Search results

1 – 10 of over 9000
Article
Publication date: 2 June 2023

N’guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka and Youki Kadobayashi

Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studies…

Abstract

Purpose

Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studies focus on smart-home users. This paper aims to fill this gap by investigating the potential interests of adult smart-home users in cybersecurity awareness training and nonfinancial rewards that may encourage them to adopt sound cybersecurity practices.

Design/methodology/approach

A total of 423 smart-home users between the ages of 25 and 64 completed a survey questionnaire for this study, with 224 participants from Japan and 199 from the UK.

Findings

Cultural factors considerably influence adult smart-home users’ attitudes toward cybersecurity. Specifically, cultural differences impact their willingness to participate in cybersecurity awareness training, their views on the importance of cybersecurity training for children and senior citizens and their preference for nonfinancial rewards as an incentive for good cybersecurity behavior. These results highlight the need to consider cultural differences and their potential impact when developing and implementing cybersecurity programs that target smart-home users.

Practical implications

This research has two main implications. First, it provides insights for information security professionals on the importance of designing cost-effective and time-efficient cybersecurity awareness training programs for smart-home users. Second, the findings may assist governments in establishing nonfinancial incentives to encourage greater uptake of cybersecurity practices among smart-home users.

Originality/value

The paper investigates whether adult smart-home users are willing to spend time and money to engage in cybersecurity awareness training and to encourage their children and elderly parents to participate in training, as well. In addition, the paper examines incentives, especially nonfinancial rewards, that may motivate adult smart-home users to adopt cybersecurity behaviors at home. Furthermore, the paper analyses demographic differences among smart-home users in Japan and the UK.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

Article
Publication date: 3 June 2022

Niranjan Devkota, Ashok Joshi, Ghanashyam Khanal, Sushanta Kumar Mahapatra, Nabaraj Gautam, Udaya Raj Paudel and Udbodh Bhandari

Agriculture, since time immemorial, has been a major sector in reducing poverty, accelerating economic activities and source of sustainability of a nation. As most of the youth in…

Abstract

Purpose

Agriculture, since time immemorial, has been a major sector in reducing poverty, accelerating economic activities and source of sustainability of a nation. As most of the youth in the 21st century are targeting the youth's career in the non-agricultural sector, attracting and involving the youths in agribusinesses is the need of the hour. In this regard, the research tries to understand the awareness and involvement of youth farmers in agripreneurship in Western Nepal.

Design/methodology/approach

Using a structured questionnaire, data were collected from both primary and secondary sources. On the basis of descriptive and inferential analysis, the ordered logit model is employed in the study. The research is based on explanatory research design through identifying farmers' awareness of agriculture entrepreneurship from 324 farmers of Bedkot Municipality, Kanchanpur, Nepal.

Findings

Study findings have shown that agricultural knowledge with overall awareness is statistically significant. Ordered logistic regression indicated that sex has somehow influenced technical and entrepreneur skills while agriculture information highly influenced education and training. The result shows that agricultural training is still the requirement of one-fourth of the farmers, whereas another quarter of farmers need subsidies.

Research limitations/implications

The study suggests that in order to enhance awareness, training, subsidy, market management and development program are widely needed. In the backdrop of declining agro-products and food security challenges, the study targets to offer an understanding to policymakers and stakeholders on addressing the dire need of agripreneurship among the youths around the world.

Originality/value

The study summarizes the state of knowledge of agripreneurship of Nepalese farmers, identifies emerging issues and policy implications and priorities for future applied research.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. 13 no. 5
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 2 March 2023

Giddeon Njamngang Angafor, Iryna Yevseyeva and Leandros Maglaras

This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security…

Abstract

Purpose

This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security posture as it adapts to remote working because of the Coronavirus 2019 (COVID-19). The pandemic forced businesses to move operations from offices to remote working. Given that this happened quickly for many, some firms had little time to factor in appropriate cyber-hygiene and incident prevention measures, thereby exposing themselves to vulnerabilities such as phishing and other scams.

Design/methodology/approach

The exercise was designed and facilitated through Microsoft Teams. The approach used included a literature review and an experiential learning method that used scenario-based, active pedagogical strategies such as case studies, simulations, role-playing and discussion-focused techniques to develop and evaluate processes and procedures used in preventing, detecting, mitigating, responding and recovering from cyber incidents.

Findings

The exercise highlighted the value of using scenario-based exercises in cyber security training. It elaborated that scenario-based incident response (IR) exercises are beneficial because well-crafted and well-executed exercises raise cyber security awareness among managers and IT professionals. Such activities with integrated operational and decision-making components enable businesses to evaluate IR and disaster recovery (DR) procedures, including communication flows, to improve decision-making at strategic levels and enhance the technical skills of cyber security personnel.

