Search results

1 – 10 of over 2000
Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 25 December 2023

Changlong Ma, Yuhui Ge and Heng Zhao

Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they…

Abstract

Purpose

Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they have adopted seemingly conflicting theoretical perspectives to explain how it works. Drawing on ideas from the threat rigidity theory, the authors integrated these perspectives by proposing a contingency model in which the relationships between TMT diversity and adaptive firm performance depend on the matching between the internal context (i.e. overlapping team tenure) and external context (i.e. severity of threat).

Design/methodology/approach

This study sampled 579 Chinese A-share listed companies that have been severely affected by the COVID-19 pandemic, and multilevel linear regression analysis was used to test the hypothesis.

Findings

Results provided support for this hypothesis. Specifically, the interaction between TMT age/tenure diversity and overlapping team tenure is significant only when the severity of threat is high, while the interaction between TMT functional diversity and overlapping team tenure is significant only when the severity of threat is low.

Originality/value

The results of this study provide a comprehensive perspective to predict the performance impact of team diversity and contribute to diversity research and practice.

Details

Journal of Organizational Change Management, vol. 37 no. 1
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 19 October 2023

Hao Chen, Jianming Jiang, Liang Wang, Zihan Zhang and Jiaying Bao

The purpose of this study is to reveal the mechanism of humble leadership inducing abusive supervision from the low-status compensation perspective, examining the mediation role…

Abstract

Purpose

The purpose of this study is to reveal the mechanism of humble leadership inducing abusive supervision from the low-status compensation perspective, examining the mediation role of leader perceived thread to status. Besides, the moderation effect of regulatory focus on the mediation path is discussed.

Design/methodology/approach

This study conducted a three-wave longitudinal survey. The data was collected from 438 leaders and their employees in five Chinese enterprises. This study used Mplus 7.4 and adopted a bootstrapping technique for data analysis.

Findings

Humble leadership has a positive effect on leader perceived threat to status. Leader perceived threat to status plays a mediation role between humble leadership and leader abusive supervision. Leader regulatory focus is the “gate valve” that humble leadership fosters leader abusive supervision. That is, when the leader promotion focus is high, leader perceived threat to status bred by humble leadership is low, resulting in less abusive supervision. When the leader prevention focus is high, humble leadership brings relatively more abusive supervision through perceived threat to status.

Originality/value

This study explores why humble leadership breeds abusive supervision behaviors and reveals the mechanism behind the negative effect of humble leadership based on low-status compensation theory. This study not only promotes the continuous development of the field of humble leadership research through empirical research but also provides guidance for effectively suppressing the negative effects of humble leadership, promoting strengths and avoiding weaknesses and suppressing inappropriate management behaviors in management practice.

Details

International Journal of Conflict Management, vol. 35 no. 3
Type: Research Article
ISSN: 1044-4068

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 27 March 2024

Yupeng Mou, Yixuan Gong and Zhihua Ding

Artificial intelligence (AI) is experiencing growth and prosperity worldwide because of its convenience and other benefits. However, AI faces challenges related to consumer…

Abstract

Purpose

Artificial intelligence (AI) is experiencing growth and prosperity worldwide because of its convenience and other benefits. However, AI faces challenges related to consumer resistance. Thus, drawing on the user resistance theory, this study explores factors that influence consumers’ resistance to AI and suggests ways to mitigate this negative influence.

Design/methodology/approach

This study tested four hypotheses across four studies by conducting lab experiments. Study 1 used a questionnaire to verify the hypothesis that AI’s “substitute” image leads to consumer resistance to AI; Study 2 focused on the role of perceived threat as an underlying driver of resistance to AI. Studies 3–4 provided process evidence by the way of a measured moderator, testing whether AI with servant communication style and literal language style is resisted less.

Findings

This study showed that AI’s “substitute” image increased users' resistance to AI. This occurs because the substitute image increases consumers’ perceived threat. The study also found that using servant communication and literal language styles in the interaction between AI and consumers can mitigate the negative effects of AI-substituted images.

Originality/value

This study reveals the mechanism of action between AI image and consumers’ resistance and sheds light on how to choose appropriate image and expression styles for AI products, which is important for lowering consumer resistance to AI.

