Search results
1 – 10 of over 1000Ahmed Ali Otoom, Issa Atoum, Heba Al-Harahsheh, Mahmoud Aljawarneh, Mohammed N. Al Refai and Mahmoud Baklizi
The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity…
Abstract
Purpose
The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity through collaborative efforts in the higher education sector. The EduCERT framework addresses this gap by enhancing cyber security and mitigating cybercrime through collaborative incident management, knowledge sharing and university awareness campaigns.
Design/methodology/approach
The authors propose an EduCERT framework following the design science methodology. The framework is developed based on literature and input from focus group experts. Moreover, it is grounded in the principles of the technology-organization-environment framework, organizational learning and diffusion of innovations theory.
Findings
The EduCERT has eight components: infrastructure, governance, knowledge development, awareness, incident management, evaluation and continuous improvement. The framework reinforces national cybersecurity through cooperation between universities and the National Computer Emergency Response Team. The framework has been implemented in Jordan to generate a cybersecurity foundation for higher education. Evaluating the EduCERT framework’s influence on national cybersecurity highlights the importance of adopting comprehensive cyber-security policies and controls. The framework application shows its relevance, effectiveness, adaptability and alignment with best practices.
Research limitations/implications
Despite the impact of applying the framework in the Jordanian context, it is essential to acknowledge that the proposed EduCERT framework’s practical implementation may encounter challenges specific to diverse international educational environment sectors. However, framework customization for global applicability could address varied educational institutions in other countries.
Practical implications
Furthermore, the proposed EduCERT framework is designed with universal applicability that extends beyond the specific country’s context. The principles and components presented in the framework can serve as valuable design advice for establishing collaborative and resilient cybersecurity frameworks in educational settings worldwide. Therefore, the research enhances the proposed framework’s practical utility and positions it as an invaluable contribution to the broader discourse on global cybersecurity in academia.
Originality/value
This paper enhances national cybersecurity in the higher education sector, addressing the need for a more integrated response mechanism. The EduCERT framework demonstrates its effectiveness, adaptability and alignment with best practices, offering valuable guidance for global educational institutions.
Details
Keywords
The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018).
Abstract
Purpose
The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018).
Design/methodology/approach
To be able to compare the results of this study and those reported by Moody et al. (2018) (and followers), the same quantitative data collection method (questionnaire) and variable measurement instruments were used. Specifically, questionnaire data were collected from a department within a Swedish governmental organization comprising 150 employees. Of these, 90 answered the questionnaire which rendered a response rate of 60%. Following Moody et al. (2018), the collected data were analyzed by means of structural equation modeling.
Findings
This study generally provides empirical support for the original UMISPC as a large majority of the findings are in line with those reported by Moody et al. (2018). However, it also suggests important differences and boundary conditions.
Originality/value
This study extends the original study of Moody et al. (2018) and subsequent replication studies by testing it in a new national/organizational context. Based on their call for future research, it also develops and empirically tests the effects of a new, socially visible information system security violation scenario. Related to this, this study also revisits the role of the variable subjective norms for better understanding employee non-/compliance to information security policies by suggesting that their effects may be indirect (i.e. running through other variables in the UMISPC) rather than direct.
Details
Keywords
Mahsa Fekrisari and Jussi Kantola
This paper aims to identify potential barriers to Industry 4.0 adoption for manufacturers and examine the changes that must be made to production processes to implement Industry…
Abstract
Purpose
This paper aims to identify potential barriers to Industry 4.0 adoption for manufacturers and examine the changes that must be made to production processes to implement Industry 4.0 successfully. It aims to develop technology by assisting with the successful implementation of Industry 4.0 in the manufacturing process by using smart system techniques.
Design/methodology/approach
Multiple case studies are used in this paper by using the smart system and Matlab, and semi-structured interviews are used to collect qualitative data.
Findings
Standardization, management support, skills, and costs have been cited as challenges for most businesses. Most businesses struggle with data interoperability. Complexity, information security, scalability, and network externalities provide challenges for some businesses. Environmental concerns are less likely to affect businesses with higher degrees of maturity. Additionally, it enables the Technical Director’s expertise to participate in the measurement using ambiguous input and output using language phrases. The outcomes of the numerous tests conducted on the approaches are extensively studied in the provided method.
Originality/value
In this research, a multiple-case study aims to carry out a thorough investigation of the issue in its actual setting.