Practical implications

It maintained that the primary implication for practice is that they enhance security awareness through practical experiential, hands-on exercises such as this VIRTTX. These exercises bring together staff from across a business to evaluate existing IR/DR processes to determine if they are fit for purpose, establish existing gaps and identify strategies to prevent future threats, including during challenging circumstances such as the COVID-19 outbreak. Furthermore, the use of TTXs or TTEs for scenario-based incident response exercises was extremely useful for cyber security practice because well-crafted and well-executed exercises have been found to serve as valuable and effective tools for raising cyber security awareness among senior leadership, managers and IT professionals (Ulmanová, 2020).

Originality/value

This paper underlines the importance of practical, scenario-based cyber-IR training and reports on the experience of conducting a virtual IR/DR tabletop exercise within a large organisation.

Open Access
Article
Publication date: 30 March 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA…

4546

Abstract

Purpose

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.

Design/methodology/approach

This exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.

Findings

In this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.

Originality/value

This research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 9 April 2024

Ahmed Shehata and Metwaly Eldakar

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education…

Abstract

Purpose

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education and occupation affect individuals’ awareness, skills and perceptions of social engineering.

Design/methodology/approach

A quantitative research approach was used to survey a diverse demographic of Egyptian society. The survey was conducted in February 2023, and the participants were sourced from various Egyptian social media pages covering different topics. The collected data was analyzed using descriptive and inferential statistics, including independent samples t-test and ANOVA, to compare awareness and skills across different groups.

Findings

The study revealed that younger individuals and those with higher education tend to research social engineering more frequently. Males display a higher level of awareness but score lower in terms of social and psychological consequences as well as types of attacks when compared to females. The type of attack cannot be predicted based on age. Higher education is linked to greater awareness and ability to defend against attacks. Different occupations have varying levels of awareness, skills, and psychosocial consequences. The study emphasizes the importance of increasing awareness, education and implementing cybersecurity measures.

Originality/value

This study’s originality lies in its focus on diverse Egyptian demographics, innovative recruitment via social media, comprehensive exploration of variables, statistical rigor, practical insights for cybersecurity education and diversity in educational and occupational backgrounds.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 10 June 2024

Dhanya Pramod

The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a…

Abstract

Purpose

The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a dire need to provide cybersecurity awareness most effectively. Gamification-based platforms have evolved to make cybersecurity education more engaging and effective. This study explores the gamification platforms available for cybersecurity training and awareness, the extent to which they are used and their benefits and challenges.

Design/methodology/approach

PRISMA 2020 was used to conduct the systematic literature review.

Findings

The study comprehends the game design elements and their role in the effectiveness of cybersecurity training and awareness. The study unveils that traditional education methodologies are insignificant in cybersecurity awareness, and gamification-based platforms are more beneficial. The paper summarizes the implications of the findings and further postulates future research directions.

Originality/value

This work comprehends the various forms of gamification platforms and frameworks available for cybersecurity training and will motivate further development of gamification platforms. This paper will help academia, private and public organizations and game designers enhance their gamification-based cybersecurity education interventions.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 9 September 2024

Michael Wayne Davidson, John Parnell and Shaun Wesley Davenport

The purpose of this study is to address a critical gap in enterprise resource planning (ERP) implementation process for small and medium-sized enterprises (SMEs) by acknowledging…

Abstract

Purpose

The purpose of this study is to address a critical gap in enterprise resource planning (ERP) implementation process for small and medium-sized enterprises (SMEs) by acknowledging and countering cognitive biases through a cognitive bias awareness matrix model. Cognitive biases such as temporal discounting and optimism bias often skew decision-making, leading SMEs to prioritize short-term benefits over long-term sustainability or underestimate the challenges involved in ERP implementation. These biases can result in costly missteps, underutilizing ERP systems and project failure. This study enhances decision-making processes in ERP adoption by introducing a matrix that allows SMEs to self-assess their level of awareness and proactivity when addressing cognitive biases in decision-making.

Design/methodology/approach

The design and methodology of this research involves a structured approach using the problem-intervention-comparison-outcome-context (PICOC) framework to systematically explore the influence of cognitive biases on ERP decision-making in SMEs. The study integrates a comprehensive literature review, empirical data analysis and case studies to develop the Cognitive Bias Awareness Matrix. This matrix enables SMEs to self-assess their susceptibility to biases like temporal discounting and optimism bias, promoting proactive strategies for more informed ERP decision-making. The approach is designed to enhance SMEs’ awareness and management of cognitive biases, aiming to improve ERP implementation success rates and operational efficiency.

