Search results

1 – 10 of over 1000
Article
Publication date: 23 January 2024

Hao Chen and Yuge Hai

Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for…

Abstract

Purpose

Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for critical influencing factors to discuss the combined influence mechanism of multiple factors on ISM performance (ISMP). This study aims to explore the critical success factors and understand how these factors contribute to ISMP.

Design/methodology/approach

This study used a mixed-method approach to achieve this study’s research goals. In Study 1, the authors conducted a qualitative analysis to take a series of International Organization for Standardization/International Electrotechnical Commission standard documents as the basis to refine the critical factors that may influence organizations’ ISMP. In Study 2, the authors built a research model based on the organizational control perspective and used the survey-based partial least squares-based structural equation modeling (PLS-SEM) approach to understand the relationships between these factors in promoting ISMP. In Study 3, the authors used the fuzzy set qualitative comparative analysis (fsQCA) method to empirically analyze the complex mechanisms of how the combinations of the factors affect ISMP.

Findings

The following three research findings are obtained. First, based on the text-based qualitative analysis, the authors refined the critical success factors that may increase ISMP, including information security policies (ISP), top management support (TMS), alignment (ALI), information security risk assessment (IRA), information security awareness (ISA) and information security culture (ISC). Second, the PLS-SEM testing results confirmed TMS is the antecedent variable motivating organization’s formation (ISP) and information control (ISC) approaches; these two types of organization control approaches increase IRA, ISA and ALI and then promote ISMP directly and indirectly. Third, the fsQCA testing results found two configurations that can achieve high ISMP and one driving path that leads to non-high ISMP.

Originality/value

This study extends knowledge by exploring configuration factors to improve or impede the performances of organizations’ ISM. To the best of the authors’ knowledge, this study is one of the first to explore the use of the fsQCA approach in information security studies, and the results not only revealed causal associations between single factors but also highlighted the critical role of configuration factors in developing organizational ISMP. This study calls attention to information security managers of an organization should highlight the combined effect between the factors and reasonably allocate organizational resources to achieve high ISMP.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 August 2023

Atika Ahmad Kemal and Mahmood Hussain Shah

While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited…

Abstract

Purpose

While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited understanding on the socio-political nature of institutional interactions that determine DI and affect organizational practices in social cash organizations. Drawing on the neo-institutionalist vision, the purpose of the study is to examine the unique set of institutional exchanges that influence the transition to digital social cash payments that give rise to new institutional arrangements in social cash organizations.

Design/methodology/approach

The paper draws on an in-depth case study of a government social cash organization in Pakistan. Qualitative data were collected using 30 semi-structured interviews from key organizational members and stakeholders.

Findings

The results suggest that DI is determined by the novel intersections between the coercive (techno-economic, regulatory), normative (socio-organizational), mimetic (international) and covert power (political) forces. Hence, DI is not a technologically deterministic output, but rather a complex socio-political process enacted through dialogue, negotiation and conflict between institutional actors. Technology is socially embedded through the process of institutionalization that is coupled by the deinstitutionalization of established organizational practices for progressive transformation.

Research limitations/implications

The research has implications for government social cash organizations especially in the Global South. Empirically, the authors gained rare access to, and support from a government-backed social cash organization in Pakistan (an understudied country in the Global South), which made the data and the consequent analyses even invaluable. This made the empirical contribution within this geographical setting even more worthy, since this case study has received little attention from indigenous scholars in the past. The empirical findings showcased a unique set of contextual factors that were subject to BISP and interpreted through an account of socio-cultural sensitivities.

Practical implications

The paper provides practical implications for policymakers and practitioners, emphasizing the need to address institutional challenges, including covert power, during the implementation of digitalization projects in the public sector. The paper has certain potential for inspiring future e-government related (or public sector focused) studies. The paper may guide both private and government policy-makers and practitioners in presenting how to overcome certain institutional challenges while planning and implementing large scale multi-stakeholder digitization projects in similar country contexts. So while there is scope of linking the digitization of public sector organizations to anti-corruption measures in other Global South countries, the paper may not be that straightforward with the private sector involvement.

Social implications

The paper offers rich social insights on the institutional interchanges that occur between the social actors for the innovation of technology. Especially, the paper highlights the social-embeddedness nature of technology that underpins the institutionalization of new organizational practices. These have implications on how DI is viewed as a socio-political process of change.

Originality/value

This study contributes to neo-institutional theory by theorizing covert power as a political force that complements the neo-institutional framework. This force is subtle but also resistive for some political actors as the force shifts the equilibrium of power between different institutional actors. Furthermore, the paper presents the social and practical implications that guide policymakers and practitioners by taking into consideration the unique institutional challenges, such as covert power, while implementing large scale digital projects in the social cash sector.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 12 April 2023

Zijun Mao and Yuqian Zhu

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Abstract

Purpose

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Design/methodology/approach

The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.

