Search results

1 – 10 of 17
Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 10 April 2024

Tze Yin Khaw, Azlan Amran and Ai Ping Teoh

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity…

Abstract

Purpose

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.

Design/methodology/approach

This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study’s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.

Findings

This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.

Originality/value

This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.

Details

Journal of Systems and Information Technology, vol. 26 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Book part
Publication date: 23 April 2024

Maha Shehadeh

In an era where sustainability and digital transformation are becoming indispensable pillars of successful business operations, this chapter explores the potent synergy between…

Abstract

In an era where sustainability and digital transformation are becoming indispensable pillars of successful business operations, this chapter explores the potent synergy between these two paradigms. As businesses strive to align their operations with Environmental, Social, and Governance (ESG) goals, digital transformation emerges as a powerful enabler. This chapter delves into how digital technologies are not only revolutionizing traditional business models but are also paving the way toward more sustainable practices. From data-driven decision-making to improved resource management, this chapter discusses the diverse ways in which digital transformation contributes to sustainability. It also offers an in-depth analysis of real-world case studies, illustrating how businesses have successfully integrated digital transformation in their pursuit of sustainability. Recognizing the potential roadblocks, this chapter also addresses the challenges businesses may face in this journey, including cybersecurity risks, data privacy issues, and the need for technological literacy. It further presents strategies to navigate these challenges and underscores the importance of preparedness in managing potential risks. Finally, this chapter ventures into the future of digital transformation, evaluating current trends and predictions, and their potential impact on sustainable business practices.

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 May 2024

Samer Abaddi

Artificial intelligence (AI) is a powerful and promising technology that can foster the performance, and competitiveness of micro, small and medium enterprises (MSMEs). However…

Abstract

Purpose

Artificial intelligence (AI) is a powerful and promising technology that can foster the performance, and competitiveness of micro, small and medium enterprises (MSMEs). However, the adoption of AI among MSMEs is still low and slow, especially in developing countries like Jordan. This study aims to explore the elements that influence the intention to adopt AI among MSMEs in Jordan and examines the roles of firm innovativeness and government support within the context.

Design/methodology/approach

The study develops a conceptual framework based on the integration of the technology acceptance model, the resource-based view, the uncertainty reduction theory and the communication privacy management. Using partial least squares structural equation modeling – through AMOS and R studio – and the importance–performance map analysis techniques, the responses of 471 MSME founders were analyzed.

Findings

The findings reveal that perceived usefulness, perceived ease of use and facilitating conditions are significant drivers of AI adoption, while perceived risks act as a barrier. AI autonomy positively influences both firm innovativeness and AI adoption intention. Firm innovativeness mediates the relationship between AI autonomy and AI adoption intention, and government support moderates the relationship between facilitating conditions and AI adoption intention.

Practical implications

The findings provide valuable insights for policy formulation and strategy development aimed at promoting AI adoption among MSMEs. They highlight the need to address perceived risks and enhance facilitating conditions and underscore the potential of AI autonomy and firm innovativeness as drivers of AI adoption. The study also emphasizes the role of government support in fostering a conducive environment for AI adoption.

Originality/value

As in many emerging nations, the AI adoption research for MSMEs in Jordan (which constitute 99.5% of businesses), is under-researched. In addition, the study adds value to the entrepreneurship literature and integrates four theories to explore other significant factors such as firm innovativeness and AI autonomy.

Details

Journal of Entrepreneurship in Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4604

Keywords

Article
Publication date: 8 May 2024

Ahed Habib, Abdulrahman Alnaemi and Maan Habib

Earthquakes pose a significant challenge to human safety and the durability of infrastructure, highlighting the urgent need for innovative disaster management strategies. This…

Abstract

Purpose

Earthquakes pose a significant challenge to human safety and the durability of infrastructure, highlighting the urgent need for innovative disaster management strategies. This study addresses the gap in current earthquake disaster management approaches, which are often related to issues of transparency, centralization and sluggish response times. By exploring the integration of blockchain technology into seismic hazard management, the purpose of the research is to overcome these limitations by offering a novel framework for integrating blockchain technology into earthquake risk mitigation and disaster management strategies of smart cities.

Design/methodology/approach

This study develops an innovative approach to address these issues by introducing a blockchain-based seismic monitoring and automated decision support system for earthquake disaster management in smart cities. This research aims to capitalize on the benefits of blockchain technology, specifically its real-time data accessibility, decentralization and automation capabilities, to enhance earthquake disaster management. The methodology employed integrates seismic monitoring data into a blockchain framework, ensuring accurate, reliable and comprehensive information. Additionally, smart contracts are utilized to handle decision-making and enable rapid responses during earthquake disasters, offering an effective alternative to traditional approaches.

Findings

The study results highlight the system’s potential to foster reliability, decentralization and efficiency in earthquake disaster management, promoting enhanced collaboration among stakeholders and facilitating swift actions to minimize human and capital loss. This research lays the foundation for further exploration of blockchain technology’s practical applications in other disaster management contexts and its potential to transform traditional practices.

