Search results

1 – 10 of 534
Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 10 April 2024

Tze Yin Khaw, Azlan Amran and Ai Ping Teoh

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity…

Abstract

Purpose

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.

Design/methodology/approach

This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study’s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.

Findings

This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.

Originality/value

This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.

Details

Journal of Systems and Information Technology, vol. 26 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 21 February 2024

Simon D. Norton

Free banking theory, as developed in Adam Smith’s 1776 treatise, “The Wealth of Nations” is a useful tool in determining the extent to which the “invisible hand of the market”…

Abstract

Purpose

Free banking theory, as developed in Adam Smith’s 1776 treatise, “The Wealth of Nations” is a useful tool in determining the extent to which the “invisible hand of the market” should prevail in regulatory policy. The purpose of this study is to provide a timely review of the literature, evaluating the theory’s relevance to regulation of financial technology generally and cryptocurrencies (cryptos) specifically.

Design/methodology/approach

The methodology is qualitative, applying free banking theory as developed in the literature to technology-defined environments. Recent legislative developments in the regulation of cryptocurrencies in the UK, European Union and the USA, are drawn upon.

Findings

Participants in volatile cryptocurrency markets should bear the consequences of inadvisable investments in accordance with free banking theory. The decentralised nature of cryptocurrencies and the exchanges on which these are traded militate against coordinated oversight by central banks, supporting a qualified free banking approach. Differences regarding statutory definitions of cryptos as units of exchange, tokens or investment securities and the propensity of these to transition between categories across the business cycle render attempts at concerted classification at the international level problematic. Prevention of criminality through extension of Suspicious Activity Reporting to exchanges and intermediaries should be the principal objective of policymakers, rather than definitions of evolving products that risk stifling technological innovation.

Originality/value

The study proposes that instead of a traditional regulatory approach to cryptos, which emphasises holders’ safety and compensation, a free banking approach combined with a focus on criminality would be a more effective and pragmatic way forward.

Details

Journal of Financial Regulation and Compliance, vol. 32 no. 2
Type: Research Article
ISSN: 1358-1988

Keywords

Open Access
Article
Publication date: 6 February 2024

Daniel Cookman

This paper aims to discuss the adequacy of restrictive measures. Providing a synopsis of a global movement toward the imposition of target restrictive measures. Questioning the…

Abstract

Purpose

This paper aims to discuss the adequacy of restrictive measures. Providing a synopsis of a global movement toward the imposition of target restrictive measures. Questioning the success of targeted restrictive measures in obtaining behavioural change. Identifying a reversion to the implementation of wide ranging sectoral restrictive measures in an attempt to encourage immediate behavioural change. Accessing the success of using restrictive measures to encourage democratic regimes in Africa.

Design/methodology/approach

This study is a desktop research that examines European Parliament and Council issued Regulations for the jurisdictions of Iran, Russia and Belarus. Academic research is also used in identifying a pendulum swing by global legislatures with respect to the imposition of targeted measures to requiring the imposition of additional wide ranging sectoral measures.

Findings

Targeted measures can be circumvented using non-hostile third countries. Academic research identifies that wide reaching sectoral sanctions encourage regime change. Therefore, where targeted measures fail to give rise to their desired persuasive objectives. The legislator moves to introduce additional measures, also comprising of sectoral sanctions. Sectoral sanctions have been applied by the European Union in Iran, Russia and Belarus. The USA has taken measures to limit Russia ability to use Turkey as a transshipment hub. The African continent case study identifies the importance of creating an architecture founded on upholding positive governance and human rights standards. Failure to do so leads to a revolving system of authoritarian regimes, sanctioned by restrictive measures.

Originality/value

This paper is a desktop review composed by the author.

Details

Journal of Money Laundering Control, vol. 27 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 7 May 2024

Dien Van Tran, Phuong V. Nguyen, Linh Phuong Le and Sam Thi Ngoc Nguyen

This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to…

Abstract

Purpose

This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to explore the complex correlation between the level of awareness about cybersecurity measures and attitudes towards compliance with these measures. Additionally, it looks at how these factors collectively impact employees’ behaviour to protect organisational assets and information.

