Search results

1 – 10 of 137
Article
Publication date: 3 March 2023

Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…

Abstract

Purpose

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.

Design/methodology/approach

This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.

Findings

The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.

Originality/value

Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 5 April 2024

Karen D. Lynden

This study provides a meta-review of global virtual team (GVT)–related reviews, creating a resource that highlights dominant themes, research trends and shifts in topics over time…

Abstract

Purpose

This study provides a meta-review of global virtual team (GVT)–related reviews, creating a resource that highlights dominant themes, research trends and shifts in topics over time culminating in a summary of opportunities for future research. By analyzing and grouping the evidence presented in previous research, this meta-review provides key insights toward future research and managerial implications.

Design/methodology/approach

This meta-review identifies 35 existing GVT-related reviews across 32 publication outlets, providing a longitudinal and cross-disciplinary view of GVT research to date.

Findings

Results of the analysis reveal over time that there has been a largely adopted reconceptualization of the GVT paradigm toward a continuum of virtuality. There has been a shift in the view of the cross-cultural and global components of GVTs toward a recognition that a greater variance of dimensionality exists. Additionally, popular themes across the literature emerge, notably, virtuality, concepts of culture, trust, leadership and communication technology.

Originality/value

As a multidisciplinary GVT-focused meta-review, this study complements previous efforts by taking a tour across this wide topic and is dedicated to those who are researching, teaching, working and managing GVT-related strategies. The reviews selected represent work published across multiple literature streams, providing a comprehensive and forward thinking perspective.

Details

Cross Cultural & Strategic Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5794

Keywords

Article
Publication date: 20 April 2023

Vamsi Desam and Pradeep Reddy CH

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and…

Abstract

Purpose

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and administration make symmetric encryption difficult. The purpose of this paper is to address these concerns, the novel hybrid partial differential elliptical Rubik’s cube algorithm is developed in this study as an asymmetric image encryption approach. This novel algorithm generates a random weighted matrix, and uses the masking method on image pixels with Rubik’s cube principle. Security analysis has been conducted, it enhances and increases the reliability of the proposed algorithm against a variety of attacks including statistical and differential attacks.

Design/methodology/approach

In this light, a differential elliptical model is designed with two phases for image encryption and decryption. A modified image is achieved by rotating and mixing intensities of rows and columns with a masking matrix derived from the key generation technique using a unique approach based on the elliptic curve and Rubik’s cube principle.

Findings

To evaluate the security level, the proposed algorithm is tested with statistical and differential attacks on a different set of test images with peak signal-to-noise ratio, unified average changed intensity and number of pixel change rate performance metrics. These results proved that the proposed image encryption method is completely reliable and enhances image security during transmission.

Originality/value

The elliptic curve–based encryption is hard to break by hackers and adding a Rubik’s cube principle makes it even more complex and nearly impossible to decode. The proposed method provides reduced key size.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 9 October 2023

Yong Sun, Ya-Feng Zhang, Yalin Wang and Sihui Zhang

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference…

Abstract

Purpose

This paper aims to investigate the cooperative governance mechanisms for personal information security, which can help enrich digital governance research and provide a reference for the formulation of protection policies for personal information security.

Design/methodology/approach

This paper constructs an evolutionary game model consisting of regulators, digital enterprises and consumers, which is combined with the simulation method to examine the influence of different factors on personal information protection and governance.

Findings

The results reveal seven stable equilibrium strategies for personal information security within the cooperative governance game system. The non-compliant processing of personal information by digital enterprises can damage the rights and interests of consumers. However, the combination of regulatory measures implemented by supervisory authorities and the rights protection measures enacted by consumers can effectively promote the self-regulation of digital enterprises. The reputation mechanism exerts a restricting effect on the opportunistic behaviour of the participants.

Research limitations/implications

The authors focus on the regulation of digital enterprises and do not consider the involvement of malicious actors such as hackers, and the authors will continue to focus on the game when assessing the governance of malicious actors in subsequent research.

Practical implications

This study's results enhance digital governance research and offer a reference for developing policies that protect personal information security.

Originality/value

This paper builds an analytical framework for cooperative governance for personal information security, which helps to understand the decision-making behaviour and motivation of different subjects and to better address issues in the governance for personal information security.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 18 August 2022

Olufemi Gbenga Onatunji

The current wave of decreasing electricity supply to meet the immediate demand of the populace is influencing not only economic growth but also the industrial productivity of the…

Abstract

Purpose

The current wave of decreasing electricity supply to meet the immediate demand of the populace is influencing not only economic growth but also the industrial productivity of the ECOWAS sub-region. In this context, this paper investigates the long-run and causal relationships between electricity consumption and industrial output in selected ECOWAS countries over the period 1971–2017.

Design/methodology/approach

The Autoregressive Distributed Lag (ARDL) bound testing approach is employed to determine the existence of relationships among the variables. The causal nexus between electricity consumption and industrial output is examined using both the Toda-Yamamoto causality test and the bootstrap-corrected causality technique.

Findings

The long run results indicated that increasing electricity supply enhances industrial output only in Benin, Cote d'Ivoire, Gambia, Guinea, Liberia, Nigeria, Senegal, and Sierra Leone. Furthermore, the causality test results confirmed the presence of all four hypotheses in this study, but the two causality tests agree, particularly in the evidence of growth and neutrality hypotheses. In the cases of Benin, Burkina Faso, Gambia, Ghana, Nigeria, and Sierra Leone, a unilateral causality running from electricity consumption to industrial output is found. However, no evidence of causality between electricity consumption and industrial production has been confirmed in Cote d'Ivoire, Guinea Bissau, Liberia and Niger.

Practical implications

The relevant energy stakeholders in the subregion need to reprioritize their policy framework to focus more on the electricity sector of their economies since electricity consumption is identified as an important driver of industrial growth in the West African countries.

Originality/value

This is the first study to provide a comparative and country-specific investigation of the nexus between electricity consumption and industrial output in Africa, particularly in the West African region.

Details

Journal of Economic and Administrative Sciences, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1026-4116

Keywords

Article
Publication date: 20 February 2024

Pooja Purang, Archita Dutta and Sailee Biwalkar

This study aims to focus on understanding the work–family conflict of Indian women engineers through the lens of identity conflict.

Abstract

Purpose

This study aims to focus on understanding the work–family conflict of Indian women engineers through the lens of identity conflict.

Design/methodology/approach

Semi-structured interviews conducted with 20 Indian women engineers working in India and abroad of varying ages and work experience helped in understanding the types, sources and coping decisions about work–family conflicts experienced by them. Thematic analysis was conducted to analyse the qualitative data.

Findings

The findings reveal that as women engineers negotiate their “engineering” and “woman” identities, work–family conflict manifests as a battle of time and responsibilities, psychological strain and behaviour-based conflict. Furthermore, self-expectations and negative social sanctions play an important role in augmenting the experiences of these conflicts. The results also reveal how women re-strategize their career decisions to conciliate their conflicting identities.

Originality/value

This study furthers the literature on resolving work–family conflict by taking an identity perspective. Recommendations in literature such as work flexibility and part-time work, place the onus on women to increase their capacities to perform different roles better. Examining work–family conflict from an identity perspective allows us to look at the psychological processes underlying the challenges women face in balancing work and home in a male-dominated profession. These give insights into the need to go beyond accommodations in the workplace to redefine gender roles and relations for equal participation of women in the modern workforce.

Details

Gender in Management: An International Journal , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-2413

Keywords

Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of 137