Search results

1 – 10 of 140
Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 19 May 2023

Ambareen Beebeejaun

The phenomenal proliferation of crowdfunding platforms raises concerns on the heightened occurrence of financial crimes since billions of funds are exchanged through these online…

Abstract

Purpose

The phenomenal proliferation of crowdfunding platforms raises concerns on the heightened occurrence of financial crimes since billions of funds are exchanged through these online systems frequently. Accordingly, some countries have implemented legislative responses to address these risks, although each countries’ laws have varying degrees of severity. Hence, the purpose of this study is to assess the efficiency and robustness of Mauritian laws to combat financial crimes that may arise from a crowdfunding transaction with a particular emphasis on money laundering and tax evasion.

Design/methodology/approach

To achieve this research objective, the black letter approach was used to analyse Mauritian rules and regulations on the researched topic and a comparative analysis was carried out against the corresponding laws on crowdfunding in some other jurisdictions, notably the UK and the USA with the view of suggesting the policy recommendations to Mauritian authorities.

Findings

It was found that there is still scope for improving the existing legal and regulatory framework on crowdfunding in Mauritius to prevent instances of money laundering and tax evasion. The paper suggests that a crowdfunding operator must be categorised as a reporting person and must carry out regular due diligence checks. There must also be more collaboration in terms of information exchanges and training sessions among the tax authority of Mauritius, crowdfunding operators, fund seekers and investors to shed light on the tax treatment of income and deductions to avoid issues of tax evasion.

Originality/value

At present, to the best of the authors’ knowledge, this study is amongst the first academic writings on the efficiency of Mauritian laws in dealing with the risk of financial crimes through crowdfunding, and also, because existing literature is quite scarce on assessing the adequacy of crowdfunding rules in developing countries, this research aims at filling in the gap in literature. The study is carried out with the aim of combining a large amount of empirical, theoretical and factual information that can be of use to various stakeholders and not only to academics.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 6 November 2023

Simon D. Norton

This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money…

Abstract

Purpose

This study aims to evaluate the advantages and disadvantages of auditor mandatory suspicious activity reporting versus the exercise of professional judgement in the anti-money laundering regimes of the UK and the USA.

Design/methodology/approach

The research draws upon the following sources. Firstly, statistics provided by the UK National Crime Agency, 2019 (NCA) regarding suspicious activity report (SAR) filing rates. Secondly, anti-money laundering legislation in the USA and UK. Thirdly, statements made in the political domain in the USA, particularly those which raised constitutional concerns during the progress of the Patriot Act 2001. Finally, statements and recommendations by a UK Parliamentary Commission enquiring into the effectiveness of the suspicious activity reporting regime.

Findings

The UK reporting regime does not accommodate professional judgement, resulting in the filing of SARs with limited intelligence value. This contrasts with discretionary reporting in the USA: voluntary reporting guides and influences auditor behaviour rather than mandating it. Defensive filing by UK auditors (defence to anti-money launderings [DAMLs]) has increased in recent years but the number of SARs filed has declined.

Originality/value

The study evaluates auditor behavioural responses to legislative regimes which mandate or alternatively accommodate discretion in the reporting suspicion of money laundering. Consideration of constitutional and judicial activism in this context is a novel contribution to the literature. For its theoretical framework the study uses Foucault’s concept of discipline of the self to evaluate auditor behaviour under both regimes.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1033

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 27 February 2023

Dhanraj P. Tambuskar, Prashant Jain and Vaibhav S. Narwane

With big data (BD), traditional supply chain is shifting to digital supply chain. This study aims to address the issues and challenges in the way toward the implementation of big…

Abstract

Purpose

With big data (BD), traditional supply chain is shifting to digital supply chain. This study aims to address the issues and challenges in the way toward the implementation of big data analytics (BDA) in sustainable supply chain management (SSCM).

Design/methodology/approach

The factors that affect the implementation of BDA in SSCM are identified through a widespread literature review. The PESTEL framework is used for this purpose as it covers all the political, economic, social, technological, environmental and legal factors. These factors are then finalized by means of experts' opinion and analyzed using structural equation modeling (SEM).

Findings

A total of 10 factors are finalized with 31 sub-factors, of which sustainable performance, competitive advantage, stakeholders' involvement and capabilities, lean and green practices and improvement in environmental performance are found to be the critical factors for the implementation of BDA in SSCM.

Research limitations/implications

This research has taken up the case of Indian manufacturing industry. It can be diversified to other geographical areas and industry sectors. Further, the quantitative analysis may be undertaken with structured or semi-structured interviews for validation of the proposed model.

Practical implications

This research provides an insight to managers regarding the implementation of BDA in SSCM by identifying and examining the influencing factors. The results may be useful for managers for the implementation of BDA and budget allocation for BDA project.

Social implications

The result includes green practices and environmental performance as critical factors for the implementation of BDA in SSCM. Thus the research establishes a positive relationship between BDA and sustainable manufacturing that ultimately benefits the environment and society.

