Search results

1 – 10 of over 7000
Article
Publication date: 15 March 2024

Seyed Hadi Arabi, Mohammad Hasan Maleki and Hamed Ansari

The purpose of this study is to identify the drivers and future scenarios of Iran’s Social Security Organization.

Abstract

Purpose

The purpose of this study is to identify the drivers and future scenarios of Iran’s Social Security Organization.

Design/methodology/approach

The research is applied in terms of orientation and mixed in terms of methodology. In this research, the methods of theme analysis, root definitions, fuzzy Delphi and Cocoso were used. The theoretical population is the managers and senior experts of the social security organization, and the sampling method was done in a judgmental way. The tools of data collection were interviews and questionnaires. The interview tool was used to extract the main and subdrivers of the research and develop the scenarios.

Findings

Through theme analysis, 35 subdrivers were extracted in the form of economic, sociocultural, financial and investment, policy, marketing, environmental and legal themes. Due to the large number of subdrivers, these factors were screened with fuzzy Delphi. Eleven drivers had defuzzied coefficient higher than 0.7 and were selected for final prioritization. The final drivers were prioritized with the CoCoSo technique, and the two drivers of social security holdings governance and state of government revenues had the highest priority. Based on these two drivers, four scenarios of prosperity, resilient social security, unstable development and collapse have been developed.

Originality/value

Some of the suggestions of the research are: using the capacity of FinTechs and financial startups to invest the government revenues of the organization, using digital technologies such as business intelligence for more efficient decisions and developing corporate governance in the organization.

Details

foresight, vol. 26 no. 2
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 7 April 2023

Devang Chhtrapati, Dharmendra Trivedi, Shanti P. Chaudhari, Arpit Sharma and Atul Bhatt

This study concentrates on assessing the research productivity in the domain of social media security in the past decades. The purpose of this study is to conduct a comprehensive…

Abstract

Purpose

This study concentrates on assessing the research productivity in the domain of social media security in the past decades. The purpose of this study is to conduct a comprehensive bibliometric review on social media using various bibliometric indicators.

Design/methodology/approach

A total of 8,121 scientific publications were retrieved from Scopus database from period 1998 to 2021 using associated keyword search. This study also used VOSviewer© tool to evaluate the network visualisation.

Findings

The result of this study revealed that there is a steady growth of annual publications except for the years 2015 and 2016. A total of 8,121 scientific publications and 80,454 total citations were found with 11.2 average citations per publication. The USA, China and India were top productive countries in terms of publishing research in the field; Chinese Academy of Sciences secured top position with 126 publications in highly productive organisation in the domain. The lecture notes in computer science from Springer Nature received a highly produced title with 553 publications and 4,453 total citations. For co-occurrence of author’s keywords, network visualisation analysis revealed that “Social Media”, “Social Network”, “Security”, “Privacy” and “Trust” found maximum occurrence in the domain of social media security.

Research limitations/implications

This study provides comprehensive research status of social media security by performing a bibliometric analysis. The findings of this study will help relevant researchers to understand the research trend, pursue scientific collaborators and enhance research topic preferences.

Originality/value

The rareness of this study, detailed bibliometric analysis on the domain of social media security, is proven using numerous bibliometric indicators and application of VOSviewer in the domain.

Details

Information Discovery and Delivery, vol. 52 no. 1
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 11 December 2023

Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai and Quynh-Chi Le

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Abstract

Purpose

This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites.

Design/methodology/approach

Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% men and 73.3% women. When constructing the questionnaire survey method with lone source respondents, the individual’s unique awareness and experiences with using online social networks (OSNs) were taken into account.

Findings

The results of the investigation demonstrate a significant relationship between information-sharing and awareness of data collecting, perceptions of information security threats and behavior. Social media users have used OSN privacy settings and paid attention to the sharing restriction because they are concerned about data harvesting.

Research limitations/implications

This study was conducted among young Vietnamese social media users, reflecting specific characteristics prevalent in the Vietnamese environment, and hence may be invalid in other nations’ circumstances.

Practical implications

Social media platform providers should improve user connectivity by implementing transparent privacy policies that allow users to choose how their data are used; have clear privacy statements and specific policies governing the use of social media users’ data that respect users’ consent to use their data; and thoroughly communicate how they collect and use user data while promptly detecting any potential vulnerabilities within their systems.

Originality/value

The authors ascertain that the material presented in this manuscript will not infringe upon any statutory copyright and that the manuscript will not be submitted elsewhere while under Journal of Information, Communication and Ethics in Society review.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 4 July 2023

Amal Jmaii and Noomene Zaafouri

This paper provides a new empirical evidence of the impact of Global security on economic growth in Tunisia. Like Buzan (1991), the framework used four types of security: army…

Abstract

Purpose

This paper provides a new empirical evidence of the impact of Global security on economic growth in Tunisia. Like Buzan (1991), the framework used four types of security: army security, economic security, social security, and political security.

