Search results
1 – 10 of over 3000Hamada Elsaid Elmaasrawy and Omar Ikbal Tawfik
This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance…
Abstract
Purpose
This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance cybersecurity (CS).
Design/methodology/approach
The questionnaire was used to collect data for 97 internal auditors (IAu) from the Gulf Cooperation Council countries. The authors used partial least squares (PLS) to test the hypotheses.
Findings
The results show a positive effect of the ADRIA on each of the organisational proactive measures, human proactive measures and technical proactive measures to enhance CS. The study also found a positive effect of the confirmatory role of IA on both human proactive measures and technical proactive measures to enhance CS. No effect of the confirmatory role of IA on the organisational proactive measures is found.
Research limitations/implications
This study focused on only three proactive measures to enhance CS, and this study was limited to the opinions of IAu. In addition, the study was limited to using regression analysis according to the PLS method.
Practical implications
The results of this study show that managers need to consider the influential role of IA as a value-adding activity in reducing CS risks and activating proactive measures. Also, IAu must expand its capabilities, skills and knowledge in CS auditing to provide a bold view of cyber threats. At the same time, the institutions responsible for preparing IA standards should develop standards and guidelines that help IAu to play assurance and advisory roles.
Originality/value
To the best of the authors’ knowledge, this is the first study of its kind that deals with the impact of the assurance and ADRIA on proactive measures to enhance CS. In addition, the study determines the nature of the advisory role and the assurance role of IA to strengthen CS.
Details
Keywords
Shiu-Wan Hung, Min-Jhih Cheng and Yu-Jou Tung
The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this…
Abstract
Purpose
The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this gap by investigating the role of information security, loss aversion and the moderating influence of the herd effect on Inertia and behavioral intentions in the adoption of mobile payment systems.
Design/methodology/approach
A structural equation model was developed and tested with 332 valid questionnaires to examine the proposed hypotheses.
Findings
The empirical results reveal that information security plays a significant role as an enabler, while loss aversion acts as an inhibitor of mobile payment adoption. Furthermore, the study uncovers the moderating influence of the herd effect on the relationship between Inertia and behavioral intentions.
Research limitations/implications
This study was conducted in a specific region and may not be generalizable to other regions. Future studies could expand the sample size and scope to enhance the external validity of the findings.
Practical implications
This study offers practical implications for mobile payment service providers. Understanding the key enabling and inhibiting factors identified in this study can guide providers in designing and improving their services. Strengthening information security measures can help build trust among potential adopters, while offering incentives can mitigate the impact of loss aversion and encourage early adoption.
Social implications
The findings of this study have social implications as they contribute to promoting the adoption of mobile payment systems. Increased adoption can enhance financial inclusion and stimulate economic development.
Originality/value
This study provides novel insights into the enabling and inhibiting factors of mobile payment adoption and highlights the moderating role of the herd effect. By shedding light on the influence of social norms on individual behavior in the context of mobile payment adoption, this study contributes to the existing literature and advances our understanding of this phenomenon.
Details
Keywords
Binh Huu Nguyen and Huong Nguyen Quynh Le
This study aims to investigate the moderating role of sociodemographic factors, specifically age and education level, in the knowledge-attitude-behavior (KAB) model concerning…
Abstract
Purpose
This study aims to investigate the moderating role of sociodemographic factors, specifically age and education level, in the knowledge-attitude-behavior (KAB) model concerning information security awareness (ISA) amid growing technological threats.
Design/methodology/approach
This study uses a survey methodology, collecting data from 400 working individuals in Vietnam, to test the applicability of the KAB model and evaluate the moderating effects of age and education on the model’s established relationships. In addition, the theoretical model and hypotheses were evaluated using the partial least squares structural equation model (PLS-SEM) approach.
Findings
This research confirms the relationships posited in the KAB model. Notably, it shows that younger employees showcase a more positive attitude and behavior toward information security compared with their older counterparts. In addition, higher education levels strengthen the positive association between information security knowledge and attitude. The findings underscore the imperative for organizations to consider sociodemographic variables when formulating strategies to enhance ISA.
