Search results
1 – 10 of 48Martina Neri, Federico Niccolini and Luigi Martino
Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…
Abstract
Purpose
Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known characteristics, the cybersecurity phenomenon goes beyond the detection of technological impacts, and encompasses all the dimensions of an organization. This study thus focusses on an additional set of organizational elements. The key elements of cybersecurity organizational readiness depicted here are cybersecurity awareness, cybersecurity culture and cybersecurity organizational resilience (OR). This study aims to qualitatively assess small and medium enterprises’ (SMEs) overall level of organizational cybersecurity readiness.
Design/methodology/approach
This study focused on conducting a cybersecurity organizational readiness assessment using a sample of 53 Italian SMEs from the information and communication technology sector. Informed mixed method research, this study was conducted consistent with the principles of the explanatory sequential mixed method design, and adopting a quanti-qualitative methodology. The quantitative data were collected through a questionnaire. Qualitative data were subsequently collected through semi-structured interviews.
Findings
Although many elements of the technical aspects of cybersecurity OR have yielded very encouraging results, there are still some areas that require improvement. These include those facets that constitute the foundation of cybersecurity awareness, and, thus, a cybersecurity culture. This result highlights that the areas in need of improvement are exactly those that are most important in fighting against cyber threats via organizational cybersecurity readiness.
Originality/value
Although the importance of SMEs is obvious, evidence of such organizations’ attitudes to cybersecurity are still limited. This research is an attempt to depict the organizational issue related to cybersecurity, i.e. overall cybersecurity organizational readiness.
Details
Keywords
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details
Keywords
Mohd Irwan Abdul Rani, Sharifah Nazatul Faiza Syed Mustapha Nazri and Salwa Zolkaflil
This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.
Abstract
Purpose
This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.
Design/methodology/approach
This paper reviews the most common money mule themes in perpetrating financial crime activities, especially its roles, recruitment and awareness. A systematic review protocol called preferred reporting items for systematic review and meta-analysis protocols is adopted for this study.
Findings
Money mules are used by organized criminal groups (OCG) or fraudster to launder illicit funds from outrageous criminal activities. They allow their accounts to be used for money laundering by OCG. The attacker, OCG or fraudsters would layer the stolen funds using money mule accounts. These money mules are recruited using various approaches, oftentimes deceived by opulent lifestyles to captivate the interest of potential money mules.
Originality/value
This paper presents money mule awareness needed by accountant, bank employees and the society. It is an unprecedented SLR on money mule. This paper will be beneficial for future money mule researchers, enforcement agencies and practitioners in banking industry.
Details
Keywords
This paper aims to investigate cyber security awareness of the staff of Estonian libraries and gives an overview why libraries could be a target of cyber attacks and why…
Abstract
Purpose
This paper aims to investigate cyber security awareness of the staff of Estonian libraries and gives an overview why libraries could be a target of cyber attacks and why librarians need cyber security at first place.
Design/methodology/approach
The data used in this paper is based on a review of relevant literature to provide an overview of the concept of cyber security, and the results of the original online survey created by the paper’s author, conducted among Estonian librarians. The online questionnaire was developed using the world-recognised human aspects of information security questionnaire (HAIS-Q), which is based on the knowledge-attitudes-behaviour (KAB) methodology. A total of 388 completed questionnaires were returned from employees of academic, specialised, public and school libraries. The results are interpreted on the basis of descriptive statistics and Kruger and Kearney approach.
Findings
The final score of library employees is 86, which is classified as good, but based on the result, two focus areas need more attention than previously, which are the use of devices and prevention and handling of incidents.
Originality/value
The cyber behaviour of library employees has not been widely studied in the world using HAIS-Q and KAB models, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.
Details
Keywords
Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…
Abstract
Purpose
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.
Design/methodology/approach
In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.
Findings
Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.
Originality/value
This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.
Details
Keywords
Duha Alsmadi, Ali Maqousi and Tala Abuhussein
Due to the lack of awareness and poor cybersecurity practices that pose cyber threats during COVID-19 time, this research aims to explore user's attitude toward engaging in…
Abstract
Purpose
Due to the lack of awareness and poor cybersecurity practices that pose cyber threats during COVID-19 time, this research aims to explore user's attitude toward engaging in proactive cybersecurity awareness behavior.
Design/methodology/approach
Based on the theory of planned behavior, the relationship between multiple factors and their influence on the attitude is explored. A survey-based approach was utilized to collect responses and a model was proposed and tested on 229 respondents from the University of Petra-Jordan.
Findings
The attitude was significantly influenced by peers' influence and the individuals' cybersecurity threats awareness, especially threats that emerged during the COVID-19 time.
Research limitations/implications
The research benefits decision makers in educational institutions who intend to develop cybersecurity awareness programs and helps them to assess user cybersecurity background weaknesses.
Originality/value
The research is the first to explore users' knowledge dimensions including organizational, information systems and social media as well as peers' influence on cybersecurity awareness. Also, it sheds light on the users’ perception of major cybersecurity hazards in COVID-19 time.
Details
Keywords
Mahipal Singh, Rekha Goyat and Renu Panwar
At the present time, Industry 4.0 has proven its effectiveness and significance in automation and data exchange within industries across different sectors worldwide. In the…
Abstract
Purpose
At the present time, Industry 4.0 has proven its effectiveness and significance in automation and data exchange within industries across different sectors worldwide. In the current literature, there is still a lack of research on adopting Industry 4.0 in the manufacturing setting in developing economies. The main purpose of the present study is to explore the fundamental pillars and framework for ease of adoption of Industry 4.0 in manufacturing environments, along with highlighting the benefits and challenges.
