Search results
1 – 10 of 22Alessandro Creazza, Claudia Colicchia, Salvatore Spiezia and Fabrizio Dallari
The purpose of this paper is to explore the perceptions of supply chain managers regarding the elements that make up cyber supply chain risk management (CSCRM) and the related…
Abstract
Purpose
The purpose of this paper is to explore the perceptions of supply chain managers regarding the elements that make up cyber supply chain risk management (CSCRM) and the related level of alignment, to understand how organizations can deploy a CSCRM strategy that goes beyond the technical, internal functioning of single companies and moves beyond the dyad, to create a better alignment that can ultimately lead to improved cyber supply chain resilience.
Design/methodology/approach
An exploratory survey in the fast-moving consumer goods (FMCG) industry involving over 100 organizations in Italy was conducted. Results were analysed through one-way analysis of variance, to appraise the differences in the perceptions of the various actors of the FMCG supply chain (Manufacturers, Logistics Service Providers, Retailers).
Findings
While a certain degree of alignment of the perceptions across the FMCG supply chain exists, the study found that Logistics Service Providers can play a crucial role as orchestrators of the CSCRM process towards a more “supply chain-oriented” response to cyber threats and risk events. The research also highlights the necessity to see people as key elements for improving cyber resilience in the supply chain.
Research limitations/implications
Through a vertical analysis of a supply chain, the study extends the existing theory on CSCRM, which contains isolated case studies. It also contributes to extending the current theory with the proposal of the paradigm of Logistics Service Providers as orchestrators of the CSCRM process. The study combines different classifications of CSCRM initiatives and embraces theories external to the supply chain literature.
Practical implications
Through the empirical analysis, this study helps practitioners in streamlining the design of cyber security strategies and actions that span across the supply chain for better alignment. This could mean more coordination of efforts and more targeted/accurate investments in CSCRM initiatives. The study invites practitioners to ponder the perceived relevance of the human factor as a source of risk and the perceived importance of countermeasures aimed at mitigating risk events stemming from that source.
Originality/value
By focusing on an entire supply chain, this is one of the first studies on CSCRM that goes beyond the dyad. Its originality also lies in its use of the investigations of perceptions along the supply chain as pillars for the alignment of CSCRM strategies and mitigation initiatives. This original perspective allows for discovering the role of Logistics Service Providers in driving the alignment of the efforts towards better outcomes of the CSCRM process.
Details
Keywords
The remarkable increase of sophistication of artificial intelligence in recent years has already led to its widespread use in martial applications, the potential of so-called…
Abstract
Purpose
The remarkable increase of sophistication of artificial intelligence in recent years has already led to its widespread use in martial applications, the potential of so-called “killer robots” ceasing to be a subject of fiction. The purpose of this paper is to re-examine the consequences of the availability of lethal autonomous robots (LARs) on global peace.
Design/methodology/approach
Virtually without exception, the aforementioned potential of LARs has generated fear, as evidenced by a mounting number of academic articles calling for the ban on their development and deployment. An analysis of the existing ethical objections to LARs is used as a vehicle for their critique and the advancement of an alternative.
Findings
The presented analysis shows the contemporary thought to be deficient in philosophical rigour, these deficiencies leading to a different view, one favourable to the development of LARs.
Originality/value
The emergent thesis is that LARs can in fact be a force for peace, leading to fewer and less deadly wars.
Details
Keywords
Akash Kalra and Munshi Naser Ibne Afzal
For many global firms and corporate oligopolies, transfer pricing is essential. The transfer pricing literature as it is currently written is succinctly summarized in this study…
Abstract
Purpose
For many global firms and corporate oligopolies, transfer pricing is essential. The transfer pricing literature as it is currently written is succinctly summarized in this study. The authors offer a thorough analysis of transfer pricing research in this study. This review sheds light on the top researchers, approaches, conclusions, theoretical and empirical gaps, and upcoming issues of transfer pricing research over the previous nine years through a methodical analysis of 29 research publications from the Scopus database (2014–2022). To help graduate students pursue further degrees in this area, such as a master's, thesis or PhD, this study will highlight five research issues.
Design/methodology/approach
This essay looks at five significant areas of tax avoidance and transfer pricing research. Some of these issues include determining the impact of transfer pricing regulations on various types of multinational corporations, assessing the effectiveness of transfer pricing regulations in preventing tax evasion, examining various policy options and determining the impact of transfer pricing on other economic outcomes using a systematic literature review.
