Search results

1 – 10 of over 51000
Article
Publication date: 23 August 2018

Yoel Raban and Aharon Hauptman

The cyber security industry emerged rapidly in recent years due to mounting cyber threats and increasing cyber hacking activities. Research on emerging technologies emphasizes the…

2502

Abstract

Purpose

The cyber security industry emerged rapidly in recent years due to mounting cyber threats and increasing cyber hacking activities. Research on emerging technologies emphasizes the risks and sometimes neglects to address the potential positive contribution to cyber security. The purpose of this study is to conduct a relatively balanced long-term foresight study to elicit major significant threat drivers and to identify emerging technologies that are likely to have a significant impact on defense and attack capabilities in cyber security.

Design/methodology/approach

The main instruments used in this study were horizon scanning and an online survey among subject-matter experts that assessed emerging threats and the potential impact of several emerging technologies on cyber defense capabilities and cyber attack capabilities.

Findings

An expert survey shows that cyber resilience, homomorphic encryption and blockchain may be considered as technologies contributing mainly to defense capabilities. On the other hand, Internet of Things, biohacking and human machine interface (HMI) and autonomous technologies add mainly to attack capabilities. In the middle, we find autonomous technologies, quantum computing and artificial intelligence that contribute to defense, as well as to attack capabilities, with roughly similar impact on both.

Originality/value

This study adds to the current research a balanced long-term view and experts’ assessment of negative and positive impacts of emerging technologies, including their time to maturity and consensus levels. Two new Likert scale measures were applied to measure the potential impact of emerging technologies on cyber security, thus enabling the classification of the results into four groups (net positive, net negative, positive-positive and negative-negative).

Details

foresight, vol. 20 no. 4
Type: Research Article
ISSN: 1463-6689

Keywords

Book part
Publication date: 31 August 2016

Gwendolyn K. Lee and Srikanth Parachuri

The purpose of this original research is to explore whether firms redeploy the resources that were withdrawn from existing businesses and use them to enter an emerging product…

Abstract

The purpose of this original research is to explore whether firms redeploy the resources that were withdrawn from existing businesses and use them to enter an emerging product market. We studied 244 firms that have exited from at least one business and analyzed whether the firms entered the emerging product market as a new business. The inducements of resource redeployment vary with information cues in media rhetoric about emerging and shifting threats of substitution between the firm’s existing businesses and the new one. Through our hazard rate analysis of entries of firms that exited existing businesses, we examined the hypotheses that resource redeployment through exit and entry may be driven by an interaction of the volume of substitution rhetoric with the resource commitments that the firm had made in the domain of the new business as well as the market relatedness between the firm’s existing businesses and the new one. Our study makes conceptual and methodological contributions to the research on inducements, by theorizing how performance advantages of new over existing businesses vary with product evolution and by characterizing emerging and shifting threats of substitution with content analysis of media rhetoric. Our study suggests that prior work investigating corporate diversification provides an incomplete picture of the contribution of resource relatedness to firm value and firm decision-making.

Details

Resource Redeployment and Corporate Strategy
Type: Book
ISBN: 978-1-78635-508-9

Keywords

Article
Publication date: 16 September 2013

Aharon Hauptman and Yair Sharan

Many emerging technologies are being developed in an accelerating pace and are key drivers of future change. In foresight studies, usually their positive impact on the quality of

1648

Abstract

Purpose

Many emerging technologies are being developed in an accelerating pace and are key drivers of future change. In foresight studies, usually their positive impact on the quality of life is considered or their negative environmental effects. This paper seeks to draw attention to an overlooked “dark side” of new technologies: their potential abuse by terrorists or organized crime. Recent cybercrime events are examples of abuse that perhaps could have been minimized if appropriate foresight studies were performed years ago. This was the aim of the recently completed EU-funded project FESTOS.

Design/methodology/approach

Several foresight methodologies were employed. Following a horizon scanning for potentially threatening technologies, a Delphi-type expert survey helped to evaluate critical threat characteristics of selected 33 technologies: the likelihood that each technology will actually come to pose a security threat (in different time frames), the easiness of its malicious use, the severity of the threat, and the most threatened societal spheres.

Findings

The results enabled ranking the technologies by their “abuse potential” and “threat intensity”. Certain emerging technologies (or their combinations), regarded as “weak signals”, inspired ideas for potential “wild cards”. In a subsequent workshop, which employed a variant of the “futures wheel” method, four wild-card “scenario sketches” were constructed. These were later developed to full narrative scenarios.

