Search results

1 – 10 of 67
Article
Publication date: 24 May 2023

Siqi Hu, Carol Hsu and Zhongyun Zhou

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional…

Abstract

Purpose

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional methods, the present study leveraged an “event” lens and dimensionalized employees' perceptions into three sub-dimensions: perceived novelty, perceived disruption and perceived criticality. Moreover, this research went a step further by examining how pedagogical and communication approaches to a SETA program affect employees' perceptions of the program. This study then investigated whether – and if so, how – these approaches impact employees' perceptions of the SETA program and their subsequent commitment to it.

Design/methodology/approach

Utilizing a factorial-based scenario survey, this study empirically tested a model of the above relationships via covariance-based structural equation modeling.

Findings

The results of this research showed that pedagogical approaches were more effective than communication approaches and that employees' perceptions of the SETA program accounted for a large variance in their commitment to SETA.

Originality/value

First, this research deepens understanding of the protection of information assets by elaborating on the different approaches that organizations can take to encourage employees' commitment to SETA. Second, the study enriches the SETA literature by theorizing a SETA program as an organizational “event”, which represents a major shift from the conventional approach. Third, the study adds to the theoretical knowledge of the event lens by extending it to the SETA context and investigating the relationship among three event strength components.

Article
Publication date: 13 February 2023

Siqin Yao, Jintao Lu, Hanying Wang, Joel John Wark Montgomery, Tomasz Gorny and Chidiebere Ogbonnaya

Using role stress theory, this study examines how work connectivity behavior (WCB) blurs the lines between employees' work and personal lives, thereby encouraging procrastination…

Abstract

Purpose

Using role stress theory, this study examines how work connectivity behavior (WCB) blurs the lines between employees' work and personal lives, thereby encouraging procrastination at work (PAW). The study also investigates the importance of role stress and remote work self-efficacy (RWSE) as mediating and moderating factors, respectively.

Design/methodology/approach

The study examines the direct and indirect relationships between WCB and PAW using hierarchical regression and data from 415 Chinese teleworkers. RWSE is also estimated as a second-stage moderator.

Findings

The findings indicate that WCB has a direct and indirect (via role stress) positive influence on PAW; however, these effects are weaker among employees with higher (vs lower) RWSE.

Practical implications

This study assists managers and organizations in developing more efficient ways of maximizing employee and organizational performance while minimizing the counterproductive behaviors associated with excessive technology use.

Originality/value

By investigating the links between WCB and PAW in the post-pandemic context, this study adds a new perspective on how excessive technology use for work and non-work purposes can be counterproductive.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 5 September 2023

Weihua Liu, Zhixuan Chen, Tsan-Ming Choi, Paul Tae-Woo Lee, Hing Kai Chan and Yongzheng Gao

This study aims to explore the impact of carbon neutral announcements on “stock market value” of publicly listed companies in China.

446

Abstract

Purpose

This study aims to explore the impact of carbon neutral announcements on “stock market value” of publicly listed companies in China.

Design/methodology/approach

The event study approach is adopted. Market, market-adjusted, Carhart four-factor model and a cross-sectional regression model are employed to examine the impacts of carbon neutral announcements on “stock market value” of Chinese companies based on data from 188 carbon neutral announcements.

Findings

Carbon neutral announcements positively impact Chinese shareholder value. Carbon neutral announcements at the strategic level have a more positive and significant impact on Chinese stock market value. Innovative carbon neutral announcements do not significantly cause Chinese stock market reactions. Companies have more positive and significant stock market reactions when the companies make carbon neutral announcements that reflect high supply chain network resilience and heterogeneity and strong supply chain network relationships.

Practical implications

The findings uncover the business value of carbon neutral activities and provide operations managers in developing countries insights into how to improve enterprises' market value by actively implementing carbon neutral activities.

Originality/value

This paper is the first trial to apply an event study to examine the relationship between carbon neutral announcements and Chinese stock market value from the perspective of announcement level and type and supply chain networks. This paper introduces corporate reputation theory and enriches the application of corporate reputation theory in the field of low-carbon environmental protections and supply chains.

Details

International Journal of Operations & Production Management, vol. 44 no. 4
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 22 March 2024

Hamada Elsaid Elmaasrawy and Omar Ikbal Tawfik

This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance…

Abstract

Purpose

This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance cybersecurity (CS).

Design/methodology/approach

The questionnaire was used to collect data for 97 internal auditors (IAu) from the Gulf Cooperation Council countries. The authors used partial least squares (PLS) to test the hypotheses.

Findings

The results show a positive effect of the ADRIA on each of the organisational proactive measures, human proactive measures and technical proactive measures to enhance CS. The study also found a positive effect of the confirmatory role of IA on both human proactive measures and technical proactive measures to enhance CS. No effect of the confirmatory role of IA on the organisational proactive measures is found.

