Search results
1 – 10 of over 2000Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…
Abstract
Purpose
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.
Design/methodology/approach
In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.
Findings
Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.
Originality/value
This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.
Details
Keywords
Changlong Ma, Yuhui Ge and Heng Zhao
Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they…
Abstract
Purpose
Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they have adopted seemingly conflicting theoretical perspectives to explain how it works. Drawing on ideas from the threat rigidity theory, the authors integrated these perspectives by proposing a contingency model in which the relationships between TMT diversity and adaptive firm performance depend on the matching between the internal context (i.e. overlapping team tenure) and external context (i.e. severity of threat).
Design/methodology/approach
This study sampled 579 Chinese A-share listed companies that have been severely affected by the COVID-19 pandemic, and multilevel linear regression analysis was used to test the hypothesis.
Findings
Results provided support for this hypothesis. Specifically, the interaction between TMT age/tenure diversity and overlapping team tenure is significant only when the severity of threat is high, while the interaction between TMT functional diversity and overlapping team tenure is significant only when the severity of threat is low.
Originality/value
The results of this study provide a comprehensive perspective to predict the performance impact of team diversity and contribute to diversity research and practice.
Details
Keywords
Hao Chen, Jianming Jiang, Liang Wang, Zihan Zhang and Jiaying Bao
The purpose of this study is to reveal the mechanism of humble leadership inducing abusive supervision from the low-status compensation perspective, examining the mediation role…
Abstract
Purpose
The purpose of this study is to reveal the mechanism of humble leadership inducing abusive supervision from the low-status compensation perspective, examining the mediation role of leader perceived thread to status. Besides, the moderation effect of regulatory focus on the mediation path is discussed.
Design/methodology/approach
This study conducted a three-wave longitudinal survey. The data was collected from 438 leaders and their employees in five Chinese enterprises. This study used Mplus 7.4 and adopted a bootstrapping technique for data analysis.
Findings
Humble leadership has a positive effect on leader perceived threat to status. Leader perceived threat to status plays a mediation role between humble leadership and leader abusive supervision. Leader regulatory focus is the “gate valve” that humble leadership fosters leader abusive supervision. That is, when the leader promotion focus is high, leader perceived threat to status bred by humble leadership is low, resulting in less abusive supervision. When the leader prevention focus is high, humble leadership brings relatively more abusive supervision through perceived threat to status.
Originality/value
This study explores why humble leadership breeds abusive supervision behaviors and reveals the mechanism behind the negative effect of humble leadership based on low-status compensation theory. This study not only promotes the continuous development of the field of humble leadership research through empirical research but also provides guidance for effectively suppressing the negative effects of humble leadership, promoting strengths and avoiding weaknesses and suppressing inappropriate management behaviors in management practice.
Details
Keywords
Natile Nonhlanhla Cele and Sheila Kwenda
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…
Abstract
Purpose
The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.
Design/methodology/approach
Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.
Findings
A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.
Originality/value
With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.
Details
Keywords
Yupeng Mou, Yixuan Gong and Zhihua Ding
Artificial intelligence (AI) is experiencing growth and prosperity worldwide because of its convenience and other benefits. However, AI faces challenges related to consumer…
Abstract
Purpose
Artificial intelligence (AI) is experiencing growth and prosperity worldwide because of its convenience and other benefits. However, AI faces challenges related to consumer resistance. Thus, drawing on the user resistance theory, this study explores factors that influence consumers’ resistance to AI and suggests ways to mitigate this negative influence.
Design/methodology/approach
This study tested four hypotheses across four studies by conducting lab experiments. Study 1 used a questionnaire to verify the hypothesis that AI’s “substitute” image leads to consumer resistance to AI; Study 2 focused on the role of perceived threat as an underlying driver of resistance to AI. Studies 3–4 provided process evidence by the way of a measured moderator, testing whether AI with servant communication style and literal language style is resisted less.
Findings
This study showed that AI’s “substitute” image increased users' resistance to AI. This occurs because the substitute image increases consumers’ perceived threat. The study also found that using servant communication and literal language styles in the interaction between AI and consumers can mitigate the negative effects of AI-substituted images.
Originality/value
This study reveals the mechanism of action between AI image and consumers’ resistance and sheds light on how to choose appropriate image and expression styles for AI products, which is important for lowering consumer resistance to AI.
