Search results

1 – 10 of over 11000
Open Access
Article
Publication date: 25 January 2020

Stef Schinagl and Abbas Shahim

This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate…

12676

Abstract

Purpose

This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business climate and the current body of knowledge on ISG.

Design/methodology/approach

The intention of the authors was to conduct a systematic literature review. However, owing to limited empirical papers in ISG research, this paper is more conceptually organised.

Findings

This paper shows that security has shifted from a narrow-focused isolated issue towards a strategic business issue with “from the basement to the boardroom” implications. The key takeaway is that protecting the organisation is important, but organizations must also develop strategies to ensure resilient businesses to take advantage of the opportunities that digitalization can bring.

Research limitations/implications

The concept of DSG is a new research territory that addresses the limitations and gaps of traditional ISG approaches in a digital context. To this extent, organisational theories are suggested to help build knowledge that offers a deeper understanding than that provided by the too often used practical approaches in ISG research.

Practical implications

This paper supports practitioners and decision makers by providing a deeper understanding of how organisations and their security approaches are actually affected by digitalisation.

Social implications

This paper helps individuals to understand that they have increasing rights with regard to privacy and security and a say in what parties they assign business to.

Originality/value

This paper makes a novel contribution to ISG research. To the authors’ knowledge, this is the first attempt to review and structure the ISG literature.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 6 June 2024

Ming-Yang Li, Zong-Hao Jiang and Lei Wang

The purpose of the study is to investigate and analyze the dynamics of the government-enterprise grain joint storage mechanism, particularly, focusing on profit-driven speculative…

Abstract

Purpose

The purpose of the study is to investigate and analyze the dynamics of the government-enterprise grain joint storage mechanism, particularly, focusing on profit-driven speculative behaviors exhibited by enterprises within this context. The study aims to understand the various factors influencing the behavior of stakeholders involved in grain storage, including government storage departments, agent storage enterprises and quality inspection agencies.

Design/methodology/approach

The study employs a tripartite evolutionary game model to investigate profit-driven behaviors in government-enterprise grain joint storage. It analyzes strategies of government departments, storage enterprises and quality inspection agencies, considering factors like supervision costs and speculative risks. Simulation analysis examines tripartite payoffs, initial probabilities and the impact of digital governance levels to enhance emergency grain storage effectiveness.

Findings

The study finds that leveraging digital governance tools in government-enterprise grain joint storage mechanisms can mitigate risks, enhance efficiency and ensure the security of grain storage. It highlights the significant impact of supervision costs, speculative risks and digital supervision levels on stakeholder strategies, offering guidance to improve the effectiveness of emergency grain storage systems.

Originality/value

The originality of this study lies in its integration of digital governance tools into the analysis of the government-enterprise grain joint storage mechanism, addressing profit-driven speculative behaviors. Through a tripartite evolutionary game model, it explores stakeholder strategies, emphasizing the impact of digital supervision levels on outcomes and offering insights crucial for enhancing emergency grain storage effectiveness.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 9 February 2022

Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Renette Blignaut and Angelo Cavallo

Boards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing number of…

Abstract

Purpose

Boards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing number of cyber-breaches targeting businesses makes this activity inescapable. Recently, researchers have published comprehensive lists of recommended cyber measures, specifically to inform organisational boards. However, the young cybersecurity industry has still to confirm and refine these guidelines. As a starting point, it would be helpful for organisational leaders to know what other organisations are doing in terms of using these guidelines. In an ideal world, bespoke surveys would be developed to gauge adherence to guidelines, but this is not always feasible. What we often do have is data from existing cybersecurity surveys. The authors argue that such data could be repurposed to quantify adherence to existing information security guidelines, and this paper aims to propose, and test, an original methodology to do so.

Design/methodology/approach

The authors propose a quantification mechanism to measure the degree of adherence to a set of published information security governance recommendations and guidelines targeted at organisational leaders. The authors test their quantification mechanism using a data set collected in a survey of 156 Italian companies on information security and privacy.

Findings

The evaluation of the proposed mechanism appears to align with findings in the literature, indicating the validity of the present approach. An analysis of how different industries rank in terms of their adherence to the selected set of recommendations and guidelines confirms the usability of our repurposed data set to measure adherence.

