Search results

1 – 5 of 5
Open Access
Article
Publication date: 29 September 2023

Antara Mahanta Barua and Sruti Sruba Bharali

The purpose of the case study is to investigate the perception of computer science learners at Krishna Kanta Handiqui State Open University (KKHSOU) regarding the use of…

Abstract

Purpose

The purpose of the case study is to investigate the perception of computer science learners at Krishna Kanta Handiqui State Open University (KKHSOU) regarding the use of gamification and to identify the challenges in implementing gamified teaching-learning processes in open and distance learning (ODL) institutions.

Design/methodology/approach

The case study was carried out by observing the views of the learners on the use of gamification in distance learning and studying the participation level of computer science learners before and after the gamification environment was added to a specific topic through the learning management system (LMS). The pre-game and post-game effects on learners' participation against various factors using t-tests were also investigated in this study.

Findings

The study reveals that gamification had a positive and highly significant influence on the learners' participation and engagement in the e-content provided via the LMS. The post-gamification mean score (5.62) was higher than the pre-gamification mean score (2.36), and the overall paired t-test (5.301) value was significant at the 1% level of significance. Some of the challenges faced during the study were communication with the learner, lack of technical skills of the learner, duration of study, etc.

Originality/value

This study will help in understanding the perception and effect of gamification on computer science learners in ODL mode in India. The study succeeded in demonstrating that the use of gamified elements results in increased learner participation.

Details

Asian Association of Open Universities Journal, vol. 18 no. 3
Type: Research Article
ISSN: 1858-3431

Keywords

Open Access
Article
Publication date: 30 December 2022

Durga Prasad Dube and Rajendra Prasad Mohanty

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for…

1586

Abstract

Purpose

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for evaluating the efficiency of cyber security organization but what matters is how the factors of internal efficiency affect the business performance, i.e. the external effectiveness. The purpose of this research paper is to derive the factors of internal efficiency and external effectiveness of cyber security and develop impact model to identify the most and least preferred parameters of internal efficiency with respect to all the parameters of external effectiveness.

Design/methodology/approach

There are two objectives for this research: Deriving the factors of internal efficiency and external effectiveness of cyber security; Developing a model to identify the impact of internal efficiency factors on the external effectiveness of cyber security since there is not much evidence of research in defining the factors of internal efficiency and external effectiveness of cyber security, the authors have chosen grounded theory methodology (GTM) to derive the parameters. In this study emic approach of GTM is followed and an algorithm is developed for administering the grounded theory research process. For the second research objective survey methodology and rank order was used to formulate the impact model. Two different samples and questionnaires were designed for each of the objectives.

Findings

For the objective 1, 11 factors of efficiency and 10 factors of effectiveness were derived. These are used as independent and dependent variable respectively in the later part of the research for the second objective. For the objective 2 the impact models among independent and dependent variables were formulated to find out the following. Most and least preferred parameters lead to internal efficiency of cyber security organization to identify the most and least preferred parameters of internal efficiency with respect to all the parameters external effectiveness.

Research limitations/implications

The factors of internal efficiency and external effectiveness constructed by using grounded theory cannot remain constant in the long run, because of dynamism of the domain itself. Over and above this, there are inherent limitations of the tools like grounded theory, used in the research. Few important limitations of GTM are as below in grounded theory, it is comparatively difficult to maintain and demonstrate the rigors of research discipline. The sheer volume of data makes the analysis and interpretation complex, and lengthy time consuming. The researchers’ presence during data gathering, which is often unavoidable and desirable too in qualitative research, may affect the subjects’ responses. The subjectivity of the data leads to difficulties in establishing reliability and validity of approaches and information. It is difficult to detect or to prevent researcher-induced bias.

Practical implications

The internal efficiency and external effectiveness factors of cyber security can be further correlated by the future researchers to understand the correlations among all the factors and predict cyber security performance. The grounded theory algorithm developed by us can be further used for qualitative research for deriving theory through abstractions in the areas where there is no sufficient availability of data. Practitioners of cyber security can use this research to focus on relevant areas depending on their respective business objective/requirements. The models developed by us can be used by the future researchers to for various sectoral validations and correlations.

Social implications

Though the financial costs of a cyber-attack are steep, the social impact of cyber security failures is less readily apparent but can cause lasting damage to customers, employees and the company. Therefore, it is always important to be mindful of how the impact of cyber security affects society as well as the bottom line when they are calculating the potential impact of a breach. Underestimating either impact can destroy a brand. The factor of internal efficiency and external effectiveness derived by us will help stakeholder in focusing on relevant area depending on their business. The impact model developed in this research is very useful for focusing a particular business requirement and accordingly tune the efficiency factor.

