Search results

1 – 10 of over 13000
Article
Publication date: 4 March 2014

Ying Wang, Francis Kofi Andoh-Baidoo and Jun Sun

Terrorist attacks have generated interests among practitioners and researchers on transportation security enhancement. This study investigates the role that rationality play in…

1204

Abstract

Purpose

Terrorist attacks have generated interests among practitioners and researchers on transportation security enhancement. This study investigates the role that rationality play in government funding on this important aspect of homeland security. In particular, it examines how environmental changes and project characteristics influence the allocation of security-related Airport Improvement Program (AIP) grants in the aviation industry. The paper aims to discuss these issues.

Design/methodology/approach

The central hypothesis is that rationality regulates transportations security investment through the dynamic balancing between type I error and type II error concerns. To empirically validate it, this study conducts various analyses on AIP history data. In particular, it uses text mining to identify the security-related AIP grants and their coverage, trend analysis to compare the trends of security funding and other transportation investment, and classification tree analysis to determine the factors that influence the allocation of security-related grants.

Findings

The longitudinal distribution of security-related grants differs from other types of transportation funding in terms of their distinct responses to terrorist and economic events. Project characteristics including project coverage and facility location have secondary yet consistent effects on the allocation of security-related grants.

Originality/value

This study empirically validates the concept of rationality in transportation security investment. In particular, the findings support that it in constant moves along both longitudinal and cross-sectional dimensions. The dynamic and multi-facet nature of rationality provides the key for researchers and practitioners to understand security funding in aviation industry.

Details

Industrial Management & Data Systems, vol. 114 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 13 June 2016

Michelle S. Dojutrek, Samuel Labi and J. Eric Dietz

Transportation project evaluation and prioritization use traditional performance measures including travel time, safety, user costs, economic efficiency and environmental quality…

Abstract

Purpose

Transportation project evaluation and prioritization use traditional performance measures including travel time, safety, user costs, economic efficiency and environmental quality. The project impacts in terms of enhancing the infrastructure resilience or mitigating the consequences of infrastructure damage in the event of disaster occurrence are rarely considered in project evaluation. This paper aims to present a methodology to address this issue so that in prioritizing investments, infrastructure with low security can receive the attention they deserve. Second, the methodology can be used for prioritizing candidate investments from a budget that is dedicated specifically to security enhancement.

Design/methodology/approach

In defining security as the absence of risk of damage from threats due to inherent structural or functional resilience, this paper uses security-related considerations in investment prioritization, thus introducing robustness in such evaluation. As this leads to an increase in the number of performance criteria in the evaluation, the paper adopts a multi-criteria analysis approach. The paper’s methodology quantifies the overall security level for an infrastructure in terms of the threats it faces, its resilience to damage and the consequences in the event of the infrastructure damage.

Findings

The paper demonstrates that it is feasible to develop a security-related measure that can be used as a performance criterion in the evaluation of general transportation projects or projects dedicated specifically toward security improvement. Through a case study, the paper applies the methodology by measuring the risk (and hence, security) of each for multiple infrastructure assets. On the basis of the multiple types of impacts including risk impacts (i.e. increase in security) because of each candidate investment, the paper shows how to prioritize security investments across the multiple infrastructure assets using multi-criteria analysis.

Originality/value

The overall framework consists of the traditional steps in risk management, and the paper’s specific contribution is in the part of the framework that measures the risk. The paper shows how infrastructure security can be quantified and incorporated in the project evaluation process.

Details

International Journal of Disaster Resilience in the Built Environment, vol. 7 no. 3
Type: Research Article
ISSN: 1759-5908

Keywords

Article
Publication date: 28 February 2023

Angeliki Nikolinakou and Joe Phua

Social media has the potential to enable exchange of diverse opinions, foster dialogue on important social issues and exert positive influence on stakeholders and society…

Abstract

Purpose

Social media has the potential to enable exchange of diverse opinions, foster dialogue on important social issues and exert positive influence on stakeholders and society. However, evidence is contradictory as to whether this is the case; it is possible that millennials' behaviors on social media are mainly driven by conservation (conformity and safety) or self-enhancement (power and achievement). In this research, the authors examine the extent to which different human values (self-transcendence, conservation, self-enhancement and openness to change) influence millennials' activities and behaviors on social media.

Design/methodology/approach

The authors conduct three separate surveys on Facebook, Twitter and Instagram with 491 millennials (18–34 years of age) in the USA, examining the influence of four higher-order values of the Schwartz human values model (open self-transcendence, conservation, self-enhancement and openness to change) on specific social media activities (consumption, self-focused and sharing nonpersonal content activities).

Findings

First, the authors find that for millennial users, human values significantly influence social media activities. Second, conservation values, followed by self-enhancement values, overshadow the expression of open self-transcendence values on social media. Thus, social media platforms may function more as agents of conservation and self-enhancement than agents of personal growth.

Originality/value

This is among the first studies to examine the influence of human values on social media and to find that human values such as conservation and self-enhancement have a strong influence on users' social media activities, while open self-transcendence values, which lead to expansion and growth, do not find genuine expression on social media.

