Search results

1 – 10 of 649
Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7101

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 24 May 2023

Siqi Hu, Carol Hsu and Zhongyun Zhou

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional…

Abstract

Purpose

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional methods, the present study leveraged an “event” lens and dimensionalized employees' perceptions into three sub-dimensions: perceived novelty, perceived disruption and perceived criticality. Moreover, this research went a step further by examining how pedagogical and communication approaches to a SETA program affect employees' perceptions of the program. This study then investigated whether – and if so, how – these approaches impact employees' perceptions of the SETA program and their subsequent commitment to it.

Design/methodology/approach

Utilizing a factorial-based scenario survey, this study empirically tested a model of the above relationships via covariance-based structural equation modeling.

Findings

The results of this research showed that pedagogical approaches were more effective than communication approaches and that employees' perceptions of the SETA program accounted for a large variance in their commitment to SETA.

Originality/value

First, this research deepens understanding of the protection of information assets by elaborating on the different approaches that organizations can take to encourage employees' commitment to SETA. Second, the study enriches the SETA literature by theorizing a SETA program as an organizational “event”, which represents a major shift from the conventional approach. Third, the study adds to the theoretical knowledge of the event lens by extending it to the SETA context and investigating the relationship among three event strength components.

Article
Publication date: 26 March 2024

Bernardo Nicoletti and Andrea Appolloni,

The logistics industry has undergone a tremendous transformation. This transformation is necessary to cope with the fundamental changes in customer expectations and the need for…

Abstract

Purpose

The logistics industry has undergone a tremendous transformation. This transformation is necessary to cope with the fundamental changes in customer expectations and the need for digitalization imposed by the pandemic, changes in the socioeconomic world, and innovative technology solutions. This paper aims to present digital transformation as an integrated framework for transforming the operating model and applying advanced solutions to the ecosystem of a quintile logistics (5PL) company. 5PL operators are typically an ecosystem. Loosely coupled or self-organized entities that collaborate in a symbiotic relationship represent this ecosystem. They aim to jointly develop capabilities, create innovative services or solutions, share knowledge, facilitate transactions, and leverage network synergies in a logistics environment to provide optimized or novel customer- or partner-centric solutions (Lamberjohann and Otto, 2020).

Design/methodology/approach

Currently, there is no single definition of an integrated logistics operations model in 5PL practice, so the qualitative method used in this paper allows for investigation from an exploratory perspective. The paper follows a qualitative research methodology, collecting and analyzing data/facts through interviews and visits to subject matter experts, industry practitioners, and academic researchers, combined with an extensive review of academic publications, industry reports, and written and media content from established organizations in the marketplace. This paper follows a qualitative research methodology, as it is an inquiry rather than a statistical study. The qualitative method allows the study of the concepts of phenomena and definitions, their characteristics, and the defining features that serve as the basis (Berg, 2007). It emphasizes generalized interpretation and deeper understanding of concepts, which would be more difficult in quantitative, statistically based research. Fact-finding was conducted in two ways: in-depth interviews with experts from academia, information and communication technology organizations, and key players in the logistics industry; and academic publications, industry reports, and written and media content from established national and international organizations in the market.

Findings

The operations model introduced considers six aspects: persons, processes, platforms, partners, protection and preservation. A virtual team approach can support the personal side of the 5PL ecosystem’s digital transformation. Managing a 5PL ecosystem should be based on collaborative planning, forecasting, and replenishment methods (Parsa et al., 2020). A digital platform can support trust among the stakeholders in the ecosystem. A blockchain solution can powerfully support the 5PL ecosystem from partner relationships’ points of view. The implementation of a cybersecurity reference model is important for protection (Bandari, 2023). Reverse logistics and an integrated approach support the preservation of the ecosystem.

Research limitations/implications

While the author has experience applying the different components of the operations model presented, it would be interesting to find a 5PL that would use all the components presented in an integrated way. The operations model presented applies to any similar ecosystem with minor adaptations.

Practical implications

This paper addresses operations models and digital transformation challenges for optimizing 5PL operators. It provides several opportunities and considerations for 5PL operators interested in improving their management and operations to cope with the growing challenges of today’s world.

Social implications

The competitiveness and long-term performance of 5PL operators depend on selecting and carefully implementing their operations models. This paper emphasizes the importance of using advanced operations models.

Originality/value

The operations model derives from the author’s personal experiences in research and the innovative application of these models to logistics operators (DHL, UPS, Poste Italiane and others). This paper brings together academic and industry perspectives and operations models in an integrated business digital transformation. This paper defines an original optimal operations model for a 5PL operator and can add sustainable value to organizations and society. In doing so, it outlines different solution requirements, the critical success factors and the challenges for solutions and brings logistical performance objectives when implementing a digital business transformation.

