Search results

1 – 10 of 92
Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 21 December 2023

Anshika Singh Tanwar, Harish Chaudhry and Manish Kumar Srivastava

This study aims to provide a holistic review of social media influencers (SMIs) research based on a unique approach of bibliometric analysis and content analysis between 2011 and…

Abstract

Purpose

This study aims to provide a holistic review of social media influencers (SMIs) research based on a unique approach of bibliometric analysis and content analysis between 2011 and 2020. The review examines the main influential aspects, themes and research streams to identify research directions for the future.

Design/methodology/approach

The sample selection and data collection were done from the Scopus database. The sample dataset was refined based on the inclusion and exclusion criteria to determine the final dataset of 183 articles. The dataset was exported in the BibTeX format and then imported into the BiblioShiny app for bibliometric analysis. The content analysis was done following the theory-context-methodology framework.

Findings

The several findings of this study include (1) Co-word analysis of most used keywords; (2) Longitudinal thematic evolution; (3) The focus of the research papers as per the theory-context-methodology review protocol are persuasion knowledge model, fashion and beauty industries, Instagram and content analysis, respectively; and (4) The network analysis of the research studies is known as the co-citation analysis and depicts the intellectual structure in the domain. This analysis resulted in four clusters of the research streams from the literature and two emergent themes (Chen et al., 2010)

Originality/value

In general, the previous reviews in the area are either domain, method or theory-based. Thus, this study aims to complement and extend the existing literature by presenting the overall picture of the SMI research with the help of a unique combined approach and further highlighting the trends and future research directions based on the findings of this study.

Details

Journal of Advances in Management Research, vol. 21 no. 2
Type: Research Article
ISSN: 0972-7981

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 20 April 2023

Seng-Su Tsang, Zhih Lin Liu and Thi Vinh Tran Nguyen

The present study integrates inclusive leadership and protection motivation theory to propose a new model predicting employees' intention to work from home during an emergency…

Abstract

Purpose

The present study integrates inclusive leadership and protection motivation theory to propose a new model predicting employees' intention to work from home during an emergency situation such as the COVID-19 pandemic.

Design/methodology/approach

A questionnaire was developed to collect data from 939 Taiwanese and Vietnamese office employees using a non-probability convenience sampling method. A total of 887 valid questionnaires were used for further analysis. The data were analysed following a two-stage structural equation modelling using SPSS 22 and AMOS 20 software. The validity and reliability of the instrument were tested and ensured.

Findings

The results revealed that inclusive leadership and factors related to protection motivation theory– including perceived severity and perceived vulnerability – have positive direct and indirect effects on employees' work-from-home intentions through the mediating role of employees' work-from-home-related attitudes. Protection motivation theory factors were found to have a stronger effect on employees' work-from-home intention than inclusive leadership. Differences in the relationship between perceived vulnerability, perceived severity and employees' intentions towards working from home were also discovered among participants from the two studied countries.

Practical implications

The integration of inclusive leadership and protection motivation theory brings into light what will drive employees' intention to work from home during an emergency situation. The present study has several theoretical and practical implications for scholars, governments, managers and policymakers that can help them improve management policies for working from home in the future.

Originality/value

Based on integrating inclusive leadership and protection motivation theory to explore employees' intention to work from home during an emergency situation, the present study demonstrated that inclusive leadership and protection motivation theory should be considered for studies on working from home in a pandemic setting.

Details

International Journal of Manpower, vol. 45 no. 2
Type: Research Article
ISSN: 0143-7720

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 June 2022

Mina Safizadeh, Massoomeh Hedayati Marzbali, Aldrin Abdullah and Nor Zarifah Maliki

Because of the global increase of climate change effects, floods are becoming more frequent and severer, especially in urban areas of coastal cities and islands where floodplains…

Abstract

Purpose

Because of the global increase of climate change effects, floods are becoming more frequent and severer, especially in urban areas of coastal cities and islands where floodplains have turned into buildings because of rapid urbanisation, leading to a higher risk of damages. Urban heritage areas should be highly considered in the time of evacuation because of the vulnerability of streets and buildings and limitations on taking counteractions. Given these limitations, this study aims to propose a network of potential evacuation routes based on spatial configuration analysis of the heritage areas.