Originality/value

The entire process enables the introduction of security foresight into policy planning in a long-range perspective. The foresight results were followed by the evaluation of policy implications and coping with the knowledge control dilemma. The paper illustrates how a mix of foresight methods can help in a continuous analysis of new and threats posed by emerging technologies, thus raising awareness of decision makers and mitigating the risk of unforeseen surprises.

Details

Foresight, vol. 15 no. 5
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 4 January 2011

Pamela Scott and Patrick T. Gibbons

Subsidiary units have traditionally feared relocation of their activities to lower‐cost locations. The authors identify other emerging threats which are changing how multinational

2626

Abstract

Purpose

Subsidiary units have traditionally feared relocation of their activities to lower‐cost locations. The authors identify other emerging threats which are changing how multinational corporations (MNCs) manage their subsidiary units, and develop a cycle of subsidiary decline demonstrating how these threats can undermine a subsidiary's position within the MNC.

Design/methodology/approach

The paper presents the results of a survey targeted at over 1,100 subsidiary CEOs of MNCs located in Ireland, a program of in‐depth interviews of 24 subsidiary CEOs/directors, and a review of the literature relating to MNC and subsidiary management, are combined to identify emerging threats to subsidiary activities.

Findings

The main threats to subsidiaries' efforts to enhance their role within the MNC comprise: erosion of barriers to trade; growing complexities in corporate governance; and increasingly sophisticated information and communication technology (ICT) capabilities. These threats are enabling the disaggregation of value chains and increased headquarters monitoring and control. This shift in how subsidiaries are managed is leading to a cycle of subsidiary decline.

Research limitations/implications

the results from the survey are subject to the standard limitations and a larger pool of interviewees may have reinforced the qualitative findings.

Practical implications

To increase subsidiary managers' awareness of the need for a strategic response, the authors develop a cycle of subsidiary decline which illustrates how these emerging threats combine to undermine a subsidiary's position within the MNC. Disaggregating value chains and tighter headquarters control can reduce subsidiary bargaining power constraining its abilities to challenge for resources, in turn restraining its combinative capabilities and leading to a decline in its position and contribution to the MNC.

Originality/value

This paper is the first to build a framework illustrating how emerging threats in the external environment may impact the ability of subsidiary units to maintain and develop their position within the MNC.

Details

Journal of Business Strategy, vol. 32 no. 1
Type: Research Article
ISSN: 0275-6668

Keywords

Book part
Publication date: 23 April 2021

Gabriela Capurro and Josh Greenberg

Purpose – The authors examine framing and narrativization in news coverage of health threats to assess variations in news discourse for known, emerging and novel health risks…

Abstract

Purpose – The authors examine framing and narrativization in news coverage of health threats to assess variations in news discourse for known, emerging and novel health risks. Methodology/Approach – Using the analytical categories of known, emerging, and novel risks the authors discuss media analyses of anti-vaccination, antimicrobial resistance (AMR), and Covid-19. Findings – Known risks are framed within a biomedical discourse in which scientific evidence underpins public health guidelines, and following these directives prevent risk exposure while non-compliance is characterized as immoral and risky. News coverage of emerging risks highlights public health guidelines but fails to convey their importance as the risks seem too distant or abstract. Media coverage of novel risks is characterized by the ubiquity of uncertainty, which emerges as a “master frame” under which all incidents and events are subsumed. Stories about novel risks highlight the fluid and changing nature of scientific knowledge, which has the unintended effect of fueling uncertainty as studies and experts contradict each other. Originality/Value – This chapter introduces a new analytical framework for examining how media stories represent public health risks, along with previously unpublished analysis of media coverage about AMR and Covid-19. This chapter provides insight about the nature of risk discourses involving media, public health officials, activists, and citizens.

Details

Media and Law: Between Free Speech and Censorship
Type: Book
ISBN: 978-1-80071-729-9

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 9 November 2015

Nathalie Vallet

The purpose of this paper is to examine the interaction between the local policy context and the strategic role of public libraries within urban networks or partnerships aiming…

Abstract

Purpose

The purpose of this paper is to examine the interaction between the local policy context and the strategic role of public libraries within urban networks or partnerships aiming for the future development and innovation of cities.

Design/methodology/approach

An explorative case-study design in ten Flemish public libraries (i.e. Kortrijk, Sint-Niklaas, Turnhout, Geel, Maaseik, Dendermonde, Knokke-Heist, Hemiksem-Schelle, Balen and Boortmeerbeek-Haacht).

Findings

The findings are twofold. On the one hand the research results identify three categories of emergingthreats” and “opportunities” being first, the strategic dilemmas between local policy priorities, second, the trends in policy frameworks and third, the bottlenecks in needed methods and competences of local policy actors. On the other hand the research results also uncover three public library strategies to cope with these challenges, being first, the professionalization of their own strategic management profile, second, the exploration and mapping of “the others” and third, the initiatives taken to actively craft and design the strategic partnership themselves.