Design/methodology/approach

The authors examine the multidimensionality of global security using ARDL-based cointegration bound tests. The model allows also for examining the long-run/short-run impacts of global security indicators on economic growth.

Findings

The proposed methodology revealed interesting results that may raise some potentially prominent policy implications. First, the findings show that the four security indicators have a significant impact on economic growth. In particular, from a social/political security point of view, the fundamental objective is to satisfy the needs of the poorest population, to limit the effect of social demands and protests on economic and political stability, to review the subsidy principle and aid policy to the poorest families, for greater efficiency and social equity.

Originality/value

The study highlights that global security is no longer a question of just army and defense, but it is also a question of equity, economic, social, and political development. These results call for the policymaker to adopt a strategy that reduces regional disparities and social inequalities and this through fairly distributing financial wealth for the benefit of marginalized populations.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-02-2023-0082

Details

International Journal of Social Economics, vol. 51 no. 1
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 27 April 2022

Xiaofei Tang, Pan Zeng, Bing Sun, En-Chung Chang and Fagui Mei

A humanoid intelligent robot (HIR) possessing a human-like appearance can undertake human jobs, interact, communicate and even transmit emotions to human beings. Such robots have…

Abstract

Purpose

A humanoid intelligent robot (HIR) possessing a human-like appearance can undertake human jobs, interact, communicate and even transmit emotions to human beings. Such robots have gradually been integrated into people's daily life and production scenarios. However, it is unclear whether and by what mechanism HIRs can stimulate people’s risk perception and its impact on consumption attitudes. Based on the risk decision theory, this study aims to take the social value substitution attribute of a HIR as the incentive and analyzes the influence of social value substitution and risk perception on the customers’ consumption attitudes.

Design/methodology/approach

Three experiments were conducted to investigate the related questions about the social value substitution attribute of a HIR, its impact on risk perception and the customers’ consumption attitudes.

Findings

The results reveal that physical labor, intellectual labor, friendship, kinship and the ego constitute the hierarchical elements of social value substitution. Among them, physical labor and intellectual labor pertain to the dimension of social function value substitution, while friendship, kinship and ego pertain to the dimension of social presence value substitution; social function value substitution and social presence value substitution affect the subjects’ risk perception positively, but the latter arouses a stronger risk perception; the 2 (risk perception of social function value: security/danger) × 2 (risk perception of social presence value: security/danger) condition corresponds to diverse consumption attitudes.

Originality/value

The results enrich the theories of the “cha-xu pattern” and “uncanny valley” and provide reference for the healthy development of the HIR industry.

Details

Nankai Business Review International, vol. 14 no. 4
Type: Research Article
ISSN: 2040-8749

Keywords

Article
Publication date: 17 November 2023

Dien Van Tran, Phuong Van Nguyen, Anh Thi Chau Nguyen, Demetris Vrontis and Phuong Uyen Dinh

This study aims to investigate the impact of employees’ engagement in government social media (GSM) on their cybersecurity compliance attitude, protection motivation and…

Abstract

Purpose

This study aims to investigate the impact of employees’ engagement in government social media (GSM) on their cybersecurity compliance attitude, protection motivation and protective behavior, thereby contributing to effective cybersecurity practices at organizations.

Design/methodology/approach

A quantitative cross-sectional field survey was conducted to collect primary data in big cities and large provinces in Vietnam. The final data set of 323 responses was analyzed using the partial least squares-structural equation modeling approach to interpret the results and test research hypotheses.

Findings

Engagement in GSM positively influences employees’ cybersecurity compliance attitude (ATT). Perceived threat vulnerability and response efficacy also contribute to a positive compliance attitude, although self-efficacy has a negative impact. Moreover, the cybersecurity compliance ATT significantly explains the information protection motivation, which in turn influences employee protective behaviors. However, the relationship between compliance attitude and protective behaviors is weak, unlike previous studies that found a strong correlation.

Originality/value

Although recent studies have explored specific information security practices in corporate and home contexts, the influence of GSM on individuals’ cybersecurity behaviors has received limited attention because of its novelty. This study contributes to the existing body of knowledge by investigating the impact of GSM on cybersecurity behaviors. This study provides significant contributions to understanding social media’s effects of social media on individuals’ cultivation processes, by expanding upon the protective motivation theory and cultivation theory. The results lead to practical suggestions for organizational managers and policymakers so that they can enhance their understanding of the importance of cybersecurity, encourage the implementation of self-defense strategies and highlight the significance of threat and coping evaluations in influencing attitudes and motivations.

Details

Journal of Asia Business Studies, vol. 18 no. 1
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 5 January 2023

Miraj Ahmed Bhuiyan, Zhihui Liu and Fanqiang Meng

At present, the scale of China's floating population has reached 376 million people. Compared with the local inhabitants, the poverty problem of the floating population is more…

Abstract

Purpose

At present, the scale of China's floating population has reached 376 million people. Compared with the local inhabitants, the poverty problem of the floating population is more complex, and this problem should also attract the attention of all sectors of society. This paper aims to measure and analyze the multidimensional poverty of the floating population in China.

