Search results

1 – 10 of over 6000
Content available
Article
Publication date: 22 December 2020

Kambiz Mokhtari, Noorul Shaiful Fitri Abdul Rahman, Hamid Reza Soltani, Salim Ahmed Al Rashdi and Kawkab Abdul Aziz Mohammed Al Balushi

At the substantive level, there exists a gap in knowledge about the position of security risk management (i.e. SRM) during the terminals’ operations and management; particularly…

1403

Abstract

Purpose

At the substantive level, there exists a gap in knowledge about the position of security risk management (i.e. SRM) during the terminals’ operations and management; particularly when there is potential for deliberate anti-security acts. Correspondingly, the purpose of this paper is a need for more practical research to find out the justification for the existence of the SRM and different techniques for its appropriate execution on these logistics infrastructures principally with due regard to the potential requirements in the near future.

Design/methodology/approach

Both qualitative and quantitative techniques are used in this study incorporating fuzzy set theory and risk assessment matrix to achieve the research objective.

Findings

A designed SRM framework tailored for Qalhat liquefied petroleum gas (LNG) terminal in Sultanate of Oman was established to manage the security threats which can be resulted from any probable terrorist attacks.

Research limitations/implications

The limited numbers of experts for the purpose of the addressed SRM are causing challenges in data collection.

Practical implications

The pressures for enhanced attention to critical infrastructure security have fostered new challenges for petrochemical seaports and terminals (PSTs). These tendencies dictate to maintain comprehensive security regimens that can be integrated with national and international strategies to support the country’s security against terrorism.

Originality/value

The development of the security risk factor table model in the case of Qalhat LNG Terminal.

Content available
Article
Publication date: 7 March 2019

Joshua R. Muckensturm and Dave C. Longhorn

This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing…

1154

Abstract

Purpose

This paper introduces a new heuristic algorithm that aims to solve the military route vulnerability problem, which involves assessing the vulnerability of military cargo flowing over roads and railways subject to enemy interdiction.

Design/methodology/approach

Graph theory, a heuristic and a binary integer program are used in this paper.

Findings

This work allows transportation analysts at the United States Transportation Command to identify a relatively small number of roads or railways that, if interdicted by an enemy, could disrupt the flow of military cargo within any theater of operation.

Research limitations/implications

This research does not capture aspects of time, such as the reality that cargo requirements and enemy threats may fluctuate each day of the contingency.

Practical implications

This work provides military logistics planners and decision-makers with a vulnerability assessment of theater distribution routes, including insights into which specific roads and railways may require protection to ensure the successful delivery of cargo from ports of debarkation to final destinations.

Originality/value

This work merges network connectivity and flow characteristics with enemy threat assessments to identify militarily-useful roads and railways most vulnerable to enemy interdictions. A geographic combatant command recently used this specific research approach to support their request for rapid rail repair capability.

Details

Journal of Defense Analytics and Logistics, vol. 3 no. 1
Type: Research Article
ISSN: 2399-6439

Keywords

Open Access
Book part
Publication date: 4 June 2021

Julia Slupska and Leonie Maria Tanczer

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence…

Abstract

Technology-facilitated abuse, so-called “tech abuse,” through phones, trackers, and other emerging innovations, has a substantial impact on the nature of intimate partner violence (IPV). The current chapter examines the risks and harms posed to IPV victims/survivors from the burgeoning Internet of Things (IoT) environment. IoT systems are understood as “smart” devices such as conventional household appliances that are connected to the internet. Interdependencies between different products together with the devices' enhanced functionalities offer opportunities for coercion and control. Across the chapter, we use the example of IoT to showcase how and why tech abuse is a socio-technological issue and requires not only human-centered (i.e., societal) but also cybersecurity (i.e., technical) responses. We apply the method of “threat modeling,” which is a process used to investigate potential cybersecurity attacks, to shift the conventional technical focus from the risks to systems toward risks to people. Through the analysis of a smart lock, we highlight insufficiently designed IoT privacy and security features and uncover how seemingly neutral design decisions can constrain, shape, and facilitate coercive and controlling behaviors.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 23 October 2023

Roisin Donnelly and Anthony Ryan

This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if…

Abstract

Purpose

This study considered the use of video conferencing virtual backgrounds with employees located in a large multinational corporate organisation in Ireland and the USA to discern if background images evoking gendered stereotypes of leadership can cue stereotype threat in female technology workers undertaking a leadership activity, thus negatively effecting performance. This study aims to contribute to the body of research on stereotype threat by establishing whether virtual backgrounds used in video conferencing software are inherently identity safe or whether their use could have a negative performance impact on marginalised groups.

