Search results

1 – 10 of 299
Open Access
Article
Publication date: 1 August 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1852

Abstract

Purpose

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.

Design/methodology/approach

This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.

Findings

This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.

Originality/value

The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 29 March 2024

James Caporaso

Trade relations between China and the USA have been marked by conflict, especially since China’s membership in the World Trade Organization (WTO). These conflicts have been…

Abstract

Purpose

Trade relations between China and the USA have been marked by conflict, especially since China’s membership in the World Trade Organization (WTO). These conflicts have been analyzed from a variety of perspectives, including the loss of jobs in the USA due to Chinese imports, competition in high technology sectors and the balance of trade. Conceptual frameworks have employed models of domestic differences as well as models of international power distribution. Among domestic differences examined are the existence of state-owned enterprises in China compared to the domination of the USA economy by private firms, the large role of the Communist Party in China and the influence of labor and environmental and labor groups in the USA. Power distribution theories focus on the systemic effects of the distribution of power on trade openness and on the pattern of intra-bloc versus between-bloc trade. This paper aims to examine the role of macroeconomic policy factors in China and the USA, in particular, the role of national patterns of savings, investment and consumption (both private and government). The paper concludes that insofar as the balance of trade is an important component of the trade conflict, domestic macroeconomic factors continue to be important. The resolution of the conflict will have to take into account the respective macroeconomic policies of China and the USA.

Design/methodology/approach

The design is an analytic case study of US–China trade relations with a particular focus on the balance of trade. The conceptual framework employed involves an analysis of macroeconomic policy categories, especially the overall pattern of savings (household, firm and government), investment and consumption. Process tracing over time since China's membership in the WTO is carried out with an eye toward the relationship between the balance of trade and macroeconomic policy.

Findings

The main findings are that there is a strong relation between the respective macroeconomic policies of the USA and China and their trade relations. The domestic political economy of the USA encourages consumption and a low rate of savings. The opposite is true of China where household income is low by design and national savings are high. China depends on the USA to consume what is not consumed domestically. The USA depends on Chinese imports for additional consumption encouraged by its low rate of savings. The two economies are locked in a mutual dependence.

Research limitations/implications

Key research implications are that there should be more focus on domestic macroeconomic policies since these are the root causes of the trade imbalance. This is not to say that trade frictions centering on jobs, subsidies and competition in high technology are unimportant. However, without the resolution of differences in the management of macroeconomic policies, trade conflicts between the USA and China will continue.

Practical implications

Practical implications are huge, in some ways much more important than the academic implications. Macroeconomic policy differences in savings, investment, government spending, taxation and infrastructure are important. Furthermore, there are available tools in both China and the USA to manage the macroeconomy, particularly, monetary and fiscal policy.

Social implications

One implication of this paper is that satisfaction or dissatisfaction of workers is dependent on income distribution which in turn affects trade. Treatment of people in different socioeconomic categories, such as the elderly, the young, and those at working age are a function of macroeconomic policies.

Originality/value

Many people have written about macroeconomics. It is a conventional subfield of economics. The originality of this paper lies in its advocacy of a shift of focus and attention and in the argument that traditional macroeconomics is related to trade. Despite its importance, macroeconomics has not been the center of attention for most political scientists, though economists have made it more central.

Details

International Trade, Politics and Development, vol. 8 no. 1
Type: Research Article
ISSN: 2586-3932

Keywords

Open Access
Article
Publication date: 25 March 2024

Pia Wäistö, Juhani Ukko and Tero Rantala

Organisational strategy becomes reality by connecting organisation’s resources and capabilities in daily operations, and physical workspace is one of the environments in which…

Abstract

Purpose

Organisational strategy becomes reality by connecting organisation’s resources and capabilities in daily operations, and physical workspace is one of the environments in which this takes place. This study aims to explore to what extent factors required for successful strategy implementation are considered when designing, using and managing workspaces of knowledge-intensive organisations.

Design/methodology/approach

For the study, managers in 25 large and medium-sized knowledge-intensive organisations were interviewed. The semi-structured interviews focused on organisation’s strategy, strategy implementation practices and workspace design and management. To form a comprehensive framework of strategy implementation success factors for the study, the factors of 11 frameworks were analysed, grouped and renamed.

