Search results

1 – 10 of 657
Open Access
Article
Publication date: 27 February 2023

Tripti Singh, Allen C. Johnston, John D'Arcy and Peter D. Harms

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity…

5281

Abstract

Purpose

The impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the cybersecurity profession has received little attention despite numerous reports suggesting stress is a leading cause of various adverse professional outcomes. Cybersecurity professionals work in a constantly changing adversarial threat landscape, are focused on enforcement rather than compliance, and are required to adhere to ever-changing industry mandates – a work environment that is stressful and has been likened to a war zone. Hence, this literature review aims to reveal gaps and trends in the current extant general workplace and IS-specific stress literature and illuminate potentially fruitful paths for future research focused on stress among cybersecurity professionals.

Design/methodology/approach

Using the systematic literature review process (Okoli and Schabram, 2010), the authors examined the current IS research that studies stress in organizations. A disciplinary corpus was generated from IS journals and conferences encompassing 30 years. The authors analyzed 293 articles from 21 journals and six conferences to retain 77 articles and four conference proceedings for literature review.

Findings

The findings reveal four key research opportunities. First, the demands experienced by cybersecurity professionals are distinct from the demands experienced by regular information technology (IT) professionals. Second, it is crucial to identify the appraisal process that cybersecurity professionals follow in assessing security demands. Third, there are many stress responses from cybersecurity professionals, not just negative responses. Fourth, future research should focus on stress-related outcomes such as employee productivity, job satisfaction, job turnover, etc., and not only security compliance among cybersecurity professionals.

Originality/value

This study is the first to provide a systematic synthesis of the IS stress literature to reveal gaps, trends and opportunities for future research focused on stress among cybersecurity professionals. The study presents several novel trends and research opportunities. It contends that the demands experienced by cybersecurity professionals are distinct from those experienced by regular IT professionals and scholars should seek to identify the key characteristics of these demands that influence their appraisal process. Also, there are many stress responses, not just negative responses, deserving increased attention and future research should focus on unexplored stress-related outcomes for cybersecurity professionals.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 6 October 2023

Renata Konrad, Solomiya Sorokotyaha and Daniel Walker

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute…

Abstract

Purpose

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute response phase until more established humanitarian aid organizations can enter. Nevertheless, scant research exists regarding the role of grassroots associations in providing humanitarian assistance during a military conflict. The purpose of this paper is to understand the role of grassroots associations and identify important themes for effective operations.

Design/methodology/approach

This paper adopts a case-study approach of three Ukrainian grassroots associations that began operating in the immediate days of the full-scale invasion of Ukraine. The findings are based on analyzing primary sources, including interviews with Ukrainian volunteers, and are supported by secondary sources.

Findings

Grassroots associations have local contacts and a contextual understanding of population needs and can respond more rapidly and effectively than large intergovernmental agencies. Four critical themes regarding the operations of grassroots associations emerged: information management, inventory management, coordination and performance measurement. Grassroots humanitarian response operations during conflict are challenged by personal security risks, the unpredictability of unsolicited supplies, emerging volunteer roles, dynamic transportation routes and shifting demands.

Originality/value

Grassroots responses are central to humanitarian responses during the acute phase of a military conflict. By examining the operations of grassroots associations in the early months of the 2022 war in Ukraine, the authors provide a unique perspective on humanitarian logistics. Nonetheless, more inclusive models of humanitarian responses are needed to harness the capacities and resilience of grassroots operations in practice.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 29 February 2024

Rosemarie Santa González, Marilène Cherkesly, Teodor Gabriel Crainic and Marie-Eve Rancourt

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and…

Abstract

Purpose

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and cut off from health-care services.

Design/methodology/approach

This research combines an integrated literature review and an instrumental case study. The literature review comprises two targeted reviews to provide insights: one on conflict zones and one on mobile clinics. The case study describes the process and challenges faced throughout a mobile clinic deployment during and after the Iraq War. The data was gathered using mixed methods over a two-year period (2017–2018).

Findings

Armed conflicts directly impact the populations’ health and access to health care. Mobile clinic deployments are often used and recommended to provide health-care access to vulnerable populations cut off from health-care services. However, there is a dearth of peer-reviewed literature documenting decision support tools for mobile clinic deployments.

