Search results

1 – 10 of 682
Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 17 May 2024

Melake Tewolde

The Horn of Africa which has geostrategic importance is endowed with huge natural resources. However, the region is one of the conflict-prone regions in the world. Deficiencies in…

Abstract

The Horn of Africa which has geostrategic importance is endowed with huge natural resources. However, the region is one of the conflict-prone regions in the world. Deficiencies in governance systems, deprivations and poverty, resource-based inter-communal conflicts and unduly interventions of external powers in the internal affairs of the countries have been the main triggers of conflicts. With the persistence of conflicts, the Horn of African countries have remained underdeveloped with poor development outcomes. The conflicts in the region, thus, must be reversed through genuine cooperation among the Horn of African countries. For regional durable peace and sustainable development in the Horn of Africa, the following measures are suggested: (i) Political recommitment and political willingness of leaderships in the Horn of African countries for broader regional cooperation for durable peace and development to address regional challenges jointly. (ii) Promote good governance and democratic principles. (iii) Strengthen regional cooperation among institutions of higher education to facilitate access to global knowledge. (iv) Establishment of regional media that promotes good images of the Horn of Africa. (v) Establishment of Horn of Africa Institute for Peace and Development to cultivate good governance and tolerance. (vi) Provision of civic education at all levels of education to promote understanding among different ethnic groups. (vii) Increase investments to improve the livelihoods of marginalised groups, particularly nomadic communities and unemployed youth. (viii) Refrainment of external powers from meddling in the internal affairs of the Horn of African countries.

Details

International Trade, Economic Crisis and the Sustainable Development Goals
Type: Book
ISBN: 978-1-83753-587-3

Keywords

Article
Publication date: 30 April 2024

Thai Pham and Farkhondeh Hassandoust

Information security (InfoSec) policy violations are of great concern to all organisations worldwide, especially in the financial industry. Although the importance of InfoSec…

Abstract

Purpose

Information security (InfoSec) policy violations are of great concern to all organisations worldwide, especially in the financial industry. Although the importance of InfoSec policy has been highlighted for many decades, InfoSec breaches still occur due to a low level of employee compliance and a lack of engagement and competence in high-level management. However, previous studies have primarily investigated the behavioural aspects of InfoSec policy compliance at the individual level rather than the managerial factors involved in constructing InfoSec policy and developing its effectiveness. Thus, drawing on neo-institutional theory and a transformational leadership framework, this research investigated the influence of external mechanisms and transformational leadership on InfoSec policy effectiveness.

Design/methodology/approach

The research model was implemented using field survey data from professional managers in the financial sector.

Findings

The results reported that neo-institutional mechanisms and transformational leadership shape InfoSec policy effectiveness in an organisation.

Originality/value

This study broadens current InfoSec policy research from an individual level to a managerial perspective and enhances the existing literature on neo-institutional and transformational leadership in the context of InfoSec. It highlights the need to evaluate InfoSec policy based on external factors and to support transformational leadership styles that promote InfoSec policy enforcement and effectiveness.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 26 April 2024

Rebecca Dei Mensah, Stephen Tetteh, Jacinta Martina Annan, Raphael Papa Kweku Andoh and Elijah Osafo Amoako

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management…

Abstract

Purpose

The purpose of this study was to investigate the roles of employee experience and top management commitment in the relationship between human resource (HR) records management culture and HR records privacy control in organisations in Ghana.

Design/methodology/approach

Structural equation modelling was used in analysing the data. Following the specification of the model, three main types of analyses were carried out. They were reflective measurement model analyses to test reliability and validity; formative measurement model analyses to test redundancy, collinearity, significance and relevance of the lower-order constructs; and structural model analyses to ascertain the explanatory and predictive powers of the model, significance of the hypotheses and their effect sizes.

Findings

The study confirmed that communication, privacy awareness and training and risk assessment are dimensions of HR records management culture. Concerning the hypotheses, it was established that HR records management culture is related to HR records privacy control. Also, the study showed that employee experience positively moderated the relationship HR records management culture has with HR records privacy control. However, top management commitment negatively moderated the relationship HR records management culture has with HR records privacy control.

Practical implications

Organisations committed to the privacy control of HR records need to ensure the retention of their employees, as the longer they stay with the organisation, the more they embody the HR records management culture which improves the privacy control of HR records. For top management commitment, it should be restricted to providing strategic direction for HR records privacy control, as the day-to-day influence of top management commitment on the HR records management culture does not improve the privacy control of HR records.

