Search results
1 – 10 of 34Ashlyn Tom and Alice Kim
To assess which partnerships were most critical during the recovery planning process following Hurricanes Maria and Irma. We discuss the roles and impact of different types of…
Abstract
Purpose
To assess which partnerships were most critical during the recovery planning process following Hurricanes Maria and Irma. We discuss the roles and impact of different types of partners, barriers and facilitators to partnerships and lessons in collaboration during the development of the economic and disaster recovery plan for Puerto Rico.
Design/methodology/approach
The Homeland Security Operational Analysis Center (HSOAC) was tasked with assisting the Puerto Rican government with an assessment of damages from Hurricanes Maria and Irma and the development of the Recovery Plan. During the process, a small team compiled and coded a database of meetings with non-HSOAC partners. The team was divided into sector teams that mirrored FEMA’s Recovery Support Functions. Each sector completed two surveys identifying high impact partners and their roles and contributions, as well as barriers and facilitators to partnerships.
Findings
A total of 1,382 engagements were recorded across all sectors over seven months. The most frequently identified high impact partners were federal and Puerto Rican governmental organizations partners. NGOs and nonprofits were noted as key partners in obtaining community perspective. Sector teams cited a lack of trust and difficulty identifying partners as barriers to partner engagement. Given the expedited nature of disaster response, establishing partnerships before disasters occur may help facilitate community input. Early networking, increased transparency and defining roles and responsibilities may increase trust and effectiveness among partnerships.
Originality/value
To our knowledge, this is one of the few studies that quantifies and illustrates the partnerships formed and their contributions during recovery planning, and lessons learned.
Details
Keywords
Millions of Venezuelans have fled their homeland in recent years as living standards have deteriorated rapidly, with the vast majority settling in other South American nations…
Details
DOI: 10.1108/OXAN-DB286469
ISSN: 2633-304X
Keywords
Geographic
Topical
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…
Abstract
Purpose
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.
Design/methodology/approach
This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.
Findings
The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.
Social implications
The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.
Originality/value
This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.
Details
Keywords
Lars Mjøset, Roel Meijer, Nils Butenschøn and Kristian Berg Harpviken
This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial…
Abstract
This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial, populist and democratic pacts, suitable for analysis of state formation and nation-building through to the present period. The framework relies on historical institutionalism. The methodology, however, is Rokkan's. The initial conceptual analysis also specifies differences between European and the Middle Eastern state formation processes. It is followed by a brief and selective discussion of historical preconditions. Next, the method of plotting singular cases into conceptual-typological maps is applied to 20 cases in the Greater Middle East (including Afghanistan, Iran and Turkey). For reasons of space, the empirical analysis is limited to the colonial period (1870s to the end of World War 1). Three typologies are combined into one conceptual-typological map of this period. The vertical left-hand axis provides a composite typology that clarifies cultural-territorial preconditions. The horizontal axis specifies transformations of the region's agrarian class structures since the mid-19th century reforms. The right-hand vertical axis provides a four-layered typology of processes of external intervention. A final section presents selected comparative case reconstructions. To the authors' knowledge, this is the first time such a Rokkan-style conceptual-typological map has been constructed for a non-European region.
Details
Keywords
Hedaia-t-Allah Nabil Abd Al Ghaffar
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Abstract
Purpose
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Design/methodology/approach
The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.
Findings
The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.
Practical implications
Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.
Originality/value
The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.
Details
Keywords
Abdullah S. Karaman, Ali Uyar, Rim Boussaada and Majdi Karmani
Prior studies mostly tested the association between carbon emissions and firm value in certain contexts. This study aims to advance the existing literature by concentrating on…
Abstract
Purpose
Prior studies mostly tested the association between carbon emissions and firm value in certain contexts. This study aims to advance the existing literature by concentrating on three indicators of greening in corporations namely resource use, emissions and eco-innovation, and examining their value relevance in the stock market at the global level. Furthermore, we deepen the investigation by exploring the moderating role of eco-innovation and the CSR committee between greening in corporations and market value.
Design/methodology/approach
The data for the study were retrieved from the Thomson Reuters Eikon database for the years between 2002 and 2019 and contain 17,961 firm-year observations which are analyzed through fixed-effects regression.
Findings
The results reveal that while resource usage is viewed as value-relevant by the market, the emissions and eco-innovation are not. However, despite eco-innovation per se not being value-relevant, its interaction with resource usage and emissions is value-relevant. Furthermore, CSR committees undertake a very critical role in translating greening practices into market value.
Research limitations/implications
While the results for emissions support the cost-concerned school, the findings for resource usage confirm the value creation school. Furthermore, the interaction effect of eco-innovation and CSR committee confirms the resource-based theory and stakeholder theory, respectively.
Practical implications
Investors regard eco-innovation-induced pro-environmental behaviors as value-relevant. These results propose firms replace eco-innovation at the focal point in developing environmental strategies and connecting other greening efforts to it. Moreover, CSR committees are critical to corporations in translating greening practices into firm value by developing and implementing disclosure and communication strategies.
