Search results

1 – 10 of over 1000
Article
Publication date: 12 September 2024

Ahmed Ali Otoom, Issa Atoum, Heba Al-Harahsheh, Mahmoud Aljawarneh, Mohammed N. Al Refai and Mahmoud Baklizi

The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity…

Abstract

Purpose

The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity through collaborative efforts in the higher education sector. The EduCERT framework addresses this gap by enhancing cyber security and mitigating cybercrime through collaborative incident management, knowledge sharing and university awareness campaigns.

Design/methodology/approach

The authors propose an EduCERT framework following the design science methodology. The framework is developed based on literature and input from focus group experts. Moreover, it is grounded in the principles of the technology-organization-environment framework, organizational learning and diffusion of innovations theory.

Findings

The EduCERT has eight components: infrastructure, governance, knowledge development, awareness, incident management, evaluation and continuous improvement. The framework reinforces national cybersecurity through cooperation between universities and the National Computer Emergency Response Team. The framework has been implemented in Jordan to generate a cybersecurity foundation for higher education. Evaluating the EduCERT framework’s influence on national cybersecurity highlights the importance of adopting comprehensive cyber-security policies and controls. The framework application shows its relevance, effectiveness, adaptability and alignment with best practices.

Research limitations/implications

Despite the impact of applying the framework in the Jordanian context, it is essential to acknowledge that the proposed EduCERT framework’s practical implementation may encounter challenges specific to diverse international educational environment sectors. However, framework customization for global applicability could address varied educational institutions in other countries.

Practical implications

Furthermore, the proposed EduCERT framework is designed with universal applicability that extends beyond the specific country’s context. The principles and components presented in the framework can serve as valuable design advice for establishing collaborative and resilient cybersecurity frameworks in educational settings worldwide. Therefore, the research enhances the proposed framework’s practical utility and positions it as an invaluable contribution to the broader discourse on global cybersecurity in academia.

Originality/value

This paper enhances national cybersecurity in the higher education sector, addressing the need for a more integrated response mechanism. The EduCERT framework demonstrates its effectiveness, adaptability and alignment with best practices, offering valuable guidance for global educational institutions.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 5 September 2024

Marcus Gerdin

The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018).

Abstract

Purpose

The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018).

Design/methodology/approach

To be able to compare the results of this study and those reported by Moody et al. (2018) (and followers), the same quantitative data collection method (questionnaire) and variable measurement instruments were used. Specifically, questionnaire data were collected from a department within a Swedish governmental organization comprising 150 employees. Of these, 90 answered the questionnaire which rendered a response rate of 60%. Following Moody et al. (2018), the collected data were analyzed by means of structural equation modeling.

Findings

This study generally provides empirical support for the original UMISPC as a large majority of the findings are in line with those reported by Moody et al. (2018). However, it also suggests important differences and boundary conditions.

Originality/value

This study extends the original study of Moody et al. (2018) and subsequent replication studies by testing it in a new national/organizational context. Based on their call for future research, it also develops and empirically tests the effects of a new, socially visible information system security violation scenario. Related to this, this study also revisits the role of the variable subjective norms for better understanding employee non-/compliance to information security policies by suggesting that their effects may be indirect (i.e. running through other variables in the UMISPC) rather than direct.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 14 August 2024

Mahsa Fekrisari and Jussi Kantola

This paper aims to identify potential barriers to Industry 4.0 adoption for manufacturers and examine the changes that must be made to production processes to implement Industry…

Abstract

Purpose

This paper aims to identify potential barriers to Industry 4.0 adoption for manufacturers and examine the changes that must be made to production processes to implement Industry 4.0 successfully. It aims to develop technology by assisting with the successful implementation of Industry 4.0 in the manufacturing process by using smart system techniques.

Design/methodology/approach

Multiple case studies are used in this paper by using the smart system and Matlab, and semi-structured interviews are used to collect qualitative data.

Findings

Standardization, management support, skills, and costs have been cited as challenges for most businesses. Most businesses struggle with data interoperability. Complexity, information security, scalability, and network externalities provide challenges for some businesses. Environmental concerns are less likely to affect businesses with higher degrees of maturity. Additionally, it enables the Technical Director’s expertise to participate in the measurement using ambiguous input and output using language phrases. The outcomes of the numerous tests conducted on the approaches are extensively studied in the provided method.

Originality/value

In this research, a multiple-case study aims to carry out a thorough investigation of the issue in its actual setting.