Design/methodology/approach

Using a mixed methods research design with 22 participants in two countries working in the one large organisation, using two quantitative methods (an experiment and a survey) and one qualitative method (semi-structured interviews), the study examined the relationship between performance on the leadership activity and exposure to gendered backgrounds on a video conference call.

Findings

It found that female leaders undertaking a leadership test experienced more anxiety and achieved lower scores on average when exposed to a male-gendered virtual background compared to male colleagues or female leaders exposed to a female gendered background. It was also found that these leaders were aware of the stereotype of leadership being White and male, and showed symptoms of prolonged exposure to stereotype threat in the workplace. While the authors still are working through a post-pandemic environment, it may be judicious for organisations to restrict the use of virtual backgrounds to identity-safe ones, specifically chosen by the company.

Research limitations/implications

The study makes several practical recommendations, indicating actions which can be taken at the individual, team and corporate levels. Re-running this experiment in a more controlled environment with a larger sample set could yield more definitive, statistically significant results and contribute more to the literature.

Practical implications

Some individual impacts were found via the interviews. Male leaders in the organisation need to do more to mentor and endorse their female colleagues. By doing this, they can counter the negative effects of solo status and the subsequent performance degradations of their female counterparts, while also setting an example for other leaders. Participation in the mentoring programme and initiatives such as Dare and value, inclusion, belonging, and equity should be encouraged and supported. Reverse mentoring should also be encouraged among the population of male leaders to aid in allyship and bias-awareness.

Social implications

Teams should note that a democratic vote is not always the best way to decide on the names of teams, projects or meeting rooms. These may skew towards niche interests that can serve to alienate members of the team who do not associate themselves with that interest. Rather, the teams should strive to be fully inclusive and educated on the need for identity-safety. Team events may also serve to alienate members if teams are not mindful of the need to be inclusive. Activities, such as “go-kart” racing and physical or competitive team events have been highlighted as unsuitable for some team members, and should be avoided in favour of inclusivity.

Originality/value

A significant body of research has documented the effect to which stereotype threat can be triggered by both the physical environment and by the use of various technology media. However, there is a dearth of research exploring the relationship between stereotype threat, defined as “the concrete, real-time threat of being judged and treated poorly in settings where a negative stereotype about one’s group applies” (Steele et al., 2002, p. 385), and video conferencing software features, such as virtual backgrounds.

Details

International Journal of Organizational Analysis, vol. 31 no. 8
Type: Research Article
ISSN: 1934-8835

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Content available
Article
Publication date: 21 March 2023

Abel Yeboah-Ofori and Francisca Afua Opoku-Boateng

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their…

Abstract

Purpose

Various organizational landscapes have evolved to improve their business processes, increase production speed and reduce the cost of distribution and have integrated their Internet with small and medium scale enterprises (SMEs) and third-party vendors to improve business growth and increase global market share, including changing organizational requirements and business process collaborations. Benefits include a reduction in the cost of production, online services, online payments, product distribution channels and delivery in a supply chain environment. However, the integration has led to an exponential increase in cybercrimes, with adversaries using various attack methods to penetrate and exploit the organizational network. Thus, identifying the attack vectors in the event of cyberattacks is very important in mitigating cybercrimes effectively and has become inevitable. However, the invincibility nature of cybercrimes makes it challenging to detect and predict the threat probabilities and the cascading impact in an evolving organization landscape leading to malware, ransomware, data theft and denial of service attacks, among others. The paper explores the cybercrime threat landscape, considers the impact of the attacks and identifies mitigating circumstances to improve security controls in an evolving organizational landscape.

