Search results
1 – 10 of 14The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…
Abstract
Purpose
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.
Design/methodology/approach
This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.
Findings
The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.
Social implications
The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.
Originality/value
This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.
Details
Keywords
Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia
The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.
Abstract
Purpose
The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.
Design/methodology/approach
This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?
Findings
In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.
Research limitations/implications
This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.
Practical implications
Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.
Social implications
Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.
Originality/value
Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.
Details
Keywords
Research indicates a long historical connection between racism and nationalist ideologies. This connection has been highlighted in the resurgence of exclusionary nationalism in…
Abstract
Research indicates a long historical connection between racism and nationalist ideologies. This connection has been highlighted in the resurgence of exclusionary nationalism in recent years, across many multicultural societies. This chapter discusses the notions of race, ethnicity and nation, and critically examines how racism shapes contemporary manifestations of nationalist discourse across the world. It explores the historical role of settler-colonialism, imperial expansions and the capitalist development in shaping the racial/ethnic aspect of nationalist development. Moreover, it provides an analysis of the interconnections between the racialisation of minorities, exclusionary ideologies and the consolidation of ethno-nationalist tropes. This chapter further considers the impact of demographic changes in reinforcing anti-migrant exclusionary sentiments. This is examined in connection with emerging nativist discourse, exploring how xenophobic racism has shaped and is shaped by nostalgic nationalism based on the sanitisation of the legacies of Empire and colonialism.
Details
Keywords
Support from Washington helped President Bernardo Arevalo take power in January, resetting relations after a period of strain under former President Alejandro Giammattei…
Details
DOI: 10.1108/OXAN-DB286562
ISSN: 2633-304X
Keywords
Geographic
Topical
Hirusheekesan Selvanesan and Navodana Rodrigo
Despite the unique features and potential applications in various industries, widespread blockchain adoption is hindered for several reasons. One of them is the lack of government…
Abstract
Purpose
Despite the unique features and potential applications in various industries, widespread blockchain adoption is hindered for several reasons. One of them is the lack of government regulations regarding blockchain and cryptocurrencies. However, a deliberate preliminary analysis of the policy initiatives by various jurisdictions proved otherwise, and a lack of sound academic literature on the policy initiatives on blockchain worldwide was evident. Addressing this gap, this study aims to summarize the policy initiatives of jurisdictions around the world, assessing if governments do not enact many regulations.
Design/methodology/approach
A systematic literature review was adopted in this study, in which the authors shortlisted a set of research papers and policy reports using several selection criteria and a screening process.
Findings
It was found that numerous policy initiatives have been enacted by governments worldwide, and blockchain applications are also being piloted or practiced successfully in several nations. It was also evident that governments are reluctant to accept cryptocurrencies as legal tender while embracing their underlying technology, blockchain.
Originality/value
To the best of the authors’ knowledge, this paper appears to be one of the first attempts to summarize the blockchain policy initiatives contributing to the body of knowledge on blockchain adoption.
Details
Keywords
Emad M. Hashem Otri, Reza Kouhy, Salem Eltkhtash and Christopher Tribble
Corporate Social Responsibility (CSR) Implementation and Disclosure in the Banking Sector: the case of banks with Islamic identity in Syria. This study aims to explore Corporate…
Abstract
Corporate Social Responsibility (CSR) Implementation and Disclosure in the Banking Sector: the case of banks with Islamic identity in Syria. This study aims to explore Corporate Social Responsibility Disclosure (CSRD) in Syrian banks which have an Islamic identity, investigating their motivations when implementing and disclosing CSR and the challenges banks have faced. This study employed content analysis to extract knowledge from 33 annual reports published by three banks which have Islamic identity in Syria over the period 2008–2020. Semi-structured interviews were then conducted with five participants who are aware of CSRD policy in the banks in the sample, in order to gain a fuller understanding of their motivations in relation to CSR and any challenges they faced. This article draws on the overlap between Stakeholder and Legitimacy theories in order to explain the motivations of the banks in question. The study found that banks which have an Islamic identity increased their levels of CSR implementation during the conflict crisis but were not publishing details on these activities because of a concern regarding the Islamic modesty around charitable actions and to avoid upsetting the sensibility of beneficiaries. Interviewees commented that in the time of conflict crisis, many Syrians needed relief and support. Because of this, banks in our research sample decided to take responsibility to lessen the negative impact of the conflict crisis on the Syrian community. In addition, the analysis revealed that banks engaged with Environment and Human Right issues after 2013 because they wanted to fulfil the requirements of their national partners.
