Search results
1 – 10 of over 84000The China threat is the first and most obvious answer when it comes to the question of threat perception in Taiwan, but the issue encompasses much more. The ruling elite for years…
Abstract
The China threat is the first and most obvious answer when it comes to the question of threat perception in Taiwan, but the issue encompasses much more. The ruling elite for years considered the subject population a threat, for example, and even the nature and severity of the China threat varies greatly depending on an individual’s identification. How do those who identify as Taiwanese see the consequences of an attack from China? There is a very different threat perception among the Taiwanese population, who view annexation by China in much the same way as their Mainlander counterparts would see annexation by Japan, for example. Persons self-identifying as Taiwanese do not view themselves as being culturally the same as the people across the Taiwan Strait, having grown apart from them (in a cultural sense) over the past 120 years that they have been separated. Moreover, after Taiwan’s long history of being colonized by one alien power after another – from the Dutch and Spanish, to Koxinga, and then the Manchu dynasty; by the Japanese; and finally by the KMT (for being colonized is how many Taiwanese perceive the ROC period) – finally the inhabitants of the island have the opportunity to chart their own future, and enjoy a newfound sovereignty and identity separate from that of any colonizing power: thus the prospect of being colonized by China is anathema, and therefore a much greater existential threat for them than for Mainlanders.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…
Abstract
Purpose
The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.
Design/methodology/approach
In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.
Findings
Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.
Originality/value
This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.
Details
Keywords
Rita Dalton and Helen Eracleous
This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. It is in two parts. The…
Abstract
This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. It is in two parts. The first part considers the definitions and classification of threats, the prevalence of threat‐making and suggestions for assessment and management. The second part concerns the characteristics of those who threaten and the impact of the threats on the victims, and considers threats as predictors of, and part of, the escalating process which leads to further violence.
Details
Keywords
Rita Dalton and Helen Eracleous
This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. This is the second of two…
Abstract
This article considers the literature on threats made by individuals, with particular reference to threats made by patients against health care workers. This is the second of two parts, and concerns the characteristics of those who threaten and the impact of the threats on the victims. It considers threats as predictors of, and part of, the escalating process which leads to further violence.
Details
Keywords
Changlong Ma, Yuhui Ge and Heng Zhao
Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they…
Abstract
Purpose
Although strategic scholars have made great effects to exploring the moderating roles of team interaction in explaining the effect of top management team (TMT) diversity, they have adopted seemingly conflicting theoretical perspectives to explain how it works. Drawing on ideas from the threat rigidity theory, the authors integrated these perspectives by proposing a contingency model in which the relationships between TMT diversity and adaptive firm performance depend on the matching between the internal context (i.e. overlapping team tenure) and external context (i.e. severity of threat).
Design/methodology/approach
This study sampled 579 Chinese A-share listed companies that have been severely affected by the COVID-19 pandemic, and multilevel linear regression analysis was used to test the hypothesis.
Findings
Results provided support for this hypothesis. Specifically, the interaction between TMT age/tenure diversity and overlapping team tenure is significant only when the severity of threat is high, while the interaction between TMT functional diversity and overlapping team tenure is significant only when the severity of threat is low.
Originality/value
The results of this study provide a comprehensive perspective to predict the performance impact of team diversity and contribute to diversity research and practice.
Details
Keywords
Almaas Sultana and Rayees Farooq
The purpose of the study is to develop a valid measure of stereotype threat.
Abstract
Purpose
The purpose of the study is to develop a valid measure of stereotype threat.
Design/methodology/approach
A convenience sample of 2,900 respondents from different occupational sectors, including managers, engineers and health-care professionals, was used for the present study. The data were collected from various government and private organizations in North India. The questionnaire survey was administered in three phases. During the first phase, 800 questionnaires were circulated, followed by 1,200 questionnaires in the second phase, and the third phase involves 900 questionnaires. The data were analysed using exploratory factor analysis, confirmatory factor analysis and structural equation modelling.
Findings
The results indicate nine dimensions, namely, occupational identification, occupational stigma consciousness, gender identification, gender stigma consciousness, religion identification, religion stigma consciousness, caste identification, caste stigma consciousness and negative effect of stereotype threat. The study ensures the reliability and validity of the stereotype threat scale. The measure also fulfils the assumptions of nomological validity.
Originality/value
To the best of the authors’ knowledge, the study is the first of its kind to develop and validate the stereotype threat scale adhering to scale development procedures.
Details
Keywords
Purpose – Police violence involving minority citizens is a significant problem in the United States. Efforts to explain the disparate treatment of minorities have often relied on…
Abstract
Purpose – Police violence involving minority citizens is a significant problem in the United States. Efforts to explain the disparate treatment of minorities have often relied on structural-level racial threat hypotheses. However, research framed by this macro-level approach fails to consider meso-level characteristics of spatially specified places within cities. The place hypothesis maintains that police see disadvantaged minority neighborhoods as especially threatening and, therefore, use more violence in them. Reconceptualizing the racial threat model to include meso-level characteristics of place is essential to better explain police violence.
Design/methodology/approach – The argument is investigated using literature drawn from quantitative analyses of structural predictors of police violence and qualitative/quantitative studies of the police subculture and police behavior within disadvantaged neighborhoods.
Findings – Research on the effects of city-level racial segregation on police violence supports the place hypothesis that the incidence of police violence is higher in segregated minority neighborhoods. City-level segregation is, however, only a proxy for the degree of concentrated minority disadvantage existing at the meso-level. Community-level studies suggest that the police do see disadvantaged places as especially threatening and use more violence in them. Plausibly, meso-level neighborhood characteristics of cities may prove to be better predictors of the incidence of police violence than are structural-level characteristics in cross-city comparisons.
Originality/value – This analysis builds on structural-level racial threat theories by demonstrating that meso-level characteristics of cities are central to explaining disparities in the use of police violence. A multilevel approach to studying police violence using this analytic framework is proposed.
Details
Keywords
Eileen M. Decker, Matthew Morin and Eric M. Rosner
Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…
Abstract
Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.
Details