Originality/value

This study highlights the gaps in the literature and provides direction for future research to support the development of valuable insights and decision support tools for practitioners.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 27 July 2023

Andrea Kő, Gábor Tarján and Ariel Mitev

This paper aims to provide a maturity model for information security awareness (MMISA), based on the literature, expert interviews and feedback. In addition to developing the…

814

Abstract

Purpose

This paper aims to provide a maturity model for information security awareness (MMISA), based on the literature, expert interviews and feedback. In addition to developing the MMISA, the authors investigate the role of the three decisive factors that affect ISA maturity level: risk management mechanism, organizational structure and ISA.

Design/methodology/approach

The research methodology is a combined one; qualitative and quantitative methods were applied, including surveying the literature, interviews and developing a survey to collect quantitative data about decisive factors that affect ISA maturity level. The authors perform a variance-based partial least squares-structural equation modeling (PLS-SEM) investigation of the relationships between these factors.

Findings

The investigation of decisive factors of ISA maturity levels revealed that if the authors identify a strong risk assessment mechanism (through a documented methodology and reliable results), the authors can expect a high level of ISA. If there is a well-defined organizational structure with clear responsibilities, this supports the linking of a risk management mechanism with the level of ISA. The connection between organizational structure and ISA maturity level is supported by ISA activities: an increased level of awareness actions strengthens an organizational structure via the best practices learned by the staff.

Originality/value

The main contribution of the proposed MMISA model is that the model offers controls and audit evidence for maturity levels. Beyond that, the authors distinguish in the MMISA model controls supporting knowledge and controls supporting attitude, emphasizing that this is not enough to know what to do, but the proper attitude is required too. The authors didn't find any other ISA maturity model which has a similar feature. The contribution of the authors' work is that the authors provide a method for solving this complex measurement problem via the MMISA, which also offers direct guidance for the daily practices of organizations.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 20 March 2023

Kudakwashe Chirambwi

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and…

Abstract

Purpose

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and contention on the superiority given to positivist and interpretivist research designs when doing fieldwork in war situations, hence there is a need to use integrated data generation techniques. The combined effect of severe limitations of movement for both the researcher and researched fragmented data because of polarized views about the causes of the war and unpredictable events that make information hard to come by militate against systematic, organised and robust data generation. The purpose of this paper, therefore, is to make fieldwork researchers understand significant research problems unique to war zones.

Design/methodology/approach

This research was guided by the postmodernist mode of thought which challenges standardised research traditions. Fieldwork experiences in Cabo suggest the need to use the composite strategies that rely on the theoretical foundation of integrative and creative collection of data when doing research in violent settings.

Findings

The fieldwork experiences showed that the standardised, conventional and valorised positivist and ethnographic research strategies may not sufficiently facilitate understanding of the dynamics of war. There should not be firm rules, guidelines or regulations governing the actions of the researcher in conflict. As such, doing research in violent settings require reflexivity, flexibility and creativity in research strategies that respond to rapid changes. Research experiences in Mozambique show the need to use blended methods that include even less structured methodologies.

Originality/value

Fieldwork experiences in Cabo challenges researchers who cling to standardised research traditions which often hamper awareness of new postmodernist mode of thought applicable to war settings. It is essential to study the nature of African armed conflicts by combining creativity and flexibility in the selection of research strategies.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 13 October 2023

Roland Hellberg

A deteriorating security situation and an increased need for defence equipment calls for new forms of collaboration between Armed Forces and the defence industry. This paper aims…

1119

Abstract

Purpose

A deteriorating security situation and an increased need for defence equipment calls for new forms of collaboration between Armed Forces and the defence industry. This paper aims to investigate the ways in which the accelerating demand for increased security of supply of equipment and supplies to the Armed Forces requires adaptability in the procurement process that is governed by laws on public procurement (PP).

Design/methodology/approach

This paper is based on a review of current literature as well as empirical data obtained through interviews with representatives from the Swedish Defence Materiel Administration and the Swedish defence industry.

Findings

Collaboration with the globalized defence industry requires new approaches, where the PP rules make procurement of a safe supply of defence equipment difficult.

Research limitations/implications

The study's empirical data and findings are based on the Swedish context. In order to draw more general conclusions in a defence context, the study should be expanded to cover more nations.

Practical implications

The findings will enable the defence industry and the procurement authorizations to better understand the requirements of Armed Forces, and how to cooperate under applicable legal and regulatory requirements.