Research limitations/implications

This study focused on only three proactive measures to enhance CS, and this study was limited to the opinions of IAu. In addition, the study was limited to using regression analysis according to the PLS method.

Practical implications

The results of this study show that managers need to consider the influential role of IA as a value-adding activity in reducing CS risks and activating proactive measures. Also, IAu must expand its capabilities, skills and knowledge in CS auditing to provide a bold view of cyber threats. At the same time, the institutions responsible for preparing IA standards should develop standards and guidelines that help IAu to play assurance and advisory roles.

Originality/value

To the best of the authors’ knowledge, this is the first study of its kind that deals with the impact of the assurance and ADRIA on proactive measures to enhance CS. In addition, the study determines the nature of the advisory role and the assurance role of IA to strengthen CS.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 22 March 2024

Ghulam Mustafa, Waqas Rafiq, Naveed Jhamat, Zeeshan Arshad and Farhana Aziz Rana

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and…

Abstract

Purpose

This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and adherence to existing laws.

Design/methodology/approach

The paper explores blockchain’s potential in e-government, focusing on legal, ethical and governance aspects. It conducts an in-depth analysis of blockchain’s integration into data governance, emphasizing legal compliance and resilient security protocols.

Findings

The study comprehensively evaluates blockchain’s implementation, covering privacy, interoperability, consensus mechanisms, scalability and regulatory alignment. It highlights governance’s critical role in ensuring legal compliance within blockchain paradigms.

Research limitations/implications

Ethical and legal concerns arising from blockchain adoption remain unresolved. The study underscores how blockchain challenges its core principles of anonymity and decentralization in e-government settings.

Practical implications

The framework outlined offers potential for diverse technological environments, albeit raising ethical and legal queries. It emphasizes governance’s pivotal role in achieving legal compliance in blockchain adoption.

Social implications

Blockchain’s impact on legal and ethical facets necessitates further exploration to align with its core principles while addressing governance in e-government settings.

Originality/value

This study presents a robust framework for assessing blockchain’s viability in e-government, emphasizing legal compliance, despite ethical and legal intricacies that challenge its fundamental principles.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 15 July 2021

Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Abstract

Purpose

The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.

Design/methodology/approach

The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.

Findings

The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.

Originality/value

The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 22 March 2024

Muhammad Azmi Sait, Muhammad Anshari Ali, Mohammad Nabil Almunawar and Haji Masairol Haji Masri

This exploratory study aims to investigate and identify the factors influencing discontinuance intention among past users of local digital wallets in Brunei Darussalam.

Abstract

Purpose

This exploratory study aims to investigate and identify the factors influencing discontinuance intention among past users of local digital wallets in Brunei Darussalam.

Design/methodology/approach

This study uses a mixed-method approach that integrates quantitative and qualitative research method. An online survey is distributed via widely used social media platforms, using purposive sampling to target previous users of local digital wallets. Structured questionnaires capture demographic data, whereas open-ended inquiries delve into reasons for discontinuation. Descriptive analysis will extract the demographic profiles of the samples. Inductive thematic analysis, guided by Braun and Clarke's framework, will extract and analyze qualitative responses to unveil emergent themes. Data saturation, anticipated beyond 12 responses, will signify sample adequacy.

Findings

Demographic profiles based on gender, age and payment preferences of discontinuers supplement the justification for identified themes influencing digital wallet discontinuation in Brunei Darussalam. These themes include “Acceptability Challenge,” highlighting limited vendor acceptance; “Financial Management and Security Issues,” revealing concerns over impulsive buying behavior and security robustness; “Limited Benefits,” referring to short-term interest driven by promotional benefits; “Technological Inertia,” emphasizing reluctance to change from conventional payment methods and “Technical Challenges,” encompassing internet connectivity and operational functionality issues.

Research limitations/implications

This study acknowledges few limitations, including a limited number of respondents, comprising majorly of the younger age groups and females. Self-reported data usage introduces potential response bias, impacting result validity. The qualitative approach limits comprehensive understanding, suggesting validation through quantitative correlational studies. Additionally, the cross-sectional design restricts insight into the dynamic nature of digital wallet discontinuance in Brunei, suggesting the need for longitudinal studies.

Practical implications

The findings of this study offer valuable insights for digital wallet providers, policymakers and businesses operating within the realm of Brunei Darussalam. By tackling pertinent issues such as vendor acceptance, financial security and promotional incentives, stakeholders can effectively improve user experiences and mitigate intentions of discontinuing usage. Recommended strategies encompass the enlargement of vendor networks, the implementation of stringent security measures and the customization of promotional campaigns. Furthermore, comprehending demographic inclinations enables the tailoring of offerings, thereby fostering enduring adoption rates.

