Search results
1 – 10 of over 2000Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…
Abstract
Purpose
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.
Design/methodology/approach
In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.
Findings
Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.
Originality/value
This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.
Details
Keywords
Ankit Suri, Yogesh Sharma, Lokesh Jindal and Rajeev Sijariya
The purpose of this study is to investigate the role of blockchain technology in reducing online fraud among Gen Y and Gen Z.
Abstract
Purpose
The purpose of this study is to investigate the role of blockchain technology in reducing online fraud among Gen Y and Gen Z.
Design/methodology/approach
This study uses a two-phase approach. Firstly, a systematic literature review is conducted to examine various aspects of blockchain technology and cyber security. Secondly, the Technology Adoption Model is used to study the adoption dynamics of blockchain-based platforms for online data exchange among 415 Gen Y and Z users.
Findings
The results indicate that efficiency and security, perceived ease of use, perceived usefulness, and trust have a positive effect on behavioral intention and attitude towards use. This is the first study to examine the role of blockchain technology to reduce fraud among Gen Y and Gen Z.
Originality/value
This study provides new insights into the adoption of blockchain-based platforms for online data exchange among Gen Y and Gen Z. The study highlights the critical areas of concern for the adoption of blockchain technology and provides managerial implications for fintech firms, banks, and e-commerce platforms. It is unique in its focus on the potential for blockchain technology to reduce fraud among Gen Y and Gen Z, which has not been previously explored in the literature.
Details
Keywords
Zijing Ye, Huan Li and Wenhong Wei
Path planning is an important part of UAV mission planning. The main purpose of this paper is to overcome the shortcomings of the standard particle swarm optimization (PSO) such…
Abstract
Purpose
Path planning is an important part of UAV mission planning. The main purpose of this paper is to overcome the shortcomings of the standard particle swarm optimization (PSO) such as easy to fall into the local optimum, so that the improved PSO applied to the UAV path planning can enable the UAV to plan a better quality path.
Design/methodology/approach
Firstly, the adaptation function is formulated by comprehensively considering the performance constraints of the flight target as well as the UAV itself. Secondly, the standard PSO is improved, and the improved particle swarm optimization with multi-strategy fusion (MFIPSO) is proposed. The method introduces class sigmoid inertia weight, adaptively adjusts the learning factors and at the same time incorporates K-means clustering ideas and introduces the Cauchy perturbation factor. Finally, MFIPSO is applied to UAV path planning.
Findings
Simulation experiments are conducted in simple and complex scenarios, respectively, and the quality of the path is measured by the fitness value and straight line rate, and the experimental results show that MFIPSO enables the UAV to plan a path with better quality.
Originality/value
Aiming at the standard PSO is prone to problems such as premature convergence, MFIPSO is proposed, which introduces class sigmoid inertia weight and adaptively adjusts the learning factor, balancing the global search ability and local convergence ability of the algorithm. The idea of K-means clustering algorithm is also incorporated to reduce the complexity of the algorithm while maintaining the diversity of particle swarm. In addition, the Cauchy perturbation is used to avoid the algorithm from falling into local optimum. Finally, the adaptability function is formulated by comprehensively considering the performance constraints of the flight target as well as the UAV itself, which improves the accuracy of the evaluation model.
Details
Keywords
Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L. and S.V. Akilandeeswari
This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
Abstract
Purpose
This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
Design/methodology/approach
In this paper, the authors use Federated Learning Algorithm Based On Matrix Mapping For Data Privacy over Edge Computing.
Findings
By using Softmax layer probability distribution for model byzantine tolerance can be increased from 40% to 45% in the blocking-convergence attack, and the edge backdoor attack can be stopped.
Originality/value
By using Softmax layer probability distribution for model the results of the tests, the aggregation method can protect at least 30% of Byzantine clients.
Details
Keywords
Xiaojun Wu, Zhongyun Zhou and Shouming Chen
Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an…
Abstract
Purpose
Artificial intelligence (AI) applications pose a potential threat to users' data security and privacy due to their high data-dependence nature. This paper aims to investigate an understudied issue in the literature, namely, how users perceive the threat of and decide to use a threatening AI application. In particular, it examines the influencing factors and the mechanisms that affect an individual’s behavioral intention to use facial recognition, a threatening AI.
Design/methodology/approach
The authors develop a research model with trust as the key mediating variable by integrating technology threat avoidance theory, the theory of planned behavior and contextual factors related to facial recognition. Then, it is tested through a sequential mixed-methods investigation, including a qualitative study (for model development) of online comments from various platforms and a quantitative study (for model validation) using field survey data.
Findings
Perceived threat (triggered by perceived susceptibility and severity) and perceived avoidability (promoted by perceived effectiveness, perceived cost and self-efficacy) have negative and positive relationships, respectively, with an individual’s attitude toward facial recognition applications; these relationships are partially mediated by trust. In addition, perceived avoidability is positively related to perceived behavioral control, which along with attitude and subjective norm is positively related to individuals' intentions to use facial recognition applications.
Originality/value
This paper is among the first to examine the factors that affect the acceptance of threatening AI applications and how. The research findings extend the current literature by providing rich and novel insights into the important roles of perceived threat, perceived avoidability, and trust in affecting an individual’s attitude and intention regarding using threatening AI applications.
