Search results

1 – 10 of 68
Article
Publication date: 6 June 2024

Dien Van Tran, Phuong Van Nguyen, Demetris Vrontis, Sam Thi Ngoc Nguyen and Phuong Uyen Dinh

Government employees must comply with policies on information security regulations, online security practices, social networking usage, internet addiction, online cyberthreats and…

Abstract

Purpose

Government employees must comply with policies on information security regulations, online security practices, social networking usage, internet addiction, online cyberthreats and other related habits. These activities are considered cybersecurity behaviors. Government social media (GSM) accounts are increasingly used to educate employees about cybersecurity risks. To support the effectiveness of cybersecurity practices in government organizations, the purpose of this study is to investigate the impacts of GSM and organizational policy compliance on employees’ cybersecurity awareness, motivation and behaviors.

Design/methodology/approach

Data were obtained by administering a questionnaire survey to public personnel in Vietnam. A total of 330 valid responses were obtained, and the research hypotheses were tested using partial least squares–structural equation modeling.

Findings

First, cybersecurity awareness enhances information protection motivation and employee protective behavior. Second, GSM has positive impacts on cybersecurity knowledge and information protection motivation. Third, there is a strong positive association between information protection motivation and employee protective behavior. Finally, while organizational compliance significantly increases cybersecurity awareness, its impact on employee protective behavior is ind irect.

Originality/value

This research enhances the literature on the behavioral dimension of cybersecurity. The primary objective of this study is to assess the influence of cybersecurity awareness on protective behaviors rather than intents and attitudes alone. Furthermore, this research integrates protection motivation theory and cultivation theory to provide a more thorough assessment of cybersecurity awareness and protective behavior. By investigating the impact of GSM on the level of cybersecurity awareness among employees within government organizations, this study provides valuable insights into the efficacy of recent governmental initiatives aimed at fostering cybersecurity.

Details

Journal of Asia Business Studies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 12 September 2024

Ahmed Ali Otoom, Issa Atoum, Heba Al-Harahsheh, Mahmoud Aljawarneh, Mohammed N. Al Refai and Mahmoud Baklizi

The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity…

Abstract

Purpose

The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity through collaborative efforts in the higher education sector. The EduCERT framework addresses this gap by enhancing cyber security and mitigating cybercrime through collaborative incident management, knowledge sharing and university awareness campaigns.

Design/methodology/approach

The authors propose an EduCERT framework following the design science methodology. The framework is developed based on literature and input from focus group experts. Moreover, it is grounded in the principles of the technology-organization-environment framework, organizational learning and diffusion of innovations theory.

Findings

The EduCERT has eight components: infrastructure, governance, knowledge development, awareness, incident management, evaluation and continuous improvement. The framework reinforces national cybersecurity through cooperation between universities and the National Computer Emergency Response Team. The framework has been implemented in Jordan to generate a cybersecurity foundation for higher education. Evaluating the EduCERT framework’s influence on national cybersecurity highlights the importance of adopting comprehensive cyber-security policies and controls. The framework application shows its relevance, effectiveness, adaptability and alignment with best practices.

Research limitations/implications

Despite the impact of applying the framework in the Jordanian context, it is essential to acknowledge that the proposed EduCERT framework’s practical implementation may encounter challenges specific to diverse international educational environment sectors. However, framework customization for global applicability could address varied educational institutions in other countries.

Practical implications

Furthermore, the proposed EduCERT framework is designed with universal applicability that extends beyond the specific country’s context. The principles and components presented in the framework can serve as valuable design advice for establishing collaborative and resilient cybersecurity frameworks in educational settings worldwide. Therefore, the research enhances the proposed framework’s practical utility and positions it as an invaluable contribution to the broader discourse on global cybersecurity in academia.

Originality/value

This paper enhances national cybersecurity in the higher education sector, addressing the need for a more integrated response mechanism. The EduCERT framework demonstrates its effectiveness, adaptability and alignment with best practices, offering valuable guidance for global educational institutions.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 August 2024

Mohd Ismail Abidin, K. Kiran and Samsul Farid Samsuddin

This study examines the preparedness and responsiveness of Malaysian academic librarians in handling disruptions in library services during a disaster.

Abstract

Purpose

This study examines the preparedness and responsiveness of Malaysian academic librarians in handling disruptions in library services during a disaster.

Design/methodology/approach

This qualitative approach involved semi-structured interviews with decision-makers, chief librarians and library managers from five selected public universities.

Findings

Thematic and qualitative data analysis produced several key themes based on (1) disaster preparedness involving policies, plans, asset protection, risk management, coordination of disaster management and preparative measures; and (2) disaster response involving strategies for information and communication access, community engagement, emergency response teams and procedures, and resource availability.

Practical implications

The findings are expected to be useful for policymakers in formulating policies and guidelines for library disaster management plans.

Social implications

The interruptions of academic library services during a disaster may result in the disruption of the information sources and social information networks of students, academics and researchers alike. Effective disaster management is also the library’s responsibility to protect collections that belong to society at large.

Originality/value

This is one of the first attempts in disaster management research to focus on the preparedness and responses of academic libraries in Malaysia in the face of disasters. Therefore, the results of this study can be used as a baseline for policymakers to prepare policies, guidelines and manuals for management in the event of a disaster.

Details

Library Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 13 September 2024

Malin Ågren

This study investigates how communication is used by a Swedish public authority to legitimate the responsibilization of preparedness, i.e. how the state encourages individual…

Abstract

Purpose

This study investigates how communication is used by a Swedish public authority to legitimate the responsibilization of preparedness, i.e. how the state encourages individual citizens to take more responsibility for their security.