Social implications

This study’s findings hold social significance for financial inclusion, technological literacy and consumer empowerment in Brunei Darussalam. Overcoming barriers to digital wallet adoption, such as limited vendor acceptance, promotes financial inclusion in the long run. Improved understanding of digital wallets enhances technological literacy and empowers users to make informed decisions. By catering to diverse demographic needs, stakeholders can promote social equity and ensure widespread access to digital payment benefits, thus positively impacting Brunei Darussalam’s socioeconomic landscape.

Originality/value

This study contributes to the existing knowledge gap on digital wallet discontinuance in Brunei Darussalam. By uncovering key themes and factors influencing past users’ decisions, it advances understanding in the context of postadoption dynamics. The study provides valuable insights for local and global fintech adoption strategies.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 25 January 2021

Pouyan Esmaeilzadeh, Spurthy Dharanikota and Tala Mirzaei

Patient-centric exchanges, a major type of Health Information Exchange (HIE), empower patients to aggregate and manage their health information. This exchange model helps patients…

Abstract

Purpose

Patient-centric exchanges, a major type of Health Information Exchange (HIE), empower patients to aggregate and manage their health information. This exchange model helps patients access, modify and share their medical information with multiple healthcare organizations. Although existing studies examine patient engagement, more research is required to investigate patients' attitudes and willingness to play an active role in patient-centered information exchange. The study's main objective is to develop a model based on the belief-attitude-intention paradigm to empirically examine the effects of patients' attitudes toward engagement in care on their willingness to participate in patient-centric HIE.

Design/methodology/approach

The authors conducted an online survey study to identify the antecedents and consequences of patients' attitudes toward engagement in care. To empirically test the research model, the authors collected data from a national sample (n = 357) of individuals in the United States. The data were analyzed using structural equation modeling (SEM).

Findings

The proposed model categorizes the antecedents to patients' attitudes toward engagement in patient-related and healthcare system factors. The results show that patient-related factors (perceived health literacy and perceived coping ability) and health system factors (perceived experience with the healthcare organization and perceived patient-provider interaction) significantly shape patient attitude toward care management engagement. The results indicate that patients' attitudes toward engaging in their healthcare significantly contribute to their willingness to participate in medical information sharing through patient-centric HIE initiatives. Moreover, the authors’ findings also demonstrate that the link between patient engagement and willingness to participate in HIE is stronger for individuals who perceive lower levels of privacy and security concerns.

Originality/value

The authors validate the proposed model explaining patients' perceptions about their characteristics and the healthcare system significantly influence their attitude toward engaging in their care. This study also suggests that patients' favorable attitude toward engagement can bring patient-centric HIE efforts onto a path to success. The authors’ research attempts to shed light on the importance of patients' roles in adopting patient-centric HIE initiatives. Theoretical and practical contributions of this study are noticeable since they could result in a deeper understanding of the concept of patient engagement and how it may affect healthcare services in an evolving digital world. The authors’ findings can help healthcare organizations provide public citizen-centric services by introducing user-oriented approaches in healthcare delivery systems.

Article
Publication date: 2 February 2023

Lai-Wan Wong, Garry Wei-Han Tan, Keng-Boon Ooi and Yogesh Dwivedi

The deployment of artificial intelligence (AI) technologies in travel and tourism has received much attention in the wake of the pandemic. While societal adoption of AI has…

1144

Abstract

Purpose

The deployment of artificial intelligence (AI) technologies in travel and tourism has received much attention in the wake of the pandemic. While societal adoption of AI has accelerated, it also raises some trust challenges. Literature on trust in AI is scant, especially regarding the vulnerabilities faced by different stakeholders to inform policy and practice. This work proposes a framework to understand the use of AI technologies from the perspectives of institutional and the self to understand the formation of trust in the mandated use of AI-based technologies in travelers.

Design/methodology/approach

An empirical investigation using partial least squares-structural equation modeling was employed on responses from 209 users. This paper considered factors related to the self (perceptions of self-threat, privacy empowerment, trust propensity) and institution (regulatory protection, corporate privacy responsibility) to understand the formation of trust in AI use for travelers.

Findings

Results showed that self-threat, trust propensity and regulatory protection influence trust in users on AI use. Privacy empowerment and corporate responsibility do not.

Originality/value

Insights from the past studies on AI in travel and tourism are limited. This study advances current literature on affordance and reactance theories to provide a better understanding of what makes travelers trust the mandated use of AI technologies. This work also demonstrates the paradoxical effects of self and institution on technologies and their relationship to trust. For practice, this study offers insights for enhancing adoption via developing trust.

Details

Internet Research, vol. 34 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 67