Search results

1 – 10 of 12

Abstract

Details

Police Responses to Islamist Violent Extremism and Terrorism
Type: Book
ISBN: 978-1-83797-845-8

Open Access
Article
Publication date: 20 March 2023

Kudakwashe Chirambwi

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and…

Abstract

Purpose

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and contention on the superiority given to positivist and interpretivist research designs when doing fieldwork in war situations, hence there is a need to use integrated data generation techniques. The combined effect of severe limitations of movement for both the researcher and researched fragmented data because of polarized views about the causes of the war and unpredictable events that make information hard to come by militate against systematic, organised and robust data generation. The purpose of this paper, therefore, is to make fieldwork researchers understand significant research problems unique to war zones.

Design/methodology/approach

This research was guided by the postmodernist mode of thought which challenges standardised research traditions. Fieldwork experiences in Cabo suggest the need to use the composite strategies that rely on the theoretical foundation of integrative and creative collection of data when doing research in violent settings.

Findings

The fieldwork experiences showed that the standardised, conventional and valorised positivist and ethnographic research strategies may not sufficiently facilitate understanding of the dynamics of war. There should not be firm rules, guidelines or regulations governing the actions of the researcher in conflict. As such, doing research in violent settings require reflexivity, flexibility and creativity in research strategies that respond to rapid changes. Research experiences in Mozambique show the need to use blended methods that include even less structured methodologies.

Originality/value

Fieldwork experiences in Cabo challenges researchers who cling to standardised research traditions which often hamper awareness of new postmodernist mode of thought applicable to war settings. It is essential to study the nature of African armed conflicts by combining creativity and flexibility in the selection of research strategies.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 19 April 2024

Halil Deligöz

This study aims to define a “technological statecraft” concept to distinguish tech-based measures/sanctions from an array of economic measures ranging from restrictions of rare…

Abstract

Purpose

This study aims to define a “technological statecraft” concept to distinguish tech-based measures/sanctions from an array of economic measures ranging from restrictions of rare earth elements and natural gas supplies to asset freezes under the wider portfolio of economic statecraft. This concept is practically intended to reveal the USA’s “logic of choice” in its employment of technology as an efficient instrument to deal with China in the context of the great power rivalry.

Design/methodology/approach

This study follows David A. Baldwin’s statecraft definition and conceptualization methodology, which relies on “means” rather than “ends.” In addition to Baldwin and as an incremental contribution to his economic statecraft analysis, this study also combines national political economy with statecraft analysis with a particular focus on the utilization of technological measures against China during the Trump administration.

Findings

The US rationale for choosing technology, namely, emerging and foundational technologies, in its rivalry against China is caused at least by two factors: the nature of the external challenge and the characteristics of the US innovation model based largely on radical innovations. To deal with China, the USA practically distinguished the role of advanced technology and followed a grammer of technological statecraft as depicted in the promulgated legal texts during the Trump administration.

Originality/value

Despite a growing volume of literature on economic statecraft and technological competition, studies focusing on countries’ “logic of choice” with regard to why and under what conditions they choose financial, technological or commodity-based sanctions/measures/controls are lacking. Inspired from Baldwin’s account on the “logic of choice” from among alternative statecrafts (i.e. diplomacy, military, economic statecraft, and propaganda). This study will contribute to the literature with a clear lens to demonstrate the “logic of choice” from among a variety of economic statecraft measures in the case of the US technological statecraft toward China.

Details

Journal of International Trade Law and Policy, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1477-0024

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1035

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7135

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 23 February 2024

Elin K. Funck, Kirsi-Mari Kallio and Tomi J. Kallio

This paper aims to investigate the process by which performative technologies (PTs), in this case accreditation work in a business school, take form and how humans engage in…

Abstract

Purpose

This paper aims to investigate the process by which performative technologies (PTs), in this case accreditation work in a business school, take form and how humans engage in making up such practices. It studies how academics come to accept and even identify with the quantitative representations of themselves in a translation process.

Design/methodology/approach

The research involved a longitudinal, self-ethnographic case study that followed the accreditation process of one Nordic business school from 2015 to 2021.

Findings

The findings show how the PT pushed for different engagements in various phases of the translation process. Early in the translation process, the PT promoted engagement because of self-realization and the ability for academics to proactively influence the prospective competitive milieu. However, as academic qualities became fabricated into numbers, the PT was able to request compliance, but also to induce self-reflection and self-discipline by forcing academics to compare themselves to set qualities and measures.

Originality/value

The paper advances the field by linking five phases of the translation process, problematization, fabrication, materialization, commensuration and stabilization, to a discussion of why academics come to accept and identify with the quantitative representations of themselves. The results highlight that the materialization phase appears to be the critical point at which calculative practices become persuasive and start influencing academics’ thoughts and actions.

