Search results

1 – 10 of 125
Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6323

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7135

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 13 September 2023

Kabir Md Shahin and Moyenul Hasan

This paper aims to examine the prevailing Rohingya refugee crisis from political and humanitarian perspectives and explores the political and humanitarian aspects of the Rohingya…

1912

Abstract

Purpose

This paper aims to examine the prevailing Rohingya refugee crisis from political and humanitarian perspectives and explores the political and humanitarian aspects of the Rohingya refugee crisis.

Design/methodology/approach

Relevant literature has been reviewed for conceptual understanding. This study is descriptive and qualitative in nature and based on secondary sources of data.

Findings

The main causes of the Rohingya crisis such as political and humanitarian aspects. Issues such as discrimination and homelessness, and national security concerns that regional politics scapegoated the Rohingya to exacerbate regional tensions. Moreover, armed conflicts, political radicalization, security concerns, human rights violations and low media attention compared to other displaced families have made the future of the Rohingyas very uncertain.

Practical implications

The Rohingya crisis has far-reaching implications for domestic and regional politics as well as for relations with major world powers. In the context of regional security and geopolitics, this study provides insight into the polarization and politicization of the Rohingya minority.

Originality/value

This research offers a vital exploration of the Rohingya refugee crisis, delving into its multifaceted political and humanitarian dimensions, contributing fresh insights to address a pressing global concern.

Details

Southeast Asia: A Multidisciplinary Journal, vol. 23 no. 3
Type: Research Article
ISSN: 1819-5091

Keywords

Open Access
Article
Publication date: 4 December 2023

Ignat Kulkov, Julia Kulkova, Daniele Leone, René Rohrbeck and Loick Menvielle

The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and…

1121

Abstract

Purpose

The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and value creation. This study also aims to explore the potential of combining AI with other technologies, such as cloud computing, blockchain, IoMT, additive manufacturing and 5G, in the healthcare industry.

Design/methodology/approach

Exploratory qualitative methodology was chosen to analyze 22 case studies from the USA, EU, Asia and South America. The data source was public and specialized podcast platforms.

Findings

The findings show that combining technologies can create a competitive advantage for technology entrepreneurs and bring about transitions from simple consumer devices to actionable healthcare applications. The results of this research identified three main entrepreneurship areas: 1. Analytics, including staff reduction, patient prediction and decision support; 2. Security, including protection against cyberattacks and detection of atypical cases; 3. Performance optimization, which, in addition to reducing the time and costs of medical procedures, includes staff training, reducing capital costs and working with new markets.

Originality/value

This study demonstrates how AI can be used with other technologies to cocreate value in the healthcare industry. This study provides a conceptual framework, “AI facilitators – AI achievers,” based on the findings and offer several theoretical contributions to academic literature in technology entrepreneurship and technology management and industry recommendations for practical implication.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Open Access
Article
Publication date: 2 January 2020

Zaid Odeh Ebniya

The purpose of this study is to know the effect of religious values that the Jordan Political discipline adopted and were mentioned in the Jordan political discourses (Amman…

1519

Abstract

Purpose

The purpose of this study is to know the effect of religious values that the Jordan Political discipline adopted and were mentioned in the Jordan political discourses (Amman Message 2005, discourse of King Abdullah II in the European Parliament 2008 and his discourse in United Nations 2015) on the public opinion of the university students, especially their attitudes toward terrorism and extremism. Defending Islam is the responsibility of the Jordan political leadership according to Hashemite legacy and promoting Islamic values that rejected terrorism and extremism to Jordanian youth, especially tolerance and moderation values, to counter defamations and claims against Islam and correct its image in the West.

Design/methodology/approach

A political discourse analysis approach was used by analyzing the Amman Message and identifying the most important religious values contained therein. Also, a quantitative research method was used in this study. The study population consisted of university students, particularly Jordanian University students because being one of the high-bred Jordanian universities, it is characterized with gender, age, regional affiliation and family income diversities. This study depends on a purposive sample containing 350 students (175 males and 175 females). The survey was conducted in the academic year (2018-2019). A questionnaire that was reviewed by three jurors was used in data collection.