Originality/value
This study extends the KAB model by exploring the impact of sociodemographic factors, focusing on age and education in ISA. Overcoming the oversight in current literature, particularly in the context of technological threats, the research uses PLS-SEM and targets a specific demographic in Vietnam.
Details
Keywords
Ben Krishna, Satish Krishnan and M.P. Sebastian
The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level…
Abstract
Purpose
The current body of empirical research regarding the impact of trust in the cybersecurity commitment of institutions on digital payment usage has focused solely on a macro-level analysis, overlooking the intricate dynamics between institutions' cybersecurity commitments and the trust levels of digital payment users. In light of this limitation, this study aims to offer a more comprehensive understanding of this complex relationship.
Design/methodology/approach
A case study was conducted on digital payment users in India through the critical realist lens. To gather data, interviews and focus group discussions were conducted with digital payment users from various regions of the country.
Findings
The citizen-centric outcomes of the national cybersecurity commitment (performance and responsiveness) are the most prominent and impactful trust indicators. These outcomes play a crucial role in shaping digital payment users' perception and trust in the cybersecurity commitment of public institutions. Individuals' value positions also influence trust judgments, as it is essential to recognize the value tensions that may arise due to security implementation and their congruence with citizens' values.
Research limitations/implications
The findings of this study have significant implications for policymakers. They are potentially an artifact of the security and perception of digital payment users and the cultural uniqueness of digital payment users in India.
Originality/value
The study proposes a holistic understanding of the relationship between institutions' cybersecurity commitments and the trust levels of digital payment users. It offers a qualitative evaluation of how digital payment users perceive and construe efficient information security management implemented by public institutions.
Details
Keywords
Sid'Ahmed Soumbara and Ahmed El Ghini
This study aims to examine the asymmetric effects of average temperature (TP) and rainfall (RF) on the Moroccan food security, measured by the food production index (FPI), using…
Abstract
Purpose
This study aims to examine the asymmetric effects of average temperature (TP) and rainfall (RF) on the Moroccan food security, measured by the food production index (FPI), using annual data from 1961 to 2020.
Design/methodology/approach
The study uses the Climate Change and Food Security Framework (CCFS) developed by the Food and Agriculture Organization (FAO) and employs the nonlinear auto-regressive distributed lag (NARDL) model and various econometric techniques to show the effects of climate variability in the short and long-term. It also examines if the impacts on Moroccan food security are asymmetric by analyzing the positive and negative partial sums of mean temperature and rainfall.
Findings
The study shows that RF has a long-term relationship with FPI, with increased RF leading to increased FPI and decreased RF leading to decreased FPI. FPI responds more strongly and persistently to a positive shock in RF than to an adverse shock. The study also identifies an asymmetric relationship between FPI and RF, with increased TP enhancing food output in the long run and a decrease reducing food production in the long run.
Research limitations/implications
The current study could have some limitations. For instance, there are several other non-climate factors that might potentially impact food security. In particular, CO2 emissions which from the literature is a key variable that represent climate change impact on food security, was not included. The present research has not included those factors mainly because adding more variables to the model reduces the degree of freedom available to estimate the parameters, resulting in inaccurate results.
Originality/value
This paper contributes to the food security literature by utilizing the latest asymmetry methodology to decompose climate changes into their positive and negative trends and examining the contrasting impacts food production.
Details
Keywords
Yuxiao Ye, Yiting Han and Baofeng Huo
In this research, we explore the adverse impact of foreign ownership on operational security, a critical operational implication of the liability of foreignness (LOF).
Abstract
Purpose
In this research, we explore the adverse impact of foreign ownership on operational security, a critical operational implication of the liability of foreignness (LOF).
Design/methodology/approach
The empirical analysis is based on a multi-country dataset from the World Bank Enterprises Survey, which contains detailed firm-level information from over 8,902 firms in 82 emerging market countries. We perform a series of robustness checks to further confirm our findings.