Originality/value

This study demonstrates that communication, privacy awareness and training and risk assessment are dimensions of HR record management culture. Also, the extent of employee experience and top management commitment required in the relationship between HR records management culture and HR records privacy control is revealed.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 14 August 2023

Dinesh Sivaguru and Kamal Tilakasiri

The purpose of the study is to examine the available literature to comprehend what the underground banking system is, for what purposes this method is used and how policymakers…

Abstract

Purpose

The purpose of the study is to examine the available literature to comprehend what the underground banking system is, for what purposes this method is used and how policymakers should proceed to address this issue.

Design/methodology/approach

The approach involved conducting this study and combining it with a critical analysis of the available literature as well as the available historical data. The sources the study has explored include government documents, public hearings, academic articles, case studies and articles available on the internet.

Findings

The study revealed prevention of illegal proceeds is critical, still regulating one entity, is a phenomenon of Boyle’s law, “squeezing the balloon”. If one end of the balloon is squeezed, making the volume smaller, the pressure inside increases, making the un-squeezed part of the balloon expand out. The real issue is not how criminals transfer their illegal earnings; it is the criminals themselves. Hence, the policy decision on this issue needs to be carefully considered.

Research limitations/implications

Due to the complexity of the operating system of Undiyal, this study had a number of limitations, as do many others. Firstly, there are no records of the Undiyal agents or the volumes of transactions publicly available. However, comprehending the scope of the underground operation that exists in the country is quite difficult.

Practical implications

The study contributes to the academic researchers grasping what type of future research should be focused on in this area according to the study.

Social implications

From the point of view of its practical application, the study seeks to resolve social issues that the middle-class population experiences on a daily basis and that have a huge and adverse impact on GDP.

Originality/value

To the best of the authors’ knowledge, this is an original contribution.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 29 April 2024

Kapil Bansal, Aseem Chandra Paliwal and Arun Kumar Singh

Technology advancement has changed how banks operate. Modernizing technology has, on the one hand, made it simpler for banks to do their daily business, but it has also increased…

Abstract

Purpose

Technology advancement has changed how banks operate. Modernizing technology has, on the one hand, made it simpler for banks to do their daily business, but it has also increased cyberattacks. The purpose of the study is to to determine the factors that have the most effects on online fraud detection and to evaluate the advantages of AI and human psychology research in preventing online transaction fraud. Artificial intelligence has been used to create new techniques for both detecting and preventing cybercrimes. Fraud has also been facilitated in some organizations via employee participation.

Design/methodology/approach

The main objective of the research approach is to guide the researcher at every stage to realize the main objectives of the study. This quantitative study used a survey-based methodology. Because it allows for both unbiased analysis of the relationship between components and prediction, a quantitative approach was adopted. The study of the body of literature, the design of research questions and the development of instruments and procedures for data collection, analysis and modeling are all part of the research process. The study evaluated the data using Matlab and a structured model analysis method. For reliability analysis and descriptive statistics, IBM SPSS Statistics was used. Reliability and validity were assessed using the measurement model, and the postulated relationship was investigated using the structural model.

Findings

There is a risk in scaling at a fast pace, 3D secure is used payer authentication has a maximum mean of 3.830 with SD of 0.7587 and 0.7638, and (CE2).

Originality/value

This study focused on investigating the benefits of artificial intelligence and human personality study in online transaction fraud and to determine the factors that affect something most strongly on online fraud detection. Artificial intelligence and human personality in the Indian banking industry have been emphasized by the current research. The study revealed the benefits of artificial intelligence and human personality like awareness, subjective norms, faster and more efficient detection and cost-effectiveness significantly impact (accept) online fraud detection in the Indian banking industry. Also, security measures and better prediction do not significantly impact (reject) online fraud detection in the Indian banking industry.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Open Access
Article
Publication date: 29 February 2024

Rosemarie Santa González, Marilène Cherkesly, Teodor Gabriel Crainic and Marie-Eve Rancourt

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and…

Abstract

Purpose

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and cut off from health-care services.

Design/methodology/approach

This research combines an integrated literature review and an instrumental case study. The literature review comprises two targeted reviews to provide insights: one on conflict zones and one on mobile clinics. The case study describes the process and challenges faced throughout a mobile clinic deployment during and after the Iraq War. The data was gathered using mixed methods over a two-year period (2017–2018).

Findings

Armed conflicts directly impact the populations’ health and access to health care. Mobile clinic deployments are often used and recommended to provide health-care access to vulnerable populations cut off from health-care services. However, there is a dearth of peer-reviewed literature documenting decision support tools for mobile clinic deployments.

Originality/value

This study highlights the gaps in the literature and provides direction for future research to support the development of valuable insights and decision support tools for practitioners.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 6 October 2023

Renata Konrad, Solomiya Sorokotyaha and Daniel Walker

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute…

Abstract

Purpose

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute response phase until more established humanitarian aid organizations can enter. Nevertheless, scant research exists regarding the role of grassroots associations in providing humanitarian assistance during a military conflict. The purpose of this paper is to understand the role of grassroots associations and identify important themes for effective operations.

