Search results

1 – 10 of 48
Open Access
Article
Publication date: 20 July 2023

Martina Neri, Federico Niccolini and Luigi Martino

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…

1864

Abstract

Purpose

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known characteristics, the cybersecurity phenomenon goes beyond the detection of technological impacts, and encompasses all the dimensions of an organization. This study thus focusses on an additional set of organizational elements. The key elements of cybersecurity organizational readiness depicted here are cybersecurity awareness, cybersecurity culture and cybersecurity organizational resilience (OR). This study aims to qualitatively assess small and medium enterprises’ (SMEs) overall level of organizational cybersecurity readiness.

Design/methodology/approach

This study focused on conducting a cybersecurity organizational readiness assessment using a sample of 53 Italian SMEs from the information and communication technology sector. Informed mixed method research, this study was conducted consistent with the principles of the explanatory sequential mixed method design, and adopting a quanti-qualitative methodology. The quantitative data were collected through a questionnaire. Qualitative data were subsequently collected through semi-structured interviews.

Findings

Although many elements of the technical aspects of cybersecurity OR have yielded very encouraging results, there are still some areas that require improvement. These include those facets that constitute the foundation of cybersecurity awareness, and, thus, a cybersecurity culture. This result highlights that the areas in need of improvement are exactly those that are most important in fighting against cyber threats via organizational cybersecurity readiness.

Originality/value

Although the importance of SMEs is obvious, evidence of such organizations’ attitudes to cybersecurity are still limited. This research is an attempt to depict the organizational issue related to cybersecurity, i.e. overall cybersecurity organizational readiness.

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

5866

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 5 January 2023

Mohd Irwan Abdul Rani, Sharifah Nazatul Faiza Syed Mustapha Nazri and Salwa Zolkaflil

This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.

Abstract

Purpose

This paper aims to provide a systematic literature review (SLR) on contemporary cardinal money mule issues.

Design/methodology/approach

This paper reviews the most common money mule themes in perpetrating financial crime activities, especially its roles, recruitment and awareness. A systematic review protocol called preferred reporting items for systematic review and meta-analysis protocols is adopted for this study.

Findings

Money mules are used by organized criminal groups (OCG) or fraudster to launder illicit funds from outrageous criminal activities. They allow their accounts to be used for money laundering by OCG. The attacker, OCG or fraudsters would layer the stolen funds using money mule accounts. These money mules are recruited using various approaches, oftentimes deceived by opulent lifestyles to captivate the interest of potential money mules.

Originality/value

This paper presents money mule awareness needed by accountant, bank employees and the society. It is an unprecedented SLR on money mule. This paper will be beneficial for future money mule researchers, enforcement agencies and practitioners in banking industry.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 11 April 2023

Kate-Riin Kont

This paper aims to investigate cyber security awareness of the staff of Estonian libraries and gives an overview why libraries could be a target of cyber attacks and why…

473

Abstract

Purpose

This paper aims to investigate cyber security awareness of the staff of Estonian libraries and gives an overview why libraries could be a target of cyber attacks and why librarians need cyber security at first place.

Design/methodology/approach

The data used in this paper is based on a review of relevant literature to provide an overview of the concept of cyber security, and the results of the original online survey created by the paper’s author, conducted among Estonian librarians. The online questionnaire was developed using the world-recognised human aspects of information security questionnaire (HAIS-Q), which is based on the knowledge-attitudes-behaviour (KAB) methodology. A total of 388 completed questionnaires were returned from employees of academic, specialised, public and school libraries. The results are interpreted on the basis of descriptive statistics and Kruger and Kearney approach.

Findings

The final score of library employees is 86, which is classified as good, but based on the result, two focus areas need more attention than previously, which are the use of devices and prevention and handling of incidents.

Originality/value

The cyber behaviour of library employees has not been widely studied in the world using HAIS-Q and KAB models, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.

Details

Library Hi Tech News, vol. 41 no. 1
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 1 December 2022

Duha Alsmadi, Ali Maqousi and Tala Abuhussein

Due to the lack of awareness and poor cybersecurity practices that pose cyber threats during COVID-19 time, this research aims to explore user's attitude toward engaging in…

Abstract

Purpose

Due to the lack of awareness and poor cybersecurity practices that pose cyber threats during COVID-19 time, this research aims to explore user's attitude toward engaging in proactive cybersecurity awareness behavior.

Design/methodology/approach

Based on the theory of planned behavior, the relationship between multiple factors and their influence on the attitude is explored. A survey-based approach was utilized to collect responses and a model was proposed and tested on 229 respondents from the University of Petra-Jordan.

Findings

The attitude was significantly influenced by peers' influence and the individuals' cybersecurity threats awareness, especially threats that emerged during the COVID-19 time.

Research limitations/implications

The research benefits decision makers in educational institutions who intend to develop cybersecurity awareness programs and helps them to assess user cybersecurity background weaknesses.

Originality/value

The research is the first to explore users' knowledge dimensions including organizational, information systems and social media as well as peers' influence on cybersecurity awareness. Also, it sheds light on the users’ perception of major cybersecurity hazards in COVID-19 time.

Details

Kybernetes, vol. 53 no. 1
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 5 April 2023

Mahipal Singh, Rekha Goyat and Renu Panwar

At the present time, Industry 4.0 has proven its effectiveness and significance in automation and data exchange within industries across different sectors worldwide. In the…

564

Abstract

Purpose

At the present time, Industry 4.0 has proven its effectiveness and significance in automation and data exchange within industries across different sectors worldwide. In the current literature, there is still a lack of research on adopting Industry 4.0 in the manufacturing setting in developing economies. The main purpose of the present study is to explore the fundamental pillars and framework for ease of adoption of Industry 4.0 in manufacturing environments, along with highlighting the benefits and challenges.