Findings

The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.

Originality/value

The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 4 December 2023

Ben Krishna, Satish Krishnan and M.P. Sebastian

The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level…

Abstract

Purpose

The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level analysis, overlooking the intricate dynamics between institutions' cybersecurity commitments and the trust levels of digital payment users. In light of this limitation, this study aims to offer a more comprehensive understanding of this complex relationship.

Design/methodology/approach

A case study was conducted on digital payment users in India through the critical realist lens. To gather data, interviews and focus group discussions were conducted with digital payment users from various regions of the country.

Findings

The citizen-centric outcomes of the national cybersecurity commitment (performance and responsiveness) are the most prominent and impactful trust indicators. These outcomes play a crucial role in shaping digital payment users' perception and trust in the cybersecurity commitment of public institutions. Individuals' value positions also influence trust judgments, as it is essential to recognize the value tensions that may arise due to security implementation and their congruence with citizens' values.

Research limitations/implications

The findings of this study have significant implications for policymakers. They are potentially an artifact of the security and perception of digital payment users and the cultural uniqueness of digital payment users in India.

Originality/value

The study proposes a holistic understanding of the relationship between institutions' cybersecurity commitments and the trust levels of digital payment users. It offers a qualitative evaluation of how digital payment users perceive and construe efficient information security management implemented by public institutions.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 16 January 2024

Arief Rijanto

Know your customer (KYC), accounting standards, issuance, clearing, and trade settlement became the major barrier to implement accounting, accountability and assurance process in…

Abstract

Purpose

Know your customer (KYC), accounting standards, issuance, clearing, and trade settlement became the major barrier to implement accounting, accountability and assurance process in supply chain finance (SCF). Blockchain technology features have the potential to solve accounting problems. This research focuses on exploring how blockchain technology provides solutions to overcome the barriers of accounting process in SCF. The benefits, opportunities, costs and risks related to blockchain adoption are also explored.

Design/methodology/approach

Multi-case study and qualitative methods are used with a framework based on blockchain role to overcome the accounting process barriers. Ten blockchain projects in SCF and 29 interviews of participants as a unit of analysis are considered.

Findings

The findings indicate that blockchain technology offers solutions to solve accounting, accountability and assurance problems in SCF. Validity, verification, smart contracts, automation and enduring data on trade transactions potentially solve those barriers. However, it is also necessary to consider costs such as implementation, technology, education and integration costs. Then there are possible risks such as regulatory compliance, operational, code development and scalability risk. This finding reflects the current status of blockchain technology roles in SCF.

Research limitations/implications

This study unveils blockchain's SCF accounting potential, emphasizing multi-case method limitations and future research prospects. Diverse contexts challenge findings' applicability, warranting cross-industry studies for deeper insights. Addressing selection bias and integrating quantitative measures can enhance understanding of blockchain's accounting impact.

Practical implications

Accounting professionals can get an idea of the future direction and impact of blockchain technology on accounting, accountability and assurance processes.

Originality/value

This study provides initial findings on the potential, costs and risks of blockchain that is beneficial for parties involved in SCF, especially for banks and insurance underwriters. In addition, the findings also provide direction for the contribution of blockchain technology to accounting theory in the future.

Details

Asian Review of Accounting, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1321-7348

Keywords

Article
Publication date: 20 February 2024

Amira Schiff

The purpose of this paper is to advance our understanding of international crisis mediation by introducing and examining the nested insider-partial mediator (NIPM) concept, a…

Abstract

Purpose

The purpose of this paper is to advance our understanding of international crisis mediation by introducing and examining the nested insider-partial mediator (NIPM) concept, a nuanced perspective on IPM behavior. This study challenges the traditional view of effective mediators as external, unbiased entities by delving into the behavior and contribution of mediators who are deeply embedded in the conflict environment, such as South Korea’s unique position in navigating the US–DPRK crisis in 2017–2018. By analyzing South Korea’s dual role as mediator and negotiator and its employment of both nondirective and directive mediation strategies, the paper demonstrates the potential effectiveness of NIPMs in managing complex biases and contributing to de-escalation in intense crisis scenarios.

Design/methodology/approach

This paper uses a focused single-case study approach to analyze South Korea’s role as an NIPM. Using a process-tracing methodology, it examines how contextual factors such as relationships, interests and inherent biases influenced South Korea’s mediation strategies in this complex geopolitical scenario. Empirical evidence was retrieved from public sources, including official statements and press interviews, providing an empirical foundation for understanding NIPM behavior. This approach facilitates a detailed study of South Korea’s unique mediation role within the intricate dynamics of the Korean Peninsula conflict.

