Search results

1 – 10 of 293
Open Access
Article
Publication date: 6 July 2023

Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of…

Abstract

Purpose

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of such a warrant in South African criminal cases.

Design/methodology/approach

This paper provides a brief overview of international and local impediments, followed by a detailed discussion of the implications of these impediments and how it is approached in various jurisdictions. The methodology of this paper consists of a literature review.

Findings

Addressing the impediments in the compilation of the application and the warrant will be beneficial for forensic investigators, the South African Police Service (SAPS) and the administration of justice in South Africa.

Research limitations/implications

Search and seizures for digital evidence form part of civil, regulatory and criminal search and seizures. This study focuses on the search and seizure of digital evidence in criminal matters pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.

Originality/value

The originality of this paper lies in the approach to the drafting of applications for search and seizure warrants for digital information in South Africa. The contribution of the study is that, by using this approach, the SAPS can address the impediments during the application and compilation of the warrants, which would enhance the quality of investigations and contribute to the successful investigation and prosecution of crime in South Africa.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Abstract

Details

Understanding Financial Risk Management, Third Edition
Type: Book
ISBN: 978-1-83753-253-7

Article
Publication date: 30 April 2024

Thai Pham and Farkhondeh Hassandoust

Information security (InfoSec) policy violations are of great concern to all organisations worldwide, especially in the financial industry. Although the importance of InfoSec…

Abstract

Purpose

Information security (InfoSec) policy violations are of great concern to all organisations worldwide, especially in the financial industry. Although the importance of InfoSec policy has been highlighted for many decades, InfoSec breaches still occur due to a low level of employee compliance and a lack of engagement and competence in high-level management. However, previous studies have primarily investigated the behavioural aspects of InfoSec policy compliance at the individual level rather than the managerial factors involved in constructing InfoSec policy and developing its effectiveness. Thus, drawing on neo-institutional theory and a transformational leadership framework, this research investigated the influence of external mechanisms and transformational leadership on InfoSec policy effectiveness.

Design/methodology/approach

The research model was implemented using field survey data from professional managers in the financial sector.

Findings

The results reported that neo-institutional mechanisms and transformational leadership shape InfoSec policy effectiveness in an organisation.

Originality/value

This study broadens current InfoSec policy research from an individual level to a managerial perspective and enhances the existing literature on neo-institutional and transformational leadership in the context of InfoSec. It highlights the need to evaluate InfoSec policy based on external factors and to support transformational leadership styles that promote InfoSec policy enforcement and effectiveness.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 29 April 2024

Giovanna Culot, Guido Orzes, Marco Sartor and Guido Nassimbeni

This study aims to analyze the factors that drive or prevent interorganizational data sharing in the context of digital transformation (DT). Data sharing appears as a precondition…

Abstract

Purpose

This study aims to analyze the factors that drive or prevent interorganizational data sharing in the context of digital transformation (DT). Data sharing appears as a precondition for companies to capture emerging opportunities in supply chain management and for product-related servitization; however, there are ongoing concerns, and data are often perceived as the “new oil.” It is thus important to gain a better understanding of the determinants of firms’ decisions.

Design/methodology/approach

The authors develop an embedded case study analysis involving 16 firms within an extended supply network in the automotive industry. The authors focus on the peculiarities of the new context, as opposed to elements highlighted by research prior to the advent of the latest technologies. Abductive reasoning is applied to the theoretical foundations of the resource-based view, resource dependence theory and the complex adaptive systems perspective.

Findings

Data sharing is largely underpinned by factors identified prior to DT, such as data specificity, dependence dynamics and protection mechanisms and the dynamism of the business context. DT, however, can influence the extent of data sharing. New factors concern complementarities whenever data are pooled from different sources and digital platforms, as well as different forms of data ownership protection.

Originality/value

This study stresses that data sharing in the context of DT can be explained through established theoretical lenses, providing the integration of elements accounting for new technological opportunities.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 8 April 2024

Fred Kyagante, Benjamin Tukamuhabwa, Joel Ngobi Makepu, Henry Mutebi and Colline Waiswa

This paper aims to investigate the relationship between information technology (IT) capabilities, information integration and supply chain resilience within the context of a…

Abstract

Purpose

This paper aims to investigate the relationship between information technology (IT) capabilities, information integration and supply chain resilience within the context of a developing country.

Design/methodology/approach

Employing a structured questionnaire survey, the study collected cross-sectional data from 205 agro-food processing firms in Uganda, drawn from a sample of 248. The data were subsequently analyzed using SPSS version 27 to validate the hypothesized relationships.

Findings

The study findings revealed that IT capabilities and information integration are positively and significantly associated with supply chain resilience. Moreover, it established a positive and significant link between IT capabilities and information integration. The results further revealed both IT capabilities and information integration account for 62.2% of the variance in supply chain resilience (SCRES) in agro-food processing firms in Uganda. Notably, the findings revealed the partial mediating role of information integration, addressing the need to understanding the mechanisms through which IT capabilities influence SCRES.