Originality/value

To the best of the authors’ knowledge, a quantification mechanism as the one proposed in this study has never been proposed, and tested, in the literature. It suggests a way to repurpose survey data to determine the extent to which companies are implementing measures recommended by published cybersecurity guidelines. This way, the proposed mechanism responds to increasing calls for the adoption of research practices that minimise waste of resources and enhance research sustainability.

Open Access
Article
Publication date: 8 February 2022

Boning Li and Su Zhang

The purpose of this study is to explore how the development of digital trade can provide new development prospects to China's foreign trade under the background of the gradual…

6381

Abstract

Purpose

The purpose of this study is to explore how the development of digital trade can provide new development prospects to China's foreign trade under the background of the gradual expansion of China's digital economy and the further release of policy dividends.

Design/methodology/approach

Using the methods of literature collection and induction, combined with traditional trade theory, this paper analyzes the characteristics and challenges of digital trade under the background of the digital economy.

Findings

The findings reveal that China's digital trade development still faces some risks, such as the containment of China's core technology, digital security and unbalanced development among regions. Considering these risks, China should break through core technical problem, participate in the formulation of international rules to ensure data security, give priority to the development of service trade and improve the unbalanced development of digital trade.

Social implications

By analyzing the development status and characteristics of the digital economy and digital trade, this paper summarizes the challenges and comparative advantages faced by China's digital trade, and puts forward corresponding suggestions. These suggestions will allow China to take advantage of its rapid digital economy development and occupy a leading position in global digital trade.

Originality/value

This paper creatively expounds on the new development direction of digital trade from the perspective of comparative advantage and risks, and provides some suggestions to expedite China's digital trade development.

Details

Journal of Internet and Digital Economics, vol. 2 no. 1
Type: Research Article
ISSN: 2752-6356

Keywords

Open Access
Article
Publication date: 14 September 2021

Li Tao

The study aims to elaborate the author’s basic viewpoints on how economics should view the Internet from four aspects.

2589

Abstract

Purpose

The study aims to elaborate the author’s basic viewpoints on how economics should view the Internet from four aspects.

Design/methodology/approach

This paper reviews the existing literature on this topic, and summarizes key findings and conclusions of these researches.

Findings

The findings include four major contradictions in economics brought by the Internet, and 12 new changes in economics that needs to be addressed.

Originality/value

This paper provides a clear summary of existing studies on economics’ views of the internet and a prospect for future internet economy research.

Details

Journal of Internet and Digital Economics, vol. 1 no. 1
Type: Research Article
ISSN: 2752-6356

Keywords

Article
Publication date: 26 February 2024

Sabrine Cherni and Anis Ben Amar

This study aims to examine how digitalization affects the work efficiency of the Shariah Supervisory Board (SSB) in Islamic banks.

Abstract

Purpose

This study aims to examine how digitalization affects the work efficiency of the Shariah Supervisory Board (SSB) in Islamic banks.

Design/methodology/approach

This study uses panel data analysis of annual report disclosures over the past 10 years. The authors have selected 79 Islamic banks for the period ranging from 2012 to 2021. The criteria for SSB efficiency used in this research are disclosure of Zakat and disclosure in the SSB report.

Findings

The econometric results show that digitalization has a positive effect on improving the work efficiency of the SSB in Islamic banks. Accordingly, the authors provide evidence that the higher the bank's digital engagement, the higher the quality of the SSB.

Originality/value

The findings highlight the need to improve the current understanding of SSB structures and governance mechanisms that can better assist Islamic banks in engaging in effective compliance with recent governance and accounting reforms. Moreover, Islamic banks are the most capable and appropriate to implement and activate digitalization because they are based on a vital root calling for development if there are executives believing in it, as well as legislation supporting and serving them.

Details

Journal of Islamic Accounting and Business Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0817

Keywords

Article
Publication date: 18 July 2016

Jason R. Baron and Anne Thurston

This paper aims to present a high-level summary of the US archivist’s digital mandate for 2019, embodied in the publication “Managing Government Records”, issued on August 24…

1687

Abstract

Purpose

This paper aims to present a high-level summary of the US archivist’s digital mandate for 2019, embodied in the publication “Managing Government Records”, issued on August 24, 2012, and a summary of US policy. The authors then consider the implications of the US e-recordkeeping initiative for lower-resource countries.

