Search results

1 – 10 of 34
Article
Publication date: 16 April 2024

Ashlyn Tom and Alice Kim

To assess which partnerships were most critical during the recovery planning process following Hurricanes Maria and Irma. We discuss the roles and impact of different types of…

Abstract

Purpose

To assess which partnerships were most critical during the recovery planning process following Hurricanes Maria and Irma. We discuss the roles and impact of different types of partners, barriers and facilitators to partnerships and lessons in collaboration during the development of the economic and disaster recovery plan for Puerto Rico.

Design/methodology/approach

The Homeland Security Operational Analysis Center (HSOAC) was tasked with assisting the Puerto Rican government with an assessment of damages from Hurricanes Maria and Irma and the development of the Recovery Plan. During the process, a small team compiled and coded a database of meetings with non-HSOAC partners. The team was divided into sector teams that mirrored FEMA’s Recovery Support Functions. Each sector completed two surveys identifying high impact partners and their roles and contributions, as well as barriers and facilitators to partnerships.

Findings

A total of 1,382 engagements were recorded across all sectors over seven months. The most frequently identified high impact partners were federal and Puerto Rican governmental organizations partners. NGOs and nonprofits were noted as key partners in obtaining community perspective. Sector teams cited a lack of trust and difficulty identifying partners as barriers to partner engagement. Given the expedited nature of disaster response, establishing partnerships before disasters occur may help facilitate community input. Early networking, increased transparency and defining roles and responsibilities may increase trust and effectiveness among partnerships.

Originality/value

To our knowledge, this is one of the few studies that quantifies and illustrates the partnerships formed and their contributions during recovery planning, and lessons learned.

Details

Disaster Prevention and Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0965-3562

Keywords

Expert briefing
Publication date: 18 April 2024

Millions of Venezuelans have fled their homeland in recent years as living standards have deteriorated rapidly, with the vast majority settling in other South American nations…

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

157

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 19 April 2024

Lars Mjøset, Roel Meijer, Nils Butenschøn and Kristian Berg Harpviken

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial…

Abstract

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial, populist and democratic pacts, suitable for analysis of state formation and nation-building through to the present period. The framework relies on historical institutionalism. The methodology, however, is Rokkan's. The initial conceptual analysis also specifies differences between European and the Middle Eastern state formation processes. It is followed by a brief and selective discussion of historical preconditions. Next, the method of plotting singular cases into conceptual-typological maps is applied to 20 cases in the Greater Middle East (including Afghanistan, Iran and Turkey). For reasons of space, the empirical analysis is limited to the colonial period (1870s to the end of World War 1). Three typologies are combined into one conceptual-typological map of this period. The vertical left-hand axis provides a composite typology that clarifies cultural-territorial preconditions. The horizontal axis specifies transformations of the region's agrarian class structures since the mid-19th century reforms. The right-hand vertical axis provides a four-layered typology of processes of external intervention. A final section presents selected comparative case reconstructions. To the authors' knowledge, this is the first time such a Rokkan-style conceptual-typological map has been constructed for a non-European region.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7169

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Article
Publication date: 23 April 2024

Abdullah S. Karaman, Ali Uyar, Rim Boussaada and Majdi Karmani

Prior studies mostly tested the association between carbon emissions and firm value in certain contexts. This study aims to advance the existing literature by concentrating on…

Abstract

Purpose

Prior studies mostly tested the association between carbon emissions and firm value in certain contexts. This study aims to advance the existing literature by concentrating on three indicators of greening in corporations namely resource use, emissions and eco-innovation, and examining their value relevance in the stock market at the global level. Furthermore, we deepen the investigation by exploring the moderating role of eco-innovation and the CSR committee between greening in corporations and market value.

Design/methodology/approach

The data for the study were retrieved from the Thomson Reuters Eikon database for the years between 2002 and 2019 and contain 17,961 firm-year observations which are analyzed through fixed-effects regression.

Findings

The results reveal that while resource usage is viewed as value-relevant by the market, the emissions and eco-innovation are not. However, despite eco-innovation per se not being value-relevant, its interaction with resource usage and emissions is value-relevant. Furthermore, CSR committees undertake a very critical role in translating greening practices into market value.

Research limitations/implications

While the results for emissions support the cost-concerned school, the findings for resource usage confirm the value creation school. Furthermore, the interaction effect of eco-innovation and CSR committee confirms the resource-based theory and stakeholder theory, respectively.

Practical implications

Investors regard eco-innovation-induced pro-environmental behaviors as value-relevant. These results propose firms replace eco-innovation at the focal point in developing environmental strategies and connecting other greening efforts to it. Moreover, CSR committees are critical to corporations in translating greening practices into firm value by developing and implementing disclosure and communication strategies.

Originality/value

The study’s originality stems from investigating the synergetic effect that eco-innovation and CSR committees generate in translating greening practices to greater market value at a global scale.

