Search results
1 – 10 of over 2000Hedaia-t-Allah Nabil Abd Al Ghaffar
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Abstract
Purpose
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Design/methodology/approach
The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.
Findings
The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.
Practical implications
Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.
Originality/value
The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.
Details
Keywords
A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…
Abstract
Purpose
A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.
Design/methodology/approach
A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.
Research limitations/implications
This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.
Originality/value
The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.
Details
Keywords
Workicho Jateno Gadiso, Bamlaku Alamirew Alemu and Maru Shete
This study aims to measure the status of rural household food security across regions using multidimensional indicators. It also aims to identify the determinants of rural…
Abstract
Purpose
This study aims to measure the status of rural household food security across regions using multidimensional indicators. It also aims to identify the determinants of rural household food security in Ethiopia.
Design/methodology/approach
The study adopted descriptive and explanatory designs. It used data from the fourth wave of the Ethiopian socioeconomic survey that has 3,115 respondents. The authors constructed household food security index using variables that capture availability, access, utilization and stability dimensions of food security. The authors categorized households into relative food security groups, namely, alarming and moderately food insecure, as well as moderately and highly food secure. Beta regression model, which is widely used to analyze response variables that assume values between 0 and 1, is used to estimate the determinants of food security.
Findings
The study finds that 77.7% of rural households are food insecure. Of this, 90% are moderately food insecure. Regional variations in magnitude of food security showed that Harari, Gambella and Benshanguel Gumuz regional states are relatively better-off than other regions in Ethiopia. The study identified sex, education level, marital status, location and wealth status of households as significant determinants of food security.
Originality/value
This study sheds light on regional variations in multidimensional food security in Ethiopia. It thus challenged previous estimates of food security using uni-dimensional indicator. It highlighted the need for region-specific analysis of determinants and a follow up of tailored regional interventions.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-02-2023-0139
Details
Keywords
Aswathy Sreenivasan and Suresh M.
Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying…
Abstract
Purpose
Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying ethical dimensions to the field of entrepreneurship. By combining a bibliometric analysis with the literature review, the purpose of this paper is to provide an overview of entrepreneurship ethics and its contribution to sustainable development goals, along with future research directions on the topic of entrepreneurship and ethics.
Design/methodology/approach
The research looked for literature based on entrepreneurship ethics from the Dimension database. The authors accumulated 2,279 articles for the period of 2002–2022 for analysis. The authors used bibliometric analysis for analyzing the topic with the use of VosViewer and Excel.
Findings
By combining a bibliometric analysis with a literature review, this study aimed to provide an overview of the ethics and entrepreneurship and contribution to sustainable development goals. The most influential author and journal are Vanessa Ratten and the Journal of Business Ethics, respectively. The top sustainable development goals (SDGs) being contributed by entrepreneurship ethics are SDG4, SDG8, SDG16, SDG11 and SDG3. By contrasting these two interpretations, the authors have demonstrated that the entrepreneurship environment involves various ethical issues connected to personal, organizational and societal sectors.
Research limitations/implications
The current study may serve as a general guideline for future investigation into this topic.
Practical implications
Regarding the practical ramifications, the findings can help entrepreneurs who are preparing to launch a business or are already doing so. The findings provide a comprehensive framework of success variables that must be considered to improve the venture’s performance.
Originality/value
This study’s originality is from presenting a structured and in-depth literature review that describes the current state of entrepreneurship ethics and its contribution to sustainable development goals. A complete analysis of the data gathered on entrepreneurship ethics is offered to establish that it is sustainable.
Details
Keywords
Achille Augustin Diendere and Sansan Ali Bepounte Dah
Effective agricultural product price regulation policies depend on market integration and the degree of symmetry in the transmission of agricultural product price signals. This…
Abstract
Purpose
Effective agricultural product price regulation policies depend on market integration and the degree of symmetry in the transmission of agricultural product price signals. This study analyzes the transmission and asymmetry of the price series between the Ouagadougou consumer market and assembly markets considering three primary cereal products in Burkina Faso.
Design/methodology/approach
This study applies the nonlinear autoregressive distributed lag (NARDL) econometric model, which is an asymmetric extension of the ARDL cointegration model. The price series examined covers the period extending from January 2005 to December 2020.
Findings
Our analysis provides novel insights regarding short- and long-term asymmetric effects in the transmission of price signals between assembly markets and the consumer market. We also determine that the effects of negative shocks are more persistent than those of positive shocks in several markets.
Research limitations/implications
For markets that exhibit symmetrical responses of assembly market prices to consumer market prices, the results could reflect the continuous efforts of market players, particularly the government, to eliminate market failures and ensure the long-term efficiency of cereal markets. To this end, an agricultural market information system can have a crucial role in easing information access for all market players.
Originality/value
This study provides new evidence regarding the nature of the transmission and asymmetry of price information on primary cereal products in the largest markets in Burkina Faso. Applying the NARDL model makes it possible to simultaneously estimate short- and long-term asymmetry.
