Search results

1 – 10 of 557
Open Access
Article
Publication date: 3 November 2022

Godwin Thomas and Mary-Jane Sule

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…

1722

Abstract

Purpose

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.

Design/methodology/approach

Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.

Findings

Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.

Originality/value

This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2266

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Content available
Article
Publication date: 21 November 2018

Joan Mileski, Christopher Clott and Cassia Bomer Galvao

The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security…

3867

Abstract

Purpose

The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses.

Design/methodology/approach

The authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port.

Findings

The authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering.

Originality/value

Further, this inconsistency may require further policy regulation to properly address cyber information in a port.

Details

Maritime Business Review, vol. 3 no. 4
Type: Research Article
ISSN: 2397-3757

Keywords

Open Access
Article
Publication date: 16 July 2019

Jinghuan Zhang, Shan Wang, Wenfeng Zheng and Lei Wang

By drawing on the research paradigm of collective action that occurs in physical space, the present study aims to explore the antecedent predictors of network social mobilization…

1028

Abstract

Purpose

By drawing on the research paradigm of collective action that occurs in physical space, the present study aims to explore the antecedent predictors of network social mobilization – feeling of injustice – and discuss the emotional mechanism of this prediction: mediating effect of anger and resentment.

Design/methodology/approach

Micro-blog postings about network social mobilization were collected to develop the dictionary of codes of fairness, anger and resentment. Then, according to the dictionary, postings on Sina Weibo were coded and analyzed.

Findings

The feeling of injustice predicted network social mobilization directly. The predictive value was 27% and 33%, respectively during two analyses. The feeling of injustice also predicted social mobilization indirectly via anger and resentment. In other words, anger and resentment account for the active mechanism in which the feeling of injustice predicts network social mobilization. Mediating effect value was 29.63% and 33.33% respectively.

Research limitations/implications

This study is our first exploration to use python language to collect data from human natural language pointing on micro-blog, a large number of comments of netizen about certain topic were crawled, but a small portion of the comments could be coded into analyzable data, which results in a doubt of the reliability of the study. Therefore, we should put the established model under further testing.

Practical implications

In the cyberspace, this study confirms the mechanism of network social mobilization, expands and enriches the research on social mobilization and deepens the understanding of social mobilization.

Social implications

This study provides an empirical evidence to understand the network social mobilization, and it gives us the clue to control the process of network social mobilization.

Originality/value

This study uses the Python language to write Web crawlers to obtain microblog data and analyze the microblog content for word segmentation and matching thesaurus. It has certain innovation.

Details

International Journal of Crowd Science, vol. 3 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Content available
Article
Publication date: 1 May 2009

Andy Miah and Emma Rich

227

Abstract

Details

Journal of Information, Communication and Ethics in Society, vol. 7 no. 2/3
Type: Research Article
ISSN: 1477-996X

Keywords

Content available
Article
Publication date: 1 February 2002

Melanie Chan

246

Abstract

Details

Foresight, vol. 4 no. 1
Type: Research Article
ISSN: 1463-6689

Open Access
Article
Publication date: 3 November 2022

Wenlong Han

To realise the shared development of the digital economy, people need to transcend the capital logic and advocate the logic of cooperative development, i.e. “co-construction…

Abstract

Purpose

To realise the shared development of the digital economy, people need to transcend the capital logic and advocate the logic of cooperative development, i.e. “co-construction, benefit-sharing and co-governance”. This study aims to discuss the aforementioned statement.

Design/methodology/approach

Platform economy is a new economic form produced by the transformation of the social production patterns in the era of digital capitalism. In the neo-imperialist stage, a new stage of capitalist development, capital logic promotes the global expansion of the platform economy and influences its development process, organisational form, contradictions and dilemmas and internal transcendence. Having the spatiotemporal chain of capital circulation repaired, the globalisation of the platform economy is reshaping how the means of production are combined with labour, affecting the local changes in the general relations of production and “international relations of production”.

Findings

In the accumulation of digital capitalism, the social contradictions and fundamental contradictions in the capitalist world have been further intensified, making exploitation, income distribution gap, monopoly and other problems increasingly severe. The imbalance and inequality in the global development of the digital economy are increasingly prominent.

Originality/value

Regarding the global governance of the digital economy, China, as a major responsible country, will strive to encourage all countries to co-build a community with a shared future in cyberspace. In the new international development pattern of digital economy globalisation, China must take effective measures to actively safeguard its national security and development interests to meet specific challenges.

Details

China Political Economy, vol. 5 no. 1
Type: Research Article
ISSN: 2516-1652

Keywords

Content available
Article
Publication date: 1 February 2005

Karin McGuirk

234

Abstract

Details

The Electronic Library, vol. 23 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Content available
Article
Publication date: 1 August 2003

Ina Fourie

118

Abstract

Details

Online Information Review, vol. 27 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

1 – 10 of 557