Details
Keywords
Amer Jazairy, Mazen Brho, Ila Manuj and Thomas J. Goldsby
Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this…
Abstract
Purpose
Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this gap, this research examines the effect of SC cyber risk management strategies on integration decisions for cybersecurity (with suppliers, customers, and internally) to enhance the SC’s cyber resilience and robustness.
Design/methodology/approach
A research model grounded in the supply chain risk management (SCRM) literature, with roots in the Dynamic Capabilities View and the Relational View, was developed. Survey responses of 388 SC managers at US manufacturers were obtained to test the model.
Findings
An impact of SC cyber risk management strategies on internal cyber integration was detected, which in turn impacted external cyber integration with both suppliers and customers. Further, a positive effect of internal and customer cyber integration on both cyber resilience and robustness was found, while cyber integration with suppliers impacted neither.
Practical implications
Industry practitioners may adapt certain risk management and integration strategies to enhance the cybersecurity posture of their SCs.
Originality/value
This research bridges between the established domain of SCRM and the emergent field of SC cybersecurity by forming and testing novel relationships between SCRM-rooted constructs tailored to an SC cyber risks context.
Details
Keywords
Jindi Fu, Yuan Sun, Justin Zuopeng Zhang, Samar Mouakket and Peng Chen
Due to the rapid growth of digital economy, improving employees’ creativity is becoming essential to optimizing the development of organizations. This study investigates how…
Abstract
Purpose
Due to the rapid growth of digital economy, improving employees’ creativity is becoming essential to optimizing the development of organizations. This study investigates how enterprise social media can enhance employee creativity and develops an integrated model based on communication visibility and social capital theories.
Design/methodology/approach
A two-stage questionnaire was conducted on full-time employees with enterprise social media experience. The first round of this study distributed 1,048 questionnaires and collected 639 valid sample data. A month later, the second survey was sent to the first valid respondents, with 421 valid sample data collected within a week.
Findings
Results show that visibility has a positive influence on employee creativity, in which expertise recognition and network recognition play a mediating role. The findings also indicate that bridging social capital positively moderates the effect of visibility on expertise recognition, and bonding social capital positively moderates the effect of visibility on network recognition.
Originality/value
This study contributes to a better understanding of the benefits of enterprise social media by uncovering the mechanism and theoretical boundary of the effect of visibility on employee creativity.
Details
Keywords
Alok Raj, Dhirendra Shukla, Abdul Quadir and Prateek Sharma
This study aims to explore the determinants of digital technology adoption within micro, small and medium enterprises (MSMEs) operating in a developing economy. Grounded in the…
Abstract
Purpose
This study aims to explore the determinants of digital technology adoption within micro, small and medium enterprises (MSMEs) operating in a developing economy. Grounded in the theoretical frameworks of fit-viability and task-technology fit models, this study investigates the impact of environmental fit, task-technology fit and viability on the intention to adopt digital technologies among MSMEs.
Design/methodology/approach
This study validates the theoretical model using structural equation modeling, using data collected from 280 experienced respondents employed in the MSMEs in India.
Findings
The results indicate that both functional and symbolic benefits positively impact managers’ intention to adopt digital technology. However, subgroup analysis reveals that in the case of service enterprises, only functional benefits have a positive influence on managers’ intention to adopt digital technology. In addition, the findings underscore the crucial role of viability in shaping the intention to adopt digital technologies among MSMEs. This study highlights how functional and symbolic benefits motivate digital technology adoption in MSMEs.
Originality/value
There is a dearth of empirical studies investigating the factors influencing the adoption of digital technology by MSME firms, especially within the context of developing economies and specifically within the MSME domain. This study contributes to the theoretical discussion surrounding digital technology adoption among MSMEs in India. Through empirical research, it expands on the fit-viability model and formulates a technology adoption model within the MSME context.
Details
Keywords
Diem-Trang Vo, Long Thang Van Nguyen, Duy Dang-Pham and Ai-Phuong Hoang
Artificial intelligence (AI) allows the brand to co-create value with young customers through mobile apps. However, as many brands claim that their mobile apps are using the most…
Abstract
Purpose
Artificial intelligence (AI) allows the brand to co-create value with young customers through mobile apps. However, as many brands claim that their mobile apps are using the most updated AI technology, young customers face app fatigue and start questioning the authenticity of this touchpoint. This paper aims to study the mediating effect of authenticity for the value co-creation of AI-powered branded applications.
