Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7113

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 13 September 2023

Workicho Jateno Gadiso, Bamlaku Alamirew Alemu and Maru Shete

This study aims to measure the status of rural household food security across regions using multidimensional indicators. It also aims to identify the determinants of rural…

Abstract

Purpose

This study aims to measure the status of rural household food security across regions using multidimensional indicators. It also aims to identify the determinants of rural household food security in Ethiopia.

Design/methodology/approach

The study adopted descriptive and explanatory designs. It used data from the fourth wave of the Ethiopian socioeconomic survey that has 3,115 respondents. The authors constructed household food security index using variables that capture availability, access, utilization and stability dimensions of food security. The authors categorized households into relative food security groups, namely, alarming and moderately food insecure, as well as moderately and highly food secure. Beta regression model, which is widely used to analyze response variables that assume values between 0 and 1, is used to estimate the determinants of food security.

Findings

The study finds that 77.7% of rural households are food insecure. Of this, 90% are moderately food insecure. Regional variations in magnitude of food security showed that Harari, Gambella and Benshanguel Gumuz regional states are relatively better-off than other regions in Ethiopia. The study identified sex, education level, marital status, location and wealth status of households as significant determinants of food security.

Originality/value

This study sheds light on regional variations in multidimensional food security in Ethiopia. It thus challenged previous estimates of food security using uni-dimensional indicator. It highlighted the need for region-specific analysis of determinants and a follow up of tailored regional interventions.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-02-2023-0139

Details

International Journal of Social Economics, vol. 51 no. 5
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 15 April 2024

Aswathy Sreenivasan and Suresh M.

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying…

Abstract

Purpose

Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying ethical dimensions to the field of entrepreneurship. By combining a bibliometric analysis with the literature review, the purpose of this paper is to provide an overview of entrepreneurship ethics and its contribution to sustainable development goals, along with future research directions on the topic of entrepreneurship and ethics.

Design/methodology/approach

The research looked for literature based on entrepreneurship ethics from the Dimension database. The authors accumulated 2,279 articles for the period of 2002–2022 for analysis. The authors used bibliometric analysis for analyzing the topic with the use of VosViewer and Excel.

Findings

By combining a bibliometric analysis with a literature review, this study aimed to provide an overview of the ethics and entrepreneurship and contribution to sustainable development goals. The most influential author and journal are Vanessa Ratten and the Journal of Business Ethics, respectively. The top sustainable development goals (SDGs) being contributed by entrepreneurship ethics are SDG4, SDG8, SDG16, SDG11 and SDG3. By contrasting these two interpretations, the authors have demonstrated that the entrepreneurship environment involves various ethical issues connected to personal, organizational and societal sectors.

Research limitations/implications

The current study may serve as a general guideline for future investigation into this topic.

Practical implications

Regarding the practical ramifications, the findings can help entrepreneurs who are preparing to launch a business or are already doing so. The findings provide a comprehensive framework of success variables that must be considered to improve the venture’s performance.

Originality/value

This study’s originality is from presenting a structured and in-depth literature review that describes the current state of entrepreneurship ethics and its contribution to sustainable development goals. A complete analysis of the data gathered on entrepreneurship ethics is offered to establish that it is sustainable.

Details

International Journal of Ethics and Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9369

Keywords

Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 26 March 2024

Yingjie Ju, Jianliang Yang, Jingping Ma and Yuehang Hou

The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security…

62

Abstract

Purpose

The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security emergency industry demonstration base, on the profitability of local publicly traded companies. Additionally, the study investigates the significance of firms' blockchain strategies and technologies within this framework.

Design/methodology/approach

Using the differences-in-differences (DID) approach, this study evaluates the impact of China's national security emergency industry demonstration bases (2015–2022) on the profitability of local firms. Data from the China Research Data Service (CNRDS) platform and investor Q&As informed our analysis of firms' blockchain strategy and technology, underpinned by detailed data collection and a robust DID model.

Findings

Emergency industry demonstration bases have notably boosted enterprise profitability in both return on assets (ROA) and return on equity (ROE). Companies adopting blockchain strategies and operational technology see a clear rise in profitability over non-blockchain peers. Additionally, the technical operation of blockchain presents a more pronounced advantage than at the strategic level.

Originality/value

We introduced a new perspective, emphasizing the enhancement of corporate operational safety and financial performance through the pathway of emergency industry policies, driven by the collaboration between government and businesses. Furthermore, we delved into the potential application value of blockchain strategies and technologies in enhancing operational security and the emergency industry.

Details

Industrial Management & Data Systems, vol. 124 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 28 February 2023

Heeseung Yu, Yuhosua Ryoo and Eunkyoung Han

In the face of increasing political polarization worldwide, this study explores whether people create biased perceptions of political knowledge and how this affects their…

317

Abstract

Purpose

In the face of increasing political polarization worldwide, this study explores whether people create biased perceptions of political knowledge and how this affects their selection and evaluation of political content on YouTube.

Design/methodology/approach

For this study, an online experiment was conducted with 441 panels of South Korean respondents. In the first phase, participants answered 10 questions designed to capture their level of objective political knowledge, and for each question, they indicated whether they had responded to that question correctly as a means of measuring their subjective political knowledge. In the second phase, two types of YouTube thumbnails were presented to represent progressive and conservative claims on two controversial political issues, and participants rated and selected the content they would like to see.

Findings

Participants with low political knowledge perceived their knowledge as more than it really was. In contrast, participants with high political knowledge perceived their political knowledge as less than it really was. This biased perception of political knowledge influences respondents' choice and evaluation of political YouTube channel videos.

Originality/value

At a time when political polarization is increasing around the world, this study sought to explore how perceptions of political knowledge differ from actual political knowledge by applying the Dunning-Kruger effect. The authors also used political YouTube channels, whose role in forming public opinion and political influence is rapidly growing, to study the behavior and attitudes of a group of Korean respondents in the media according to their actual and perceived level of political literacy.

Details

Internet Research, vol. 34 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 16 March 2023

Imoh Antai and Roland Hellberg

The total defence (TD) concept constitutes a joint endeavour between the military forces and civil defence structures within a TD state. Logistics is essential for such joint…

Abstract

Purpose

The total defence (TD) concept constitutes a joint endeavour between the military forces and civil defence structures within a TD state. Logistics is essential for such joint collaboration to work; however, the mismatch between military and civil defence logistics structures poses challenges for such joint collaboration. The purpose of this paper is to identify logistics concept areas within the TD framework that allow for military and civil defence collaborations from a logistics operations perspective.

Design/methodology/approach

Pattern-matching analysis is used to compare patterns found in the investigated case with those prescribed from the literature and predicted to occur. The study seeks to identify logistics concepts within TD from the literature and from the events describing the Swedish response to the Covid-19 pandemic. Pattern matching thus allows for the reconciliation of logistics concepts from the literature to descriptions of how the response was handled, albeit under a TD framework.

Findings

Findings show quite distinct foci between the theoretical and observational realms in terms of logistics applications. While the theoretical realm identifies four main logistics concepts, the observational realm identifies five logistics conceptual themes. This goes on to show an incongruence between the military and civil parts of the TD.

Research limitations/implications

This study provides basis for further research into the applications and management of logistics activity within TD and emergency response.

Originality/value

Logistics applications within TD have not, until now, received much attention in the literature. Given this knowledge gap, this study is of original value.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

1 – 10 of over 1000