Design/methodology/approach

This study uses a quantitative research methodology in which primary data are gathered using a survey questionnaire distributed to personnel employed at Vietnamese organisations. The data are analysed, and the validity of the measurement and structural equation model is assessed using a partial least squares–structural equation model approach after the collection of all the survey responses.

Findings

The provision of policies and security education, training and awareness programmes are strongly and positively associated with cybersecurity awareness. Moreover, cybersecurity awareness plays an important role in shaping attitudes and intentions towards information security policy compliance (ISPC). Attitude is positively associated with intention towards ISPC and employee protective behaviour. Finally, the intention towards ISPC is significant in shaping employee protective behaviour.

Originality/value

This study contributes to the understanding of the antecedents of cybersecurity in developing countries such as Vietnam. Furthermore, it provides a comprehensive framework for understanding intention and protective behaviour through cybersecurity awareness and compliance attitudes. By combining the theory of planned behaviour and protection motivation theory with institutional governance, this study extends previous research on the effects of these variables on employee protective behaviour.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Open Access
Article
Publication date: 8 May 2024

Tapas Kumar Sethy and Naliniprava Tripathy

This study aims to explore the impact of systematic liquidity risk on the averaged cross-sectional equity return of the Indian equity market. It also examines the effects of…

Abstract

Purpose

This study aims to explore the impact of systematic liquidity risk on the averaged cross-sectional equity return of the Indian equity market. It also examines the effects of illiquidity and decomposed illiquidity on the conditional volatility of the equity market.

Design/methodology/approach

The present study employs the Liquidity Adjusted Capital Asset Pricing Model (LCAPM) for pricing systematic liquidity risk using the Fama & MacBeth cross-sectional regression model in the Indian stock market from January 1, 2012, to March 31, 2021. Further, the study employed an exponential generalized autoregressive conditional heteroscedastic (1,1) model to observe the impact of decomposed illiquidity on the equity market’s conditional volatility. The study also uses the Ordinary Least Square (OLS) model to illuminate the return-volatility-liquidity relationship.

Findings

The study’s findings indicate that the commonality between individual security liquidity and aggregate liquidity is positive, and the covariance of individual security liquidity and the market return negatively affects the expected return. The study’s outcome specifies that illiquidity time series analysis exhibits the asymmetric effect of directional change in return on illiquidity. Further, the study indicates a significant impact of illiquidity and decomposed illiquidity on conditional volatility. This suggests an asymmetric effect of illiquidity shocks on conditional volatility in the Indian stock market.

Originality/value

This study is one of the few studies that used the World Uncertainty Index (WUI) to measure liquidity and market risks as specified in the LCAPM. Further, the findings of the reverse impact of illiquidity and decomposed higher and lower illiquidity on conditional volatility confirm the presence of price informativeness and its immediate effects on illiquidity in the Indian stock market. The study strengthens earlier studies and offers new insights into stock market liquidity to clarify the association between liquidity and stock return for effective policy and strategy formulation that can benefit investors.

Details

China Accounting and Finance Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1029-807X

Keywords

Article
Publication date: 24 October 2023

Doron Goldbarsht

The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks…

Abstract

Purpose

The rise of cryptocurrencies and other digital assets has triggered concerns about regulation and security. Governments and regulatory bodies are challenged to create frameworks that protect consumers, combat money laundering and address risks linked to digital assets. Conventional approaches to confiscation and anti-money laundering are deemed insufficient in this evolving landscape. The absence of a central authority and the use of encryption hinder the identification of asset owners and the tracking of illicit activities. Moreover, the international and cross-border nature of digital assets complicates matters, demanding global coordination. The purpose of this study is to highlight that the effective combat of money laundering, legislative action, innovative investigative techniques and public–private partnerships are crucial.

Design/methodology/approach

The focal point of this paper is Australia’s approach to law enforcement in the realm of digital assets. It underscores the pivotal role of robust confiscation mechanisms in disrupting criminal networks operating through digital means. The paper firmly asserts that staying ahead of the curve and maintaining an agile stance is paramount. Criminals are quick to embrace emerging technologies, necessitating proactive measures from policymakers and law enforcement agencies.