Details

Journal of Global Operations and Strategic Sourcing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 18 January 2024

Yelena Smirnova and Victoriano Travieso-Morales

The general data protection regulation (GDPR) was designed to address privacy challenges posed by globalisation and rapid technological advancements; however, its implementation…

Abstract

Purpose

The general data protection regulation (GDPR) was designed to address privacy challenges posed by globalisation and rapid technological advancements; however, its implementation has also introduced new hurdles for companies. This study aims to analyse and synthesise the existing literature that focuses on challenges of GDPR implementation in business enterprises, while also outlining the directions for future research.

Design/methodology/approach

The methodology of this review follows the preferred reporting items for systematic reviews and meta-analysis guidelines. It uses an extensive search strategy across Scopus and Web of Science databases, rigorously applying inclusion and exclusion criteria, yielding a detailed analysis of 16 selected studies that concentrate on GDPR implementation challenges in business organisations.

Findings

The findings indicate a predominant use of conceptual study methodologies in prior research, often limited to specific countries and technology-driven sectors. There is also an inclination towards exploring GDPR challenges within small and medium enterprises, while larger enterprises remain comparatively unexplored. Additionally, further investigation is needed to understand the implications of emerging technologies on GDPR compliance.

Research limitations/implications

This study’s limitations include reliance of the search strategy on two databases, potential exclusion of relevant research, limited existing literature on GDPR implementation challenges in business context and possible influence of diverse methodologies and contexts of previous studies on generalisability of the findings.

Originality/value

The originality of this review lies in its exclusive focus on analysing GDPR implementation challenges within the business context, coupled with a fresh categorisation of these challenges into technical, legal, organisational, and regulatory dimensions.

Details

International Journal of Law and Management, vol. 66 no. 3
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 25 March 2024

Wael Abdallah, Fatima Tfaily and Arrezou Harraf

This study aims to examine the nexus between digital financial literacy and customers’ perceived financial behavior within the Kuwaiti context. Moreover, it will further explore…

Abstract

Purpose

This study aims to examine the nexus between digital financial literacy and customers’ perceived financial behavior within the Kuwaiti context. Moreover, it will further explore how digital financial literacy relates to financial behavior dimensions.

Design/methodology/approach

Data collection was facilitated by creating a questionnaire derived from multiple literature sources. This study used a cross-sectional, time-based dimension. Data was analyzed using the partial least square (PLS) structural equation modeling approach, using the Smart-PLS 4 software for computation.

Findings

Findings demonstrated a significant relationship between digital financial literacy and financial behavior, with a path coefficient of 0.542, a p-value of 0.000 and an R2 value of 0.581. The explorative model revealed substantial relationships between many dimensions of digital financial literacy and various dimensions of financial behavior. More precisely, financial knowledge, awareness and decision-making were the factors that had the most significant impact on financial behavior.

Practical implications

Kuwaiti policymakers should consider including digital financial literacy programs in comprehensive financial education programs to improve public understanding of digital financial instruments and their consequences.

Originality/value

As the authors know, this is the initial endeavor to evaluate the relationship between digital financial literacy, financial behavior and their respective dimensions.

Details

Competitiveness Review: An International Business Journal , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1059-5422

Keywords

Article
Publication date: 16 April 2024

Lee Yen Chaw, Chun Meng Tang and Muhammad Ali

As the competition to retain current and attract new mobile payment app users intensifies, meeting users’ needs has become fundamental for mobile payment app service providers to…

Abstract

Purpose

As the competition to retain current and attract new mobile payment app users intensifies, meeting users’ needs has become fundamental for mobile payment app service providers to stay competitive. This study aims to investigate the relationship between users’ needs, users’ attitude towards mobile payment apps and users’ continuance intention to use mobile payment apps.

Design/methodology/approach

Following an exploratory sequential mixed methods research design, this study first conducted three focus groups in the qualitative phase to investigate issues or concerns faced by current users of mobile payment apps. The study then conducted an online questionnaire survey in the quantitative phase to collect responses from users of mobile payment apps. Partial least squares structural equation modelling was used to analyse 110 valid responses.

Findings

Findings show that usefulness (modelled as a second-order reflective construct consisting of three first-order reflective constructs, i.e. ease of use, acceptability and responsiveness), traceability and security had a statistically significant relationship with attitude towards mobile payment apps (which in turn had a statistically significant relationship with continuance intention to use mobile payment apps). It was also found that attitude towards mobile payment mediated the relationships between usefulness, traceability and security; and continuance intention to use mobile payment apps.

Practical implications

The findings of this study can help mobile payment app service providers and developers design apps that offer the functions and features that their users need.

