Search results

1 – 10 of 236
Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 April 2024

Ahmed Shehata and Metwaly Eldakar

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education…

Abstract

Purpose

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education and occupation affect individuals’ awareness, skills and perceptions of social engineering.

Design/methodology/approach

A quantitative research approach was used to survey a diverse demographic of Egyptian society. The survey was conducted in February 2023, and the participants were sourced from various Egyptian social media pages covering different topics. The collected data was analyzed using descriptive and inferential statistics, including independent samples t-test and ANOVA, to compare awareness and skills across different groups.

Findings

The study revealed that younger individuals and those with higher education tend to research social engineering more frequently. Males display a higher level of awareness but score lower in terms of social and psychological consequences as well as types of attacks when compared to females. The type of attack cannot be predicted based on age. Higher education is linked to greater awareness and ability to defend against attacks. Different occupations have varying levels of awareness, skills, and psychosocial consequences. The study emphasizes the importance of increasing awareness, education and implementing cybersecurity measures.

Originality/value

This study’s originality lies in its focus on diverse Egyptian demographics, innovative recruitment via social media, comprehensive exploration of variables, statistical rigor, practical insights for cybersecurity education and diversity in educational and occupational backgrounds.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 9 April 2024

Iftikhar Ahmad, Salim Khan and Shahid Iqbal

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities…

Abstract

Purpose

The purpose of this paper is to investigate and analyze the adoption of digital technologies in the banking industry and its impact on the rise of digital fraudulent activities, specifically focusing on online banking frauds. This paper aims to provide insights into the current technologies implemented by banks to secure their online banking systems and explores the methods used by cybercriminals to exploit security vulnerabilities in these systems.

Design/methodology/approach

In order to understand how digital technologies in banking can be secured against online fraud, this research conducted a systematic literature review (SLR) on digital banking, online banking fraud, and security measurements. The review encompasses a variety of sources from online databases such as Emerald Insight, Google Scholar, IEEE, JSTOR, Springer and Science Direct.

Findings

The key finding of the paper is that the adoption of digital technologies in the banking industry has led to a significant increase in digital fraudulent activities, particularly in the form of online banking frauds. This paper emphasizes that these frauds have become a global concern and have evolved into an industry where cybercriminals use sophisticated tools such as phishing attacks, denial-of-service attacks, Trojan horses, malware infections, identity theft and computer viruses.

Research limitations/implications

This study relies solely on a literature review without incorporating primary data or case studies; therefore, it might miss out on the firsthand experiences and perspectives of banks and cybersecurity professionals.

Practical implications

This study emphasizes the need for banks to adopt advanced security measures to safeguard their online banking systems.

Social implications

This study underscores the importance of ongoing training and awareness programs for both bank employees and customers.

Originality/value

This study specifically addresses the adoption of digital technologies in the banking industry and its correlation with the increase in digital fraudulent activities. This focus on the intersection of technology and fraud in the banking sector is a distinctive aspect. This study conducts a SLR to examine the current technologies implemented by banks to safeguard their online banking systems. This comprehensive approach provides insights into the diverse security measures used by banks to protect against various types of cyber threats.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 10 April 2024

Tze Yin Khaw, Azlan Amran and Ai Ping Teoh

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity…

Abstract

Purpose

This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.

Design/methodology/approach

This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study’s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.

Findings

This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.

Originality/value

This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 21 December 2023

Anshika Singh Tanwar, Harish Chaudhry and Manish Kumar Srivastava

This study aims to provide a holistic review of social media influencers (SMIs) research based on a unique approach of bibliometric analysis and content analysis between 2011 and…

Abstract

Purpose

This study aims to provide a holistic review of social media influencers (SMIs) research based on a unique approach of bibliometric analysis and content analysis between 2011 and 2020. The review examines the main influential aspects, themes and research streams to identify research directions for the future.

Design/methodology/approach

The sample selection and data collection were done from the Scopus database. The sample dataset was refined based on the inclusion and exclusion criteria to determine the final dataset of 183 articles. The dataset was exported in the BibTeX format and then imported into the BiblioShiny app for bibliometric analysis. The content analysis was done following the theory-context-methodology framework.

Findings

The several findings of this study include (1) Co-word analysis of most used keywords; (2) Longitudinal thematic evolution; (3) The focus of the research papers as per the theory-context-methodology review protocol are persuasion knowledge model, fashion and beauty industries, Instagram and content analysis, respectively; and (4) The network analysis of the research studies is known as the co-citation analysis and depicts the intellectual structure in the domain. This analysis resulted in four clusters of the research streams from the literature and two emergent themes (Chen et al., 2010)

Originality/value

In general, the previous reviews in the area are either domain, method or theory-based. Thus, this study aims to complement and extend the existing literature by presenting the overall picture of the SMI research with the help of a unique combined approach and further highlighting the trends and future research directions based on the findings of this study.

