Search results

1 – 10 of 56
Open Access
Article
Publication date: 9 February 2023

Gunnar Lindqvist and Joakim Kävrestad

The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the…

Abstract

Purpose

The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the research seeks to examine whether privacy concerns and lower willingness correlate with one another and thereby investigate whether privacy concerns could lead to fewer crimes being reported and resolved.

Design/methodology/approach

A mobile phone survey was distributed to 400 Swedish adults to identify their hypothetical willingness to report certain crimes with and without handing in their mobile phones as evidence. The results were then analysed using inferential statistics.

Findings

The result suggests that there is no meaningful correlation between privacy attitudes and willingness to report crime when the handover of a mobile phone is necessary. The results of this study however show a significant lower willingness to report crimes when the mobile phone must be handed in.

Research limitations/implications

Because the chosen target group were Swedish adults, the research results may lack generalisability for other demographics. Therefore, researchers are encouraged to test other demographics.

Originality/value

This paper’s contribution is the novel exploration of attitudes and behaviours regarding the combination of privacy, digital forensics, mobile phones and crime reportage. This research effort examined the problematic situation that can arise for victims of crime, the invasion of privacy when providing evidence by handing in a mobile phone to the police’s forensic unit for examination.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 21 March 2023

Abel Yeboah-Ofori and Francisca Afua Opoku-Boateng

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their…

Abstract

Purpose

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their Internet with small and medium scale enterprises (SMEs) and third-party vendors to improve business growth and increase global market share, including changing organizational requirements and business process collaborations. Benefits include a reduction in the cost of production, online services, online payments, product distribution channels and delivery in a supply chain environment. However, the integration has led to an exponential increase in cybercrimes, with adversaries using various attack methods to penetrate and exploit the organizational network. Thus, identifying the attack vectors in the event of cyberattacks is very important in mitigating cybercrimes effectively and has become inevitable. However, the invincibility nature of cybercrimes makes it challenging to detect and predict the threat probabilities and the cascading impact in an evolving organization landscape leading to malware, ransomware, data theft and denial of service attacks, among others. The paper explores the cybercrime threat landscape, considers the impact of the attacks and identifies mitigating circumstances to improve security controls in an evolving organizational landscape.

Design/methodology/approach

The approach follows two main cybercrime framework design principles that focus on existing attack detection phases and proposes a cybercrime mitigation framework (CCMF) that uses detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface. The methods and implementation processes were derived by identifying an organizational goal, attack vectors, threat landscape, identification of attacks and models and validation of framework standards to improve security. The novelty contribution of this paper is threefold: first, the authors explore the existing threat landscapes, various cybercrimes, models and the methods that adversaries are deploying on organizations. Second, the authors propose a threat model required for mitigating the risk factors. Finally, the authors recommend control mechanisms in line with security standards to improve security.

Findings

The results show that cybercrimes can be mitigated using a CCMF to detect, assess, analyze, evaluate and respond to cybercrimes to improve security in an evolving organizational threat landscape.

Research limitations/implications

The paper does not consider the organizational size between large organizations and SMEs. The challenges facing the evolving organizational threat landscape include vulnerabilities brought about by the integrations of various network nodes. Factor influencing these vulnerabilities includes inadequate threat intelligence gathering, a lack of third-party auditing and inadequate control mechanisms leading to various manipulations, exploitations, exfiltration and obfuscations.

Practical implications

Attack methods are applied to a case study for the implementation to evaluate the model based on the design principles. Inadequate cyber threat intelligence (CTI) gathering, inadequate attack modeling and security misconfigurations are some of the key factors leading to practical implications in mitigating cybercrimes.

Social implications

There are no social implications; however, cybercrimes have severe consequences for organizations and third-party vendors that integrate their network systems, leading to legal and reputational damage.

Originality/value

The paper’s originality considers mitigating cybercrimes in an evolving organization landscape that requires strategic, tactical and operational management imperative using the proposed framework phases, including detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface, which is currently inadequate.

