Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of over 98000
To view the access options for this content please click here
Article
Publication date: 26 October 2020

Cybersecurity: investing for competitive outcomes

Dejan Kosutic and Federico Pigni

The purpose of this paper is to help companies address the problem of ever-increasing cybersecurity investment that does not produce tangible business value – this is…

HTML
PDF (920 KB)

Abstract

Purpose

The purpose of this paper is to help companies address the problem of ever-increasing cybersecurity investment that does not produce tangible business value – this is achieved by explaining the relationship between cybersecurity and competitive advantage.

Design/methodology/approach

The impact of cybersecurity on competitive advantage was explored through a qualitative research study – the authors conducted an extensive literature review and conducted two rounds of semi-structured interviews with executives and security professionals from companies in four countries, from the financial, IT and security industries.

Findings

The analysis of the findings enabled the conceptualization of the Cybersecurity Competitive Advantage Model that explains how to build up cybersecurity dynamic capabilities to achieve long-term competitive advantage.

Research limitations/implications

The research presents the theorization of the model based on an extensive literature review, gathered information, insight from qualified respondents and the authors’ experience in the field. While we controlled for saturation and rigorously collected and analyzed the data, the inductive approach followed may limit the generalizability of the findings.

Practical implications

The proposed model helps explain to executives how to differentiate their company in a novel way and how to retain that competitive advantage; security professionals can use the model to organize cybersecurity and communicate to their superiors more effectively.

Originality/value

The presented model differs from existing literature, cybersecurity frameworks and industry standards by presenting a method of avoiding technological bias and for achieving competitive advantage.

Details

Journal of Business Strategy, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/JBS-06-2020-0116
ISSN: 0275-6668

Keywords

  • Cybersecurity
  • Competitive advantage
  • Dynamic capabilities
  • Operational capabilities
  • Resource-based view
  • Information security
  • Socio-technical model

To view the access options for this content please click here
Article
Publication date: 26 November 2020

Highlights of the new PRC securities law

TieCheng Yang, Yang Chen, Scarlett Zhang, Virginia Qiao, Zhenyu Wang and Shuozhu Zheng

To introduce the Securities Law of the People's Republic of China (the “Securities Law 2019”) revised on 28 December 2019, and provide a detailed analysis on its key…

HTML
PDF (171 KB)

Abstract

Purpose

To introduce the Securities Law of the People's Republic of China (the “Securities Law 2019”) revised on 28 December 2019, and provide a detailed analysis on its key implications to the securities regulatory regime and market activities, especially securities issuance and trading activities in China.

Design/methodology/approach

This article starts from a historical overview of the Securities Law and its several revisions and amendments, highlights the notable core revisions in the Securities Law 2019, analyzes the key legal and regulatory impacts to the securities-related activities and market players, and finally, provides an outlook to the future developments of securities regulatory regime in conformity with the Securities Law 2019.

Findings

This article concludes that the revisions made to the Securities Law 2019 cover a broad range of issues including the issuance and trading of securities, acquisition of a listed company, information disclosure, securities registration and settlement, etc. Such revisions to the Securities Law will lead to far-reaching and profound implications on the securities regulatory system and industry practice in China.

Practical implications

The Securities Law 2019 attracts broad attention from securities market players as well as relevant professionals of the industry, including securities lawyers. As this is a novel and hot topic within the industry, it is important for securities lawyers to keep on track.

Originality/value

High-level guidance from experienced lawyers in the Capital Markets and Financial Regulation practices.

Details

Journal of Investment Compliance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/JOIC-07-2020-0012
ISSN: 1528-5812

Keywords

  • The Securities Law
  • Listed companies
  • Initial public offering (IPO)
  • Securities trading
  • Information disclosure
  • Investor protection

To view the access options for this content please click here
Book part
Publication date: 30 June 2004

PROTECTING CANADA AND THE U.S. AGAINST TERRORISM: A COMMON SECURITY PERIMETER?

Georges A. Tanguay and Marie-Christine Therrien

We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and…

HTML
PDF (63 KB)

Abstract

We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and the United States. Next, we discuss the options of status quo and adoption of a common security perimeter relative to sovereignty and security. We show that efficient border policies could require cooperation among countries but motivating such collaboration may be difficult since joint border security policies may involve a prisoners’ dilemma problem. On the other hand, we show that the likelihood of joint increased security will be higher if there are country-specific benefits for a country improving security at its border. If this is the case, we demonstrate it is possible to reach optimal security using independent border policies.