Originality/value

Although some recent studies have investigated the adoption of mobile payments in the Malaysian context, few of these studies examined current users’ continuance intention to use mobile payment apps.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 28 March 2022

Nidhi Raghav and Anoop Kumar Bhola

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a…

Abstract

Purpose

To make more smart health-care system, the health-care data should be shared in the secure manner, and it improves health-care service quality. This paper aims to implement a modern decentralized blockchain, safe and easy-to-use health-care technology application in the cloud.

Findings

On observing the graph, the convergence analysis of proposed Levy Flight-integrated moth flame optimization method at 80th iteration was 4.59%, 2.80%, 3.316%, 8.92% and 2.55% higher than the traditional models MFO, artificial bee colony (ABC), particle swarm optimization (PSO), moth search algorithm (MSA) and glow worm swarm optimization (GWSO), respectively, for Hungarian data set. Particularly, in best case scenario, the adopted method attains low cost value (5.672671) when compared to all other traditional models such as MFO (5.727314), ABC (5.711577), PSO (5.706499), MSA (5.764517) and GWSO (5.723353).

Originality/value

The proposed method achieved effective performance in terms of key sensitivity, sanitization effectiveness, restoration effectiveness, etc.

Details

Journal of Engineering, Design and Technology, vol. 22 no. 2
Type: Research Article
ISSN: 1726-0531

Keywords

Book part
Publication date: 23 April 2024

Heba Hikal, Marwan Altarawneh, Ahmad AL-Hawamleh, Zaid Jaradat and Alya Elfedawy

This research focuses on the Metaverse's evolving trend and the potential application of blockchain technology in the accounting of virtual assets in this digital domain. The…

Abstract

This research focuses on the Metaverse's evolving trend and the potential application of blockchain technology in the accounting of virtual assets in this digital domain. The Metaverse introduces a new economy in which users may earn real-world revenue through virtual activities, necessitating the need for efficient and dependable virtual asset accounting. Blockchain technology, with its decentralized and immutable record, appears to be a viable answer to these problems. This chapter discusses the present status of blockchain technology for accounting for virtual assets in the Metaverse as well as its potential role for businesses and the economy. It also determines the technology's issues and limits and makes recommendations for further development. The findings indicate that blockchain technology has the potential to transform virtual asset accounting in the Metaverse by improving security, transparency, and consistency. However, scalability and legal/regulatory issues must be overcome before it can completely achieve its promise. Accounting experts, developers, and stakeholders interested in the convergence of blockchain technology and the Metaverse economy will find this chapter useful.

Details

Technological Innovations for Business, Education and Sustainability
Type: Book
ISBN: 978-1-83753-106-6

Keywords

Article
Publication date: 7 June 2023

Mohammad Mehdi Mohammadi, Mehdi Safari Gerayli, Maryam Shahri, Hasan Valiyan and Farhad Dehdar

The citizen-shareholder approach in the capital market is considered a knowledge-enhancing and emerging concept in financial and accounting offerings. Its reliable background in…

Abstract

Purpose

The citizen-shareholder approach in the capital market is considered a knowledge-enhancing and emerging concept in financial and accounting offerings. Its reliable background in management and human sciences makes it an essential basis for protecting the interests of shareholders and investors. Shareholders are considered a necessary part of the social platforms that are companies and regulatory institutions in the capital market; beyond being obligated to protect their material and intellectual rights, they are responsible for developing norms and facilitating investment values and gaining trust through mutual interactions based on respect for their interests. The purpose of this paper is to perform interactive qualitative analysis of the requirements for protecting the rights of citizens of capital market shareholders.

Design/methodology/approach

The methodology of the research is mixed, so that in the qualitative part, through content screening, the dimensions related to the protection of the citizen rights of the capital market shareholders were identified through a systematic review of 10 research in the period of 2017–2022. Then, the reliability of the specified dimensions was examined through Delphi analysis; in the quantitative part of the research, the criteria identified through the pairwise comparison matrix were first determined by the level of their relationships to determine based on the pattern of systemic representation of drivers and the consequences of requirements to protect the rights of citizens of capital market shareholders.

Findings

The research results in the qualitative part indicated the existence of 12 primary themes; during the two stages of Delphi analysis, three themes were removed, and a total of nine themes entered the quantitative phase. The results in a quantitative part indicate the creation of specialized and active committees of the board of directors as the primary driver and the reliability and timely disclosure of information in the long term as a systemic consequence.

Originality/value

To the best of the authors’ knowledge, this is the first research that presents the new concept of citizen shareholders to strengthen the requirements of protecting the rights of shareholders in the capital market while developing new theoretical literature.

Details

Qualitative Research in Financial Markets, vol. 16 no. 2
Type: Research Article
ISSN: 1755-4179

Keywords

1 – 10 of 649