Search results
1 – 10 of over 1000Hedaia-t-Allah Nabil Abd Al Ghaffar
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Abstract
Purpose
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Design/methodology/approach
The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.
Findings
The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.
Practical implications
Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.
Originality/value
The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.
Details
Keywords
Aswathy Sreenivasan and Suresh M.
Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying…
Abstract
Purpose
Research done to date has produced a wide range of perspectives that center on the junction between the specific function and responsibility of the entrepreneur when applying ethical dimensions to the field of entrepreneurship. By combining a bibliometric analysis with the literature review, the purpose of this paper is to provide an overview of entrepreneurship ethics and its contribution to sustainable development goals, along with future research directions on the topic of entrepreneurship and ethics.
Design/methodology/approach
The research looked for literature based on entrepreneurship ethics from the Dimension database. The authors accumulated 2,279 articles for the period of 2002–2022 for analysis. The authors used bibliometric analysis for analyzing the topic with the use of VosViewer and Excel.
Findings
By combining a bibliometric analysis with a literature review, this study aimed to provide an overview of the ethics and entrepreneurship and contribution to sustainable development goals. The most influential author and journal are Vanessa Ratten and the Journal of Business Ethics, respectively. The top sustainable development goals (SDGs) being contributed by entrepreneurship ethics are SDG4, SDG8, SDG16, SDG11 and SDG3. By contrasting these two interpretations, the authors have demonstrated that the entrepreneurship environment involves various ethical issues connected to personal, organizational and societal sectors.
Research limitations/implications
The current study may serve as a general guideline for future investigation into this topic.
Practical implications
Regarding the practical ramifications, the findings can help entrepreneurs who are preparing to launch a business or are already doing so. The findings provide a comprehensive framework of success variables that must be considered to improve the venture’s performance.
Originality/value
This study’s originality is from presenting a structured and in-depth literature review that describes the current state of entrepreneurship ethics and its contribution to sustainable development goals. A complete analysis of the data gathered on entrepreneurship ethics is offered to establish that it is sustainable.
Details
Keywords
Achille Augustin Diendere and Sansan Ali Bepounte Dah
Effective agricultural product price regulation policies depend on market integration and the degree of symmetry in the transmission of agricultural product price signals. This…
Abstract
Purpose
Effective agricultural product price regulation policies depend on market integration and the degree of symmetry in the transmission of agricultural product price signals. This study analyzes the transmission and asymmetry of the price series between the Ouagadougou consumer market and assembly markets considering three primary cereal products in Burkina Faso.
Design/methodology/approach
This study applies the nonlinear autoregressive distributed lag (NARDL) econometric model, which is an asymmetric extension of the ARDL cointegration model. The price series examined covers the period extending from January 2005 to December 2020.
Findings
Our analysis provides novel insights regarding short- and long-term asymmetric effects in the transmission of price signals between assembly markets and the consumer market. We also determine that the effects of negative shocks are more persistent than those of positive shocks in several markets.
Research limitations/implications
For markets that exhibit symmetrical responses of assembly market prices to consumer market prices, the results could reflect the continuous efforts of market players, particularly the government, to eliminate market failures and ensure the long-term efficiency of cereal markets. To this end, an agricultural market information system can have a crucial role in easing information access for all market players.
Originality/value
This study provides new evidence regarding the nature of the transmission and asymmetry of price information on primary cereal products in the largest markets in Burkina Faso. Applying the NARDL model makes it possible to simultaneously estimate short- and long-term asymmetry.
Details
Keywords
Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…
Abstract
Purpose
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.
Design/methodology/approach
The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.
Findings
The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.
Originality/value
This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.
Details
Keywords
Yingjie Ju, Jianliang Yang, Jingping Ma and Yuehang Hou
The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security…
Abstract
Purpose
The objective of this study is to explore the impact of a government-supported initiative for operational security, specifically the establishment of the national security emergency industry demonstration base, on the profitability of local publicly traded companies. Additionally, the study investigates the significance of firms' blockchain strategies and technologies within this framework.
Design/methodology/approach
Using the differences-in-differences (DID) approach, this study evaluates the impact of China's national security emergency industry demonstration bases (2015–2022) on the profitability of local firms. Data from the China Research Data Service (CNRDS) platform and investor Q&As informed our analysis of firms' blockchain strategy and technology, underpinned by detailed data collection and a robust DID model.
Findings
Emergency industry demonstration bases have notably boosted enterprise profitability in both return on assets (ROA) and return on equity (ROE). Companies adopting blockchain strategies and operational technology see a clear rise in profitability over non-blockchain peers. Additionally, the technical operation of blockchain presents a more pronounced advantage than at the strategic level.
Originality/value
We introduced a new perspective, emphasizing the enhancement of corporate operational safety and financial performance through the pathway of emergency industry policies, driven by the collaboration between government and businesses. Furthermore, we delved into the potential application value of blockchain strategies and technologies in enhancing operational security and the emergency industry.