Design/methodology/approach

Penang Island's heritage site, namely, George Town, located on the northwest coast of Malaysia, is chosen as the case study. By using an approach of spatial configuration analysis using space syntax techniques in addition to considering the potential starting points for evacuation and flood risk map of the area, this study analysed the area's street network values for evacuation function during flood crisis time.

Findings

Potential evacuation routes were identified for flood disasters in the George Town heritage area. Furthermore, the proposed evacuation routes were evaluated in terms of time for evacuation by metric step-depth analysis of space syntax.

Originality/value

A few studies have focused on practical guidelines for evacuation routes based on spatial configuration analysis, an important yet neglected approach in this regard, especially concerning urban island areas. This study can contribute to providing strategies to reduce vulnerability and casualties in urban heritage areas.

Details

Journal of Facilities Management , vol. 22 no. 2
Type: Research Article
ISSN: 1472-5967

Keywords

Open Access
Article
Publication date: 12 June 2023

Maria Dodaro and Lavinia Bifulco

The purpose of this paper is to explore two financial inclusion measures adopted within the local welfare context of the city of Milan, Italy, examining their functioning and…

Abstract

Purpose

The purpose of this paper is to explore two financial inclusion measures adopted within the local welfare context of the city of Milan, Italy, examining their functioning and underpinning representations. The aim is also to understand how such representations take concrete shape in the practices of local actors, and their implications for the opportunities and constraints regarding individuals' effective inclusion. To this end, this paper takes a wide-ranging look at the interplay between the rise of financial inclusion and the individualisation and responsibilisation models informing welfare policies, within the broader context of financialisation processes overall.

Design/methodology/approach

This paper draws on the sociology of public action approach and provides a qualitative analysis of two case studies, a social microcredit service and a financial education programme, based on direct observation and semi-structured interviews conducted with key policy actors.

Findings

This paper sheds light on the rationale behind two financial inclusion services and illustrates how the instruments involved incorporate and tend to reproduce, individualising logics that reduce the problem of financial exclusion, and the social and economic vulnerability which underlies it, to a matter of personal responsibility, thus fuelling depoliticising tendencies in public action. It also discusses the contradictions underlying financial inclusion instruments, showing how local actors negotiate views and strategies on the problems to be addressed.

Originality/value

The paper makes an original contribution to the field of sociology and social policy by focusing on two under-researched instruments of financial inclusion and improving understanding of the finance-welfare state nexus and of the contradictions underpinning attempts at financial inclusion of the most vulnerable.

Details

International Journal of Sociology and Social Policy, vol. 44 no. 13/14
Type: Research Article
ISSN: 0144-333X

Keywords

Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 16 April 2024

Soraya González-Mendes, Sara Alonso-Muñoz, Fernando E. García-Muiña and Rocío González-Sánchez

This paper aims to provide an overview of the application of blockchain to agri-food supply chains, including key issues and trends. It examines the state of the art and…

Abstract

Purpose

This paper aims to provide an overview of the application of blockchain to agri-food supply chains, including key issues and trends. It examines the state of the art and conceptual structure of the field and proposes an agenda to guide future research.

Design/methodology/approach

This article performs a bibliometric analysis using VOSviewer software on a sample of 205 articles from the WoS database to identify research trend topics.

Findings

The number of publications in this area has increased since 2020, which shows a growing research interest. The research hotspots are related to the integration of blockchain technology in the agri-food supply chain for traceability, coordination between all actors involved, transparency of operations and improvement of food safety. Furthermore, this is linked to sustainability and the achievement of the sustainable development gtoals (SDGs), while addressing key challenges in the implementation of blockchain-based technologies in the agri-food supply chain.

Practical implications

The application of blockchain in the agri-food supply chain may consider four key aspects. Firstly, the implementation of blockchain can improve the traceability of food products. Secondly, this technology supports sustainability issues and could avoid disruptions in the agri-food supply chain. Third, blockchain improves food quality and safety control throughout the supply chain. Fourthly, the findings show that regulation is needed to improve trust between stakeholders.

Originality/value

The paper provides a comprehensive overview of the blockchain phenomenon in the agri-food supply chain by optimising the search criteria. Moreover, it serves to bridge to future research by identifying gaps in the field.

Details

British Food Journal, vol. 126 no. 13
Type: Research Article
ISSN: 0007-070X

Keywords

1 – 10 of 92