Findings
The findings of this review demonstrate the need for transfer pricing research to look more closely at transfer pricing as a tool for business in addition to compliance and tax management.
Originality/value
This analysis concludes with future directions for transfer pricing research.
Details
Keywords
Aderinola Ololade Dunmade and Adeyinka Tella
This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.
Abstract
Purpose
This paper aims to explore the role of libraries and librarians in promoting appropriate cyberethical behaviour among postgraduate students in Nigeria.
Design/methodology/approach
Using content analysis and a review of relevant literature, this study examines the challenges that librarians face in enforcing cyberethics and highlights the strategies that libraries can adopt to promote responsible online behaviour.
Findings
This paper identifies the lack of awareness among postgraduate students regarding cybersecurity risks and the need for training and resources for librarians as key challenges in promoting cyberethics.
Originality/value
This study recommends that libraries provide access to training resources and develop policies and guidelines to promote cyberethics among postgraduate students. Overall, this paper argues that libraries and librarians can play a critical role in promoting responsible online behaviour and ensuring the safety and security of postgraduate students in Nigeria.
Details
Keywords
Eline Punt, Jochen Monstadt, Sybille Frank and Patrick Witte
Cyber resilience has emerged as an approach for seaports to deal with cyberattacks; it emphasizes ports’ ability to prepare for an attack and to keep operating and recover…
Abstract
Purpose
Cyber resilience has emerged as an approach for seaports to deal with cyberattacks; it emphasizes ports’ ability to prepare for an attack and to keep operating and recover quickly. However, little research has been undertaken on the challenges of governing cyber risks in seaports. This study aims to address this gap.
Design/methodology/approach
Governing cyber resilience is shaped by distributed responsibilities, uncertainties and ambiguities. The authors use this conceptualization to explore the governance of cyber risks in seaports, taking the Port of Rotterdam as a case study and analyzing semistructured interviews with stakeholders, participatory observation and policy documents and legislation.
Findings
The authors found that many strategies for governing cyber risks remain dedicated to protecting computer systems against cyberattacks. Nevertheless, port stakeholders have also developed strategies in anticipation of disruptions. However, these strategies appear informal and uncoordinated due to a lack of information exchange, insufficient knowledge regarding cyber risks and disagreement about how to make the Port of Rotterdam cyber resilient. What mainly hampers the cyber resilience of the port is the lack of a comprehensive regulatory framework and economic incentives. The authors conclude that resilience is merely an ideal at the Port of Rotterdam, meaning related governance strategies remain incremental and await institutionalization.
Originality/value
This paper offers insights into the cyber resilience of critical socio-technical systems, which have been underexposed in cyber resilience debates, but, when exploited, can manifest in large-scale disruptions.
Details
Keywords
Kanthana Ditkaew and Muttanachai Suttipun
The main objective of this study is to examine the impact of audit data analytics (ADA) on audit quality (AQ) and audit review continuity (ARC).
Abstract
Purpose
The main objective of this study is to examine the impact of audit data analytics (ADA) on audit quality (AQ) and audit review continuity (ARC).
Design/methodology/approach
Using 452 CPAs in Thailand as samples, mail questionnaires were used and sent to collect the data. Descriptive analysis, correlation matrix and path analysis were used to analyze the data.
Findings
The results of this study indicated that audit data analytics had a positive impact on AQ and ARC. Cybersecurity, used as a moderator in this study, was found to be the interaction between ADA, AQ and review continuity.
Practical implications
Auditors and audit firms can consider using big data in their data analytics to improve AQ and ARC.
Originality/value
Resource advantage theory has been used in this study to explain the impact of ADA on AQ and ARC in Thailand.
Details
Keywords
Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…
Abstract
Purpose
Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.
Design/methodology/approach
Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.
Findings
Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.
Originality/value
These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.
Details
Keywords
Øystein Pedersen Dahlen and Helge Skirbekk
The aim of this article is to explain why there is a higher degree of trust in some countries compared to others – and which are the main historical factors that explain these…
Abstract
Purpose
The aim of this article is to explain why there is a higher degree of trust in some countries compared to others – and which are the main historical factors that explain these differences. The main focus is on how governments relate to and communicate with its citizens in the times of crises.