Design/methodology/approach

After setting out key elements of the US Archivist’s digital mandate, the paper proceeds to evaluate its policy implications for lower-resource countries based on the authors’ field experience and knowledge of case studies.

Findings

The USA is embarking on a state of the art approach for managing public sector archives in a digital form, with deadlines approaching for all federal agencies to manage e-mail and other e-records. Although a similar need exists in lesser-resourced countries, there are enormous barriers to successful implementation of a similar approach.

Research limitations/implications

The archivist’s 2019 digital mandate assumes that the technology sector will embrace the needs of public sector agencies in working on applicable electronic archiving solutions.

Practical implications

The Archivist’s Directive has the potential to be an enormous driver of change in the records management profession with respect to future management of increasingly digital archive collections. Vast collections of public sector e-mail and other forms of e-records potentially will be preserved under the directive, raising the stakes that archivists and records managers work on solutions in the area of long-term preservation and future access.

Social implications

The importance of capturing the activities of public-sector institutions in all countries for the purpose of openness, transparency and access cannot be overstated. In an increasingly digital age, new methods are needed to ensure that the historical record of governmental institutions is preserved and made accessible.

Originality/value

The US Archivist’s mandate represents a cutting-edge approach to long-term digital archiving with potential future applicability to the management of public sector records worldwide.

Details

Records Management Journal, vol. 26 no. 2
Type: Research Article
ISSN: 0956-5698

Keywords

Open Access
Article
Publication date: 30 December 2020

Fábio Luís Falchi de Magalhães, Marcos Antonio Gaspar, Edimara Mezzomo Luciano and Domingos Márcio Rodrigues Napolitano

investigate and analyze the aspects of legitimation, theorization and trends for the evolution of research in information technology governance (ITG) in Brazil, according to…

1415

Abstract

Purpose

investigate and analyze the aspects of legitimation, theorization and trends for the evolution of research in information technology governance (ITG) in Brazil, according to researchers familiar with the matter.

Design/methodology/approach

By means of a qualitative and quantitative research of exploratory-descriptive approach, the Delphi method was applied using a questionnaire supported by content analysis.

Findings

ITG is an increasingly interdisciplinary research field, with significant help from other fields of knowledge, such as administration, computer science and engineering. The main means of ITG publication are periodicals (MISQ, JMIS, JISTEM RESI), scientific events (AMCIS, ECIS, HICSS, EnANPAD, CONTECSI) and researchers, such as Peter Weill and Edimara Mezzomo Luciano. Best practice models are the most significant theoretical frameworks, and the main trend of research are on emerging technologies such as cloud computing and Internet of things (IoT) in the context of ITG.

Research limitations/implications

To the unavailability of some researchers to participate in the second phase of the Delphi research performed, as well as the non-completion of a third Delphi round. Likewise, the “Block B (open answer questions)” it was not contemplated in the second phase for a new collection of answers, which could partially change the results presented here.

Practical implications

The results show important insights for ITG researchers that can allow new researches about its applications, jointly reflecting on relevant aspects for the advancement of this research field.

Social implications

There are several research contributions to broaden the discussion and the evolution of this new scientific field in Brazil and that can be grouped for each set of stakeholders: academia and related researchers; the practicing community of business managers and private and public organizations; the academic legitimizing bodies; the non-academic legitimating bodies and researchers from other areas of knowledge.

Originality/value

ITG is a concept that emerged as part of corporate governance (CG), which has evolved as an emerging theme and is expanding in the international academic arena. However, the current stage of legitimation, theorization and trends of ITG in the Brazilian researches are lacked greater understanding, in order to provide better targeting for new researches.

Details

Revista de Gestão, vol. 28 no. 1
Type: Research Article
ISSN: 1809-2276

Keywords

Article
Publication date: 9 October 2023

Yong Sun, Ya-Feng Zhang, Yalin Wang and Sihui Zhang

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference…

Abstract

Purpose

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference for the formulation of protection policies for personal information security.