Details

Continuity & Resilience Review, vol. 5 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Article
Publication date: 29 November 2022

Rajat Kumar Behera, Pradip Kumar Bala and Nripendra P. Rana

The new ways to complete financial transactions have been developed by setting up mobile payment (m-payment) platforms and such platforms to access banking in the financial…

1312

Abstract

Purpose

The new ways to complete financial transactions have been developed by setting up mobile payment (m-payment) platforms and such platforms to access banking in the financial mainstream can transact as never before. But, does m-payment have veiled consequences? To seek an answer, the research was undertaken to explore the dark sides of m-payment for consumers by extending the theory of innovation resistance (IR) and by measuring non-adoption intention (NAI).

Design/methodology/approach

Three hundred individuals using popular online m-payment apps such as Paytm, PhonePe, Amazon Pay and Google Pay were surveyed for the primary data. IBM AMOS based structural equation modelling (SEM) was used to analyse the data.

Findings

Each m-payment transaction leaves a digital record, making some vulnerable consumers concerned about privacy threats. Lack of global standards prevents consumers from participating in the m-payment system properly until common interfaces are established based on up-to-date standards. Self-compassion (SC) characteristics such as anxiety, efficacy, fatigue, wait-and-see tendencies and the excessive choice of technology effect contribute to the non-adoption of m-payment.

Originality/value

This study proposes a threat model and empirically explores the dark sides of m-payment. In addition, it also unveils the moderator's role of SC in building the structural relationship between IR and NAI.

Details

Information Technology & People, vol. 36 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 23 April 2024

Fahim Ullah, Oluwole Olatunji and Siddra Qayyum

Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning…

Abstract

Purpose

Contemporary technological disruptions are espoused as though they stimulate sustainable growth in the built environment through the Green Internet of Things (G-IoT). Learning from discipline-specific experiences, this paper articulates recent advancements in the knowledge and concepts of G-IoT in relation to the construction and smart city sectors. It provides a scoping review for G-IoT as an overlooked dimension. Attention was paid to modern circularity, cleaner production and sustainability as key benefits of G-IoT adoption in line with the United Nations’ Sustainable Development Goals (UN-SDGs). In addition, this study also investigates the current application and adoption strategies of G-IoT.

Design/methodology/approach

This study uses the Preferred Reporting Items for Systematic and Meta-Analyses (PRISMA) review approach. Resources are drawn from Scopus and Web of Science repositories using apt search strings that reflect applications of G-IoT in the built environment in relation to construction management, urban planning, societies and infrastructure. Thematic analysis was used to analyze pertinent themes in the retrieved articles.

Findings

G-IoT is an overlooked dimension in construction and smart cities so far. Thirty-three scholarly articles were reviewed from a total of 82 articles retrieved, from which five themes were identified: G-IoT in buildings, computing, sustainability, waste management and tracking and monitoring. Among other applications, findings show that G-IoT is prominent in smart urban services, healthcare, traffic management, green computing, environmental protection, site safety and waste management. Applicable strategies to hasten adoption include raising awareness, financial incentives, dedicated work approaches, G-IoT technologies and purposeful capacity building among stakeholders. The future of G-IoT in construction and smart city research is in smart drones, building information modeling, digital twins, 3D printing, green computing, robotics and policies that incentivize adoption.

Originality/value

This study adds to the normative literature on envisioning potential strategies for adoption and the future of G-IoT in construction and smart cities as an overlooked dimension. No previous study to date has reviewed pertinent literature in this area, intending to investigate the current applications, adoption strategies and future direction of G-IoT in construction and smart cities. Researchers can expand on the current study by exploring the identified G-IoT applications and adoption strategies in detail, and practitioners can develop implementation policies, regulations and guidelines for holistic G-IoT adoption.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Book part
Publication date: 10 May 2023

Keshav Kaushik

Purpose: Blockchain technology has exploded in popularity in the social economy over the years. Because blockchain technology offers so many advantages, it was first employed for…

Abstract

Purpose: Blockchain technology has exploded in popularity in the social economy over the years. Because blockchain technology offers so many advantages, it was first employed for Bitcoin transactions. The interaction between blockchain technology and financial industries will grow more personal and interwoven with the introduction of Bitcoin. As the value of blockchain technology became evident, more financial companies began to test its use in monetary operations. Numerous financial companies have been experimenting with blockchain technology to reduce the transactional costs and to improve the efficiency of operations, specifically in the domain of financial notes, cross-border payments, and asset-backed securitisation. Blockchain will have a broad range of applications in the financial industry shortly.