Details

Journal of Applied Accounting Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0967-5426

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Case study
Publication date: 24 April 2024

Frank Warnock, James C. Wheat, Justin Drake, Mitch Debrah and Archie Hungwe

South Africa had formally introduced a policy of inflation targeting (IT) in February 2000. By December 2001, the governor of the South African Reserve Bank, after reading the…

Abstract

South Africa had formally introduced a policy of inflation targeting (IT) in February 2000. By December 2001, the governor of the South African Reserve Bank, after reading the latest statistics, was concerned with the disappointing economic data. Economic activity had slowed drastically, to the point that the country appeared to be heading for a recession. The gloomy statistics forced the governor to consider whether the country had pursued the right policy. Persistently high unemployment, one legacy of the apartheid era, meant that South Africa did not have the luxury of waiting for new policies to bear fruit. With the inflation forecast to exceed the mandated target, the governor would have to tighten monetary policy, which would further restrict investment. Was it is time for South Africa to change course?

Details

Darden Business Publishing Cases, vol. no.
Type: Case Study
ISSN: 2474-7890
Published by: University of Virginia Darden School Foundation

Keywords

Article
Publication date: 11 October 2023

Ali Uyar, Ali Meftah Gerged, Cemil Kuzey and Abdullah S. Karaman

This study aims to guide firms in emerging markets on whether corporate social responsibility (CSR) engagement facilitates their access to debt with the moderation of asset…

Abstract

Purpose

This study aims to guide firms in emerging markets on whether corporate social responsibility (CSR) engagement facilitates their access to debt with the moderation of asset structure and firm performance. Considering the moderating effect analysis, this study explores the substitutive or complementary effect of these two contingencies on CSR-oriented firms in accessing debt financing.

Design/methodology/approach

Drawing on data collected for 16 emerging markets between 2008 and 2019, this study runs country–industry–year fixed-effects regression.

Findings

This study finds that CSR performance and reporting facilitate access to debt in emerging markets. However, CSR performance does not have an inverted U-shaped influence on firms’ access to debt financing. The moderation analysis of this study shows that asset tangibility has a negative moderating effect on the link between CSR engagements (i.e. both CSR performance and reporting) and access to debt, confirming a substitutive relationship between asset tangibility and CSR engagements in accessing debt. In contrast, firm performance is positively moderating the nexus between CSR engagement proxies and access to debt, which confirms a complementary type of relationship between firm performance and CSR engagements in accessing debt.

Practical implications

The empirical evidence of this study implies that creditors critically consider CSR engagements of firms in the loan-granting decision process. Similarly, the inverted U-shaped relationship between CSR and access to debt implies that there is an optimal level of CSR engagement creditors might consider in their decision. Likewise, the moderating effects analysis highlights that asset tangibility and firm performance are two conditions under which CSR performance and reporting are linked to access to debt.

Originality/value

Emerging countries are a different set of countries than developed ones; they have high growth rates and hence need financing, have a weaker institutional environment and have weaker stakeholder power. These particularities motivated the authors to conduct a separate study focusing on CSR and debt financing links drawing on a wide range of emerging countries. Thus, this study adds to the ongoing debate by examining the conditions under which CSR-oriented firms can access debt financing in emerging economies.

Details

Review of Accounting and Finance, vol. 23 no. 2
Type: Research Article
ISSN: 1475-7702

Keywords

Article
Publication date: 16 April 2024

Cemil Kuzey, Amal Hamrouni, Ali Uyar and Abdullah S. Karaman

This study aims to investigate whether social reputation via corporate social responsibility (CSR) awarding facilitates access to debt and decreases the cost of debt and whether…

Abstract

Purpose

This study aims to investigate whether social reputation via corporate social responsibility (CSR) awarding facilitates access to debt and decreases the cost of debt and whether governance mechanisms moderate this relationship.

Design/methodology/approach

The sample covers the period between 2002 and 2021, during which CSR award data were available in the Thomson Reuters Eikon/Refinitiv database. The empirical models are based on country, industry and year fixed-effects regression.

Findings

While the main findings produced an insignificant result for access to debt, they indicated strong evidence for the positive relationship between CSR awarding and the cost of debt. Moreover, the moderating effect highlights that while the sustainability committee helps CSR-awarded companies access debt more easily, independent directors help firms decrease the cost of debt via CSR awarding. Furthermore, the results differ between the US and the non-US samples, earlier and recent periods, high- and low-leverage firms and large and small firms.

Originality/value

For the first time, to the best of the authors’ knowledge, the authors assess whether social reputation via CSR awarding facilitates access to debt and decreases the cost of debt in an international and cross-industry sample. Little is known about the effect of social reputation on loan contracting, although social reputation conveys broader information that goes beyond the firm’s internal (performance) and external (reporting) CSR practices. The authors also draw attention to the differing roles of distinct governance mechanisms in leveraging social reputation for loan contracting.

Details

International Journal of Accounting & Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1834-7649

Keywords

1 – 10 of 34