Findings

It is argued that an agile and comprehensive approach is vital in countering money laundering, as criminals adapt to new technologies. Policymakers and law enforcement agencies must remain proactively ahead of these developments to efficiently identify, trace and seize digital assets involved in illicit activities, thereby safeguarding the integrity of the global financial system.

Originality/value

This paper provides a distinctive perspective by examining Australia’s legal anti-money laundering and counterterrorism financing framework, along with its law enforcement strategies within the realm of the digital asset landscape. While there is a plethora of literature on both asset confiscation and digital assets, there is a noticeable absence of exploration into their interplay, especially within the Australian context.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 3 November 2023

Nermeen Bahnasy

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites…

Abstract

Purpose

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites. Specifically, the study aims to explore the relationship between the tourism industry and local agricultural practices and how this connection influences food security in the Siwa Oasis, located in the Western Desert of Egypt.

Design/methodology/approach

The study employs a qualitative exploratory research design using in-depth interviews and focus groups to investigate the impact of the tourism economy on food security and identify potential benefits and limitations for food security in the region.

Findings

The research reveals that the tourism economy in Siwa Oasis has only a marginal contribution to food security. The study highlights a lack of a strong connection between the tourism industry and local agricultural practices within the heritage site. As a result, the potential benefits and synergies that could be achieved between tourism and agriculture have not been fully realized, leading to a limited impact on food stability.

Research limitations/implications

This study primarily relies on qualitative data from Siwa Oasis, Egypt, which may limit the generalizability of findings beyond this specific context. Additionally, while the study provides valuable insights into the complex relationship between tourism and food security, it does not quantitatively measure the magnitude of tourism's impact. Future research could incorporate quantitative methods for a more comprehensive understanding of this relationship in diverse desert-prone regions. Finally, the study highlights the need for more integrated approaches to enhance food security through tourism, but the specific strategies and policy recommendations require further investigation and adaptation to local contexts.

Practical implications

This study underscores the need for tourism development strategies that prioritize food security in desert-prone areas like Siwa Oasis. Policymakers and stakeholders should promote sustainable tourism practices that enhance local agriculture, create diversified income sources and foster equitable benefits for communities. Moreover, recognizing the seasonal nature of tourism, interventions to address food shortages during off-peak periods are crucial. Efforts should also focus on skill development and gender-inclusive opportunities within the tourism sector to ensure broader community participation. Additionally, collaborations between tourism and agriculture should be encouraged to optimize food availability and stability while preserving cultural food traditions.

Originality/value

This study adds original insights by examining the specific impact of the tourism economy on food security in dessert-prone agricultural heritage sites. The study's originality lies in its exploration of the untapped potential for synergy between the tourism and agricultural sectors and the implications for local food security. This research contributes to understanding how tourism can improve food security in specific contexts and provides valuable insights into sustainable development in heritage sites.

Details

Journal of Humanities and Applied Social Sciences, vol. 6 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Article
Publication date: 7 May 2024

Richard Kapend, Mark Button and Peter Stiernstedt

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional…

Abstract

Purpose

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional services firms such as firms of accountants who also charge fees, in-house investigators employed by private organisations and in-house investigators of public sector organisations who are not sworn police officers. Some of these investigators, such as private investigators, have been exposed in unethical activities such as illegal surveillance and blagging to name some. In this respect, this study aims to uncover the ethical orientations of investigators using cluster analysis.

Design/methodology/approach

This study is based upon an online survey of private investigators predominantly in the UK, i.e. investigators beyond the public police. An innovate statistical inferential analysis was used to investigate the sample which resulted in the development of three ethical orientations of such investigators.

Findings

Based upon a survey response from 331 of these types of investigators this study illustrates the extent they engage in unethical activities, showing a very small minority of largely private investigators who engage in such activities.

Originality/value

A unique feature of this study is the use of an innovative statistical approach using an unsupervised machine learning model, namely, TwoStep cluster analysis, to successfully group and classify respondents based on their ethical orientation. The model derived three types of ethical orientation: ethical, inbetweeners and risk takers.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 534