Search results

1 – 10 of 22
Open Access
Article
Publication date: 17 May 2021

Alessandro Creazza, Claudia Colicchia, Salvatore Spiezia and Fabrizio Dallari

The purpose of this paper is to explore the perceptions of supply chain managers regarding the elements that make up cyber supply chain risk management (CSCRM) and the related…

11244

Abstract

Purpose

The purpose of this paper is to explore the perceptions of supply chain managers regarding the elements that make up cyber supply chain risk management (CSCRM) and the related level of alignment, to understand how organizations can deploy a CSCRM strategy that goes beyond the technical, internal functioning of single companies and moves beyond the dyad, to create a better alignment that can ultimately lead to improved cyber supply chain resilience.

Design/methodology/approach

An exploratory survey in the fast-moving consumer goods (FMCG) industry involving over 100 organizations in Italy was conducted. Results were analysed through one-way analysis of variance, to appraise the differences in the perceptions of the various actors of the FMCG supply chain (Manufacturers, Logistics Service Providers, Retailers).

Findings

While a certain degree of alignment of the perceptions across the FMCG supply chain exists, the study found that Logistics Service Providers can play a crucial role as orchestrators of the CSCRM process towards a more “supply chain-oriented” response to cyber threats and risk events. The research also highlights the necessity to see people as key elements for improving cyber resilience in the supply chain.

Research limitations/implications

Through a vertical analysis of a supply chain, the study extends the existing theory on CSCRM, which contains isolated case studies. It also contributes to extending the current theory with the proposal of the paradigm of Logistics Service Providers as orchestrators of the CSCRM process. The study combines different classifications of CSCRM initiatives and embraces theories external to the supply chain literature.

Practical implications

Through the empirical analysis, this study helps practitioners in streamlining the design of cyber security strategies and actions that span across the supply chain for better alignment. This could mean more coordination of efforts and more targeted/accurate investments in CSCRM initiatives. The study invites practitioners to ponder the perceived relevance of the human factor as a source of risk and the perceived importance of countermeasures aimed at mitigating risk events stemming from that source.

Originality/value

By focusing on an entire supply chain, this is one of the first studies on CSCRM that goes beyond the dyad. Its originality also lies in its use of the investigations of perceptions along the supply chain as pillars for the alignment of CSCRM strategies and mitigation initiatives. This original perspective allows for discovering the role of Logistics Service Providers in driving the alignment of the efforts towards better outcomes of the CSCRM process.

Details

Supply Chain Management: An International Journal, vol. 27 no. 1
Type: Research Article
ISSN: 1359-8546

Keywords

Open Access
Article
Publication date: 25 April 2023

Ognjen Arandjelović

The remarkable increase of sophistication of artificial intelligence in recent years has already led to its widespread use in martial applications, the potential of so-called…

Abstract

Purpose

The remarkable increase of sophistication of artificial intelligence in recent years has already led to its widespread use in martial applications, the potential of so-called “killer robots” ceasing to be a subject of fiction. The purpose of this paper is to re-examine the consequences of the availability of lethal autonomous robots (LARs) on global peace.

Design/methodology/approach

Virtually without exception, the aforementioned potential of LARs has generated fear, as evidenced by a mounting number of academic articles calling for the ban on their development and deployment. An analysis of the existing ethical objections to LARs is used as a vehicle for their critique and the advancement of an alternative.

Findings

The presented analysis shows the contemporary thought to be deficient in philosophical rigour, these deficiencies leading to a different view, one favourable to the development of LARs.

Originality/value

The emergent thesis is that LARs can in fact be a force for peace, leading to fewer and less deadly wars.

Details

Journal of Ethics in Entrepreneurship and Technology, vol. 3 no. 1
Type: Research Article
ISSN: 2633-7436

Keywords

Open Access
Article
Publication date: 3 October 2023

Akash Kalra and Munshi Naser Ibne Afzal

For many global firms and corporate oligopolies, transfer pricing is essential. The transfer pricing literature as it is currently written is succinctly summarized in this study…

4306

Abstract

Purpose

For many global firms and corporate oligopolies, transfer pricing is essential. The transfer pricing literature as it is currently written is succinctly summarized in this study. The authors offer a thorough analysis of transfer pricing research in this study. This review sheds light on the top researchers, approaches, conclusions, theoretical and empirical gaps, and upcoming issues of transfer pricing research over the previous nine years through a methodical analysis of 29 research publications from the Scopus database (2014–2022). To help graduate students pursue further degrees in this area, such as a master's, thesis or PhD, this study will highlight five research issues.