Originality/value
The study’s originality stems from investigating the synergetic effect that eco-innovation and CSR committees generate in translating greening practices to greater market value at a global scale.
Details
Keywords
Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia
The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.
Abstract
Purpose
The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.
Design/methodology/approach
This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?
Findings
In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.
Research limitations/implications
This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.
Practical implications
Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.
Social implications
Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.
Originality/value
Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.
Details
Keywords
Frank Warnock, James C. Wheat, Justin Drake, Mitch Debrah and Archie Hungwe
South Africa had formally introduced a policy of inflation targeting (IT) in February 2000. By December 2001, the governor of the South African Reserve Bank, after reading the…
Abstract
South Africa had formally introduced a policy of inflation targeting (IT) in February 2000. By December 2001, the governor of the South African Reserve Bank, after reading the latest statistics, was concerned with the disappointing economic data. Economic activity had slowed drastically, to the point that the country appeared to be heading for a recession. The gloomy statistics forced the governor to consider whether the country had pursued the right policy. Persistently high unemployment, one legacy of the apartheid era, meant that South Africa did not have the luxury of waiting for new policies to bear fruit. With the inflation forecast to exceed the mandated target, the governor would have to tighten monetary policy, which would further restrict investment. Was it is time for South Africa to change course?
Details
Keywords
Ali Uyar, Ali Meftah Gerged, Cemil Kuzey and Abdullah S. Karaman
This study aims to guide firms in emerging markets on whether corporate social responsibility (CSR) engagement facilitates their access to debt with the moderation of asset…
Abstract
Purpose
This study aims to guide firms in emerging markets on whether corporate social responsibility (CSR) engagement facilitates their access to debt with the moderation of asset structure and firm performance. Considering the moderating effect analysis, this study explores the substitutive or complementary effect of these two contingencies on CSR-oriented firms in accessing debt financing.
Design/methodology/approach
Drawing on data collected for 16 emerging markets between 2008 and 2019, this study runs country–industry–year fixed-effects regression.
Findings
This study finds that CSR performance and reporting facilitate access to debt in emerging markets. However, CSR performance does not have an inverted U-shaped influence on firms’ access to debt financing. The moderation analysis of this study shows that asset tangibility has a negative moderating effect on the link between CSR engagements (i.e. both CSR performance and reporting) and access to debt, confirming a substitutive relationship between asset tangibility and CSR engagements in accessing debt. In contrast, firm performance is positively moderating the nexus between CSR engagement proxies and access to debt, which confirms a complementary type of relationship between firm performance and CSR engagements in accessing debt.
Practical implications
The empirical evidence of this study implies that creditors critically consider CSR engagements of firms in the loan-granting decision process. Similarly, the inverted U-shaped relationship between CSR and access to debt implies that there is an optimal level of CSR engagement creditors might consider in their decision. Likewise, the moderating effects analysis highlights that asset tangibility and firm performance are two conditions under which CSR performance and reporting are linked to access to debt.
Originality/value
Emerging countries are a different set of countries than developed ones; they have high growth rates and hence need financing, have a weaker institutional environment and have weaker stakeholder power. These particularities motivated the authors to conduct a separate study focusing on CSR and debt financing links drawing on a wide range of emerging countries. Thus, this study adds to the ongoing debate by examining the conditions under which CSR-oriented firms can access debt financing in emerging economies.
Details
Keywords
Cemil Kuzey, Amal Hamrouni, Ali Uyar and Abdullah S. Karaman
This study aims to investigate whether social reputation via corporate social responsibility (CSR) awarding facilitates access to debt and decreases the cost of debt and whether…
Abstract
Purpose
This study aims to investigate whether social reputation via corporate social responsibility (CSR) awarding facilitates access to debt and decreases the cost of debt and whether governance mechanisms moderate this relationship.
Design/methodology/approach
The sample covers the period between 2002 and 2021, during which CSR award data were available in the Thomson Reuters Eikon/Refinitiv database. The empirical models are based on country, industry and year fixed-effects regression.
Findings
While the main findings produced an insignificant result for access to debt, they indicated strong evidence for the positive relationship between CSR awarding and the cost of debt. Moreover, the moderating effect highlights that while the sustainability committee helps CSR-awarded companies access debt more easily, independent directors help firms decrease the cost of debt via CSR awarding. Furthermore, the results differ between the US and the non-US samples, earlier and recent periods, high- and low-leverage firms and large and small firms.
Originality/value
For the first time, to the best of the authors’ knowledge, the authors assess whether social reputation via CSR awarding facilitates access to debt and decreases the cost of debt in an international and cross-industry sample. Little is known about the effect of social reputation on loan contracting, although social reputation conveys broader information that goes beyond the firm’s internal (performance) and external (reporting) CSR practices. The authors also draw attention to the differing roles of distinct governance mechanisms in leveraging social reputation for loan contracting.
Details