Details
Keywords
Heeseung Yu, Yuhosua Ryoo and Eunkyoung Han
In the face of increasing political polarization worldwide, this study explores whether people create biased perceptions of political knowledge and how this affects their…
Abstract
Purpose
In the face of increasing political polarization worldwide, this study explores whether people create biased perceptions of political knowledge and how this affects their selection and evaluation of political content on YouTube.
Design/methodology/approach
For this study, an online experiment was conducted with 441 panels of South Korean respondents. In the first phase, participants answered 10 questions designed to capture their level of objective political knowledge, and for each question, they indicated whether they had responded to that question correctly as a means of measuring their subjective political knowledge. In the second phase, two types of YouTube thumbnails were presented to represent progressive and conservative claims on two controversial political issues, and participants rated and selected the content they would like to see.
Findings
Participants with low political knowledge perceived their knowledge as more than it really was. In contrast, participants with high political knowledge perceived their political knowledge as less than it really was. This biased perception of political knowledge influences respondents' choice and evaluation of political YouTube channel videos.
Originality/value
At a time when political polarization is increasing around the world, this study sought to explore how perceptions of political knowledge differ from actual political knowledge by applying the Dunning-Kruger effect. The authors also used political YouTube channels, whose role in forming public opinion and political influence is rapidly growing, to study the behavior and attitudes of a group of Korean respondents in the media according to their actual and perceived level of political literacy.
Details
Keywords
Yumei Zhang, Ming Lei, Xiangmin Lan, Xiangyang Zhang, Shenggen Fan and Ji Gao
As one of its major strategies, China has made a new plan to further expand High Standard Farmland (HSF) to all permanent basic farmland (80% of total farmland) for grain security…
Abstract
Purpose
As one of its major strategies, China has made a new plan to further expand High Standard Farmland (HSF) to all permanent basic farmland (80% of total farmland) for grain security over the next decade. Yet, what will be the impact of farmland infrastructure investment on agrifood systems? The paper aims to systematically evaluate the multiple effects (food security, economy, nutrition and environment) of expanding HSF construction under the context of the “Big Food vision” using an interdisciplinary model.
Design/methodology/approach
An interdisciplinary model – AgriFood Systems Model, which links the China CGE model to diet and carbon emission modules, is applied to assess the multiple effects of HSF construction on agrifood systems, such as food security and economic development, residents’ diet quality and carbon emissions. Several policy scenarios are designed to capture these effects of the past HSF investment based on counterfactual analysis and compare the effects of HSF future investment at the national level under the conditions of different land use policies – restricting to grain crops or allowing diversification (like vegetables, and fruit).
Findings
The investments in HSF offer a promising solution for addressing the challenges of food and nutrition security, economic development and environmental sustainability. Without HSF construction, grain production and self-sufficiency would decline significantly, while the agricultural and agrifood systems’ GDP would decrease. The future investment in the HSF construction will further increase both grain production and GDP, improve dietary quality and reduce carbon emissions. Compared with the policy of limiting HSF to planting grains, diversified planting can provide a more profitable economic return, improve dietary quality and reduce carbon emissions.
Originality/value
This study contributes to better informing the impact of land infrastructure expanding investment on the agrifood systems from multiple dimensions based on an interdisciplinary model. We suggest that the government consider applying diversified planting in the future HSF investment to meet nutritional and health demands, increase household income and reduce carbon emissions.
Details
Keywords
Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…
Abstract
Purpose
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.
Design/methodology/approach
The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.
Findings
The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.
Research limitations/implications
This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.
Practical implications
Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.
Originality/value
The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.
Details
Keywords
In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology…
Abstract
In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology capable, in part, of inferring threats based on analysis of data streams, of developing response strategies, and taking automated action toward alerts and calamities in light of evolving circumstances. The project was a failure. This chapter explores the conceptualization and development of this technology – rooted in cybernetics – and compares its conceptual underpinnings with some situated problems of awareness, communication, coordination, and action in emergencies as they unfold in one of the busiest transport systems in the world, the New York subway. The author shows how the technology, with all the theatrical trappings of a “legitimate” security solution, was apparently conceived without a grounded understanding of actual use-cases, and the degree to which the complex interactions which give rise to subway emergency can be anticipated in – and therefore managed through – a technological system. As a case-study, the chapter illustrates the pitfalls of deploying technology against problems which are not well-defined in the first place, to the neglect of investments against much more fundamental problems – such as inadequate communication systems, and unstable relationships with emergency response agencies – which might offer guaranteed benefits, and indeed lay a firm groundwork for future deployment of more ambitious technology.
Details
Keywords
Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık
The purpose of this paper is to investigate the cyber hygiene practices of remote workers.
Abstract
Purpose
The purpose of this paper is to investigate the cyber hygiene practices of remote workers.
Design/methodology/approach
This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.
Findings
The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.
Research limitations/implications
This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.
Originality/value
This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.
Details