Findings

The results of the analysis of the political discourse showed that the values of tolerance and moderation are among the most valued in the Amman Message, where they were frequently repeated. Also, findings have shown that the religious values adopted by the Jordanian political system mentioned in the political discourses had an impact on public opinion of university students on terrorism and extremism causes in a large percent. When gender differed (males and females), the impact ratio of the public opinion for males was higher than that for females. When the age group differed (18-22 and 23-30 years), the effect ratio with the old age group was higher than the effect ratio for the students with the youngest age group. When regional affiliation differed (Jordanian and Jordanian of Palestinian origin), the impact ratio of the public opinion for Jordanian students was higher than that for Jordanian students of Palestinian origin. When regional family income differed (500 dinars and less, more than 500 dinars), the impact ratio of the public opinion for students with family income more than 500 dinars was higher than that for students with family income 500 dinars and less.

Originality/value

This study represents an approach to recognize the effect of religious values that were adopted by the Jordanian political system mentioned in the political discourses on public opinion of university students on terrorism and extremism causes, considering that university students represent the influential youth group in the Jordanian society.

Details

Review of Economics and Political Science, vol. 9 no. 1
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 29 July 2020

Abdullah Alharbi, Wajdi Alhakami, Sami Bourouis, Fatma Najar and Nizar Bouguila

We propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is…

Abstract

We propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is extremely challenging and important for many applications. The proposed approach involves developing new probabilistic support vector machines (SVMs) kernels from a flexible generative statistical model named “bounded generalized Gaussian mixture model”. The developed learning framework has the advantage to combine properly the benefits of both discriminative and generative models and to include prior knowledge about the nature of data. It can effectively recognize if an image is a tampered one and also to identify both forged and authentic images. The obtained results confirmed that the developed framework has good performance under numerous inpainted images.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 26 April 2024

Marcus Gerdin, Ella Kolkowska and Åke Grönlund

Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research…

Abstract

Purpose

Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and its potential effect on these results. This study aims to add to this discussion by investigating discrepancies between what the authors claim to measure (theoretical properties of variables) and what they actually measure (respondents’ interpretations of the operationalized variables). This study asks: How well do respondents’ interpretations of variables correspond to their theoretical definitions? What are the characteristics of any discrepancies between variable definitions and respondent interpretations?

Design/methodology/approach

This study is based on in-depth interviews with 17 respondents from the Swedish public sector to understand how they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior.

Findings

The authors found that respondents’ interpretations in many cases differ substantially from the theoretical definitions. Overall, the authors found four principal ways in which respondents interpreted measurement items – referred to as property contextualization, extension, alteration and oscillation – each implying more or less (dis)alignment with the intended theoretical properties of the two variables examined.

Originality/value

The qualitative method used proved vital to better understand respondents’ interpretations which, in turn, is key for improving self-reporting measurement instruments. To the best of the authors’ knowledge, this study is a first step toward understanding how precise and uniform definitions of variables’ theoretical properties can be operationalized into effective measurement items.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 3 April 2023

Lisa Bosman, Taofeek Oladepo and Ida Ngambeki

Upon graduating from university, many engineers will work in new product development and/or technology adoption for continuous improvement and production optimization. These jobs…

1309

Abstract

Purpose

Upon graduating from university, many engineers will work in new product development and/or technology adoption for continuous improvement and production optimization. These jobs require employees to be cognizant of ethical practices and implications for design. However, little engineering coursework, outside the traditional ABET (Accreditation Board for Engineering and Technology) required Engineering Ethics course, accounts for the role of ethics within this process. Because of this, engineering students have few learning opportunities to practice and reflect on ethical decision-making.

Design/methodology/approach

This paper highlights one approach to integrating ethics into an engineering course (outside of engineering ethics). Specifically, the study is implemented within a five-week module with a focus on big data ethics, as part of a Supply Chain Management Technology course (required for Industrial Engineering Technology majors), using metacognition as the core assessment.

Findings

Four main themes were identified through the qualitative data analysis of the metacognitive reflections: (1) overreliance on content knowledge, (2) time management skills, (3) career connections and (4) knowledge extensions.

Originality/value

Three notable points emerged which contribute to the literature. First, this study showcased one example of how an ethics module can be integrated into an engineering course (other than Engineering Ethics). Second, this study demonstrated how metacognitive reflections can be used to reinforce student self-awareness of the learning process and connections to big data ethics in the workplace. Finally, this study exhibited how metacognitive reflection assignments can be deployed as a teaching and learning assessment tool, providing an opportunity for the instructor to make immediate changes as needed.

Details

Journal of Research in Innovative Teaching & Learning, vol. 17 no. 1
Type: Research Article
ISSN: 2397-7604

Keywords

Access

Only Open Access

Year

Last 6 months (125)

Content type

1 – 10 of 125