Findings
We find that a high ratio of foreign ownership is associated with an increased likelihood of security breaches and higher security costs. Our results also indicate that high levels of host countries’ institutional quality and firms’ local embeddedness can mitigate such vulnerability in operational security.
Originality/value
This study is one of the first to uncover the critical operational implication of the LOF, indicating that a high ratio of foreign ownership exposes firms to operational security challenges.
Details
Keywords
Sherly de Yong, Murni Rachmawati and Ima Defiana
This paper aims to identify aspects of how work-life interaction has changed in the post-pandemic situations and propose strategies of the security concept for living-working…
Abstract
Purpose
This paper aims to identify aspects of how work-life interaction has changed in the post-pandemic situations and propose strategies of the security concept for living-working patterns in the post-pandemic interior as future disease prevention.
Design/methodology/approach
We conducted a systematic literature search and review to select previous research systematically and relate concepts by coding the data and synthesising the data critically. The systematic literature search and review considered 90 papers (35 were studied).
Findings
The findings identify three strategies: hybrid activity patterns, new layout for hybrid and changing behaviour and culture. Each strategy demonstrates the connection between the hybrid living-working interior spaces in the post-pandemic period and security-pandemic variables. The results on security design factors focused on interior control, detection and deterrence; connection to nature creates a safer environment to prevent further variables; and hybrid activity requires more elements to govern users' behaviour and culture.
Research limitations/implications
Limitations of this study are as follows: excluded papers that are not written in English/Bahasa or do not have gold/green open access; some aspects were not discussed (such as social distancing); the articles included in this review are up to April 2023 (and there is the possibility of recent papers). Future studies can be developed to update building certification for post-pandemic interiors or research with psychological, social equity or family vitality issues.
Originality/value
The study offers strategies and the holistic relationship between the post-pandemic concept and security-pandemic design variables within the built environment, especially in the users' culture and behaviour context.
Details
Keywords
Puneett Bhatnagr and Anupama Rajesh
This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the…
Abstract
Purpose
This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the continuous usage intention (CUI) of Indian digital banks from Generation Y and Z perspectives.
Design/methodology/approach
This study used an online survey method to gather data from a sample of 466 digital banking users, from which usable questionnaires were obtained. The obtained data were subjected to thorough analysis using PLS-SEM to further study the research hypotheses.
Findings
The main factors that determine digital banks’ OCE are perceived enjoyment, e-service quality, information quality and e-convenience. Additionally, relevant constructs were evaluated using an importance-performance map analysis.
Research limitations/implications
This study used convenience sampling for the urban population using digital banking; therefore, the outcome may be generalised to a limited extent. It would be valuable to imitate studies in other countries to strengthen digital banking further.
Originality/value
There is a lack of research on digital banking and OCE in India; thus, this study helps rectify this issue while providing valuable insights. This study differs from others in that it examines the connections between OCE, EL, ET and the bottom line of financial institutions, using these factors as dependent variables instead of traditional measures.
Details
Keywords
This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale…
Abstract
Purpose
This investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study. This paper aims to present the preliminary findings of an investigation that explored the constructs of personality traits and situational crime prevention theory (SCPT) as antecedents to social cognitive determinants (attitude, perceived behavioural control and subjective norms using the theory of planned behaviour [TPB] framing) and how these elements subsequently estimate compliant information security behaviour. Moreover, this paper delves into the contrasting influences of light and dark personality traits on insider information security compliance.
Design/methodology/approach
A cross-sectional survey was conducted to study SCPT measures and the personality factors dyad using a diverse but limited sample (n = 82).
Findings
There were ten significant direct relationships between SCPT factors and personality traits related to the components of the TPB. Seventeen hypotheses were not supported. However, these findings highlight the complexity of the topic under study.
Practical implications
Understanding individual differences within the compliance model could be used for custom training protocols, employee selection, assignment and specific types of information security interventions.
Originality/value
There is a scarcity of studies considering the effects of situational and personality factors, specifically the dark versus light triad of personality traits within the information security domain. Therefore, this preliminary result provides early insight that could guide further studies. This research could have important implications for organisations at risk of insider attacks.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details