Practical implications

This paper provides unique and interesting insights on how the changing local policy context in Flanders prevents (“threats”) and stimulates (“opportunites”) the formation, development and acknowledgment of strategic partnerships of public libraries, and on how the public libraries involved encounter these challenges.

Originality/value

It is the only study in Flanders providing empirical information on the interaction between the changing local policy context and the strategic partnerships of public libraries.

Details

Library Management, vol. 36 no. 8/9
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 8 August 2016

Kia Hamid Yeganeh

This paper aims to examine the conditions, characteristics and strategies pertaining to the rise of emerging markets’ multinationals (EMNEs).

2026

Abstract

Purpose

This paper aims to examine the conditions, characteristics and strategies pertaining to the rise of emerging markets’ multinationals (EMNEs).

Design/methodology/approach

The paper relies on both academic and professional resources to offer a holistic understanding of EMNEs by reviewing, analyzing and classifying their underlying conditions, characteristics, internationalization motivations, strategies and competitive advantages.

Findings

The analysis indicates that EMNEs ascended as a result of major socio-economic transformations in the past two decades after the Cold War; follow an accelerated path of expansion; implement flexible and decentralized organizational configurations; enjoy strong political connections; do not internationalize according to the ownership-location-internalization paradigm, rather follow the linkage-leverage-learning pattern; benefit from multiple sources of competitive advantage and adopt five main types of international strategies; are becoming more sophisticated and represent serious threats to their counterparts from advanced economies.

Research limitations/implications

As emerging markets and their multinationals are highly heterogeneous, the findings and suggestions remain context-bound.

Practical implications

The paper synthesizes the EMNEs literature, bridges theory and practice and offers an integrative outline that can be useful for international business managers.

Originality/value

The paper takes an all-inclusive approach and provides insights into multiple societal and organizational facets of EMNEs.

Article
Publication date: 29 January 2021

Marco Maffei, Raffaela Casciello and Fiorenza Meucci

The aim of this paper is to explore the effects of adopting and implementing blockchain technology (BT) in accounting and auditing practices in terms of benefits and threats, thus…

2822

Abstract

Purpose

The aim of this paper is to explore the effects of adopting and implementing blockchain technology (BT) in accounting and auditing practices in terms of benefits and threats, thus discovering new and upcoming risks and issues.

Design/methodology/approach

This paper adopts a critical perspective to investigate how the implementation of BT could affect accounting and auditing practices, providing a reflection on the role of accountants and auditors during such a technological revolution.

Findings

This paper highlights the importance of the unreplaceable professional conscience and experience of accountants and auditors compared to the impersonal and standardised operating system of artificial intelligence provided by BT. The development and diffusion of BT are leading professionals to acquaint themselves with new accounting and auditing systems, such as reinventing old practices and finding new ways of taking advantage of blockchain instead of being overwhelmed.

Originality/value

Different from the majority of previous literature contributions, this study looks beyond the potential and undeniable benefits that BT can offer to accounting and auditing environments by focussing especially on the threats and risks caused by its implementation.

Details

Journal of Organizational Change Management, vol. 34 no. 2
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 8 April 2014

Andrew James and Thomas Teichler

This paper aims to provide a meta-analysis of the main themes emerging from public domain foresight studies on the defence and security environment undertaken in the decade since

1093

Abstract

Purpose

This paper aims to provide a meta-analysis of the main themes emerging from public domain foresight studies on the defence and security environment undertaken in the decade since the 9/11 attacks on the USA. The authors focus mainly on foresight studies undertaken in Europe.

Design/methodology/approach

The paper is based on a content analysis of public domain foresight studies.

Findings

Foresight studies on the defence and security environment reflect a shift in security thinking away from a focus on state-centric threats towards a much broader view of security risks that includes risks presented by the vulnerability of European society to the failure of critical infrastructure, to pandemics, environmental change and resource based conflicts. The authors place a particular emphasis on the treatment of technological change in these defence and security foresight studies and argue that the growing importance of dual-use technologies is likely to mean that defence will play a declining role as a sponsor and lead-user of advanced technologies in the future.

Originality/value

Foresight studies on the defence and security environment have grown in number since 9/11 not least in Europe. However, they have been the subject of little systematic analysis. This paper makes a contribution to such an analysis.

Details

Foresight, vol. 16 no. 2
Type: Research Article
ISSN: 1463-6689

Keywords

1 – 10 of over 51000