Design/methodology/approach
The analysis is based on comparative historical sociology with a modernity perspective with a special focus on Norway and Scandinavia. The authors do a parallel demonstration of history to confirm and expand the theories that could explain the high level of trust in these countries. The authors also bring in the Spanish experience in order to testify how governmental reactions affected the different levels of trust.
Findings
Scandinavian governments allowed open communication between different social classes on difficult and important issues, in contrast to Spain in the same period. These two factors therefore expand the understanding of the development of trust: (1) The establishment of the nation state as the organising concept and all-encompassing container of the other institutions (democracy, parliamentarism, trade unions, etc.); (2) The open hand strategy in dealing with deviant opinions, based on democratic compromises and a policing of consent ideology.
Originality/value
The article combines the understanding of the first crisis of modernity and the development of trust and contain a comparative analysis of the development of trust in four different countries. The investigation thus clarifies the correlation between specific historical factors and the levels of trust.
Details
Keywords
Kristina Gyllensten and Marianne Torner
The aim of this study was to explore the organizational and social prerequisites for employees' participative and rule-compliant information security behaviour in Swedish nuclear…
Abstract
Purpose
The aim of this study was to explore the organizational and social prerequisites for employees' participative and rule-compliant information security behaviour in Swedish nuclear power production and its related industry. These industries are high-risk activities that must be meticulously secured. Protecting the information security in the related organizations is an essential aspect of this.
Design/methodology/approach
Individual in-depth interviews were conducted with 24 employees in two organizations within the nuclear power industry in Sweden.
Findings
We found that prerequisites for employees' participative and rule-compliant information security behaviour could be categorized into structural, social and individual aspects. Structural aspects included well-adapted rules, knowledge support and resources. Social aspects included a supportive organizational culture, collaboration and adequate resources, and individual aspects included individual responsibility.
Originality/value
The qualitative approach of the study provided comprehensive descriptions of the identified preconditions. The results may thus enable organizations to better promote conditions important for information security in a high-risk industry.
Details
Keywords
Petru Lucian Curseu and Helen Pluut
This paper aims to test the influence of external information search (EIS) on knowledge elaboration and group cognitive complexity (GCC) under the moderating effect of absorptive…
Abstract
Purpose
This paper aims to test the influence of external information search (EIS) on knowledge elaboration and group cognitive complexity (GCC) under the moderating effect of absorptive capacity (AC is indicated by prior knowledge base and gender diversity).
Design/methodology/approach
The results of three studies (one field study and two experimental studies) are reported. The first study tests the interaction between EIS and the two dimensions of AC on group knowledge elaboration in a sample of 65 organizational groups. In the second study, EIS was directly manipulated and the interaction with AC in a sample of 65 groups was tested. In the last experimental study, the AC of the boundary spanner (highest level of expertise versus lowest level of expertise) was manipulated and the effects of EIS in a sample of 37 groups were tested.
Findings
The first study reveals a significant interaction between EIS and prior knowledge base on knowledge elaboration and points toward a compensatory interplay of EIS and AC on GCC. The results of the second study indicate that EIS increases the time spent on task, as well as the efficiency of knowledge integration (GCC per unit of time). Furthermore, EIS has the strongest positive effect on GCC in groups in which at least one of the AC dimensions is average or high. The results of the last study show that the AC of the boundary spanner compensates for the lack of absorptive capacity of the group and also show that the cognitive distance between the boundary spanner and the rest of the group has a negative influence on the efficiency of knowledge integration in groups.
Research limitations/implications
The limitations of Study 1, common to non-experimental research (related to causality), are dealt with in the second and third studies that establish causality between EIS and GCC.
Practical implications
The paper has important implications for the management of information search effort in organizational groups, in particular the groups are advised to: engage in EIS to increase their cognitive repertoire and cognitive complexity, delegate, when possible, their most competent members to engage in boundary spanning activities as they will maximize the cognitive benefits of EIS and finally minimize the cognitive dissimilarity between the boundary spanner and the rest of the group to facilitate the effective integration of novel insights into the group cognition.
Originality/value
This study is among the first empirical attempts to uncover the causal effect of EIS on knowledge elaboration and GCC in groups and to uncover the role of the boundary spanner in the EIS efforts.
Details