Findings

Current workspace design, usage and management mainly support human-related strategy implementation factors. However, both organisation- and human-related factors are needed for the strategy implementation to be successful. Therefore, the organisations studied may have unused potential in their workspaces to ensure strategy-aligned operations and behaviour.

Practical implications

Due to the potential imbalance between organisation- and human-related strategy implementation factors, a more holistic, organisational-level approach to workspace design, usage and management is recommended to ensure the success of strategy implementation.

Originality/value

Workspaces have extensively been studied from individual strategy implementation factors’ as well as employees’ perspectives. Prior to this work, there are only few studies exploring workspace in the holistic, strategy implementation context.

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7145

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 1 February 2024

Hebatalla Atef Emam

This study aims to investigate the main drivers of private saving in Egypt (2005–2020).

Abstract

Purpose

This study aims to investigate the main drivers of private saving in Egypt (2005–2020).

Design/methodology/approach

It employs an autoregressive distributed lag (ARDL) approach for quarterly data on private saving, lagged private saving, real gross domestic product (GDP) growth, public saving, inflation, real interest rate, money supply, current account deficit and unemployment.

Findings

Private saving in Egypt displays persistency and public saving depresses private saving in the short run and long run. Real interest rate, inflation and unemployment have negative and statistically significant impacts on private saving in the short run and long run. The current account deficit displays a negative effect on private saving but is significant only in the short run. Other incorporated variables, like real GDP and money supply, are not statistically significant. This could be attributed to the high consumption rather than saving motive of the Egyptian population and their tendency to rely more on other informal saving channels.

Research limitations/implications

Findings are of policy relevance as unleashing the determinants of private saving guides policymakers in formulating the appropriate sustainable development policies. It also assists in identifying the main obstacles hindering the promotion of private saving and hence major areas for policy intervention, like financial inclusion, poverty eradication, employment generation and structural reforms.

Originality/value

This study contributes to the literature: (1) it tackles private saving figure rather than aggregate saving figure that is covered by similar studies due to lack of consistent data, (2) given the relatively low quality, unavailability and inconsistency of data on private saving in developing countries, investigating the determinants of private saving should be carried out on an individual country basis which is done by this study, (3) this study fulfills the gap in literature related to the lack of up-to-date studies on private saving in Egypt and (4) it relies on quarterly data that could produce more reliable results.

Details

Review of Economics and Political Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 12 December 2023

Sun-Joong Yoon

In 2022, US financial regulators proposed to mandate a single central clearing mechanism for treasury bonds and repo transactions to stabilize financial markets. The systemic…

Abstract

In 2022, US financial regulators proposed to mandate a single central clearing mechanism for treasury bonds and repo transactions to stabilize financial markets. The systemic risks inherent in repo markets were first highlighted by the global financial crisis and, as a response, global financial authorities such as the Financial Stability Board (FSB) and Bank for International Settlements (BIS) have advocated for the introduction of a central counterparty (CCP). This study examines the structural characteristics of Korean repo markets and proposes the introduction of CCPs as a way to mitigate systemic risk. To this end, the author analyzes the structural differences between US and European repo markets and estimates the potential consequences of introducing CCP clearing in local repo markets. In general, CCPs offer two benefits: they can reduce required capital through netting in multilateral transactions, and they can mitigate the effects of risk transfer by isolating counterparty risk during periods of turbulence. In Korea, the latter effect is expected to play a pivotal role in mitigating potential risks.

Details

Journal of Derivatives and Quantitative Studies: 선물연구, vol. 32 no. 1
Type: Research Article
ISSN: 1229-988X

Keywords

Open Access
Article
Publication date: 8 April 2024

Vikas Mishra, Ariun Ishdorj, Elizabeth Tabares Villarreal and Roger Norton

Collaboration in agricultural value chains (AVCs) has the potential to increase smallholders’ participation in international value chains and increase their benefits from…

Abstract

Purpose

Collaboration in agricultural value chains (AVCs) has the potential to increase smallholders’ participation in international value chains and increase their benefits from participation. This scoping review explores existing collaboration models among stakeholders of AVCs in developing countries, examines enablers and constraints of collaboration and identifies policy gaps.