Originality/value

The paper extends the extant body of academic knowledge of the security of supply into the defence sector. It serves as a first step towards articulating a call for new approaches to collaboration in defence supply chains.

Details

Journal of Defense Analytics and Logistics, vol. 7 no. 2
Type: Research Article
ISSN: 2399-6439

Keywords

Open Access
Article
Publication date: 29 April 2024

Aryaning Arya Kresna, Pamerdi Giri Wiloso, Wilson Therik and Willi Toisuta

The paper aims is to see why social conflict caused by class segregation did not occur in Gading Serpong? What factors prevent conflict from occurring? This research seeks to find…

Abstract

Purpose

The paper aims is to see why social conflict caused by class segregation did not occur in Gading Serpong? What factors prevent conflict from occurring? This research seeks to find the causes of the nonoccurrence of social conflict due to class segregation in the Gading Serpong cluster area and explore the factors that restrain conflict there.

Design/methodology/approach

This research is qualitative research with data collection techniques through in-depth interviews with several parties identified as brokerages in the research object area. In this context, one of the media and analytical tools is to recognize agents or brokers who connect two groups of people. Brokerage occurs in sectors, patterns or forms of informal, personal relationships; to understand it, one must pay close attention to micro-level relationships and social psychological processes. However, brokerage can have a significant impact on macro-level social relations, as it is generally associated with social integration processes.

Findings

The lack of involvement of developers in overcoming social conflicts that occur between Gading Serpong natives and migrants in Gading Serpong housing has given rise to new actors. These new actors are what we can call brokers, where they have a role as brokers who are able to connect between migrants and natives in the Gading Serpong area. The broker phenomenon is actually familiar in academia, where in practice the broker acts as someone who is able to find solutions to problems. The broker is the reason even social segregation is created between migrant citizens and native citizens in Gading Serpong but never becomes a conflict between them.

Research limitations/implications

Even if the brokerage phenomenon is the reason why there is no conflict over social segregation brokerage is not the only factor in this nonconflict segregation. Therefore, to cover the larger area of these suburban segregation problems, there must be further research on this topic.

Practical implications

The practical implication of this research is to encourage the housing developers that create urban housing, such as clusters or other gated communities, to evaluate the social factors, such as potential segregation and conflict management. Also to encourage the developers to get involved and create some social engineering systems, like brokerage, market and other social agents, to create some nonconflict segregation or even more inclusive communities.

Originality/value

This research is uncovering the main reason why social segregation between migrant and native people in Gading Serpong, which could potentially lead to conflict, is never a conflict. The main reason is social actors like brokerage.

Details

Southeast Asia: A Multidisciplinary Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1819-5091

Keywords

Open Access
Article
Publication date: 13 February 2023

Elham Rostami, Fredrik Karlsson and Shang Gao

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

1205

Abstract

Purpose

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

Design/methodology/approach

This study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden.

Findings

This study’s demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs.

Research limitations/implications

The proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process.

Practical implications

Practitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs.

Originality/value

The proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7145

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 11 December 2023

Eoin Whelan and Ofir Turel

Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The…

2918

Abstract

Purpose

Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The purpose of this study is to bridge this gap and examine how the non-work use of smartphones in the workplace affects work–life conflict.

Design/methodology/approach

Drawing from three literature streams: technostress, work–life conflict and role boundary theory, the authors theorise on how limiting employees' ability to integrate the personal life domain into work, by means of technology use policy, contributes to stress and work–life conflict. To test this model, the authors employ a natural experiment in a company that changed its policy from fully restricting to open smartphone access for non-work purposes in the workplace. The insights gained from the experiment were explored further through qualitative interviews.

Findings

Work–life conflict declines when a ban on using smartphones for non-work purposes in the workplace is revoked. This study's results show that the relationship between smartphone use in the workplace and work–life conflict is mediated by sensed stress. Additionally, a post-hoc analysis reveals that work performance was unchanged when the smartphone ban was revoked.

Originality/value

First, this study advances the authors' understanding of how smartphone use policies in the workplace spill over to affect non-work life. Second, this work contributes to the technostress literature by revealing how, in specific situations, engagement with ICT can reduce distress and strain.

Details

Internet Research, vol. 34 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

Access

Only Open Access

Year

Last 12 months (657)

Content type

1 – 10 of 657