Design/methodology/approach
Drawing from regulatory engagement theory, this study conceptualize authenticity as the key construct in customers’ value experience process, which triggers customer value co-creation. Two scenario-based online experiments are conducted to collect data from 444 young customers. Data analysis is performed using ANOVA and Process Hayes.
Findings
The results reveal that perceived authenticity is an important mediator between media richness (chatbot vs AI text vs augmented reality) and value co-creation. There is no interaction effect of co-brand fit (high vs low) and source endorsement (doctor vs government) on the relationship between media richness and perceived authenticity, whereas injunctive norms (high vs low) strengthen this relationship.
Practical implications
The finding provides insights for marketing managers on engaging young customers suffering from app fatigue. Authenticity holds the key to young customers’ technological perceptions.
Originality/value
This research highlights the importance of perceived authenticity in encouraging young customers to co-create value. Young customers consider authenticity as a motivational force experience that involves customers through the app’s attributes (e.g. media richness) and social standards (e.g. norms), rather than brand factors (e.g. co-brand fit, source endorsement).
Details
Keywords
Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali
Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…
Abstract
Purpose
Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.
Design/methodology/approach
The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.
Findings
By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.
Originality/value
There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.
Details
Keywords
Dohyeong Kim, Jaehun Yang, Doyeop Lee, Dongmin Lee, Farzad Rahimian and Chansik Park
Computer vision (CV) offers a promising approach to transforming the conventional in-person inspection practices prevalent within the construction industry. However, the reliance…
Abstract
Purpose
Computer vision (CV) offers a promising approach to transforming the conventional in-person inspection practices prevalent within the construction industry. However, the reliance on centralized systems in current CV-based inspections introduces a vulnerability to potential data manipulation. Unreliable inspection records make it challenging for safety managers to make timely decisions to ensure safety compliance. To address this issue, this paper proposes a blockchain (BC) and CV-based framework to enhance safety inspections at construction sites.
Design/methodology/approach
This study adopted a BC-enhanced CV approach. By leveraging CV and BC, safety conditions are automatically identified from site images and can be reliably recorded as safety inspection data through the BC network. Additionally, by using this data, smart contracts coordinate inspection tasks, assign responsibilities and verify safety performance, managing the entire safety inspection process remotely.
Findings
A case study confirms the framework’s applicability and efficacy in facilitating remote and reliable safety inspections. The proposed framework is envisaged to greatly improve current safety inspection practices and, in doing so, contribute to reduced accidents and injuries in the construction industry.
Originality/value
This study provides novel and practical guidance for integrating CV and BC in construction safety inspection. It fulfills an identified need to study how to leverage CV-based inspection results for remotely managing the safety inspection process using BC. This work not only takes a significant step towards data-driven decision-making in the safety inspection process, but also paves the way for future studies aiming to develop tamper-proof data management systems for industrial inspections and audits.
Details
Keywords
This study aims to investigate the compliance of Kuwait’s College of Basic Education (CBE) with records management standards (RMS), legislation and regulations.
Abstract
Purpose
This study aims to investigate the compliance of Kuwait’s College of Basic Education (CBE) with records management standards (RMS), legislation and regulations.
Design/methodology/approach
This case study collects data from semi-structured interviews and a thorough internet search of relevant records management (RM) policies and procedures.
Findings
The findings reveal the shortcomings of the bottom-up approach to RM, which poses significant risks due to inadequate management and monitoring; lack of compliance with local or national records and archives regulations; and a general unawareness of RMS and best practices among interviewees.
Research limitations/implications
This study focuses on CBE, potentially limiting generalizability to other academic institutions in Kuwait, but offers valuable insights for polities that similarly lack records legislation and wish to improve their RM practices and comply with international standards.
Practical implications
This study proposes a more top-down approach to RM with the adoption of international RMS to improve practices, minimize risks and reduce legal liabilities. Positive outcomes will support the case for records and archives legislation (RAL) in Kuwait and provide the framework for its establishment.
Social implications
The study argues that the passage of RAL and the subsequent implementation of RMS will improve citizens’ Right to Access Information.
Originality/value
This study initiates a pioneering effort in understanding Public Authority for Applied Education and Training and CBE’s level of compliance with RMS, legislation and regulations and their challenges.
Details