Design/methodology/approach

This paper constructs an evolutionary game model consisting of regulators, digital enterprises and consumers, which is combined with the simulation method to examine the influence of different factors on personal information protection and governance.

Findings

The results reveal seven stable equilibrium strategies for personal information security within the cooperative governance game system. The non-compliant processing of personal information by digital enterprises can damage the rights and interests of consumers. However, the combination of regulatory measures implemented by supervisory authorities and the rights protection measures enacted by consumers can effectively promote the self-regulation of digital enterprises. The reputation mechanism exerts a restricting effect on the opportunistic behaviour of the participants.

Research limitations/implications

The authors focus on the regulation of digital enterprises and do not consider the involvement of malicious actors such as hackers, and the authors will continue to focus on the game when assessing the governance of malicious actors in subsequent research.

Practical implications

This study's results enhance digital governance research and offer a reference for developing policies that protect personal information security.

Originality/value

This paper builds an analytical framework for cooperative governance for personal information security, which helps to understand the decision-making behaviour and motivation of different subjects and to better address issues in the governance for personal information security.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 12 March 2018

Rashmi Anand, Sanjay Medhavi, Vivek Soni, Charru Malhotra and D.K. Banwet

Digital India, the flagship programme of Government of India (GoI) originated from National e-Governance Project (NeGP) in the year 2014. The programme has important aspect of…

1203

Abstract

Purpose

Digital India, the flagship programme of Government of India (GoI) originated from National e-Governance Project (NeGP) in the year 2014. The programme has important aspect of information security and implementation of IT policy which supports e-Governance in a focused approach of Mission Mode. In this context, there is a need to assess situation of the programme which covers a study of initiatives and actions taken by various actor involved and processes which are responsible for overall e-Governance. Therefore, the purpose of this case study is to develop a Situation-Actor-Process (SAP), Learning-Action-Performance (LAP) based inquiry model to synthesize situation of information security governance, IT policy and overall e-Governance.

Design/methodology/approach

In this case study both systematic inquiry and matrices based SAP-LAP models are developed. Actors are classified who are found responsible and engaged in IT policy framing, infrastructure development and also in e-Governance implementation. Based on a synthesis of SAP components, various LAP elements were then synthesized then which further led to learning from the case study. Suitable actions and performance have also been highlighted, followed by a statement of the impact of the efficacy i.e. transformation of information security, policy and e-Governance on the Digital India programme.

Findings

On developing the SAP-LAP framework, it was found that actors like the Ministry of Electronics and Information Technology of the Govt. of India secures a higher rank in implementing various initiatives and central sector schemes to accelerate the agenda of e-Governance. Actions of other preferred actors include more investments in IT infrastructure, policy development and a mechanism to address cyber security threats for effective implementation of e-Governance. It was found that actors should be pro-active on enhancing technical skills, capacity building and imparting education related to ICT applications and e-Governance. Decision making should be based on the sustainable management practices of e-Governance projects implementation to manage change, policy making and the governmental process of the Indian administration and also to achieve Sustainable Development Goals by the Indian economy.

Research limitations/implications

The SAP-LAP synthesis is used to develop the case study. However, few other qualitative and quantitative multi criteria decision making approaches could also be explored for the development of IT security based e-Governance framework in the Indian context.

Practical implications

The synthesis of SAP leads to LAP components which can bridge the gaps between information security, IT policy governance and e-Governance process. Based on the learning from the Situation, it is said that the case study can provide decision making support and has impact on the e-Governance process i.e. may enhance awareness about e-services available to the general public. Such work is required to assess the transparency and accountability on the Government.

Social implications

Learning based on the SAP-LAP framework could provide decision making support to the administrators, policy makers and IT sector stakeholders. Thus, the case study would further help in addressing the research gaps, accelerating e-Governance initiatives and in capturing cyber threats.

Originality/value

The SAP-LAP model is found as an intuitive approach to analyze the present status of information security governance, IT policy and e-Governance in India in a single unitary model.

Details

Information & Computer Security, vol. 26 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 11000