Design/methodology/approach

The approach follows two main cybercrime framework design principles that focus on existing attack detection phases and proposes a cybercrime mitigation framework (CCMF) that uses detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface. The methods and implementation processes were derived by identifying an organizational goal, attack vectors, threat landscape, identification of attacks and models and validation of framework standards to improve security. The novelty contribution of this paper is threefold: first, the authors explore the existing threat landscapes, various cybercrimes, models and the methods that adversaries are deploying on organizations. Second, the authors propose a threat model required for mitigating the risk factors. Finally, the authors recommend control mechanisms in line with security standards to improve security.

Findings

The results show that cybercrimes can be mitigated using a CCMF to detect, assess, analyze, evaluate and respond to cybercrimes to improve security in an evolving organizational threat landscape.

Research limitations/implications

The paper does not consider the organizational size between large organizations and SMEs. The challenges facing the evolving organizational threat landscape include vulnerabilities brought about by the integrations of various network nodes. Factor influencing these vulnerabilities includes inadequate threat intelligence gathering, a lack of third-party auditing and inadequate control mechanisms leading to various manipulations, exploitations, exfiltration and obfuscations.

Practical implications

Attack methods are applied to a case study for the implementation to evaluate the model based on the design principles. Inadequate cyber threat intelligence (CTI) gathering, inadequate attack modeling and security misconfigurations are some of the key factors leading to practical implications in mitigating cybercrimes.

Social implications

There are no social implications; however, cybercrimes have severe consequences for organizations and third-party vendors that integrate their network systems, leading to legal and reputational damage.

Originality/value

The paper’s originality considers mitigating cybercrimes in an evolving organization landscape that requires strategic, tactical and operational management imperative using the proposed framework phases, including detect, assess, analyze, evaluate and respond phases and subphases to reduce the attack surface, which is currently inadequate.

Details

Continuity & Resilience Review, vol. 5 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Open Access
Article
Publication date: 13 March 2020

Edmond Ofori

The purpose of this study was to assess the effects of the Ponzi schemes and revocation of licences of some financial institutions in Ghana on financial threat.

4879

Abstract

Purpose

The purpose of this study was to assess the effects of the Ponzi schemes and revocation of licences of some financial institutions in Ghana on financial threat.

Design/methodology/approach

The study adopted a quantitative research approach. Convenient sampling method was used to select 435 individuals from three regions in Ghana. Standardize questionnaire developed by the researcher was used as the main data collection instrument. The binary logistic regression was used to test the relationship between the dependent variable and the independent variables.

Findings

The results of the study showed a positive relationship between financial threat and job loss, general health, information search and loss of investment. However, negative relationship was identified between financial threat and total debt, stress, economic hardship and anxiety. Findings from this study imply that job loss, general health, information search and loss of investment are major factors that determined financial threat in Ghana.

Practical implications

This indicates that individuals in Ghana have become uncertain regarding the use of current and future financial services in Ghana because most individuals have lost their jobs in the financial institutions, cannot get access to safe drinking water and education, need to gather more information before investing in financial institutions in Ghana and losing of funds invested.

Originality/value

This study is the first to test the effects of the Ponzi schemes and the revocation of licences of some financial institutions in Ghana on financial threat using binary logistic regression.

Details

Journal of Financial Crime, vol. 30 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Content available
Article
Publication date: 15 February 2022

Megan M. Walsh, Erica L. Carleton, Amanda J. Hancock and Kara A. Arnold

The purpose of this paper were to investigate whether gendered social media images reduce women’s leadership aspirations (via reduced leadership self-efficacy) and whether state…

2098

Abstract

Purpose

The purpose of this paper were to investigate whether gendered social media images reduce women’s leadership aspirations (via reduced leadership self-efficacy) and whether state mindfulness buffers the effect of stereotype threat on women’s leadership self-efficacy, and in turn, leadership aspirations.