Originality/value

During literature study the authors did not find any evidence of application of grounded theory approach in cyber security research. While the authors were exploring research literature to find out some insight into the factor of internal efficiency and external effectiveness of cyber security, the authors did not find concrete and objective research on this. This motivated us to use grounded theory to derive these factors. This, in the authors’ opinion is one of the pioneering and unique contribution to the research as to the authors’ knowledge no researchers have ever tried to use this methodology for the stated purpose and cyber security domain in general. In this process the authors have also developed an algorithm for administering GTM. Further developing impact models using factors of internal efficiency and external effectiveness has lots of managerial and practical implication.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 15 May 2020

Fatima Ghezali and Abdessamad Boudi

The purpose of this paper is to investigate the relationship between marketing mix (MM), information technology capabilities (ITCAP) and corporate entrepreneurship (CE)…

5459

Abstract

Purpose

The purpose of this paper is to investigate the relationship between marketing mix (MM), information technology capabilities (ITCAP) and corporate entrepreneurship (CE). Additionally, the study has attempted to address the moderating influence of ITCAP on MM–CE relationship.

Design/methodology/approach

To achieve the objectives of the study, data was collected from managers working in the upper and middle departments in some major Algerian banks. To test the hypotheses of the study, simple regression and PROCESS macro with moderated multiple regression were used.

Findings

The results of the study revealed that the MM and ITCAP positively affect entrepreneurship, and the ITCAP of banks and their interaction with the MM contributed positively to promoting entrepreneurship for companies through the moderate influence of ITCAP on the relationship between the MM and CE.

Research limitations/implications

It is very difficult to present the generalization of the results of this study because some of the major banks mainly drove the study sample. Therefore, researchers are encouraged to test the proposed propositions further.

Practical implications

The results of the study suggested that policymakers in the banking sector in Algeria seriously consider developing the MM for its direct role in the CE. Specifically, the moderate role of ITCAP indicated that an effective alignment of the bank’s ITCAP with elements of the MM could enhance the entrepreneurship position of the bank. Therefore, it is necessary to pay attention to the importance of these factors to foster entrepreneurship in the services sector.

Originality/value

The role of MM in CE has been overlooked in the extant literature, especially in the emerging economies. In addition, this study extends the body of knowledge through evaluating the moderating role of ITCAP using the effect of interaction in PROCESS macro with moderated multiple regression for path analysis.

Open Access
Article
Publication date: 8 January 2020

Elham Rostami, Fredrik Karlsson and Ella Kolkowska

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…

1422

Abstract

Purpose

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about.

Design/methodology/approach

The results are based on a literature review of ISP management research published between 1990 and 2017.

Findings

Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.

Research limitations/implications

Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.

Practical implications

The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.

Originality/value

Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 4 December 2020

Špela Orehek and Gregor Petrič

The concept of information security culture, which recently gained increased attention, aims to comprehensively grasp socio-cultural mechanisms that have an impact on…

3754

Abstract

Purpose

The concept of information security culture, which recently gained increased attention, aims to comprehensively grasp socio-cultural mechanisms that have an impact on organizational security. Different measurement instruments have been developed to measure and assess information security culture using survey-based tools. However, the content, breadth and face validity of these scales vary greatly. This study aims to identify and provide an overview of the scales that are used to measure information security culture and to evaluate the rigor of reported scale development and validation procedures.

Design/methodology/approach

Papers that introduce a new or adapt an existing scale of information security culture were systematically reviewed to evaluate scales of information security culture. A standard search strategy was applied to identify 19 relevant scales, which were evaluated based on the framework of 16 criteria pertaining to the rigor of reported operationalization and the reported validity and reliability of the identified scales.

Findings

The results show that the rigor with which scales of information security culture are validated varies greatly and that none of the scales meet all the evaluation criteria. Moreover, most of the studies provide somewhat limited evidence of the validation of scales, indicating room for further improvement. Particularly, critical issues seem to be the lack of evidence regarding discriminant and criterion validity and incomplete documentation of the operationalization process.

Research limitations/implications

Researchers focusing on the human factor in information security need to reach a certain level of agreement on the essential elements of the concept of information security culture. Future studies need to build on existing scales, address their limitations and gain further evidence regarding the validity of scales of information security culture. Further research should also investigate the quality of definitions and make expert assessments of the content fit between concepts and items.

Practical implications

Organizations that aim to assess the level of information security culture among employees can use the results of this systematic review to support the selection of an adequate measurement scale. However, caution is needed for scales that provide limited evidence of validation.

Originality/value

This is the first study that offers a critical evaluation of existing scales of information security culture. The results have decision-making value for researchers who intend to conduct survey-based examinations of information security culture.

Access

Only Open Access

Year

Content type

1 – 5 of 5