Search results

1 – 10 of 14
Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

157

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 2 May 2024

Amanuel Elias

Research indicates a long historical connection between racism and nationalist ideologies. This connection has been highlighted in the resurgence of exclusionary nationalism in…

Abstract

Research indicates a long historical connection between racism and nationalist ideologies. This connection has been highlighted in the resurgence of exclusionary nationalism in recent years, across many multicultural societies. This chapter discusses the notions of race, ethnicity and nation, and critically examines how racism shapes contemporary manifestations of nationalist discourse across the world. It explores the historical role of settler-colonialism, imperial expansions and the capitalist development in shaping the racial/ethnic aspect of nationalist development. Moreover, it provides an analysis of the interconnections between the racialisation of minorities, exclusionary ideologies and the consolidation of ethno-nationalist tropes. This chapter further considers the impact of demographic changes in reinforcing anti-migrant exclusionary sentiments. This is examined in connection with emerging nativist discourse, exploring how xenophobic racism has shaped and is shaped by nostalgic nationalism based on the sanitisation of the legacies of Empire and colonialism.

Details

Racism and Anti-Racism Today
Type: Book
ISBN: 978-1-83753-512-5

Keywords

Expert briefing
Publication date: 29 April 2024

Support from Washington helped President Bernardo Arevalo take power in January, resetting relations after a period of strain under former President Alejandro Giammattei…

Article
Publication date: 30 April 2024

Hirusheekesan Selvanesan and Navodana Rodrigo

Despite the unique features and potential applications in various industries, widespread blockchain adoption is hindered for several reasons. One of them is the lack of government…

Abstract

Purpose

Despite the unique features and potential applications in various industries, widespread blockchain adoption is hindered for several reasons. One of them is the lack of government regulations regarding blockchain and cryptocurrencies. However, a deliberate preliminary analysis of the policy initiatives by various jurisdictions proved otherwise, and a lack of sound academic literature on the policy initiatives on blockchain worldwide was evident. Addressing this gap, this study aims to summarize the policy initiatives of jurisdictions around the world, assessing if governments do not enact many regulations.

Design/methodology/approach

A systematic literature review was adopted in this study, in which the authors shortlisted a set of research papers and policy reports using several selection criteria and a screening process.

Findings

It was found that numerous policy initiatives have been enacted by governments worldwide, and blockchain applications are also being piloted or practiced successfully in several nations. It was also evident that governments are reluctant to accept cryptocurrencies as legal tender while embracing their underlying technology, blockchain.

Originality/value

To the best of the authors’ knowledge, this paper appears to be one of the first attempts to summarize the blockchain policy initiatives contributing to the body of knowledge on blockchain adoption.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Book part
Publication date: 6 May 2024

Emad M. Hashem Otri, Reza Kouhy, Salem Eltkhtash and Christopher Tribble

Corporate Social Responsibility (CSR) Implementation and Disclosure in the Banking Sector: the case of banks with Islamic identity in Syria. This study aims to explore Corporate…

Abstract

Corporate Social Responsibility (CSR) Implementation and Disclosure in the Banking Sector: the case of banks with Islamic identity in Syria. This study aims to explore Corporate Social Responsibility Disclosure (CSRD) in Syrian banks which have an Islamic identity, investigating their motivations when implementing and disclosing CSR and the challenges banks have faced. This study employed content analysis to extract knowledge from 33 annual reports published by three banks which have Islamic identity in Syria over the period 2008–2020. Semi-structured interviews were then conducted with five participants who are aware of CSRD policy in the banks in the sample, in order to gain a fuller understanding of their motivations in relation to CSR and any challenges they faced. This article draws on the overlap between Stakeholder and Legitimacy theories in order to explain the motivations of the banks in question. The study found that banks which have an Islamic identity increased their levels of CSR implementation during the conflict crisis but were not publishing details on these activities because of a concern regarding the Islamic modesty around charitable actions and to avoid upsetting the sensibility of beneficiaries. Interviewees commented that in the time of conflict crisis, many Syrians needed relief and support. Because of this, banks in our research sample decided to take responsibility to lessen the negative impact of the conflict crisis on the Syrian community. In addition, the analysis revealed that banks engaged with Environment and Human Right issues after 2013 because they wanted to fulfil the requirements of their national partners.

Details

The Emerald Handbook of Ethical Finance and Corporate Social Responsibility
Type: Book
ISBN: 978-1-80455-406-7

Keywords

Open Access
Article
Publication date: 7 September 2023

Sten Torpan, Sten Hansson, Kati Orru, Mark Rhinard, Lucia Savadori, Pirjo Jukarainen, Tor-Olav Nævestad, Sunniva Frislid Meyer, Abriel Schieffelers and Gabriella Lovasz

This paper offers an empirical overview of European emergency managers' institutional arrangements and guidelines for using social media in risk and crisis communication.