Design/methodology/approach

This essay looks at five significant areas of tax avoidance and transfer pricing research. Some of these issues include determining the impact of transfer pricing regulations on various types of multinational corporations, assessing the effectiveness of transfer pricing regulations in preventing tax evasion, examining various policy options and determining the impact of transfer pricing on other economic outcomes using a systematic literature review.

Findings

The findings of this review demonstrate the need for transfer pricing research to look more closely at transfer pricing as a tool for business in addition to compliance and tax management.

Originality/value

This analysis concludes with future directions for transfer pricing research.

Details

International Trade, Politics and Development, vol. 7 no. 3
Type: Research Article
ISSN: 2586-3932

Keywords

Open Access
Article
Publication date: 15 June 2023

Aderinola Ololade Dunmade and Adeyinka Tella

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

1185

Abstract

Purpose

This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.

Design/methodology/approach

Using content analysis and a review of relevant literature, this study examines the challenges that librarians face in enforcing cyberethics and highlights the strategies that libraries can adopt to promote responsible online behaviour.

Findings

This paper identifies the lack of awareness among postgraduate students regarding cybersecurity risks and the need for training and resources for librarians as key challenges in promoting cyberethics.

Originality/value

This study recommends that libraries provide access to training resources and develop policies and guidelines to promote cyberethics among postgraduate students. Overall, this paper argues that libraries and librarians can play a critical role in promoting responsible online behaviour and ensuring the safety and security of postgraduate students in Nigeria.

Open Access
Article
Publication date: 26 May 2023

Eline Punt, Jochen Monstadt, Sybille Frank and Patrick Witte

Cyber resilience has emerged as an approach for seaports to deal with cyberattacks; it emphasizes ports’ ability to prepare for an attack and to keep operating and recover…

1591

Abstract

Purpose

Cyber resilience has emerged as an approach for seaports to deal with cyberattacks; it emphasizes ports’ ability to prepare for an attack and to keep operating and recover quickly. However, little research has been undertaken on the challenges of governing cyber risks in seaports. This study aims to address this gap.

Design/methodology/approach

Governing cyber resilience is shaped by distributed responsibilities, uncertainties and ambiguities. The authors use this conceptualization to explore the governance of cyber risks in seaports, taking the Port of Rotterdam as a case study and analyzing semistructured interviews with stakeholders, participatory observation and policy documents and legislation.

Findings

The authors found that many strategies for governing cyber risks remain dedicated to protecting computer systems against cyberattacks. Nevertheless, port stakeholders have also developed strategies in anticipation of disruptions. However, these strategies appear informal and uncoordinated due to a lack of information exchange, insufficient knowledge regarding cyber risks and disagreement about how to make the Port of Rotterdam cyber resilient. What mainly hampers the cyber resilience of the port is the lack of a comprehensive regulatory framework and economic incentives. The authors conclude that resilience is merely an ideal at the Port of Rotterdam, meaning related governance strategies remain incremental and await institutionalization.

Originality/value

This paper offers insights into the cyber resilience of critical socio-technical systems, which have been underexposed in cyber resilience debates, but, when exploited, can manifest in large-scale disruptions.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 4
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 14 February 2023

Kanthana Ditkaew and Muttanachai Suttipun

The main objective of this study is to examine the impact of audit data analytics (ADA) on audit quality (AQ) and audit review continuity (ARC).

5362

Abstract

Purpose

The main objective of this study is to examine the impact of audit data analytics (ADA) on audit quality (AQ) and audit review continuity (ARC).

Design/methodology/approach

Using 452 CPAs in Thailand as samples, mail questionnaires were used and sent to collect the data. Descriptive analysis, correlation matrix and path analysis were used to analyze the data.

Findings

The results of this study indicated that audit data analytics had a positive impact on AQ and ARC. Cybersecurity, used as a moderator in this study, was found to be the interaction between ADA, AQ and review continuity.

Practical implications

Auditors and audit firms can consider using big data in their data analytics to improve AQ and ARC.

Originality/value

Resource advantage theory has been used in this study to explain the impact of ADA on AQ and ARC in Thailand.

Details

Asian Journal of Accounting Research, vol. 8 no. 3
Type: Research Article
ISSN: 2459-9700

Keywords

Open Access
Article
Publication date: 9 November 2021

Zareef Mohammed

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…

3999

Abstract

Purpose

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.

Design/methodology/approach

Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.

Findings

Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.

Originality/value

These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 1 January 2021

Øystein Pedersen Dahlen and Helge Skirbekk

The aim of this article is to explain why there is a higher degree of trust in some countries compared to others – and which are the main historical factors that explain these…

3033

Abstract

Purpose

The aim of this article is to explain why there is a higher degree of trust in some countries compared to others – and which are the main historical factors that explain these differences. The main focus is on how governments relate to and communicate with its citizens in the times of crises.