Design/methodology/approach

Study 1 (n = 53) was a pilot study designed to test materials intended to induce stereotype threat via social media. Study 2 (n = 144) was an experimental study in which participants were randomly assigned to stereotype threat or control conditions. Stereotype threat was implicitly induced via a fictional Facebook timeline that incorporated gendered images.

Findings

Stereotype threat induced via social media predicted lower leadership aspirations for women, which was mediated by reduced leadership self-efficacy, as expected. State mindfulness moderated this mediated relationship in an unexpected way; stereotype threat effects on leadership self-efficacy and leadership aspirations were stronger for women higher in state mindfulness.

Originality/value

It is important to investigate stereotype threat induced via social media to understand the potential damage gendered images may have on women’s leadership aspirations in a modern advertising context. This research shows that indeed gendered images in social media advertising decrease women’s leadership self-efficacy and leadership aspirations. Interestingly, this study also found that mindfulness had a negative effect in relation to stereotype threat. Theoretical and practical implications are discussed.

Details

Gender in Management: An International Journal , vol. 37 no. 4
Type: Research Article
ISSN: 1754-2413

Keywords

Open Access
Article
Publication date: 12 May 2020

Hjördís Sigursteinsdóttir, Guðbjörg Linda Rafnsdóttir and Thorgerður Einarsdóttir

The recent global economic crisis affected workplaces in many countries, raising questions about the employees' situation. While most work-related studies in times of crises focus…

1390

Abstract

Purpose

The recent global economic crisis affected workplaces in many countries, raising questions about the employees' situation. While most work-related studies in times of crises focus on job loss and unemployment, this study analyzes workplace violence in the wake of the 2008 economic crisis among municipal employees within care and education.

Design/methodology/approach

Mixed method approach was used for data collection; longitudinal online surveys and focus group interviews were used.

Findings

The prevalence of workplace violence increased between the three time points of the study, in particular in downsized workplaces. A higher proportion of employees working in care were exposed to threats and physical violence than employees in education as clients of employees in care services were more likely to lash out against employees due to cutbacks in services. Focus groups interviews indicated that the causes of increased workplace violence may be due to a spreading effect both from within and outside the workplace.

Practical implications

As workplace violence can have serious consequences for the health and well-being of employees, it is important for those who have responsibility for the work environment and occupational health in the workplace to design policies that take these findings into account.

Originality/value

Based on the mixed methods, longitudinal survey and focus group interviews, this study contributes to knowledge on workplace violence in times of economic crises. It shows that the prevalence of workplace violence increased not only directly after the economic collapse but also continued up to five years later.

Details

International Journal of Workplace Health Management, vol. 13 no. 4
Type: Research Article
ISSN: 1753-8351

Keywords

Open Access
Article
Publication date: 24 October 2022

Yumei Luo and Jian Mou

This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of…

1340

Abstract

Purpose

This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of health-related ascribes on continuance intention to use mHealth apps and how these influences are contingent on gender in the mHealth app using context.

Design/methodology/approach

This study takes the protection motivation theory as a theoretical framework to examine the ordered relationship between threat and coping appraisals and their impacts on continuance intention to use mHealth apps. In addition, this study further extends the literature on gender differences into the mHealth app's context to investigate the moderating role of gender. The suggested hypotheses are confirmed by a structural equation modeling approach and multigroup investigation employing survey data of 345 users of Spring Rain Doctor in China, a typical mHealth app.

Findings

The findings suggest that the impact of perceived disease threat on user's continuance intention is mediated entirely by coping appraisals. Furthermore, the three coping appraisals' impacts are contingent upon gender. Specifically, response efficacy is more crucial for male users in forecasting continuance intention, whereas self-efficacy and response cost have a more salient influence on continuance intention for female users.

Originality/value

This study examines the ordered influences of threat and coping appraisal, moderated by gender, on continuance intention on use mHealth apps. These findings could contribute to relevant theoretical and practical implications.

Details

Journal of Electronic Business & Digital Economics, vol. 1 no. 1/2
Type: Research Article
ISSN: 2754-4214

Keywords

1 – 10 of over 6000