Details
Keywords
Chunyu Jiang and Seuk Wai Phoong
This study investigated the travel intentions (TIs) of Chinese travelers and their utilization of virtual tourism technology during the Zero COVID-19 policy period by using a…
Abstract
Purpose
This study investigated the travel intentions (TIs) of Chinese travelers and their utilization of virtual tourism technology during the Zero COVID-19 policy period by using a stimulus-organism-response (SOR) model. The study specifically examines the interplay between knowledge of policy, perception of risk, TI, usage of virtual tourism technology (UVTT) and the mediating role of personal values.
Design/methodology/approach
The data were collected from 333 Chinese travelers through an online questionnaire, and structural equation modeling (SEM) was employed to test the proposed hypotheses.
Findings
The study suggests that knowledge of policy and risk perception increase changes in personal values (PVs), which, in turn, affect Chinese travelers' TIs and the UVTT, with PVs playing a mediating role. Risk perception has a positive effect on the UVTT.
Practical implications
This study highlights the positive impact of tourism policy knowledge and risk awareness on individual values as a stimulus. Stakeholders need to implement industry-specific policies that are in line with scientific developments. Tourism managers should prioritize understanding the psychological reactions of tourists in crises and provide support to mitigate negative emotions. Anticipating changes in PVs is crucial, as instability affects tourists' behavior. The findings of the study also provide valuable insights for technology designers and underscore the substitutability of virtual technologies in improving the tourism experience.
Originality/value
This study is the first to examine the mediating role of PVs in the relationship between knowledge of policy, tourism risk perception (TRP), TI and the UVTT based on the SOR model. The insights gained from this analysis can assist policymakers and tourism managers in understanding the psychological changes of tourists, thereby facilitating the development of appropriate tourism planning.
Details
Keywords
Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…
Abstract
Purpose
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.
Design/methodology/approach
The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.
Findings
The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.
Originality/value
This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.
Details
Keywords
Yingjie Ju, Jianliang Yang, Jingping Ma and Yuehang Hou
The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security…
Abstract
Purpose
The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security emergency industry demonstration base, on the profitability of local publicly traded companies. Additionally, the study investigates the significance of firms' blockchain strategies and technologies within this framework.
Design/methodology/approach
Using the differences-in-differences (DID) approach, this study evaluates the impact of China's national security emergency industry demonstration bases (2015–2022) on the profitability of local firms. Data from the China Research Data Service (CNRDS) platform and investor Q&As informed our analysis of firms' blockchain strategy and technology, underpinned by detailed data collection and a robust DID model.
Findings
Emergency industry demonstration bases have notably boosted enterprise profitability in both return on assets (ROA) and return on equity (ROE). Companies adopting blockchain strategies and operational technology see a clear rise in profitability over non-blockchain peers. Additionally, the technical operation of blockchain presents a more pronounced advantage than at the strategic level.
Originality/value
We introduced a new perspective, emphasizing the enhancement of corporate operational safety and financial performance through the pathway of emergency industry policies, driven by the collaboration between government and businesses. Furthermore, we delved into the potential application value of blockchain strategies and technologies in enhancing operational security and the emergency industry.
Details
Keywords
Dien Van Tran, Phuong Van Nguyen, Anh Thi Chau Nguyen, Demetris Vrontis and Phuong Uyen Dinh
This study aims to investigate the impact of employees’ engagement in government social media (GSM) on their cybersecurity compliance attitude, protection motivation and…
Abstract
Purpose
This study aims to investigate the impact of employees’ engagement in government social media (GSM) on their cybersecurity compliance attitude, protection motivation and protective behavior, thereby contributing to effective cybersecurity practices at organizations.
Design/methodology/approach
A quantitative cross-sectional field survey was conducted to collect primary data in big cities and large provinces in Vietnam. The final data set of 323 responses was analyzed using the partial least squares-structural equation modeling approach to interpret the results and test research hypotheses.
Findings
Engagement in GSM positively influences employees’ cybersecurity compliance attitude (ATT). Perceived threat vulnerability and response efficacy also contribute to a positive compliance attitude, although self-efficacy has a negative impact. Moreover, the cybersecurity compliance ATT significantly explains the information protection motivation, which in turn influences employee protective behaviors. However, the relationship between compliance attitude and protective behaviors is weak, unlike previous studies that found a strong correlation.
Originality/value
Although recent studies have explored specific information security practices in corporate and home contexts, the influence of GSM on individuals’ cybersecurity behaviors has received limited attention because of its novelty. This study contributes to the existing body of knowledge by investigating the impact of GSM on cybersecurity behaviors. This study provides significant contributions to understanding social media’s effects of social media on individuals’ cultivation processes, by expanding upon the protective motivation theory and cultivation theory. The results lead to practical suggestions for organizational managers and policymakers so that they can enhance their understanding of the importance of cybersecurity, encourage the implementation of self-defense strategies and highlight the significance of threat and coping evaluations in influencing attitudes and motivations.
Details