Details

North American Economic and Financial Integration
Type: Book
DOI: https://doi.org/10.1016/S1064-4857(04)10005-3
ISBN: 978-0-76231-094-4

To view the access options for this content please click here
Book part
Publication date: 15 October 2005

12. THE ROLE OF RUSSIA IN GLOBAL SECURITY

Michael D. Intriligator

The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a…

HTML
PDF (65 KB)

Abstract

The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a leading role in contributing to global security or it can play a major role in undermining global security. The next section will present an interpretation of the nature of global security, followed by a discussion of recent changes in the global situation. Next, the current position of Russia in the global system and how that position has changed will be considered. Finally, the global security agenda and the contribution that Russia can make to this agenda will be examined. It will be shown that Russia can play a major role in the achievement of global security.

Details

Eurasia
Type: Book
DOI: https://doi.org/10.1016/S1572-8323(04)01012-4
ISBN: 978-1-84950-011-1

To view the access options for this content please click here
Article
Publication date: 15 February 2021

COVID-19 and food security as catalyst of conflict among rural households in Nigeria: a study of Ilaje community, Ondo state

Tosin Seun Adebayo and Logo Oluwamayowa

The compulsory lockdown issued by the Nigeria Government to curb the spread of the virus has undoubtedly negatively affected the livelihoods of households. As a result…

HTML
PDF (179 KB)

Abstract

Purpose

The compulsory lockdown issued by the Nigeria Government to curb the spread of the virus has undoubtedly negatively affected the livelihoods of households. As a result, many have lost their sources of income and have no other means for survival. It is important to note that it has the potential of triggering violent conflicts and civil unrest as a popular African adage goes as thus: “A hungry man is an angry man”. Unfortunately, little attention has been given, neither has extant literature adequately covered the impact of the coronavirus (COVID-19) outbreak as it directly affects households in a rural community in Nigeria.

Design/methodology/approach

This study proceeded from on both a qualitative and quantitative method and adopted a mixed-method and case study research design. Data for this study was collected through primary and secondary data. Primary data for this study was collected through a questionnaire and focus group discussions (FGD). The questionnaire used for this study was a validated instrument designed by the US Department of Agriculture (USDA) to measure food security amongst households. The USDA household’s instrument was used and then modified to access the food security status of households during the lockdown.

Findings

Findings from this study revealed that households, in general, were categorised as having “very low food security” during the lockdown as they testified to all the food insecure conditions. In general, the food intake of household members reported irregular eating patterns as the household lacked the money to purchase food. This study further indicated that a high number of respondents see violence as a means of attaining food. Extreme volatility in their inability to access food as a result of food shortages and the inability to benefit from government palliatives has been found to trigger incidents of conflict and malnutrition on households.

Research limitations/implications

This method was sampling method was adopted because of the compulsory and constitutional lockdown imposed by the government to curb the spread of the novel COVID-19 which limited the movement of the researcher to other households in the community which proved to be limited during the time this research was carried limiting the scope of the sample size.

Originality/value

This research adopted mixed-method research and was written by the researchers who did the study. This paper was conducted during the mandatory lockdown issued by the Federal Government in Nigeria with to understand the impact of the mandatory lockdown on rural households using Ilaje local of Ondo state as a case study while establishing a link between food security and conflict.

Details

Journal of Aggression, Conflict and Peace Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/JACPR-06-2020-0518
ISSN: 1759-6599

Keywords

  • Violence
  • Households
  • Food security
  • Conflict
  • COVID-19
  • Rural households

To view the access options for this content please click here
Article
Publication date: 1 March 2021

Systematic literature review on the security challenges of blockchain in IoT-based smart cities

Zhihao Yu, Liang Song, Linhua Jiang and Omid Khold Sharafi

Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature…

HTML
PDF (804 KB)

Abstract

Purpose

Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities.

Design/methodology/approach

IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture.

Findings

The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy.

Research limitations/implications

The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios.

Practical implications

The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field.

Originality/value

As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/K-07-2020-0449
ISSN: 0368-492X

Keywords

  • Internet of Things
  • Systematic literature review
  • Smart city
  • Security
  • Blockchain
  • Wireless sensor network

To view the access options for this content please click here
Article
Publication date: 15 February 2021

Securities cross-holding in the Colombian financial system: a topological approach

Carlos León and Javier Miguélez

From a financial stability viewpoint, this paper aims to study cyclical interdependencies arising from the cross-holding of securities in the Colombian financial system.

HTML
PDF (3.1 MB)

Abstract

Purpose

From a financial stability viewpoint, this paper aims to study cyclical interdependencies arising from the cross-holding of securities in the Colombian financial system.

Design/methodology/approach

Cross-holding of securities in financial systems occurs when two financial institutions hold securities issued by each other or when more than two financial institutions hold securities issued by each other in a circular structure. Securities cross-holding is key for financial stability because of potential contagion arising from cyclical interdependencies in the connective architecture of financial systems. The presence of cyclical interdependencies is studied based on network analysis. The data set is a multilayer network that comprises bonds, certificates of deposit and equity issued and held by Colombian financial institutions from 2016 to 2019.