Originality/value

This research addresses the challenges in the implementation of BDA in SSCM in Indian manufacturing sector, where such application is at its nascent stage. The use of PESTEL framework for identifying and categorizing the factors makes the study more worthwhile, as it covers full spectrum of the various factors that affect the strategic business decisions.

Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 19 April 2024

Halil Deligöz

This study aims to define a “technological statecraft” concept to distinguish tech-based measures/sanctions from an array of economic measures ranging from restrictions of rare…

Abstract

Purpose

This study aims to define a “technological statecraft” concept to distinguish tech-based measures/sanctions from an array of economic measures ranging from restrictions of rare earth elements and natural gas supplies to asset freezes under the wider portfolio of economic statecraft. This concept is practically intended to reveal the USA’s “logic of choice” in its employment of technology as an efficient instrument to deal with China in the context of the great power rivalry.

Design/methodology/approach

This study follows David A. Baldwin’s statecraft definition and conceptualization methodology, which relies on “means” rather than “ends.” In addition to Baldwin and as an incremental contribution to his economic statecraft analysis, this study also combines national political economy with statecraft analysis with a particular focus on the utilization of technological measures against China during the Trump administration.

Findings

The US rationale for choosing technology, namely, emerging and foundational technologies, in its rivalry against China is caused at least by two factors: the nature of the external challenge and the characteristics of the US innovation model based largely on radical innovations. To deal with China, the USA practically distinguished the role of advanced technology and followed a grammer of technological statecraft as depicted in the promulgated legal texts during the Trump administration.

Originality/value

Despite a growing volume of literature on economic statecraft and technological competition, studies focusing on countries’ “logic of choice” with regard to why and under what conditions they choose financial, technological or commodity-based sanctions/measures/controls are lacking. Inspired from Baldwin’s account on the “logic of choice” from among alternative statecrafts (i.e. diplomacy, military, economic statecraft, and propaganda). This study will contribute to the literature with a clear lens to demonstrate the “logic of choice” from among a variety of economic statecraft measures in the case of the US technological statecraft toward China.

Details

Journal of International Trade Law and Policy, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1477-0024

Keywords

Article
Publication date: 11 September 2023

Rong Huang, Guang Yang, Xiaoye Chen and Yuxin Chen

This study aims to investigate the influence of CEO’s only-child status on corporate social responsibility (CSR) practices. It seeks to extend the understanding of upper echelon…

Abstract

Purpose

This study aims to investigate the influence of CEO’s only-child status on corporate social responsibility (CSR) practices. It seeks to extend the understanding of upper echelon theory by examining unexplored CEO characteristics and their impact on CSR decisions.

Design/methodology/approach

The paper uses manually collected CEO family information and Chinese Stock and Market Accounting Research data as a basis to examine the influence of CEOs’ early-life experiences on their engagement in CSR activities. The study applies attachment security theory from developmental psychology and uses upper echelon theory, particularly focusing on CEOs’ only-child status. A comparative analysis of philanthropic donations between CEOs who are only children and those who have siblings is conducted. The study also examines the moderating effects of corporate slack resources and CEO shareholdings.

Findings

Preliminary findings suggest that CEOs who are only children are more likely to engage in CSR compared to their counterparts with siblings. However, the difference in donation amounts between the two groups tends to attenuate with decreased slack resources and increased CEO shareholdings.

Originality/value

To the best of the authors’ knowledge, this research represents the first attempt to investigate being the only child in one’s family and the CSR-related decision of CEOs, which extends the upper echelon theory by introducing the family science theory into the management domain.

Details

Society and Business Review, vol. 19 no. 2
Type: Research Article
ISSN: 1746-5680

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 26 April 2024

Festus E. Obiakor, Sunday O. Obi, Gina C. Obiakor, Innocent J. Aluka, Emmanuel Mbagwu, Stephanie Obi, Nkechi Amadife and Phillip Clay

It has become increasingly apparent that one's perception of issues depends largely on his or her personal history. Human beings, professionals, and stakeholders vary in their…

Abstract

It has become increasingly apparent that one's perception of issues depends largely on his or her personal history. Human beings, professionals, and stakeholders vary in their perspectives, strategies, and solutions. Rather than arbitrarily selecting issues or seeking consensus among interdisciplinary but disparate groups, it is critical to examine the broader array of values and issues that impact learners with exceptionalities and the future of special education. In addition, it is important to conceptualize effective techniques to reverse traditional problems or difficulties while considering the “cycles” of change in general and special education. These cycles are based on the view that educational perspectives have their time since they come and go. When they are innovative, they become the status quo and become finally obsolete as the next group of methods, beliefs, and educational initiatives takes hold. In special education, we have fundamental values that must be respected and followed to deliver services to learners with exceptionalities. These values are sometimes not valued by ill prepared and unprepared professionals, especially since good professionals believe in change. This chapter focuses on how these values can be respected to protect and advance special education and education as a whole.

1 – 10 of 140