Details

Journal of Accounting & Organizational Change, vol. 20 no. 6
Type: Research Article
ISSN: 1832-5912

Keywords

Article
Publication date: 26 March 2024

Sophie Cole and Richelle Duffy

This paper shares findings from a constructivist grounded theory study, exploring Trainee Teachers’ perceptions of their teaching and learning experienced during university-based…

Abstract

Purpose

This paper shares findings from a constructivist grounded theory study, exploring Trainee Teachers’ perceptions of their teaching and learning experienced during university-based teacher education programmes, specifically the theoretical components. Findings led to the development of a model of program design, pedagogy and teaching strategies that were successful in creating opportunities to build Professional Capital. This paper aims to share this model, highlighting the significance of Professional Capital amidst challenges in English Teacher Education, and to suggest implications for application of the model within broader workforce development.

Design/methodology/approach

Semi-structured interviews were conducted with 18 trainee teachers from four English universities. To support the development of the theoretical framework, researchers employed inductive and iterative constant comparative methods aligned with constructivist grounded theory to sensitise concepts and codes, which were verified using theoretical sampling.

Findings

Informed by the findings of this study, a model is presented which highlights that participants developed human, social and decisional capital during their academic programs helping them to widen their perceptions of what counts as educationally important, beyond narrow performativity measures that are pervasive in a school system. By actively adopting a transformative pedagogy and employing constructivist approaches to curriculum design and delivery, optimal learning environments for learners to build their professional capital can be provided.

Practical implications

These findings may prove valuable to Higher Education academics as a model when designing and delivering professional, student-centred programmes. There are also implications for policymakers seeking to redesign initial teacher education towards schools-led and practice-oriented approaches, who wish to consider the perceptions, values and motivations of trainee teachers.

Originality/value

The findings highlight the significance of teacher trainees’ active engagement with academic literature and theory, in terms of contributing to the development of their professional capital, resilience and professional commitment.

Details

Journal of Professional Capital and Community, vol. 9 no. 2
Type: Research Article
ISSN: 2056-9548

Keywords

Article
Publication date: 16 April 2024

Abdel K. Halabi

This paper presents the biography of one of Australia’s earliest female accountants, Miss Evelyn Maude West (aka Eva). The paper uses this history sub-genre to understand the…

Abstract

Purpose

This paper presents the biography of one of Australia’s earliest female accountants, Miss Evelyn Maude West (aka Eva). The paper uses this history sub-genre to understand the significant impacts Eva West made across several fields. Eva West was not only a pioneer woman accountant but also an active philanthropist with an interest in social issues and a nature lover who promoted and encouraged an appreciation of the environment.

Design/methodology/approach

The paper leverages a diverse array of qualitative resources, responding to Carnegie and Napier's (1996) call to expand the concept of the accounting-based archive. Notably, rare nature study diaries and a book detailing camping adventures serve as poignant examples, illustrating Eva West's profound social and environmental engagement. Additionally, personal and business letters, digitised newspapers, pamphlets, annual reports, minute books and even poems contribute to the comprehensive exploration of Eva West's life and impact. Collectively, these varied sources offer a rich tapestry of evidence, facilitating the documentation of this unique narrative.

Findings

Throughout her life, Eva West made significant contributions as a pioneering woman in the field of accounting, a dedicated philanthropist and a passionate environmentalist. Together, these offer a multifaceted portrait of a well-rounded individual. With a solid foundation in accounting, Eva utilized her expertise to benefit numerous charitable organisations, leaving a lasting impact on the community. Moreover, her deep love for the environment is illustrated in nature study diaries and books documenting her camping adventures, highlighting the interconnectedness between her accounting pursuits and her commitment to environmental stewardship.

Practical implications

While previous studies briefly mention the additional contributions of early women to various organisations and movements, none provide the depth of insight seen in the portrayal of Miss Eva West. Rather than critiquing these earlier narratives, this observation presents an opportunity for further research to honour pioneering individuals for their multifaceted roles beyond accounting. Future studies could spotlight trailblazers as accountants with diverse interests and societal contributions, whether in social or environmental spheres. Additionally, this paper demonstrates how archives maintained by individuals, such as nature or travel diaries and camping books, can enrich accounting and accountability-based historical research.

Originality/value

Biographical studies in accounting have played a significant role in advancing historical research, yet there remains a call for additional studies to gain deeper insights into specific individuals. Few biographical narratives have explored how accountants integrate their professional careers with other interests, particularly highlighting the well-roundedness of individuals, especially women. Furthermore, this paper contributes to filling the gap in research that examines the intersection of accounting professionals and environmental concerns.

Details

Accounting, Auditing & Accountability Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0951-3574

Keywords

1 – 10 of 12