Methodology: Through financial tools and methods, trust may result in successful businesses. In the long term, blockchain technology is generally a significant source of the finance industry revolution. It allows you to create immutable transaction histories available to everyone on the network. A blockchain system consists of a sequence of blocks connected by a connection to the block before each block. Each block comprises more than one transaction representing changes in the ownership of assets on the ledger. A consensus procedure is employed to add new blocks to the existing chain, in which members of the public blockchain confirm that transactions are accurate.

Findings: Blockchain technology is still in its infancy. The challenges of sustainability, privacy, secrecy, and latency, among others, have surfaced. Financial markets must get a deeper grasp of Blockchain to provide trustworthy alternatives.

Significance: The book chapter highlights the architecture, protocols, and applications of Blockchain Technology. The chapter will also enlighten the readers about the challenges and solutions of Blockchain Technology in the Financial Market. Moreover, the chapter also discusses the future research scope of Blockchain Technology in the Financial Market.

Details

Contemporary Studies of Risks in Emerging Technology, Part A
Type: Book
ISBN: 978-1-80455-563-7

Keywords

Content available
Book part
Publication date: 25 October 2023

Abstract

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Article
Publication date: 11 September 2023

Balakrishnan Unny R., Samik Shome, Amit Shankar and Saroj Kumar Pani

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this…

Abstract

Purpose

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this evolving research area.

Design/methodology/approach

This review synthesises antecedents, consequences and mediators reported in consumer privacy literature and presents these factors in a conceptual framework to demonstrate the consumer privacy phenomenon.

Findings

Based on the synthesis of constructs reported in the existing literature, a conceptual framework is proposed highlighting antecedents, mediators and outcomes of experiential marketing efforts. Finally, this study deciphers overlooked areas of consumer privacy in the context of smartphone research and provides insightful directions to advance research in this domain in terms of theory development, context, characteristics and methodology.

Originality/value

This study significantly contributes to consumer behaviour literature, specifically consumer privacy literature.

Details

Journal of Consumer Marketing, vol. 41 no. 1
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 5 October 2023

Paul C. Hong, Euisung Jung, Na Young Ahn and Youngran Hyun

This study aims to examine the role of safety governance in ensuring public–private interface ecosystems in response to the COVID-19 pandemic. It aims to highlight the role of…

Abstract

Purpose

This study aims to examine the role of safety governance in ensuring public–private interface ecosystems in response to the COVID-19 pandemic. It aims to highlight the role of safety governance in the complex interfaces of pandemic response mechanisms. The analysis is conducted at the national level, considering safety governance issues in terms of test, confirmed cases, fatality rates, vaccination rate, medical capabilities, Information and communications technology capability, Hofstede’s cultural index (individualism and power distance scores), public safety, personal privacy and national health capabilities.

Design/methodology/approach

Using multigovernance theory and technology, organization and environment theory, the authors present a research model that defines four independent factors and country level performance outcomes and conducted analysis of variance tests.

Findings

Research findings suggest that countries are classified by diverse groups using multiple criteria (e.g. country size, Hofstede’s cultural indexes, ICT capabilities and Governance index). Countries indicate differences in their policy approaches according to their private and public ecosystems. COVID-19 response performance indicators are substantially different.

Research limitations/implications

This study provides the relevance of the multigovernance theory. The empirical results suggest that effective crisis governance is characterized by vertically integrated organizational hierarchies with horizontally connected communication channels that seek maximum voluntary participation and a high level of motivation of informed societal members as a whole. Crisis events occur occasionally, and livelihood routines demonstrate incredible human agility. Gaining insight of the findings from this article may be useful to respond to future crisis events.

Originality/value

This significant study highlights the political and social factors that define response patterns of different countries regarding COVID-19 response mechanisms. With the wide vaccination administration, the COVID-19 landscape shows differences in these countries. This study is rare in providing research framework using Hofstede cultural value and examines with actual data provided by each national government, World Health Organization and credible information sources.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

1 – 10 of 56