF is a state-of-the-art manufacturing facility that uses innovative technologies, including automation, artificial intelligence (AI), the Internet of Things, additive manufacturing (AM), SM, hybrid manufacturing (HM), sensors for real-time feedback and control, and a DT, to streamline and improve manufacturing operations.

Design/methodology/approach

This study presents a novel perspective on DF development using laser-based AM, SM, sensors and DTs. Recent developments in laser-based AM, SM, sensors and DTs have been compiled. This study has been developed using systematic reviews and meta-analyses (PRISMA) guidelines, discussing literature on the DTs for laser-based AM, particularly laser powder bed fusion and direct energy deposition, in-situ monitoring and control equipment, SM and HM. The principal goal of this study is to highlight the aspects of DF and its development using existing techniques.

Findings

A comprehensive literature review finds a substantial lack of complete techniques that incorporate cyber-physical systems, advanced data analytics, AI, standardized interoperability, human–machine cooperation and scalable adaptability. The suggested DF effectively fills this void by integrating cyber-physical system components, including DT, AM, SM and sensors into the manufacturing process. Using sophisticated data analytics and AI algorithms, the DF facilitates real-time data analysis, predictive maintenance, quality control and optimal resource allocation. In addition, the suggested DF ensures interoperability between diverse devices and systems by emphasizing standardized communication protocols and interfaces. The modular and adaptable architecture of the DF enables scalability and adaptation, allowing for rapid reaction to market conditions.

Originality/value

Based on the need of DF, this review presents a comprehensive approach to DF development using DTs, sensing devices, LAM and SM processes and provides current progress in this domain.

Article
Publication date: 25 August 2023

Abinash Mandal and Amilan S.

This study aims to investigate the perceived willingness to adopt and use Forensic Accounting and Investigation Standards (FAIS) in Forensic Accounting and Investigation (FAI…

Abstract

Purpose

This study aims to investigate the perceived willingness to adopt and use Forensic Accounting and Investigation Standards (FAIS) in Forensic Accounting and Investigation (FAI) assignments. The study also analyses the usefulness of FAIS in achieving the principle of natural justice (PNJ) concerning fairness.

Design/methodology/approach

The respondents comprised 118 accounting professionals whose online survey responses were analyzed descriptively. This study also uses a 2 × 2 contingency analysis representing two levels of usefulness and fairness.

Findings

The results revealed that FAIS 410 received the highest mean rating while FAIS 240 received the lowest mean rating in willingness to adopt and use FAIS, and most of the standards were related to the PNJ concerning fairness. The study shows the accounting professionals’ readiness to adapt and flourish with the help of these Standards in FAI assignments.

Practical implications

The findings of this study will increase practitioners’ awareness of the usefulness and fairness of FAIS, which will enhance their understanding of the significance of implementing these newly developed standards to harmonize the investigative process in forensic audits. Additionally, the findings may encourage regulators, researchers, accounting bodies and their members to adopt and conduct further FAIS studies that can advance financial crime prevention, detection and investigation knowledge.

Originality/value

This paper substantially contributes to the literature as it is the first to examine the usefulness and fairness of “Forensic Accounting and Investigation Standards” in the context of forensic audits and investigations, which has not been previously explored.

Details

Journal of Financial Regulation and Compliance, vol. 31 no. 5
Type: Research Article
ISSN: 1358-1988

Keywords

Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 13 February 2024

Kaisu Laitinen, Mika Luhtala, Maiju Örmä and Kalle Vaismaa

Insufficient productivity development in the global and Finnish infrastructure sectors indicates that there are challenges in genuinely achieving the goals of resource efficiency…

Abstract

Purpose

Insufficient productivity development in the global and Finnish infrastructure sectors indicates that there are challenges in genuinely achieving the goals of resource efficiency and digitalization. This study adapts the approach of capability maturity model integration (CMMI) for examining the capabilities for productivity development that reveal the enablers of improving productivity in the infrastructure sector.

Design/methodology/approach

Civil engineering in Finland was selected as the study area, and a qualitative research approach was adopted. A novel maturity model was constructed deductively through a three-step analytical process. Previous research literature was adapted to form a framework with maturity levels and key process areas (KPAs). KPA attributes and their maturity criteria were formed through a thematic analysis of interview data from 12 semi-structured group interviews. Finally, validation and refinement of the model were performed with an expert panel.

Findings

This paper provides a novel maturity model for examining and enhancing the infrastructure sector’s maturity in productivity development. The model brings into discussion the current business logics, relevance of lifecycle-thinking, binding targets and outcomes of limited activities in the surrounding infrastructure system.

Originality/value

This paper provides a new approach for pursuing productivity development in the infrastructure sector by constructing a maturity model that adapts the concepts of CMMI and change management. The model and findings benefit all actors in the sector and provide an understanding of the required elements and means to achieve a more sustainable built environment and effective operations.

Details

Built Environment Project and Asset Management, vol. 14 no. 2
Type: Research Article
ISSN: 2044-124X

Keywords

1 – 10 of 129