Design/methodology/approach

A multimodal discursive approach drawing on multimodal narrative analysis of video clips and multimodal critical discourse analysis (MCDA) is used to examine how the responsibilization of preparedness is legitimated in video material published on Swedish Civil Contingencies Agency's (MSB’s) YouTube channel.

Findings

The study finds that the responsibilization of preparedness is legitimated through an ongoing but evolving normalization of threat. The findings also show how responsibilization is legitimated in moralizing terms of individual contribution to society, which may indicate a return from neo-liberal values to more traditional Swedish collectivist values.

Originality/value

The study shows how communication around preparedness and responsibilization is discursively constructed and legitimated through multimodal features, while previous research has mainly focused on verbal or written communication.

Details

Corporate Communications: An International Journal, vol. 29 no. 7
Type: Research Article
ISSN: 1356-3289

Keywords

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-83549-098-3

Open Access
Article
Publication date: 5 September 2024

Amer Jazairy, Mazen Brho, Ila Manuj and Thomas J. Goldsby

Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this…

1019

Abstract

Purpose

Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this gap, this research examines the effect of SC cyber risk management strategies on integration decisions for cybersecurity (with suppliers, customers, and internally) to enhance the SC’s cyber resilience and robustness.

Design/methodology/approach

A research model grounded in the supply chain risk management (SCRM) literature, with roots in the Dynamic Capabilities View and the Relational View, was developed. Survey responses of 388 SC managers at US manufacturers were obtained to test the model.

Findings

An impact of SC cyber risk management strategies on internal cyber integration was detected, which in turn impacted external cyber integration with both suppliers and customers. Further, a positive effect of internal and customer cyber integration on both cyber resilience and robustness was found, while cyber integration with suppliers impacted neither.

Practical implications

Industry practitioners may adapt certain risk management and integration strategies to enhance the cybersecurity posture of their SCs.

Originality/value

This research bridges between the established domain of SCRM and the emergent field of SC cybersecurity by forming and testing novel relationships between SCRM-rooted constructs tailored to an SC cyber risks context.

Details

International Journal of Physical Distribution & Logistics Management, vol. 54 no. 11
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 6 August 2024

Tika Widiastuti, Imron Mawardi, Al-Shami Samer Ali, Nikmatul Atiya, Lina Nugraha Rani, Anidah Binti Robani and Muhammad Ubaidillah Al Mustofa

This study aims to examine the factors influencing the intention of Muslim Millennial Generation in Indonesia to donate cash waqf digitally.

Abstract

Purpose

This study aims to examine the factors influencing the intention of Muslim Millennial Generation in Indonesia to donate cash waqf digitally.

Design/methodology/approach

A quantitative approach was employed, surveying 284 Muslim Millennial Generation in Indonesia. The study integrated the Decomposed Theory of Planned Behavior (DTPB) and Technology Acceptance Model (TAM) to investigate the key factors driving the intention to contribute to cash waqf digitally. The researcher analyzed data using Partial Least Squares Structural Equation Modeling (PLS-SEM).

Findings

The findings of this study indicate that all hypotheses related to the variables are supported, including both direct and indirect correlations, except for perceived religiosity. This study confirms that the decision of millennials to donate cash waqf online is influenced by various factors, including their attitudes, the environment they are in, their ability to control their behavior, their perception of the ease and usefulness of technology and the availability of suitable facilities. Knowledge of technology is also a decisive component. Nevertheless, this study yielded intriguing findings that the perceived level of religious devotion does not impact the millennials’ willingness to make online cash waqf donations.

Practical implications

This study’s findings offer valuable insights for waqf institutions, providing a better understanding of Muslim millennials’ characteristics and preferences regarding spending, donations and waqf activities. This understanding can be instrumental in enhancing innovative digital platforms for cash waqf in the digital economy era.

Originality/value

This study uniquely explores the determinants of digital cash waqf donations among Muslim Millennial Generation in Indonesia. Contributions include integrating the DTPB and the TAM for a comprehensive analysis. Cross-disciplinary perspectives from behavioral economics and digital marketing enrich the research. Comparative studies and potential longitudinal analysis enhance depth, providing nuanced insights into the dynamic factors shaping digital donation behavior among Muslim millennials.

Details

Journal of Islamic Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1759-0833

Keywords

Article
Publication date: 10 April 2024

Tze Yin Khaw, Azlan Amran and Ai Ping Teoh

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity…

Abstract

Purpose

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.

Design/methodology/approach

This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study’s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.

Findings

This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.

Originality/value

This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.

Details

Journal of Systems and Information Technology, vol. 26 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Book part
Publication date: 23 April 2024

Maha Shehadeh

In an era where sustainability and digital transformation are becoming indispensable pillars of successful business operations, this chapter explores the potent synergy between…

Abstract

In an era where sustainability and digital transformation are becoming indispensable pillars of successful business operations, this chapter explores the potent synergy between these two paradigms. As businesses strive to align their operations with Environmental, Social, and Governance (ESG) goals, digital transformation emerges as a powerful enabler. This chapter delves into how digital technologies are not only revolutionizing traditional business models but are also paving the way toward more sustainable practices. From data-driven decision-making to improved resource management, this chapter discusses the diverse ways in which digital transformation contributes to sustainability. It also offers an in-depth analysis of real-world case studies, illustrating how businesses have successfully integrated digital transformation in their pursuit of sustainability. Recognizing the potential roadblocks, this chapter also addresses the challenges businesses may face in this journey, including cybersecurity risks, data privacy issues, and the need for technological literacy. It further presents strategies to navigate these challenges and underscores the importance of preparedness in managing potential risks. Finally, this chapter ventures into the future of digital transformation, evaluating current trends and predictions, and their potential impact on sustainable business practices.

1 – 10 of 68