Abstract

Purpose

This paper offers an empirical overview of European emergency managers' institutional arrangements and guidelines for using social media in risk and crisis communication.

Design/methodology/approach

The authors collected and analysed material including publicly accessible relevant legal acts, policy documents, official guidelines, and press reports in eight European countries – Germany, Italy, Belgium, Sweden, Hungary, Finland, Norway, and Estonia. Additionally, the authors carried out 95 interviews with emergency managers in the eight countries between September 2019 and February 2020.

Findings

The authors found that emergency management institutions' social media usage is rarely centrally controlled and social media crisis communication was regulated with the same guidelines as crisis communication on traditional media. Considering this study's findings against the backdrop of existing research and practice, the authors find support for a “mixed arrangement” model by which centralised policies work in tandem with decentralised practices on an ad hoc basis.

Practical implications

Comparative insights about institutional arrangements and procedural guidelines on social media crisis communication in the studied countries could inform the future policies concerning social media use in other emergency management systems.

Originality/value

This study includes novel, cross-national comparative data on the institutional arrangements and guidelines for using social media in emergency management in the context of Europe.

Details

International Journal of Emergency Services, vol. 13 no. 1
Type: Research Article
ISSN: 2047-0894

Keywords

Book part
Publication date: 29 May 2024

Wasana Handapangoda

Transnational migration has produced a state of flux in the naturalized conception of home as a fixed, bounded, discreet and trouble-free place of origin, (re)casting home as a…

Abstract

Transnational migration has produced a state of flux in the naturalized conception of home as a fixed, bounded, discreet and trouble-free place of origin, (re)casting home as a more complex, or perhaps simpler, project entangled within the workings of the global capitalist economy. In this context, here the author qualitatively explores migrants’ engagement with the notion of home in the sense of how they conceptualize and experience home, based on the lived experiences of Sri Lankan women who have migrated to Kuwait as live-in migrant domestic workers (MDWs) independently of their families. The stories of the MDWs simultaneously made the meaning of home as conventionally defined, more straightforward and more complicated: home was taken on a journey with them to a faraway foreign land. The MDWs negotiated and constructed belonging and not belonging dialectically in multiple homes, thus being simultaneously “here,” “there” and “nowhere.” In migration, home thus manifests the evolution of female power and duty, portraying it at once as a locus of women’s liberation and as new and perhaps more extreme forms of (re)subjectivation in the emplacement of home within global capitalism. Migration performs home as a space in the (un)making: an ongoing project through the course of life.

Details

More than Just a ‘Home’: Understanding the Living Spaces of Families
Type: Book
ISBN: 978-1-83797-652-2

Keywords

Abstract

Details

International Trade and Inclusive Economic Growth
Type: Book
ISBN: 978-1-83753-471-5

Article
Publication date: 30 April 2024

Kate McDowell and Matthew J. Turk

Data storytelling courses position students as agents in creating stories interpreted from data about a social problem or social justice issue. The purpose of this study is to…

Abstract

Purpose

Data storytelling courses position students as agents in creating stories interpreted from data about a social problem or social justice issue. The purpose of this study is to explore two research questions: What themes characterized students’ iterative development of data story topics? Looking back at six years of iterative feedback, what categories of data literacy pedagogy did instructors engage for these themes?.

Design/methodology/approach

This project examines six years of data storytelling final projects using thematic analysis and three years of instructor feedback. Ten themes in final projects align with patterns in feedback. Reflections on pedagogical approaches to students’ topic development suggest extending data literacy pedagogy categories – formal, personal and folk (Pangrazio and Sefton-Green, 2020).

Findings

Data storytelling can develop students’ abilities to move from being consumers to creators of data and interpretations. The specific topic of personal data exposure or risk has presented some challenges for data literacy instruction (Bowler et al., 2017). What “personal” means in terms of data should be defined more broadly. Extending the data literacy pedagogy categories of formal, personal and folk (Pangrazio and Sefton-Green, 2020) could more effectively center social justice in data literacy instruction.

Practical implications

Implications for practice include positioning students as producers of data interpretation, such as role-playing data analysis or decision-making scenarios.

Social implications

Data storytelling has the potential to address current challenges in data literacy pedagogy and in teaching critical data literacy.

Originality/value

Course descriptions provide a template for future data literacy pedagogy involving data storytelling, and findings suggest implications for expanding definitions and applications of personal and folk data literacies.

1 – 10 of 14