Design/methodology/approach

The data used in this paper are the data of the China Migrants Dynamic Survey (CMDS) in China. This survey is a large-scale national migratory population sampling survey organized by the China National Health Commission, covering 31 provinces (autonomous regions and cities) and other autonomous regions. This paper uses the dynamic monitoring and Alkire and Foster (A-F) method to study the multidimensional poverty problem of the floating population.

Findings

This study finds that income poverty is no longer the main type of poverty faced by the floating population. The multidimensional poverty of the floating population mainly occurs in the social security and education dimensions, of which social security has become the most severe poverty dimension of the floating population. From the perspective of group differences, compared with the floating population in urban areas, the multidimensional poverty of migrant workers is more serious. However, the poverty of migrant workers is mainly concentrated in one-dimensional poverty and two-dimensional poverty.

Social implications

In the future, the authors should focus on the social security of the floating population in the place of influx and the education of the floating population.

Originality/value

Through the review of the existing literature, the authors find that the current research on the multidimensional poverty of the floating population is mainly concentrated on the migrant worker groups that move from rural areas to urban areas. However, insufficient attention is paid to the urban floating population groups moving between cities.

Details

Kybernetes, vol. 53 no. 3
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 December 2022

Kanokwan Pimchan and Chonlatis Darawong

This study aims to examine the influence of condominium attributes on resident satisfaction and word of mouth from the perspectives of the elderly in Thailand.

Abstract

Purpose

This study aims to examine the influence of condominium attributes on resident satisfaction and word of mouth from the perspectives of the elderly in Thailand.

Design/methodology/approach

Data were collected from 338 elderly residents through a questionnaire survey and analysed by using descriptive statistics and structural equation modelling procedures.

Findings

The results showed that the strongest predictor of resident satisfaction was design functionality, followed by social environment, safety and security and service quality. In addition, the strongest predictor of word of mouth was safety and security, followed by design functionality, proximity, service quality and social environment.

Research limitations/implications

The data were drawn at the level of the overall characteristics of elderly residents. People may be different in terms of their demographic characters such as gender, age, and user experience.

Practical implications

The study suggests that condominium developers and designers should pay attention to design functionality both physically and mentally such as suitable materials, lighting and common areas. Moreover, the developers should focus on the proximity of the nearest hospitals, safety and security measures, well-trained security personnel and social activity arrangement.

Originality/value

Elderly condominium markets are increasingly growing as a result of the ageing society in Thailand. However, very few empirical studies investigate condominium attributes that affect resident satisfaction and word of mouth provided by real estate developers. The paper aims to determine driving factors that enhance the better well-being of elderly residents.

Details

International Journal of Housing Markets and Analysis, vol. 17 no. 3
Type: Research Article
ISSN: 1753-8270

Keywords

Article
Publication date: 21 February 2024

Mohd Hafiz Hanafiah, Muhammad Aliff Asyraff, Mohd Noor Ismawi Ismail and Juke Sjukriana

The purpose of this study is twofold. The first objective is to identify the factors that affect Gen Z tourists' M-payment behaviour. Next, this study investigates the…

Abstract

Purpose

The purpose of this study is twofold. The first objective is to identify the factors that affect Gen Z tourists' M-payment behaviour. Next, this study investigates the inter-relationship between Gen Z tourist’s perception of M-payment benefits, adoption behaviour, usage risk and future usage intention.

Design/methodology/approach

The sample comprised Malaysian Gen Z individuals (n = 326) who had experience using M-payment methods while travelling outbound. Given the complex nature of the model and the goal to predict and explain relationships within Gen Z's M-payment usage, partial-least square-structural equation modelling was used to assess the study framework and test the proposed relationships.

Findings

This study reveals significant influences on Gen Z tourists' behavioural intentions towards M-payment usage. Perceived benefits, performance expectancy, social influence and perceived trust positively impact behavioural intentions, while effort expectancy exhibits no significant effect. Furthermore, perceived trust is strongly influenced by perceived security, which also positively influences behavioural intentions. A mediated relationship is evident as trust mediating the effect of perceived security on behavioural intentions.

Research limitations/implications

This study’s findings contribute to understanding the intricate relationships influencing Gen Z's M-payment behaviour and underscore trust's pivotal role in mediating the security–behavioural intention relationship.

Originality/value

This study is among the first to consider Mental Accounting Theory and the Unified Theory of Acceptance and Use of Technology as crucial underpinning theories in comprehending the intricate relationships that influence Gen Z travellers' perceptions and behaviours concerning M-payment systems.

Details

Young Consumers, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1747-3616

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

158

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 7000