Search results
1 – 10 of 557Godwin Thomas and Mary-Jane Sule
This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…
Abstract
Purpose
This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.
Design/methodology/approach
Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.
Findings
Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.
Originality/value
This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.
Details
Keywords
Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…
Abstract
Purpose
The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.
Design/methodology/approach
MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.
Findings
This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.
Research limitations/implications
The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.
Originality/value
In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.
Details
Keywords
Joan Mileski, Christopher Clott and Cassia Bomer Galvao
The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security…
Abstract
Purpose
The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses.
Design/methodology/approach
The authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port.
Findings
The authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering.
Originality/value
Further, this inconsistency may require further policy regulation to properly address cyber information in a port.
Details
Keywords
Jinghuan Zhang, Shan Wang, Wenfeng Zheng and Lei Wang
By drawing on the research paradigm of collective action that occurs in physical space, the present study aims to explore the antecedent predictors of network social mobilization…
Abstract
Purpose
By drawing on the research paradigm of collective action that occurs in physical space, the present study aims to explore the antecedent predictors of network social mobilization – feeling of injustice – and discuss the emotional mechanism of this prediction: mediating effect of anger and resentment.
Design/methodology/approach
Micro-blog postings about network social mobilization were collected to develop the dictionary of codes of fairness, anger and resentment. Then, according to the dictionary, postings on Sina Weibo were coded and analyzed.
Findings
The feeling of injustice predicted network social mobilization directly. The predictive value was 27% and 33%, respectively during two analyses. The feeling of injustice also predicted social mobilization indirectly via anger and resentment. In other words, anger and resentment account for the active mechanism in which the feeling of injustice predicts network social mobilization. Mediating effect value was 29.63% and 33.33% respectively.
Research limitations/implications
This study is our first exploration to use python language to collect data from human natural language pointing on micro-blog, a large number of comments of netizen about certain topic were crawled, but a small portion of the comments could be coded into analyzable data, which results in a doubt of the reliability of the study. Therefore, we should put the established model under further testing.
Practical implications
In the cyberspace, this study confirms the mechanism of network social mobilization, expands and enriches the research on social mobilization and deepens the understanding of social mobilization.
Social implications
This study provides an empirical evidence to understand the network social mobilization, and it gives us the clue to control the process of network social mobilization.
Originality/value
This study uses the Python language to write Web crawlers to obtain microblog data and analyze the microblog content for word segmentation and matching thesaurus. It has certain innovation.
Details
Keywords
Abstract
Details
Keywords
To realise the shared development of the digital economy, people need to transcend the capital logic and advocate the logic of cooperative development, i.e. “co-construction…
Abstract
Purpose
To realise the shared development of the digital economy, people need to transcend the capital logic and advocate the logic of cooperative development, i.e. “co-construction, benefit-sharing and co-governance”. This study aims to discuss the aforementioned statement.
Design/methodology/approach
Platform economy is a new economic form produced by the transformation of the social production patterns in the era of digital capitalism. In the neo-imperialist stage, a new stage of capitalist development, capital logic promotes the global expansion of the platform economy and influences its development process, organisational form, contradictions and dilemmas and internal transcendence. Having the spatiotemporal chain of capital circulation repaired, the globalisation of the platform economy is reshaping how the means of production are combined with labour, affecting the local changes in the general relations of production and “international relations of production”.
Findings
In the accumulation of digital capitalism, the social contradictions and fundamental contradictions in the capitalist world have been further intensified, making exploitation, income distribution gap, monopoly and other problems increasingly severe. The imbalance and inequality in the global development of the digital economy are increasingly prominent.
Originality/value
Regarding the global governance of the digital economy, China, as a major responsible country, will strive to encourage all countries to co-build a community with a shared future in cyberspace. In the new international development pattern of digital economy globalisation, China must take effective measures to actively safeguard its national security and development interests to meet specific challenges.
Details
Keywords
Abstract
Details
Keywords
Abstract
Details