Findings

The study’s findings illustrate the pivotal role NIPMs can play in complex international conflicts, underlining the significant potential of NIPMs in crisis prevention. The findings highlight South Korea’s adept navigation through intricate geopolitical dynamics, leveraging its unique insider position and established relationships with both the USA and North Korea. This behavior was instrumental in mitigating a potentially explosive situation, steering the crisis toward negotiation and de-escalation. The research underscores the effectiveness of the NIPM framework in understanding the nuanced behavior of mediators who are deeply integrated into multi-level conflicts, influenced by their connections, interests and inherent biases.

Originality/value

This research not only broadens the theoretical framework of insider-partial mediation by introducing the concept of NIPM, but also has practical implications for policymakers and practitioners in leveraging regional mediation strategies for international crisis mitigation. The study underscores the importance of mediators’ deep-rooted connections, biases and vested interests in influencing their mediation tactics, thus offering a comprehensive understanding of the multifaceted nature of international mediation in complex geopolitical conflicts.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 9 January 2024

Sihong Wu and Maureen Benson-Rea

Despite a growing body of research focusing on the dark side of sharing economy development, arguments are fragmented and incomplete. This study aims to address the gap by…

Abstract

Purpose

Despite a growing body of research focusing on the dark side of sharing economy development, arguments are fragmented and incomplete. This study aims to address the gap by integrating existing viewpoints based on a provider’s perspective.

Design/methodology/approach

This study conducted a bibliometric analysis using text mining and clustering algorithm techniques to measure the scope of scientific output on this topic and identify the main research themes.

Findings

Through the bibliometric analysis, this study developed an integrative framework based on the platform providers’ internal management issues and external conflicts with consumers, society, government regulations and traditional business. It also identified significant gaps within each research theme and proposed a future research agenda.

Originality/value

Sharing economy development has not yet been fully understood and regulated, leading to unprecedented challenges to existing business systems. The study addresses knowledge gaps and advances the understanding of the dark side of the sharing economy based on the provider’s internal management and interplay with external forces. It offers a roadmap for future research to advance understanding of the “hidden” dark side of the sharing economy.

Details

Journal of Business & Industrial Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 3 March 2023

Shing Cheong Hui, Ming Yung Kwok, Elaine W.S. Kong and Dickson K.W. Chiu

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of…

Abstract

Purpose

Although cloud storage services can bring users valuable convenience, they can be technically complex and intrinsically insecure. Therefore, this research explores the concerns of academic users regarding cloud security and technical issues and how such problems may influence their continuous use in daily life.

Design/methodology/approach

This qualitative study used a semi-structured interview approach comprising six main open-ended questions to explore the information security and technical issues for the continuous use of cloud storage services by 20 undergraduate students in Hong Kong.

Findings

The analysis revealed cloud storage service users' major security and technical concerns, particularly synchronization and backup issues, were the most significant technical barrier to the continuing personal use of cloud storage services.

Originality/value

Existing literature has focused on how cloud computing services could bring benefits and security and privacy-related risks to organizations rather than security and technical issues of personal use, especially in the Asian academic context.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 18 March 2024

Alisha Tuladhar, Michael Rogerson, Juliette Engelhart, Glenn C. Parry and Birgit Altrichter

Firms are increasingly pressured to comply with mandatory supply chain transparency (SCT) regulations. Drawing on information processing theory (IPT), this study aims to show how…

Abstract

Purpose

Firms are increasingly pressured to comply with mandatory supply chain transparency (SCT) regulations. Drawing on information processing theory (IPT), this study aims to show how blockchain technology can address information uncertainty and equivocality in assuring regulatory compliance in an interorganizational network (ION).

Design/methodology/approach

IPT is applied in a single case study of an ION in the mining industry that aimed to implement blockchain to address mandatory SCT regulations. The authors build on a rich proprietary data set consisting of interviews and substantial secondary material from actors along the supply chain.

Findings

The case shows that blockchain creates equality between actors, enables compliance and enhances efficiency in an ION, reducing information uncertainty and equivocality arising from conflict minerals regulation. The system promotes engagement and data sharing between parties while protecting commercial sensitive information. The lack of central authority prevents larger partners from taking control. The system provides mineral provenance and a regulation-compliant record. System cost analysis shows that the system is efficient as it is inexpensive relative to volumes and values of metals transacted. Issues were identified related to collecting richer human rights data for assurance and compliance with due diligence regulations.

Originality/value

The authors provide some of the first evidence in the operations and supply chain management literature of the specific architecture, costs and limitations of using blockchain for SCT. Using an IPT lens in an ION setting, the authors demonstrate how blockchain-based systems can address two key IPT challenges: environmental uncertainty and equivocality.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

1 – 10 of over 1000