Design/methodology/approach

We systematically searched three databases, CAB Abstracts, Econlit (EBSCO) and Agricola, for studies published between 2005 and 2023 and included 59 relevant studies on AVC collaboration.

Findings

The primary motivations for collaboration are to enhance market access and improve product quality. Key outcomes of collaboration include improvements in farmers’ welfare, market participation and increased production; only a few studies consider improved risk management as an important outcome. Robust support from government and non-governmental entities is a primary enabler of collaboration. Conversely, conflicts of interest among stakeholders and resource limitations constrain collaboration possibilities. Collaboration involving high-value crops prioritizes income increases, whereas collaboration involving staple crops focuses on improving household food security.

Research limitations/implications

This study may have publication bias as unsuccessful instances of collaboration are less likely to be published.

Originality/value

This study is unique in highlighting collaboration models’ characteristics and identifying AVC policy and programmatic areas where private firms, farmers’ groups, local governments and donor agencies can contribute.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Open Access
Article
Publication date: 16 March 2023

Imoh Antai and Roland Hellberg

The total defence (TD) concept constitutes a joint endeavour between the military forces and civil defence structures within a TD state. Logistics is essential for such joint…

Abstract

Purpose

The total defence (TD) concept constitutes a joint endeavour between the military forces and civil defence structures within a TD state. Logistics is essential for such joint collaboration to work; however, the mismatch between military and civil defence logistics structures poses challenges for such joint collaboration. The purpose of this paper is to identify logistics concept areas within the TD framework that allow for military and civil defence collaborations from a logistics operations perspective.

Design/methodology/approach

Pattern-matching analysis is used to compare patterns found in the investigated case with those prescribed from the literature and predicted to occur. The study seeks to identify logistics concepts within TD from the literature and from the events describing the Swedish response to the Covid-19 pandemic. Pattern matching thus allows for the reconciliation of logistics concepts from the literature to descriptions of how the response was handled, albeit under a TD framework.

Findings

Findings show quite distinct foci between the theoretical and observational realms in terms of logistics applications. While the theoretical realm identifies four main logistics concepts, the observational realm identifies five logistics conceptual themes. This goes on to show an incongruence between the military and civil parts of the TD.

Research limitations/implications

This study provides basis for further research into the applications and management of logistics activity within TD and emergency response.

Originality/value

Logistics applications within TD have not, until now, received much attention in the literature. Given this knowledge gap, this study is of original value.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Open Access
Article
Publication date: 25 April 2023

Beatriz Picazo Rodríguez, Antonio Jose Verdú-Jover, Marina Estrada-Cruz and Jose Maria Gomez-Gras

To understand how organizations, public or private, must increase their productivity perception (PP), independently of the sector. This article aims to analyze PP in the digital…

2412

Abstract

Purpose

To understand how organizations, public or private, must increase their productivity perception (PP), independently of the sector. This article aims to analyze PP in the digital transformation (DT) process to determine how it is affected by technostress (TS) and work engagement (WE), two concepts that seem to be forces opposing PP.

Design/methodology/approach

The authors use data from a questionnaire addressed to personnel in two organizations (public and private). The analysis applies partial least squares technique to the 505 valid responses obtained from these organizations. This analysis is based not on representativeness but on uniqueness.

Findings

The results suggest a positive, significant relationship between DT and PP. This article integrates DT and its effects on aspects of people's health, PP and WE. The model thus includes interactions of technology with human elements. In both business and administrative environments, PP is key to optimizing resources and survival of organizations.

Research limitations/implications

DT processes are different and complex because every organization is different. The authors recommend expanding this study to other sectors in both spheres, public and private. Aligning the objectives of the institutions for aid with DT is also quite complicated.

Practical implications

This study contributes to improving participating organizations. It also provides government institutions with a clear foundation from which to encourage actions that promote the health and WE of their workforce without reducing productivity. In addition, this study adds novelty to the research line.

Originality/value

The authors have deepened this line of research by developing fuller knowledge of the relationships among novel and necessary variables in organizations. The authors provide complementary, different and inspiring value in addressing this line of research.

Details

European Journal of Management and Business Economics, vol. 33 no. 2
Type: Research Article
ISSN: 2444-8451

Keywords

Access

Only content I have access to

Year

Last 3 months (299)

Content type

1 – 10 of 299