Details

Journal of Advances in Management Research, vol. 21 no. 2
Type: Research Article
ISSN: 0972-7981

Keywords

Open Access
Article
Publication date: 7 July 2023

Navodika Karunarathna, Dinesha Siriwardhane and Amila Jayarathne

The main aim of this study is to explore the appropriate factors in measuring COVID-19-induced supply chain disruptions and the impact of these disruptions on the economic…

1168

Abstract

Purpose

The main aim of this study is to explore the appropriate factors in measuring COVID-19-induced supply chain disruptions and the impact of these disruptions on the economic vulnerability of small-scale farmers in Sri Lanka.

Findings

The findings revealed that most of the farmers have continued to cultivate even during the pandemic despite several challenges which affected their economic status. Therefore, it is concluded that COVID-19-induced transportation and demand disruptions exacerbated the economic vulnerability of small-scale farmers over the disruptions in supply and production.

Practical implications

The findings of this study are crucial for formulating novel policies to improve the sustainability of the Sri Lankan agricultural sector and alleviate the poverty level of Agri-communities in the countryside. As farming is a vital sector in the economy, increased attention ought to be given on facilitating farmers with government-encouraged loans or allowances for their financial stability. Further, the respective government authorities should develop programs for importing and distributing adequate quantities of fertilizers among all the farmers at controlled prices so that they can continue their operations without any interruption. Moreover, the government could engage in collaboratively work with private organizations to streamline the Agri-input supply process. There should be a government initiative for critical consideration of the issues of farming families and their continued motivation to engage in agriculture. Thus, farmers' livelihoods and agricultural prosperity could be upgraded through alternative Agri-inputs and marketing strategies, providing financial assistance, encouraging innovative technology, etc.

Originality/value

Despite the significance and vulnerability of the vegetable and fruit sector in Sri Lanka, there is a limitation in the empirical studies conducted on the supply chain disruptions caused by COVID-19 measures and their implications on the farmers' livelihood. Furthermore, previous empirical research has not employed adequate quantitative tools to analyze the situation or appropriate variables in evaluating COVID-19-induced disruptions. Hence, the current study explored the appropriate factors for measuring COVID-19-induced supply chain disruption using exploratory factor analysis. Then, the impact of those factors on the economic vulnerability of the small scale farmers was revealed through the ordinal logistics regression analysis.

Details

International Journal of Industrial Engineering and Operations Management, vol. 6 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2546

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7113

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 20 April 2023

Seng-Su Tsang, Zhih Lin Liu and Thi Vinh Tran Nguyen

The present study integrates inclusive leadership and protection motivation theory to propose a new model predicting employees' intention to work from home during an emergency…

Abstract

Purpose

The present study integrates inclusive leadership and protection motivation theory to propose a new model predicting employees' intention to work from home during an emergency situation such as the COVID-19 pandemic.

Design/methodology/approach

A questionnaire was developed to collect data from 939 Taiwanese and Vietnamese office employees using a non-probability convenience sampling method. A total of 887 valid questionnaires were used for further analysis. The data were analysed following a two-stage structural equation modelling using SPSS 22 and AMOS 20 software. The validity and reliability of the instrument were tested and ensured.

Findings

The results revealed that inclusive leadership and factors related to protection motivation theory– including perceived severity and perceived vulnerability – have positive direct and indirect effects on employees' work-from-home intentions through the mediating role of employees' work-from-home-related attitudes. Protection motivation theory factors were found to have a stronger effect on employees' work-from-home intention than inclusive leadership. Differences in the relationship between perceived vulnerability, perceived severity and employees' intentions towards working from home were also discovered among participants from the two studied countries.

Practical implications

The integration of inclusive leadership and protection motivation theory brings into light what will drive employees' intention to work from home during an emergency situation. The present study has several theoretical and practical implications for scholars, governments, managers and policymakers that can help them improve management policies for working from home in the future.

Originality/value

Based on integrating inclusive leadership and protection motivation theory to explore employees' intention to work from home during an emergency situation, the present study demonstrated that inclusive leadership and protection motivation theory should be considered for studies on working from home in a pandemic setting.

Details

International Journal of Manpower, vol. 45 no. 2
Type: Research Article
ISSN: 0143-7720

Keywords

1 – 10 of 236