Design/methodology/approach

The analysis is based on comparative historical sociology with a modernity perspective with a special focus on Norway and Scandinavia. The authors do a parallel demonstration of history to confirm and expand the theories that could explain the high level of trust in these countries. The authors also bring in the Spanish experience in order to testify how governmental reactions affected the different levels of trust.

Findings

Scandinavian governments allowed open communication between different social classes on difficult and important issues, in contrast to Spain in the same period. These two factors therefore expand the understanding of the development of trust: (1) The establishment of the nation state as the organising concept and all-encompassing container of the other institutions (democracy, parliamentarism, trade unions, etc.); (2) The open hand strategy in dealing with deviant opinions, based on democratic compromises and a policing of consent ideology.

Originality/value

The article combines the understanding of the first crisis of modernity and the development of trust and contain a comparative analysis of the development of trust in four different countries. The investigation thus clarifies the correlation between specific historical factors and the levels of trust.

Details

Corporate Communications: An International Journal, vol. 26 no. 1
Type: Research Article
ISSN: 1356-3289

Keywords

Open Access
Article
Publication date: 26 November 2021

Kristina Gyllensten and Marianne Torner

The aim of this study was to explore the organizational and social prerequisites for employees' participative and rule-compliant information security behaviour in Swedish nuclear…

1572

Abstract

Purpose

The aim of this study was to explore the organizational and social prerequisites for employees' participative and rule-compliant information security behaviour in Swedish nuclear power production and its related industry. These industries are high-risk activities that must be meticulously secured. Protecting the information security in the related organizations is an essential aspect of this.

Design/methodology/approach

Individual in-depth interviews were conducted with 24 employees in two organizations within the nuclear power industry in Sweden.

Findings

We found that prerequisites for employees' participative and rule-compliant information security behaviour could be categorized into structural, social and individual aspects. Structural aspects included well-adapted rules, knowledge support and resources. Social aspects included a supportive organizational culture, collaboration and adequate resources, and individual aspects included individual responsibility.

Originality/value

The qualitative approach of the study provided comprehensive descriptions of the identified preconditions. The results may thus enable organizations to better promote conditions important for information security in a high-risk industry.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 24 August 2018

Petru Lucian Curseu and Helen Pluut

This paper aims to test the influence of external information search (EIS) on knowledge elaboration and group cognitive complexity (GCC) under the moderating effect of absorptive…

1573

Abstract

Purpose

This paper aims to test the influence of external information search (EIS) on knowledge elaboration and group cognitive complexity (GCC) under the moderating effect of absorptive capacity (AC is indicated by prior knowledge base and gender diversity).

Design/methodology/approach

The results of three studies (one field study and two experimental studies) are reported. The first study tests the interaction between EIS and the two dimensions of AC on group knowledge elaboration in a sample of 65 organizational groups. In the second study, EIS was directly manipulated and the interaction with AC in a sample of 65 groups was tested. In the last experimental study, the AC of the boundary spanner (highest level of expertise versus lowest level of expertise) was manipulated and the effects of EIS in a sample of 37 groups were tested.

Findings

The first study reveals a significant interaction between EIS and prior knowledge base on knowledge elaboration and points toward a compensatory interplay of EIS and AC on GCC. The results of the second study indicate that EIS increases the time spent on task, as well as the efficiency of knowledge integration (GCC per unit of time). Furthermore, EIS has the strongest positive effect on GCC in groups in which at least one of the AC dimensions is average or high. The results of the last study show that the AC of the boundary spanner compensates for the lack of absorptive capacity of the group and also show that the cognitive distance between the boundary spanner and the rest of the group has a negative influence on the efficiency of knowledge integration in groups.

Research limitations/implications

The limitations of Study 1, common to non-experimental research (related to causality), are dealt with in the second and third studies that establish causality between EIS and GCC.

Practical implications

The paper has important implications for the management of information search effort in organizational groups, in particular the groups are advised to: engage in EIS to increase their cognitive repertoire and cognitive complexity, delegate, when possible, their most competent members to engage in boundary spanning activities as they will maximize the cognitive benefits of EIS and finally minimize the cognitive dissimilarity between the boundary spanner and the rest of the group to facilitate the effective integration of novel insights into the group cognition.

Originality/value

This study is among the first empirical attempts to uncover the causal effect of EIS on knowledge elaboration and GCC in groups and to uncover the role of the boundary spanner in the EIS efforts.

Details

Team Performance Management: An International Journal, vol. 24 no. 7/8
Type: Research Article
ISSN: 1352-7592

Keywords

Access

Only Open Access

Year

Content type

Article (22)
1 – 10 of 22