Details
Keywords
Amir Schreiber and Ilan Schreiber
In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…
Abstract
Purpose
In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.
Design/methodology/approach
Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.
Findings
A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.
Research limitations/implications
This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.
Practical implications
It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.
Social implications
Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.
Originality/value
Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.
Details
Keywords
Syed Shah Shah Alam, Taslima Jannat, Chieh Yu Lin, Nor Asiah Omar and Yi Hui Ho
The purpose of this study is to examine the factors that affect managers’ ethical decision-making in export-oriented readymade garments in Bangladesh.
Abstract
Purpose
The purpose of this study is to examine the factors that affect managers’ ethical decision-making in export-oriented readymade garments in Bangladesh.
Design/methodology/approach
This is an empirical study based on the quantitative approach undertaking a cross-sectional survey method where a convenience sampling technique was applied. The analysis was done using partial least square structural equation model applying Smart-PLS version 3.0.
Findings
This study confirmed that all the components of cognitive appraisal processes, including perceived severity, perceived vulnerability, response efficacy and self-efficacy, have a significant influence on attitude. Attitude, in turn, mediates the relationship between these variables and the behavioural intention of ethical practice, except for perceived vulnerability. Besides, moral obligation is found to mediate the relationship between attitude, self-efficacy and the behavioural intention of ethical decision-making. The study also found that ethical climate and subjective norms have a direct influence on behavioural intention. Furthermore, behavioural intention, ethical climate and self-efficacy are positively related to actual decision-making behaviour. However, this study did not find any direct effect of subjective norms on moral obligation.
Practical implications
The organization should include an emphasis on building ethical culture and setting an ethical code of conduct within the organization to sustain ethical practice within employees. However, the practitioner should work on enhancing self-efficacy to curb unethical practices by individuals.
Originality/value
This research contributes to the management of garments manufacturers by a practical and theoretical understanding of what influences the ethical behavioural decision-making process. Valuable guidelines are provided on the ethical decision-making process in the garments manufacturing companies for future researchers.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Mehri Yasami, Kullada Phetvaroon, Mayukh Dewan and Kristina Stosic
The onset of a health crisis has substantially crippled the hotel industry, causing employees' fears of an imminent job loss. This study investigates how hotel employees'…
Abstract
Purpose
The onset of a health crisis has substantially crippled the hotel industry, causing employees' fears of an imminent job loss. This study investigates how hotel employees' perceived job insecurity affects work engagement and psychological withdrawal behavior. Additionally, it explores the mediating role of work engagement between job insecurity and psychological withdrawal behavior, along with examining the moderating effects of employee resilience on the links between job insecurity, work engagement and psychological withdrawal behavior.
Design/methodology/approach
Adopting simple random sampling, a total of 357 completed questionnaires by Thai frontline hotel employees in 36 four- and five-star international hotel chains in Phuket, Thailand, were analyzed. Data analyses were undertaken by SPSS version 25.0 and partial least squares structural equation modeling (PLS-SEM) version 4.0.9.1.
Findings
Results indicate that perceived job insecurity diminishes work engagement and leads to psychological withdrawal behavior. Work engagement is found to partially mediate the connection between job insecurity and psychological withdrawal behavior. Furthermore, employee resilience lessens the impact of job insecurity on work engagement while reinforcing the link between work engagement and psychological withdrawal behavior.
Practical implications
The study findings offer valuable practical implications, illustrating how Thai hospitality firms can cultivate effective talent management practices to develop and enhance employees' skills, engagement and enthusiasm in their work. These practices can assist employees in coping with and managing their perceptions of job insecurity during turbulent times and uncontrollable crises.
Originality/value
This study creates a compelling framework to elucidate the connections among COVID-19-intensified job insecurity, work-related outcomes and personal factors. It introduces a previously underexamined perspective that enriches the authors' theoretical comprehension of how personal resources, like employee resilience, serve as protective factors, shaping employee behavior and performance amidst job insecurity. Moreover, the study advocates for a synthesizing approach, emphasizing the integration of various theoretical perspectives and past literature, particularly when research gaps cannot be sufficiently addressed by a single theory.
Details
Keywords
Almaas Sultana and Rayees Farooq
The purpose of the study is to develop a valid measure of stereotype threat.
Abstract
Purpose
The purpose of the study is to develop a valid measure of stereotype threat.
Design/methodology/approach
A convenience sample of 2,900 respondents from different occupational sectors, including managers, engineers and health-care professionals, was used for the present study. The data were collected from various government and private organizations in North India. The questionnaire survey was administered in three phases. During the first phase, 800 questionnaires were circulated, followed by 1,200 questionnaires in the second phase, and the third phase involves 900 questionnaires. The data were analysed using exploratory factor analysis, confirmatory factor analysis and structural equation modelling.
Findings
The results indicate nine dimensions, namely, occupational identification, occupational stigma consciousness, gender identification, gender stigma consciousness, religion identification, religion stigma consciousness, caste identification, caste stigma consciousness and negative effect of stereotype threat. The study ensures the reliability and validity of the stereotype threat scale. The measure also fulfils the assumptions of nomological validity.
Originality/value
To the best of the authors’ knowledge, the study is the first of its kind to develop and validate the stereotype threat scale adhering to scale development procedures.
Details