Details

Marketing Intelligence & Planning, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-4503

Keywords

Book part
Publication date: 29 January 2024

Elizabeth Frieda Ndamono Shipena and Attlee M. Gamundani

Internet of things (IoT) involves the connection of various devices. IoT’s application ranges from wearables: Smart Home Application, Health Care, Smart Offices, Smart Cities…

Abstract

Internet of things (IoT) involves the connection of various devices. IoT’s application ranges from wearables: Smart Home Application, Health Care, Smart Offices, Smart Cities, Agriculture, and Industrial Automation. While the number of connected devices grows by the day, so does the number of security risks and vulnerabilities that these devices face. Billions of the connected devices collect and transmit huge volumes of data making Data Security one of the most pressing technical concerns in IoT. Smart Office is one of the increasing IoT applications and Data Security has become today one of the most challenging areas in its application. It is important to identify data security threats. This chapter therefore presents a review of IoT Smart Office Data Security Threats based on existing research done.

Details

Digital Technology and Changing Roles in Managerial and Financial Accounting: Theoretical Knowledge and Practical Application
Type: Book
ISBN: 978-1-80455-973-4

Keywords

Article
Publication date: 28 September 2023

Depeng Zhang, Zhongxiang Li and Jiaxin Ma

Managing the growing word-of-mouth (WOM) of brand fans has become a new challenge for companies in the fan economy era. The purpose of this paper is to examine the effect of…

Abstract

Purpose

Managing the growing word-of-mouth (WOM) of brand fans has become a new challenge for companies in the fan economy era. The purpose of this paper is to examine the effect of language intensity of brand fan WOM on customers' willingness to adopt WOM based on psychological resistance theory and to reveal the underlying mechanism of this process.

Design/methodology/approach

A research model was developed to test the proposed hypotheses. Two experiments were conducted on an online platform using data from 708 participants. The independent samples t-test and analysis of variance were used to analyze the data.

Findings

The results show that, in the context of WOM among brand fans, high-intensity language leads to a lower willingness to adopt than low-intensity language and threats to freedom mediate this effect. Moreover, the restoration postscript moderates the effect of language intensity on threats to freedom and customers' willingness to adopt WOM.

Originality/value

Unlike previous studies that focused on electronic word-of-mouth (eWOM) language content, this paper focuses on language intensity to reveal the psychological process of customers' willingness to adopt brand fan WOM. The findings not only enrich the research related to the language effect in eWOM, but also deepen the understanding of the influence effect on brand fan WOM, providing effective guidance for brands to manage fan WOM.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 36 no. 3
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 30 December 2022

Kaifei Xu, Xin Bao and Lu Lu

The lockdown of schools to control the spread of Coronavirus Disease 2019 (COVID-19) has adversely affected elementary and secondary school students in China. However, little…

Abstract

Purpose

The lockdown of schools to control the spread of Coronavirus Disease 2019 (COVID-19) has adversely affected elementary and secondary school students in China. However, little evidence is available that documents their perceptions toward the use of e-learning under the pandemic context. This study aims to explore (1) the underlying determinants influencing the students' intentions to continue e-learning and (2) the role that the COVID-19 pandemic plays in this decision. This study extends the expectation–confirmation model (ECM) through a mixed-methods study.

Design/methodology/approach

This study uses a mixed-methods approach. Phase 1 draws conclusions and extracts significant elements related to e-learning during the pandemic by analyzing students' user reviews from platforms. Based on the findings, the authors identify the relevant variables and develop an extended ECM by integrating attitudes and the perceived threat of COVID-19. In Phase 2, the research model is empirically validated using data collected from 36,920 elementary and secondary school students in China. This study uses a mixed-methods approach. Phase 1 draws conclusions and extracts significant elements related to e-learning during the pandemic by analyzing students' user reviews from platforms. Based on the findings, the authors identify the relevant variables and develop an extended ECM by integrating attitudes and the perceived threat of COVID-19. In Phase 2, the research model is empirically validated using data collected from 36,920 elementary and secondary school students in China.

Findings

In Phase 1, the results reveal that students' most concern elements in the COVID-19 pandemic are user perceptions toward e-learning and threat perceptions of COVID-19. In Phase 2, the results reveal that perceived usefulness and attitude are the most significant factors in students' intention to continue. The perceived threat of COVID-19 indirectly influences their intention to continue.

Originality/value

The study extends the ECM with a mixed-methods study to understand students' perceptions toward e-learning during the COVID-19 pandemic. This study can be helpful in related studies in the context of COVID-19-related diseases or other novel scenarios.

Details

Information Technology & People, vol. 37 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 2000