Findings

The findings underscore the profound impact of cognitive biases and information asymmetry on ERP system selection and implementation in SMEs. Temporal discounting often leads decision-makers to favor immediate cost-saving solutions, potentially resulting in higher long-term expenses due to the lack of scalability. Optimism bias tends to cause underestimating risks and overestimating benefits, leading to insufficient planning and resource allocation. Furthermore, information asymmetry between ERP vendors and SME decision-makers exacerbates these biases, steering choices toward options that may not fully align with the SME’s long-term interests.

Research limitations/implications

The study’s primary limitation is its concentrated focus on temporal discounting and optimism bias, potentially overlooking other cognitive biases that could impact ERP decision-making in SMEs. The PICOC framework, while structuring the research effectively, may restrict the exploration of broader organizational and technological factors influencing ERP success. Future research should expand the range of cognitive biases and explore additional variables within the ERP implementation process. Incorporating a broader array of behavioral economic principles and conducting longitudinal studies could provide a more comprehensive understanding of the challenges and dynamics in ERP adoption and utilization in SMEs.

Practical implications

The practical implications of this study are significant for SMEs implementing ERP systems. By adopting the Cognitive Bias Awareness Matrix, SMEs can identify and mitigate cognitive biases like temporal discounting and optimism bias, leading to more rational and effective decision-making. This tool enables SMEs to shift focus from short-term gains to long-term strategic benefits, improving ERP system selection, implementation and utilization. Regular use of the matrix can help prevent costly implementation errors and enhance operational efficiency. Additionally, training programs designed around the matrix can equip SME personnel with the skills to recognize and address biases, fostering a culture of informed decision-making.

Social implications

The study underscores significant social implications by enhancing decision-making within SMEs through cognitive bias awareness. By mitigating biases like temporal discounting and optimism bias, SMEs can make more socially responsible decisions, aligning their business practices with long-term sustainability and ethical standards. This shift improves operational outcomes and promotes a culture of accountability and transparency. The widespread adoption of the Cognitive Bias Awareness Matrix can lead to a more ethical business environment, where decisions are made with a deeper understanding of their long-term impacts on employees, customers and the broader community, fostering trust and sustainability in the business ecosystem.

Originality/value

This research introduces the original concept of the Cognitive Bias Awareness Matrix, a novel tool designed specifically for SMEs to evaluate and mitigate cognitive biases in ERP decision-making. This matrix fills a critical gap in the existing literature by providing a structured, actionable framework that effectively empowers SMEs to recognize and address biases such as temporal discounting and optimism bias. Its practical application promises to enhance decision-making processes and increase the success rates of ERP implementations. This contribution is valuable to behavioral economics and information systems, offering a unique approach to integrating cognitive insights into business technology strategies.

Details

Journal of Ethics in Entrepreneurship and Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2633-7436

Keywords

Article
Publication date: 8 November 2021

Teslim Bamidele Balogun, Olukayode Olusola Awonuga and Rukaya Abowen-Dake

This study aims to investigate digital technology (DT) competencies, training and awareness amongst Black Asian Minority Ethnic (BAME) construction students in the UK.

Abstract

Purpose

This study aims to investigate digital technology (DT) competencies, training and awareness amongst Black Asian Minority Ethnic (BAME) construction students in the UK.

Design/methodology/approach

This study uses a quantitative online survey to investigate both BAME Construction Undergraduates Graduate Students (CUGS) and staff studying on and teaching on Construction programmes. The investigation examined their opinions as to their own awareness of their competencies and training regarding DT.

Findings

Findings indicate that BAME CUGS were mostly “very proficient” in the use of basic DT, such as required to complete an authentic assessment that typifies a real-life scenario. For example, sending and receiving emails, Excel, Word, computer literacy/basic IT skills, browsing searching materials, PowerPoint, specialist IT skills, mobile devices, tablet and social media handles. However, findings revealed that training awareness and competencies in new DT is shallow, and BAME CUGS are probably not ready for the digitalised construction world. Respondents were mainly within the “probably aware” range, and very few were within the “definitely aware” range, on the Likert scale adopted. New DTs that fell within the “definitely aware” range are BIM, offsite construction and manufacturing, 3D printing, cloud computing and collaboration.

Research limitations/implications

It is acknowledged that expanding the sample size to other universities and exploring BAME industry professionals’ narratives could further enrich the discussion. However, these limitations did not impact the robust practical and theoretical implications provided to CUGS, Higher Education (HE)sectors, University staff and industry emerging from the analysis and findings achieved in the study. Still, it is being recommended for future work to consider.

Originality/value

The study provides valuable recommendations helpful to HE institutions, industry and government. Recommendations provided include a need to review and update the current curriculum, robust partnership between academia and industry, increase government funding, upskilling and training staff in the new DT.

Details

Journal of Engineering, Design and Technology , vol. 21 no. 6
Type: Research Article
ISSN: 1726-0531

Keywords

1 – 10 of over 9000