Details

The TQM Journal, vol. 36 no. 9
Type: Research Article
ISSN: 1754-2731

Keywords

Open Access
Article
Publication date: 5 September 2024

Amer Jazairy, Mazen Brho, Ila Manuj and Thomas J. Goldsby

Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this…

1066

Abstract

Purpose

Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this gap, this research examines the effect of SC cyber risk management strategies on integration decisions for cybersecurity (with suppliers, customers, and internally) to enhance the SC’s cyber resilience and robustness.

Design/methodology/approach

A research model grounded in the supply chain risk management (SCRM) literature, with roots in the Dynamic Capabilities View and the Relational View, was developed. Survey responses of 388 SC managers at US manufacturers were obtained to test the model.

Findings

An impact of SC cyber risk management strategies on internal cyber integration was detected, which in turn impacted external cyber integration with both suppliers and customers. Further, a positive effect of internal and customer cyber integration on both cyber resilience and robustness was found, while cyber integration with suppliers impacted neither.

Practical implications

Industry practitioners may adapt certain risk management and integration strategies to enhance the cybersecurity posture of their SCs.

Originality/value

This research bridges between the established domain of SCRM and the emergent field of SC cybersecurity by forming and testing novel relationships between SCRM-rooted constructs tailored to an SC cyber risks context.

Details

International Journal of Physical Distribution & Logistics Management, vol. 54 no. 11
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 6 September 2024

Jindi Fu, Yuan Sun, Justin Zuopeng Zhang, Samar Mouakket and Peng Chen

Due to the rapid growth of digital economy, improving employees’ creativity is becoming essential to optimizing the development of organizations. This study investigates how…

Abstract

Purpose

Due to the rapid growth of digital economy, improving employees’ creativity is becoming essential to optimizing the development of organizations. This study investigates how enterprise social media can enhance employee creativity and develops an integrated model based on communication visibility and social capital theories.

Design/methodology/approach

A two-stage questionnaire was conducted on full-time employees with enterprise social media experience. The first round of this study distributed 1,048 questionnaires and collected 639 valid sample data. A month later, the second survey was sent to the first valid respondents, with 421 valid sample data collected within a week.

Findings

Results show that visibility has a positive influence on employee creativity, in which expertise recognition and network recognition play a mediating role. The findings also indicate that bridging social capital positively moderates the effect of visibility on expertise recognition, and bonding social capital positively moderates the effect of visibility on network recognition.

Originality/value

This study contributes to a better understanding of the benefits of enterprise social media by uncovering the mechanism and theoretical boundary of the effect of visibility on employee creativity.

Details

Industrial Management & Data Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 5 July 2024

Alok Raj, Dhirendra Shukla, Abdul Quadir and Prateek Sharma

This study aims to explore the determinants of digital technology adoption within micro, small and medium enterprises (MSMEs) operating in a developing economy. Grounded in the…

Abstract

Purpose

This study aims to explore the determinants of digital technology adoption within micro, small and medium enterprises (MSMEs) operating in a developing economy. Grounded in the theoretical frameworks of fit-viability and task-technology fit models, this study investigates the impact of environmental fit, task-technology fit and viability on the intention to adopt digital technologies among MSMEs.

Design/methodology/approach

This study validates the theoretical model using structural equation modeling, using data collected from 280 experienced respondents employed in the MSMEs in India.

Findings

The results indicate that both functional and symbolic benefits positively impact managers’ intention to adopt digital technology. However, subgroup analysis reveals that in the case of service enterprises, only functional benefits have a positive influence on managers’ intention to adopt digital technology. In addition, the findings underscore the crucial role of viability in shaping the intention to adopt digital technologies among MSMEs. This study highlights how functional and symbolic benefits motivate digital technology adoption in MSMEs.

Originality/value

There is a dearth of empirical studies investigating the factors influencing the adoption of digital technology by MSME firms, especially within the context of developing economies and specifically within the MSME domain. This study contributes to the theoretical discussion surrounding digital technology adoption among MSMEs in India. Through empirical research, it expands on the fit-viability model and formulates a technology adoption model within the MSME context.

Details

Journal of Business & Industrial Marketing, vol. 39 no. 9
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 16 January 2024

Diem-Trang Vo, Long Thang Van Nguyen, Duy Dang-Pham and Ai-Phuong Hoang

Artificial intelligence (AI) allows the brand to co-create value with young customers through mobile apps. However, as many brands claim that their mobile apps are using the most…

Abstract

Purpose

Artificial intelligence (AI) allows the brand to co-create value with young customers through mobile apps. However, as many brands claim that their mobile apps are using the most updated AI technology, young customers face app fatigue and start questioning the authenticity of this touchpoint. This paper aims to study the mediating effect of authenticity for the value co-creation of AI-powered branded applications.