Design/methodology/approach

This paper adopts a case-study approach of three Ukrainian grassroots associations that began operating in the immediate days of the full-scale invasion of Ukraine. The findings are based on analyzing primary sources, including interviews with Ukrainian volunteers, and are supported by secondary sources.

Findings

Grassroots associations have local contacts and a contextual understanding of population needs and can respond more rapidly and effectively than large intergovernmental agencies. Four critical themes regarding the operations of grassroots associations emerged: information management, inventory management, coordination and performance measurement. Grassroots humanitarian response operations during conflict are challenged by personal security risks, the unpredictability of unsolicited supplies, emerging volunteer roles, dynamic transportation routes and shifting demands.

Originality/value

Grassroots responses are central to humanitarian responses during the acute phase of a military conflict. By examining the operations of grassroots associations in the early months of the 2022 war in Ukraine, the authors provide a unique perspective on humanitarian logistics. Nonetheless, more inclusive models of humanitarian responses are needed to harness the capacities and resilience of grassroots operations in practice.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 2 May 2024

Aktieva Tri Tjitrawati and Mochamad Kevin Romadhona

This study aims to analyse in the health access of Indonesian illegal migrant workers in Malaysia, during which time they were not covered by Indonesia’s national social health…

Abstract

Purpose

This study aims to analyse in the health access of Indonesian illegal migrant workers in Malaysia, during which time they were not covered by Indonesia’s national social health insurance.

Design/methodology/approach

This study adopted a sociolegal approach, the research approach is conducted to understand the effect of a law, policy and regulation on access to health-care access among Indonesian migrant workers working illegally in Malaysia. This research involved 110 respondents who work illegally in Malaysia. The research explored the perceptions of respondents concerning to health access services of illegal migrant workers.

Findings

The study demonstrated the weakness of provisions intended to guarantee the health access to health care of migrant workers from Indonesia illegally working in Malaysia. A decline in health status was observed, but it was not significant. Bilateral cooperation between Indonesia and Malaysia is necessary to provide a framework for Indonesia providing health care to its citizens working in Malaysia, regardless of their legal status.

Originality/value

This paper concerns on the Indonesia illegal migrant workers experiencing illness and the access to the health service in Malaysia, and also the implementation of international regulation to protect Indonesian illegal migrant workers in Malaysia under ASEAN Consensus on the Protection and Promotion of the Rights of Migrant Workers.

Details

International Journal of Migration, Health and Social Care, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1747-9894

Keywords

Article
Publication date: 2 May 2024

Rania Nasreldin and Asmaa Ibrahim

This research aims to shed light on the utilization of open spaces at Effat University through a gender lens. By eliminating gender segregation, the study seeks to examine how…

Abstract

Purpose

This research aims to shed light on the utilization of open spaces at Effat University through a gender lens. By eliminating gender segregation, the study seeks to examine how these spaces are equitably shared between genders, while also delving into the realm of gender sensitive urban design (GSUD). Furthermore, the research strives to gain valuable insights into the experiences of female students in open spaces to propose a framework for the design of fair shared open spaces.

Design/methodology/approach

To achieve these objectives, a multi-faceted approach was adopted. First, the research started by reviewing the literature about gender sensitive urban design and inclusive urban design to conclude the indicators examine how open spaces are shared fairly between both genders; second, an online questionnaire was administered to gather comprehensive data. Third, meticulous observations were conducted, involving the study, analysis and mapping of students' activities using maps and photos. Lastly, a walk shop was organized, with a focus group comprising of female participants. The collected data was then analyzed using SPSS descriptive statistics and the Pearson product-moment correlation coefficient, enabling the identification of key patterns and evaluating female students' satisfaction levels.

Findings

The findings unearth a distinctive perspective on the perception and needs of females within a unique subset of open spaces, referred to as “campus open spaces,” in the context of a gender sensitive urban design. This exploration provides valuable insights into the intricacies of gender dynamics within public spaces, contributing to a more inclusive and equitable environment for all individuals at Effat University, framework shows some of significant indicators that effect on other indicators strongly as sense of safety and security and the diversity of activities that increase visiting rates, sense of belonging.

Originality/value

This research presents a framework aimed at improving the concept of equitable and inclusive, open spaces, particularly on campuses within significant communities like KSA. The focus is on creating fair shared places that facilitate interaction and cater to the social and cultural needs of students, with a particular emphasis on supporting female students. By enhancing their sense of belonging and addressing their unique requirements, this framework aims to positively impact their academic performance while fostering an inclusive and engaging campus environment.

Details

Archnet-IJAR: International Journal of Architectural Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2631-6862

Keywords

1 – 10 of 682