Research limitations/implications

First, the study used a cross-sectional design which makes it difficult to test causality. Some of the study variables need to be studied over time due to their inherent behavioral elements such as collaboration and information sharing. Hence, future research that could, where possible, collect longitudinal data on the study variables would add value to the findings. Second, the study was limited to agro-food processing firms in Uganda in selected districts of Kampala, Wakiso, Mukono and Jinja. Further research needs to be done in other sectors such as service industry and other geographical locations in Uganda and other developing economies to provide more generality of the findings. Third, the study was based on IT capabilities, information integration and supply chain resilience. There are other variables that affect supply chain resilience such as business continuity planning strategy, interactions between teams within an organization in building resilience, supply chain velocity, system orientation and flexibility among others which can be interesting for further research.

Practical implications

Managers are advised to motivate their IT-related personnel. Efficient use of IT systems by staff, especially who are skillful at self-study, enhances their ability to respond to disruptions accordingly. This enhances SCRES. Additionally, to get feedback from supply chain stakeholders, agro-food processing firms should assess the quality of their supply chain services through using IT capabilities as well as integrating their information.

Originality/value

This study contributes to existing literature by adopting information processing perspective to provide an empirical understanding of IT capabilities and information integration as key resources and capabilities essential for information processing in building SCRES. Furthermore, the study introduces the novel insight of the mediating role of information integration as a pathway in which IT capabilities enhance SCRES in agro-food processing firms in Uganda.

Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Book part
Publication date: 13 May 2024

Pawan Whig and Sandeep Kautish

Purpose: The COVID-19 pandemic is the most severe threat we have faced since World War II. So far, there have been about 5 million recorded cases, with over 300,000 fatalities…

Abstract

Purpose: The COVID-19 pandemic is the most severe threat we have faced since World War II. So far, there have been about 5 million recorded cases, with over 300,000 fatalities globally. The epidemic is also wreaking havoc on the corporate world. People are losing their jobs and money, and no one knows when normalcy will return. So, addressing the VUCA Leadership Strategies Model is important to get more insight into this topic.

Need for the Study: According to the International Labor Organization, the pandemic might cost 195 million jobs. Even when the immediate impacts wear off, the long-term economic impact will reverberate for years. All four volatile, unpredictable, complex, and ambiguous (VUCA) characteristics apply to the issues we confront due to the coronavirus.

Methodology: Changes caused by COVID-19 occur daily, and are unpredictable, dramatic, and quick. No one can predict precisely when the epidemic will end or when a treatment or immunisation will be available. The pandemic impacts many parts of society, including health care, business, the economy, and social life. There is no ‘best practice’ that enterprises may utilise to tackle the pandemic’s issues. The VUCA leadership strategy models will be discussed and compared in this research study.

Findings: In this moment of transition, leaders must adhere to their fundamental values, core purpose, and ambition for big, hairy, and audacious goals.

Practical Implications: In this chapter, VUCA leadership strategy models will be discussed in detail for pre- and post-pandemic scenarios and their impact on different sectors, which will be very important for researchers in the same field.

Details

VUCA and Other Analytics in Business Resilience, Part B
Type: Book
ISBN: 978-1-83753-199-8

Keywords

Open Access
Article
Publication date: 3 November 2023

Nermeen Bahnasy

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites…

Abstract

Purpose

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites. Specifically, the study aims to explore the relationship between the tourism industry and local agricultural practices and how this connection influences food security in the Siwa Oasis, located in the Western Desert of Egypt.

Design/methodology/approach

The study employs a qualitative exploratory research design using in-depth interviews and focus groups to investigate the impact of the tourism economy on food security and identify potential benefits and limitations for food security in the region.

Findings

The research reveals that the tourism economy in Siwa Oasis has only a marginal contribution to food security. The study highlights a lack of a strong connection between the tourism industry and local agricultural practices within the heritage site. As a result, the potential benefits and synergies that could be achieved between tourism and agriculture have not been fully realized, leading to a limited impact on food stability.

Research limitations/implications

This study primarily relies on qualitative data from Siwa Oasis, Egypt, which may limit the generalizability of findings beyond this specific context. Additionally, while the study provides valuable insights into the complex relationship between tourism and food security, it does not quantitatively measure the magnitude of tourism's impact. Future research could incorporate quantitative methods for a more comprehensive understanding of this relationship in diverse desert-prone regions. Finally, the study highlights the need for more integrated approaches to enhance food security through tourism, but the specific strategies and policy recommendations require further investigation and adaptation to local contexts.

Practical implications

This study underscores the need for tourism development strategies that prioritize food security in desert-prone areas like Siwa Oasis. Policymakers and stakeholders should promote sustainable tourism practices that enhance local agriculture, create diversified income sources and foster equitable benefits for communities. Moreover, recognizing the seasonal nature of tourism, interventions to address food shortages during off-peak periods are crucial. Efforts should also focus on skill development and gender-inclusive opportunities within the tourism sector to ensure broader community participation. Additionally, collaborations between tourism and agriculture should be encouraged to optimize food availability and stability while preserving cultural food traditions.

Originality/value

This study adds original insights by examining the specific impact of the tourism economy on food security in dessert-prone agricultural heritage sites. The study's originality lies in its exploration of the untapped potential for synergy between the tourism and agricultural sectors and the implications for local food security. This research contributes to understanding how tourism can improve food security in specific contexts and provides valuable insights into sustainable development in heritage sites.

Details

Journal of Humanities and Applied Social Sciences, vol. 6 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Content available
Book part
Publication date: 27 May 2024

Angelo Corelli

Abstract

Details

Understanding Financial Risk Management, Third Edition
Type: Book
ISBN: 978-1-83753-253-7

1 – 10 of 293