Design/methodology/approach

Drawing from regulatory engagement theory, this study conceptualize authenticity as the key construct in customers’ value experience process, which triggers customer value co-creation. Two scenario-based online experiments are conducted to collect data from 444 young customers. Data analysis is performed using ANOVA and Process Hayes.

Findings

The results reveal that perceived authenticity is an important mediator between media richness (chatbot vs AI text vs augmented reality) and value co-creation. There is no interaction effect of co-brand fit (high vs low) and source endorsement (doctor vs government) on the relationship between media richness and perceived authenticity, whereas injunctive norms (high vs low) strengthen this relationship.

Practical implications

The finding provides insights for marketing managers on engaging young customers suffering from app fatigue. Authenticity holds the key to young customers’ technological perceptions.

Originality/value

This research highlights the importance of perceived authenticity in encouraging young customers to co-create value. Young customers consider authenticity as a motivational force experience that involves customers through the app’s attributes (e.g. media richness) and social standards (e.g. norms), rather than brand factors (e.g. co-brand fit, source endorsement).

Details

Young Consumers, vol. 25 no. 5
Type: Research Article
ISSN: 1747-3616

Keywords

Article
Publication date: 27 February 2024

Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…

Abstract

Purpose

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.

Design/methodology/approach

The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.

Findings

By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.

Originality/value

There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 8
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 13 September 2024

Dohyeong Kim, Jaehun Yang, Doyeop Lee, Dongmin Lee, Farzad Rahimian and Chansik Park

Computer vision (CV) offers a promising approach to transforming the conventional in-person inspection practices prevalent within the construction industry. However, the reliance…

Abstract

Purpose

Computer vision (CV) offers a promising approach to transforming the conventional in-person inspection practices prevalent within the construction industry. However, the reliance on centralized systems in current CV-based inspections introduces a vulnerability to potential data manipulation. Unreliable inspection records make it challenging for safety managers to make timely decisions to ensure safety compliance. To address this issue, this paper proposes a blockchain (BC) and CV-based framework to enhance safety inspections at construction sites.

Design/methodology/approach

This study adopted a BC-enhanced CV approach. By leveraging CV and BC, safety conditions are automatically identified from site images and can be reliably recorded as safety inspection data through the BC network. Additionally, by using this data, smart contracts coordinate inspection tasks, assign responsibilities and verify safety performance, managing the entire safety inspection process remotely.

Findings

A case study confirms the framework’s applicability and efficacy in facilitating remote and reliable safety inspections. The proposed framework is envisaged to greatly improve current safety inspection practices and, in doing so, contribute to reduced accidents and injuries in the construction industry.

Originality/value

This study provides novel and practical guidance for integrating CV and BC in construction safety inspection. It fulfills an identified need to study how to leverage CV-based inspection results for remotely managing the safety inspection process using BC. This work not only takes a significant step towards data-driven decision-making in the safety inspection process, but also paves the way for future studies aiming to develop tamper-proof data management systems for industrial inspections and audits.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 13 September 2024

Sakena A. Al-Alawi

This study aims to investigate the compliance of Kuwait’s College of Basic Education (CBE) with records management standards (RMS), legislation and regulations.

Abstract

Purpose

This study aims to investigate the compliance of Kuwait’s College of Basic Education (CBE) with records management standards (RMS), legislation and regulations.

Design/methodology/approach

This case study collects data from semi-structured interviews and a thorough internet search of relevant records management (RM) policies and procedures.

Findings

The findings reveal the shortcomings of the bottom-up approach to RM, which poses significant risks due to inadequate management and monitoring; lack of compliance with local or national records and archives regulations; and a general unawareness of RMS and best practices among interviewees.

Research limitations/implications

This study focuses on CBE, potentially limiting generalizability to other academic institutions in Kuwait, but offers valuable insights for polities that similarly lack records legislation and wish to improve their RM practices and comply with international standards.

Practical implications

This study proposes a more top-down approach to RM with the adoption of international RMS to improve practices, minimize risks and reduce legal liabilities. Positive outcomes will support the case for records and archives legislation (RAL) in Kuwait and provide the framework for its establishment.

Social implications

The study argues that the passage of RAL and the subsequent implementation of RMS will improve citizens’ Right to Access Information.

Originality/value

This study initiates a pioneering effort in understanding Public Authority for Applied Education and Training and CBE’s level of compliance with RMS, legislation and regulations and their challenges.

Details

Records Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0956-5698

Keywords

1 – 10 of over 1000