Details
Keywords
Sten Torpan, Sten Hansson, Kati Orru, Mark Rhinard, Lucia Savadori, Pirjo Jukarainen, Tor-Olav Nævestad, Sunniva Frislid Meyer, Abriel Schieffelers and Gabriella Lovasz
This paper offers an empirical overview of European emergency managers' institutional arrangements and guidelines for using social media in risk and crisis communication.
Abstract
Purpose
This paper offers an empirical overview of European emergency managers' institutional arrangements and guidelines for using social media in risk and crisis communication.
Design/methodology/approach
The authors collected and analysed material including publicly accessible relevant legal acts, policy documents, official guidelines, and press reports in eight European countries – Germany, Italy, Belgium, Sweden, Hungary, Finland, Norway, and Estonia. Additionally, the authors carried out 95 interviews with emergency managers in the eight countries between September 2019 and February 2020.
Findings
The authors found that emergency management institutions' social media usage is rarely centrally controlled and social media crisis communication was regulated with the same guidelines as crisis communication on traditional media. Considering this study's findings against the backdrop of existing research and practice, the authors find support for a “mixed arrangement” model by which centralised policies work in tandem with decentralised practices on an ad hoc basis.
Practical implications
Comparative insights about institutional arrangements and procedural guidelines on social media crisis communication in the studied countries could inform the future policies concerning social media use in other emergency management systems.
Originality/value
This study includes novel, cross-national comparative data on the institutional arrangements and guidelines for using social media in emergency management in the context of Europe.
Details
Keywords
Transnational migration has produced a state of flux in the naturalized conception of home as a fixed, bounded, discreet and trouble-free place of origin, (re)casting home as a…
Abstract
Transnational migration has produced a state of flux in the naturalized conception of home as a fixed, bounded, discreet and trouble-free place of origin, (re)casting home as a more complex, or perhaps simpler, project entangled within the workings of the global capitalist economy. In this context, here the author qualitatively explores migrants’ engagement with the notion of home in the sense of how they conceptualize and experience home, based on the lived experiences of Sri Lankan women who have migrated to Kuwait as live-in migrant domestic workers (MDWs) independently of their families. The stories of the MDWs simultaneously made the meaning of home as conventionally defined, more straightforward and more complicated: home was taken on a journey with them to a faraway foreign land. The MDWs negotiated and constructed belonging and not belonging dialectically in multiple homes, thus being simultaneously “here,” “there” and “nowhere.” In migration, home thus manifests the evolution of female power and duty, portraying it at once as a locus of women’s liberation and as new and perhaps more extreme forms of (re)subjectivation in the emplacement of home within global capitalism. Migration performs home as a space in the (un)making: an ongoing project through the course of life.
Details
Keywords
Kate McDowell and Matthew J. Turk
Data storytelling courses position students as agents in creating stories interpreted from data about a social problem or social justice issue. The purpose of this study is to…
Abstract
Purpose
Data storytelling courses position students as agents in creating stories interpreted from data about a social problem or social justice issue. The purpose of this study is to explore two research questions: What themes characterized students’ iterative development of data story topics? Looking back at six years of iterative feedback, what categories of data literacy pedagogy did instructors engage for these themes?.
Design/methodology/approach
This project examines six years of data storytelling final projects using thematic analysis and three years of instructor feedback. Ten themes in final projects align with patterns in feedback. Reflections on pedagogical approaches to students’ topic development suggest extending data literacy pedagogy categories – formal, personal and folk (Pangrazio and Sefton-Green, 2020).
Findings
Data storytelling can develop students’ abilities to move from being consumers to creators of data and interpretations. The specific topic of personal data exposure or risk has presented some challenges for data literacy instruction (Bowler et al., 2017). What “personal” means in terms of data should be defined more broadly. Extending the data literacy pedagogy categories of formal, personal and folk (Pangrazio and Sefton-Green, 2020) could more effectively center social justice in data literacy instruction.
Practical implications
Implications for practice include positioning students as producers of data interpretation, such as role-playing data analysis or decision-making scenarios.
Social implications
Data storytelling has the potential to address current challenges in data literacy pedagogy and in teaching critical data literacy.
Originality/value
Course descriptions provide a template for future data literacy pedagogy involving data storytelling, and findings suggest implications for expanding definitions and applications of personal and folk data literacies.
Details