Originality/value

Current methodologies, while contributing to the reduction of earthquake-related impacts, are often hindered by limitations such as lack of transparency, centralization and slow response times. In contrast, the adoption of blockchain technology can address these challenges and offer benefits over various aspects, including decentralized control, improved security, real-time data accessibility and enhanced inter-organizational collaboration.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 8 May 2024

Lan Dang and Fernando Merino

This study aims to investigate the impact of foreign direct investment (FDI) on national digital capability, specifically differentiating the impact between FDI greenfield and…

Abstract

Purpose

This study aims to investigate the impact of foreign direct investment (FDI) on national digital capability, specifically differentiating the impact between FDI greenfield and mergers and acquisitions (M&A). The research also investigates factors shaping digital capabilities, encompassing government transparency and absorptive capability, while exploring the mediating influence of absorptive capability in the FDI–digital capability relationship.

Design/methodology/approach

An econometric model has been developed to examine the interrelationship between national digital capability, FDI inflows, national absorptive capability and government transparency. The data set encompasses 55 countries over a period of nine years (2013–2021). National digital capability data is derived from the well-established index published by the World Competitive Centre (WCC). The sources of the explanatory variables align with standard practices, drawing from reputable institutions (UNCTAD and the World Bank, among others).

Findings

The findings reveal a significant positive impact of FDI, particularly in greenfield investments, on national digital capability. Government transparency and research and development (R&D) investment are crucial factors contributing to digital capabilities. Additionally, the absorptive capacity, reflected by R&D investment, also emerges as a potential moderating factor, influencing the impact of FDI inflows on digital capabilities.

Practical implications

The results recommend that policymakers and stakeholders should carefully consider the role of FDI, especially in greenfield investments, as a catalyst for enhancing national digital capability. The findings also underscore the significance of promoting government transparency and directing investments towards R&D to nurture digital capabilities. Moreover, understanding the mediating role of absorptive capability can inform strategies aimed at optimizing the impact of FDI on digital capabilities.

Originality/value

This study contributes uniquely to the existing literature by being the first to systematically explore the influence of FDI on national digital capability. Furthermore, it presents innovative empirical findings on the role of absorptive capability in enhancing the FDI impact on national digital capability, an area that remains relatively uncharted in current literature.

Details

International Journal of Development Issues, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1446-8956

Keywords

Article
Publication date: 3 May 2024

Debyani Mukherjee Rawal

This research paper investigates the theoretical frameworks encompassing a nuanced analysis of the digital divide in the Indian educational context, recognising that it is not…

Abstract

Purpose

This research paper investigates the theoretical frameworks encompassing a nuanced analysis of the digital divide in the Indian educational context, recognising that it is not merely a matter of technology access but also the ability to effectively use the resource for enhancing learning outcomes. This research provides valuable insights for fostering a more equitable and digitally inclusive learning environment by integrating conceptual insights with empirical evidence. The New Education Policy (NEP), India 2020 firmly emphasises the appropriate integration of technology into the teaching-learning process to develop relevant competencies. The pertinent question is, for India to conquer the second digital divide challenge, is the pace of technology accessibility and skill development sufficient?

Design/methodology/approach

The paper is a desk research, using secondary data from the Unified District Information System for Education (UDISE+), the Indian Government database of schools. A structured dataset has been created for all years, where states are grouped in descending ranking order of availability of infrastructure and teachers trained. A colour key segregates the States into three zones demonstrating their different levels of performance – high (green), moderate (blue) and low (yellow). The purpose is to identify state/s that have moved from one zone to another and, thereafter, analyse the reasons behind the movement.

Findings

Almost all states remained in the same digital resource availability zone for the four years studied, except for a limited few. Despite government interventions through higher budget allocation and targeted policies, growth rates of teacher training in computer usage slowed down post-COVID-19. A high positive correlation between Teachers' training in computer usage and the availability of computer and Internet facilities in schools indicates that an increase in digital infrastructure in schools is highly linked to teachers' training in computer usage and would ultimately translate into better use of digital resources to impart equitable education opportunities.

Research limitations/implications

Primary data collection through interviews might have added to the critical findings. Therefore, researchers are encouraged to test the proposed propositions further on a case-by-case basis for any state under consideration.

Practical implications

Enhancing digital infrastructure in schools and building digital competence in teachers must be understood in the context of the learning organisation and the beneficiaries' attitudes at the meso-level to expand stakeholder motivation towards digital internalisation. This requires continuous engagement with education institutions as professional learning organisations, which will thereby help develop a decentralised context for teacher competency building. Collaboration, continuous monitoring of the outcomes of professional development programs, and sharing best practices are crucial in improving teacher readiness for digital education.

Social implications

Access to tangible resources, such as computers, Internet connectivity and educational software, and developing intangible resources, such as teacher digital competencies, will play a pivotal role in shaping students' learning experiences. By studying the discrepancies in digital resource accessibility and teacher technology adoption, this research endeavours to add to the efforts towards enhancing the educational landscape.

Originality/value

This paper seeks to address a critical issue in the Indian education system and contribute to the ongoing effort to prevent the widening of the second and third digital divide in schools, and help achieve UN SDG Goals 4 and 10.

Details

Journal of Professional Capital and Community, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-9548

Keywords

Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. 37 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 10 of 17