Details
Keywords
Elizabeth Frieda Ndamono Shipena and Attlee M. Gamundani
Internet of things (IoT) involves the connection of various devices. IoT’s application ranges from wearables: Smart Home Application, Health Care, Smart Offices, Smart Cities…
Abstract
Internet of things (IoT) involves the connection of various devices. IoT’s application ranges from wearables: Smart Home Application, Health Care, Smart Offices, Smart Cities, Agriculture, and Industrial Automation. While the number of connected devices grows by the day, so does the number of security risks and vulnerabilities that these devices face. Billions of the connected devices collect and transmit huge volumes of data making Data Security one of the most pressing technical concerns in IoT. Smart Office is one of the increasing IoT applications and Data Security has become today one of the most challenging areas in its application. It is important to identify data security threats. This chapter therefore presents a review of IoT Smart Office Data Security Threats based on existing research done.
Details
Keywords
Depeng Zhang, Zhongxiang Li and Jiaxin Ma
Managing the growing word-of-mouth (WOM) of brand fans has become a new challenge for companies in the fan economy era. The purpose of this paper is to examine the effect of…
Abstract
Purpose
Managing the growing word-of-mouth (WOM) of brand fans has become a new challenge for companies in the fan economy era. The purpose of this paper is to examine the effect of language intensity of brand fan WOM on customers' willingness to adopt WOM based on psychological resistance theory and to reveal the underlying mechanism of this process.
Design/methodology/approach
A research model was developed to test the proposed hypotheses. Two experiments were conducted on an online platform using data from 708 participants. The independent samples t-test and analysis of variance were used to analyze the data.
Findings
The results show that, in the context of WOM among brand fans, high-intensity language leads to a lower willingness to adopt than low-intensity language and threats to freedom mediate this effect. Moreover, the restoration postscript moderates the effect of language intensity on threats to freedom and customers' willingness to adopt WOM.
Originality/value
Unlike previous studies that focused on electronic word-of-mouth (eWOM) language content, this paper focuses on language intensity to reveal the psychological process of customers' willingness to adopt brand fan WOM. The findings not only enrich the research related to the language effect in eWOM, but also deepen the understanding of the influence effect on brand fan WOM, providing effective guidance for brands to manage fan WOM.
Details
Keywords
Amir Schreiber and Ilan Schreiber
In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…
Abstract
Purpose
In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.
Design/methodology/approach
Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.
Findings
A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.
Research limitations/implications
This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.
Practical implications
It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.
Social implications
Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.
Originality/value
Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.
Details
Keywords
The lockdown of schools to control the spread of Coronavirus Disease 2019 (COVID-19) has adversely affected elementary and secondary school students in China. However, little…
Abstract
Purpose
The lockdown of schools to control the spread of Coronavirus Disease 2019 (COVID-19) has adversely affected elementary and secondary school students in China. However, little evidence is available that documents their perceptions toward the use of e-learning under the pandemic context. This study aims to explore (1) the underlying determinants influencing the students' intentions to continue e-learning and (2) the role that the COVID-19 pandemic plays in this decision. This study extends the expectation–confirmation model (ECM) through a mixed-methods study.
Design/methodology/approach
This study uses a mixed-methods approach. Phase 1 draws conclusions and extracts significant elements related to e-learning during the pandemic by analyzing students' user reviews from platforms. Based on the findings, the authors identify the relevant variables and develop an extended ECM by integrating attitudes and the perceived threat of COVID-19. In Phase 2, the research model is empirically validated using data collected from 36,920 elementary and secondary school students in China. This study uses a mixed-methods approach. Phase 1 draws conclusions and extracts significant elements related to e-learning during the pandemic by analyzing students' user reviews from platforms. Based on the findings, the authors identify the relevant variables and develop an extended ECM by integrating attitudes and the perceived threat of COVID-19. In Phase 2, the research model is empirically validated using data collected from 36,920 elementary and secondary school students in China.
Findings
In Phase 1, the results reveal that students' most concern elements in the COVID-19 pandemic are user perceptions toward e-learning and threat perceptions of COVID-19. In Phase 2, the results reveal that perceived usefulness and attitude are the most significant factors in students' intention to continue. The perceived threat of COVID-19 indirectly influences their intention to continue.
Originality/value
The study extends the ECM with a mixed-methods study to understand students' perceptions toward e-learning during the COVID-19 pandemic. This study can be helpful in related studies in the context of COVID-19-related diseases or other novel scenarios.
Details