Design/methodology/approach

In this study, a systematic literature review has been conducted through protocol, search, appraisal, synthesis, analysis, report (PSALSAR) model. In the literature, the articles are included within time span of 2008–2022, consisting keywords like Industry 4.0, blockchain, machine learning, artificial intelligence, Internet of Things, 3D printing, big data analytics, etc. Based on available literature, conceptual implementation framework of Industry 4.0 is proposed.

Findings

This study explored the key ingredients that play an essential role to bridge the gap and construct a strong relationship among physical and cyber world. The results reveals that the emerging technologies such as IoT, blockchain, artificial intelligence, augmented reality, 3D printing, big-data analytics, cloud-computing join hands to accomplish success in Industry 4.0 by reducing human interference for effective and efficient systems. In addition, the study also explored the possible benefits of emerging technologies with challenges faced by manufacturing setting during adaptation of Industry 4.0.

Originality/value

As per the authors' best knowledge, no research articles are found in literature which explore various emerging technologies in Industry 4.0 with its implementation framework in the manufacturing setting in developing economies. The main focus of the present study is to discover the literature review in defined area and find the research gap among current scenario and future trend for execution of Industry 4.0 in manufacturing environment.

Details

The TQM Journal, vol. 36 no. 1
Type: Research Article
ISSN: 1754-2731

Keywords

Open Access
Article
Publication date: 14 March 2024

Lázaro Florido-Benítez

The purpose of this paper is to analyse the metaverse platform in a social context to better understand the future of this tool in tourism cities and how this can help to improve…

Abstract

Purpose

The purpose of this paper is to analyse the metaverse platform in a social context to better understand the future of this tool in tourism cities and how this can help to improve the well-being of residents in both digital and physical scenarios.

Design/methodology/approach

In this paper, the current and probable developments in the metaverse, and its use in tourism cities and companies have been investigated. Moreover, this study develops, collects and examines the main metaverse definitions by expert authors and organizations as a methodology to ensure the transparency and credibility of the metaverse analysis.

Findings

Findings suggest that the fusion of the metaverse and tourism cities must create residents’ services and experiences in the new MetaTourPolis to help interact and connect citizens with the city’s institutions and companies, as well as make tourism cities more attractive, innovative, environmentally friendly and healthier places to live. Metaverse will bring new changes for residents and tourists, in fact, this virtual platform is already changing and improving the residents’ quality of life and people with disabilities in tourism cities. For instance, the metaverse platform has been implemented in Seoul, Santa Monica and Dubai MetaTourPolis to interact with their residents, including people with disabilities, to resolve bureaucratic and administrative problems, avoiding this group and the rest of the residents travelling by bus or car to the city’s institutions. In addition, several metaverse applications based on softbot tutors or metaverse virtual social centres have been developed to improve blind and impaired people, and elderly people’ quality of life, respectively.

Originality/value

A new concept called “MetaTourPolis” has been included to stage the relationship between tourism cities and the metaverse platform, where the fusion of metaverse and the new tourism polis of the 21st century will be at the service of citizens, tourists and companies, to create more sustainable, efficient, quantitative and environmental tourism cities.

Details

International Journal of Tourism Cities, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-5607

Keywords

Article
Publication date: 5 July 2023

Brinda Sampat, Emmanuel Mogaji and Nguyen Phong Nguyen

FinTech offers numerous prospects for significant enhancements and fundamental changes in financial services. However, along with the myriad of benefits, it also has the…

1742

Abstract

Purpose

FinTech offers numerous prospects for significant enhancements and fundamental changes in financial services. However, along with the myriad of benefits, it also has the potential to induce risks to individuals, organisations and society. This study focuses on understanding FinTech developers’ perspective of the dark side of FinTech.

Design/methodology/approach

This study conducted semi-structured interviews with 23 Nigerian FinTech developers using an exploratory, inductive methodology The data were transcribed and then thematically analysed using NVivo.

Findings

Three themes – customer vulnerability, technical inability and regulatory irresponsibility – arose from the thematic analysis. The poor existing technological infrastructure, data management challenges, limited access to data and smartphone adoption pose challenges to a speedy integration of FinTech in the country, making customers vulnerable. The lack of privacy control leads to ethical issues. The lack of skilled developers and the brain drain of good developers present additional obstacles to the development of FinTech in Nigeria.

Research limitations/implications

FinTech operation in a developing country differs from that in developed countries with better technological infrastructure and institutional acceptance. This study recognises that basic banking operations through FinTech are still not well adopted, necessitating the need to be more open-minded about the global practicalities of FinTech.

Practical implications

FinTech managers, banks and policymakers can ethically collect consumer data that can help influence customer credit decisions, product development and recommendations using the mobile app and transaction history. There should be strict penalties on FinTech for selling customers’ data, sending unsolicited messages or gaining unnecessary access to the customer’s contact list. FinTech can offer to educate consumers about their financial management skills.

Originality/value

Whereas other studies have focused on the positive aspects of FinTech to understand client perceptions, this study offers new insights into the dark side of FinTech by analysing the viewpoints of FinTech developers. Furthermore, the study is based in Nigeria, an emerging economy adopting FinTech, adding a new dimension to the body of knowledge.

Details

International Journal of Bank Marketing, vol. 42 no. 1
Type: Research Article
ISSN: 0265-2323

Keywords

Expert briefing
Publication date: 7 February 2024

However, recent trends and developments in the AI industry also point towards these same tools’ potential to serve valuable defence purposes, including threat detection, enhanced…

Details

DOI: 10.1108/OXAN-DB285079

ISSN: 2633-304X

Keywords

Geographic
Topical
1 – 10 of 48