Design/methodology/approach
In this study, a systematic literature review has been conducted through protocol, search, appraisal, synthesis, analysis, report (PSALSAR) model. In the literature, the articles are included within time span of 2008–2022, consisting keywords like Industry 4.0, blockchain, machine learning, artificial intelligence, Internet of Things, 3D printing, big data analytics, etc. Based on available literature, conceptual implementation framework of Industry 4.0 is proposed.
Findings
This study explored the key ingredients that play an essential role to bridge the gap and construct a strong relationship among physical and cyber world. The results reveals that the emerging technologies such as IoT, blockchain, artificial intelligence, augmented reality, 3D printing, big-data analytics, cloud-computing join hands to accomplish success in Industry 4.0 by reducing human interference for effective and efficient systems. In addition, the study also explored the possible benefits of emerging technologies with challenges faced by manufacturing setting during adaptation of Industry 4.0.
Originality/value
As per the authors' best knowledge, no research articles are found in literature which explore various emerging technologies in Industry 4.0 with its implementation framework in the manufacturing setting in developing economies. The main focus of the present study is to discover the literature review in defined area and find the research gap among current scenario and future trend for execution of Industry 4.0 in manufacturing environment.
Details
Keywords
The purpose of this paper is to analyse the metaverse platform in a social context to better understand the future of this tool in tourism cities and how this can help to improve…
Abstract
Purpose
The purpose of this paper is to analyse the metaverse platform in a social context to better understand the future of this tool in tourism cities and how this can help to improve the well-being of residents in both digital and physical scenarios.
Design/methodology/approach
In this paper, the current and probable developments in the metaverse, and its use in tourism cities and companies have been investigated. Moreover, this study develops, collects and examines the main metaverse definitions by expert authors and organizations as a methodology to ensure the transparency and credibility of the metaverse analysis.
Findings
Findings suggest that the fusion of the metaverse and tourism cities must create residents’ services and experiences in the new MetaTourPolis to help interact and connect citizens with the city’s institutions and companies, as well as make tourism cities more attractive, innovative, environmentally friendly and healthier places to live. Metaverse will bring new changes for residents and tourists, in fact, this virtual platform is already changing and improving the residents’ quality of life and people with disabilities in tourism cities. For instance, the metaverse platform has been implemented in Seoul, Santa Monica and Dubai MetaTourPolis to interact with their residents, including people with disabilities, to resolve bureaucratic and administrative problems, avoiding this group and the rest of the residents travelling by bus or car to the city’s institutions. In addition, several metaverse applications based on softbot tutors or metaverse virtual social centres have been developed to improve blind and impaired people, and elderly people’ quality of life, respectively.
Originality/value
A new concept called “MetaTourPolis” has been included to stage the relationship between tourism cities and the metaverse platform, where the fusion of metaverse and the new tourism polis of the 21st century will be at the service of citizens, tourists and companies, to create more sustainable, efficient, quantitative and environmental tourism cities.
Details
Keywords
Brinda Sampat, Emmanuel Mogaji and Nguyen Phong Nguyen
FinTech offers numerous prospects for significant enhancements and fundamental changes in financial services. However, along with the myriad of benefits, it also has the…
Abstract
Purpose
FinTech offers numerous prospects for significant enhancements and fundamental changes in financial services. However, along with the myriad of benefits, it also has the potential to induce risks to individuals, organisations and society. This study focuses on understanding FinTech developers’ perspective of the dark side of FinTech.
Design/methodology/approach
This study conducted semi-structured interviews with 23 Nigerian FinTech developers using an exploratory, inductive methodology The data were transcribed and then thematically analysed using NVivo.
Findings
Three themes – customer vulnerability, technical inability and regulatory irresponsibility – arose from the thematic analysis. The poor existing technological infrastructure, data management challenges, limited access to data and smartphone adoption pose challenges to a speedy integration of FinTech in the country, making customers vulnerable. The lack of privacy control leads to ethical issues. The lack of skilled developers and the brain drain of good developers present additional obstacles to the development of FinTech in Nigeria.
Research limitations/implications
FinTech operation in a developing country differs from that in developed countries with better technological infrastructure and institutional acceptance. This study recognises that basic banking operations through FinTech are still not well adopted, necessitating the need to be more open-minded about the global practicalities of FinTech.
Practical implications
FinTech managers, banks and policymakers can ethically collect consumer data that can help influence customer credit decisions, product development and recommendations using the mobile app and transaction history. There should be strict penalties on FinTech for selling customers’ data, sending unsolicited messages or gaining unnecessary access to the customer’s contact list. FinTech can offer to educate consumers about their financial management skills.
Originality/value
Whereas other studies have focused on the positive aspects of FinTech to understand client perceptions, this study offers new insights into the dark side of FinTech by analysing the viewpoints of FinTech developers. Furthermore, the study is based in Nigeria, an emerging economy adopting FinTech, adding a new dimension to the body of knowledge.
Details
Keywords
However, recent trends and developments in the AI industry also point towards these same tools’ potential to serve valuable defence purposes, including threat detection, enhanced…