Article
Publication date: 26 April 2011

Jun Sun, Punit Ahluwalia and Kai S. Koong

This paper seeks to investigate which factors influence user attitudes toward different levels of security measures for protecting data of differing importance. The paper also…

3087

Abstract

Purpose

This paper seeks to investigate which factors influence user attitudes toward different levels of security measures for protecting data of differing importance. The paper also examines user characteristics including IT proficiency and risk propensity, which give rise to individual differences in such attitudes.

Design/methodology/approach

To capture user attitudes toward a security measure, a construct called “information security readiness” (ISR) and its corresponding measurement items were developed. Observations were collected from a laboratory experiment based on a 2×3 factorial design, with data criticality and security level as the treatment variables. The participants were undergraduate students of a major American university. The moderating effect of data criticality on the relationship between security level and ISR was tested with multi‐group structural equation modeling. In addition to the treatment variables, IT proficiency and risk propensity were included as covariates in the analysis.

Findings

The results revealed a nonlinear relationship between security level and ISR. For data of high criticality, enhancing security level had a positive impact on ISR, but only up to the point perceived as appropriate by the participants. For data of low criticality, the enhancement of security level was perceived as unnecessary. In addition, IT proficiency was found to be a significant covariate, especially when data criticality was high.

Practical implications

In practice, the specification of a security measure requires a trade‐off between the utility of the data protected and the usability of the security method. The measure of ISR provides a means to locate the equilibrium by examining user attitudes across different security levels in relation to a particular level of data criticality. The significance of IT proficiency demonstrates the importance of user training.

Originality/value

This study introduces the ISR construct to capture evaluation, power, and activity dimensions underlying an individual's cognitive beliefs, affective responses, and behavioral inclinations toward the adoption of security measures. The results provide interesting insights into the role of interaction between security level and data criticality in influencing ISR.

Details

Industrial Management & Data Systems, vol. 111 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 13 November 2017

Harrison Stewart and Jan Jürjens

The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be…

6059

Abstract

Purpose

The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable asset.

Design/methodology/approach

Before developing the instrument for the survey, first, effective measurement built upon existing literature review was identified and developed and the survey questionnaires were set according to past studies and the findings based on qualitative analyses. Data were collected by using cross-sectional questionnaire and a Likert scale, whereby each question was related to an item as in the work of Witherspoon et al. (2013). Data analysis was done using the SPSS.3B.

Findings

Based on the results from three surveys and findings, a principle of information security compliance practices was proposed based on the authors’ proposed nine-five-circle (NFC) principle that enhances information security management by identifying human conduct and IT security-related issues regarding the aspect of information security management. Furthermore, the authors’ principle has enabled closing the gap between technology and humans in this study by proving that the factors in the present study’s finding are interrelated and work together, rather than on their own.

Research limitations/implications

The main objective of this study was to address the lack of research evidence on what mobilizes and influences information security management development and implementation. This objective has been fulfilled by surveying, collecting and analyzing data and by giving an account of the attributes that hinder information security management. Accordingly, a major practical contribution of the present research is the empirical data it provides that enable obtaining a bigger picture and precise information about the real issues that cause information security management shortcomings.

Practical implications

In this sense, despite the fact that this study has limitations concerning the development of a diagnostic tool, it is obviously the main procedure for the measurements of a framework to assess information security compliance policies in the organizations surveyed.

Social implications

The present study’s discoveries recommend in actuality that using flexible tools that can be scoped to meet individual organizational needs have positive effects on the implementation of information security management policies within an organization. Accordingly, the research proposes that organizations should forsake the oversimplified generalized guidelines that neglect the verification of the difference in information security requirements in various organizations. Instead, they should focus on the issue of how to sustain and enhance their organization’s compliance through a dynamic compliance process that involves awareness of the compliance regulation, controlling integration and closing gaps.

Originality/value

The rapid growth of information technology (IT) has created numerous business opportunities. At the same time, this growth has increased information security risk. IT security risk is an important issue in industrial sectors, and in organizations that are innovating owing to globalization or changes in organizational culture. Previously, technology-associated risk assessments focused on various technology factors, but as of the early twenty-first century, the most important issue identified in technology risk studies is the human factor.

Details

Information & Computer Security, vol. 25 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 13 February 2017

Inho Hwang, Daejin Kim, Taeha Kim and Sanghyun Kim

The purpose of this paper is to empirically investigate the negative casual relationships between organizational security factors (security systems, security education, and…

2407

Abstract

Purpose

The purpose of this paper is to empirically investigate the negative casual relationships between organizational security factors (security systems, security education, and security visibility) and individual non-compliance causes (work impediment, security system anxiety, and non-compliance behaviors of peers), which have negative influences on compliance intention.

Design/methodology/approach

Based on literature review, the authors propose a research model together with hypotheses. The survey questionnaires were developed to collect data, which then validated the measurement model. The authors collected 415 responses from employees at manufacturing and service firms that had already implemented security policies. The hypothesized relationships were tested using the structural equation model approach with AMOS 18.0.

Findings

Survey results validate that work impediment, security system anxiety, and non-compliance peer behaviors are the causes of employee non-compliance. In addition, the authors found that security systems, security education, and security visibility decrease instances of non-compliance.

Research limitations/implications

Organizations should establish a mixture of security investment in their systems, education, and visibility in order to effectively reduce employees’ non-compliance. In addition, organizations should recognize the importance of minimizing the particular causes of employees’ non-compliance to positively increase intentions to comply with information security.

Originality/value

An important issue in information security management is employee compliance. Understanding the reasons behind employees’ non-compliance is a critical issue. This paper investigates empirically why employees do not comply, and how organizations can induce employees to comply by a mixture of investments in security systems, education, and visibility.

Details

Online Information Review, vol. 41 no. 1
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 February 1993

Paul Collier

With our growing reliance on interconnected computers and networks, viruses and other forms of computer abuse are becoming an increasing problem. Computer Emergency Response Teams…

Abstract

With our growing reliance on interconnected computers and networks, viruses and other forms of computer abuse are becoming an increasing problem. Computer Emergency Response Teams (CERTs) have been set up in the USA to respond to the problem, and an organisation called ‘FIRST’ has been formed by the various CERTs to act as their mouthpiece. This paper discusses both the preventative and response roles of CERTs and then looks at what is being done to establish such a system in Europe.

Details

Journal of Financial Crime, vol. 1 no. 2
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 17 July 2019

Prasad A.Y. and Balakrishna Rayanki

In the present networking scenarios, MANETs mainly focus on reducing the consumed power of battery-operated devices. The transmission of huge data in MANETs is responsible for…

Abstract

Purpose

In the present networking scenarios, MANETs mainly focus on reducing the consumed power of battery-operated devices. The transmission of huge data in MANETs is responsible for greater energy usage, thereby affecting the parameter metrics network performance, throughput, packet overhead, energy consumption in addition to end-to-end delay. The effective parameter metric measures are implemented and made to enhance the network lifetime and energy efficiency. The transmission of data for at any node should be more efficient and also the battery of sensor node battery usage should be proficiently applied to increase the network lifetime. The paper aims to discuss these issues.

Design/methodology/approach

In this research work for the MANETs, the improvement of energy-efficient algorithms in MANETs is necessary. The main aim of this research is to develop an efficient and accurate routing protocol for MANET that consumes less energy, with an increased network lifetime.

Findings

In this paper, the author has made an attempt to improve the genetic algorithm with simulated annealing (GASA) for MANET to minimize the energy consumption of 0.851 percent and to enhance the network lifetime of 61.35 percent.

Originality/value

In this paper, the author has made an attempt to improve the GASA for MANET to minimize the energy consumption of 0.851 percent and to enhance the network lifetime of 61.35 percent.

Details

International Journal of Intelligent Unmanned Systems, vol. 8 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Book part
Publication date: 7 July 2015

Charmine E. J. Härtel and Jennifer M. O’Connor

Volunteerism underpins the sustainability of communities and a wide range of organizations. A review of the academic literature on volunteerism yields few studies considering the…

Abstract

Volunteerism underpins the sustainability of communities and a wide range of organizations. A review of the academic literature on volunteerism yields few studies considering the role of emotions, but those that do exist clearly indicate that emotions are critical factors in the recruitment, retention, and wellbeing of volunteers. The contribution of this chapter is to provide a review of the existing published academic research on emotions in the context of volunteerism, and to put out a call for emotions research in this critical aspect of sustainable communities and organizations.

Details

New Ways of Studying Emotions in Organizations
Type: Book
ISBN: 978-1-78560-220-7

Keywords

Article
Publication date: 8 May 2009

Archana Kumar, Youn‐Kyung Kim and Lou Pelton

The purpose of this paper is to examine the direct and indirect effects of individuals' self‐concept, product‐oriented variables (i.e. consumer's need for uniqueness (NFU), and…

6028

Abstract

Purpose

The purpose of this paper is to examine the direct and indirect effects of individuals' self‐concept, product‐oriented variables (i.e. consumer's need for uniqueness (NFU), and clothing interest), and brand‐specific variables (i.e. perceived quality and emotional value) on purchase intention toward a US retail brand versus a local brand that are available in the Indian market.

Design/methodology/approach

Data obtained from 405 college students in India were analyzed using structural equation modeling.

Findings

This study found that Indian consumers' self‐concept and NFU had indirect effects on purchase intention of the US brand and the local brand. Both self‐concept and NFU positively influenced clothing interest. Clothing interest positively influenced perceived quality and emotional value for the US brand, but not for the local brand. Emotional value was found to be an important factor influencing purchase intention toward the US brand and the local brand as well. However, perceived quality did not affect Indian consumers' purchase intention of the US and local brand. Implications for both US and Indian retailers are provided.

Originality/value

As India is witnessing multitude of US retailers in its market, this paper aids in the better understanding of the Indian consumers and their perceptions toward US and local clothing brands.

Details

International Journal of Retail & Distribution Management, vol. 37 no. 6
Type: Research Article
ISSN: 0959-0552

Keywords

1 – 10 of over 13000