Findings

Results show that the extent of securities’ cyclical interdependencies is particularly low and stable – even when cross-holding across different types of securities is considered.

Research limitations/implications

The monetary value of exposures and their size with respect to financial institutions’ balance sheets are not considered. Studying the impact on the financial system’s solvency is a compulsory research path.

Practical implications

The network topology suggests that increased potential contagion by cyclical interdependencies and feedback effects from securities cross-holding is rather limited.

Originality/value

To the best of the authors’ knowledge, this is the first time that cyclical interdependencies arising from the securities cross-holding are studied. From a financial stability perspective, the methodology is general and promising for monitoring and analytical purposes.

Details

Studies in Economics and Finance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/SEF-10-2020-0398
ISSN: 1086-7376

Keywords

  • Networks
  • Reciprocity
  • Financial stability
  • Transitivity
  • Contagion
  • Securities
  • D85
  • L14
  • G32
  • G2

To view the access options for this content please click here
Article
Publication date: 18 February 2021

E-waste information security protection motivation: the role of optimism bias

Hao Chen, Ofir Turel and Yufei Yuan

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in…

HTML
PDF (654 KB)

Abstract

Purpose

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always properly assessed and managed. The authors take the protection motivation theory (PMT) lens of analysis to understand intentions to protect one's discarded electronic assets.

Design/methodology/approach

By applying structural equation modeling, the authors empirically tested the proposed model with survey data from 348 e-waste handling users.

Findings

Results highlight that (1) protection intention is influenced by the perceived threat of discarding untreated e-waste (a threat appraisal) and self-efficacy to treat the discarded e-waste (a coping appraisal) and (2) optimism bias plays a dual-role in a direct and moderating way to reduce the perceived threat of untreated e-waste and its effect on protection intentions.

Originality/value

Results support the assertions and portray a unique theoretical account of the processes that underline people's motivation to protect their data when discarding e-waste. As such, this study explains a relatively understudied information security risk behavior in the e-waste context, points to the role of optimism bias in such decisions and highlights potential interventions that can help to alleviate this information security risk behavior.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/ITP-09-2019-0458
ISSN: 0959-3845

Keywords

  • Information security
  • Protection motivation theory
  • Optimism bias
  • E-waste information security
  • Threat
  • Coping

To view the access options for this content please click here
Article
Publication date: 16 February 2021

Understanding employees' information security identities: an interpretive narrative approach

Jeffrey D. Wall and Prashant Palvia

The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The…

HTML
PDF (190 KB)

Abstract

Purpose

The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors also seek to identify how the identities form over time and across contexts. Several identities are identified as well as the changes that may occur in the identities.

Design/methodology/approach

Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews and narrative analysis of the interview transcripts, this paper analyzes the security- and control-related identities and values that employees adopt in organizational settings.

Findings

Two major categories of behavioral security compliance identities were identified: compliant and noncompliant. Specific identities within the compliant category included: faithful follower vs the reasoned follower, and other-preserving versus the self-preserving identities. The noncompliant category included: anti-authority identity, utilitarian identity, trusting identity and unaware identity. Furthermore, three patterns of identity changes were observed.

Research limitations/implications

The authors’ narrative stories suggest that employee identities are complex and multi-faceted, and that they may be fluid and adaptive to situational factors. Future research should avoid assumptions that all employees are the same or that employee beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Thus, security control is far broader than is studied in behavioral studies. The authors find that history matters and should be examined carefully.

Practical implications

The authors’ study provides insights that managers can use to enhance security initiatives. It is clear that different employees build different control-related identities. Managers must understand that their employees are unique and will not all respond to policies, punishments, and other forms of control in the same way. The narratives also suggest that many organizations lack appropriate programs to enhance employees' awareness of security issues.

Originality/value

The authors’ narrative analysis suggests that employee security identities are complex and multi-faceted, and that they are fluid and adaptive to situational factors. Research should avoid assumptions that all employees are the same or that their beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Their history matters and should be examined carefully.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/ITP-04-2020-0197
ISSN: 0959-3845

Keywords

  • Information security
  • Narrative analysis
  • Compliance
  • Noncompliance
  • Identity

To view the access options for this content please click here
Article
Publication date: 22 February 2021

A comparative analysis of the provision of student housing safety measures

Fredrick Simpeh and Mariam Akinlolu

Security, safety, environment and health have become an integral part of facility management (FM). Therefore, FM departments within organisations are required to put…

HTML
PDF (208 KB)

Abstract

Purpose

Security, safety, environment and health have become an integral part of facility management (FM). Therefore, FM departments within organisations are required to put measures in place to safeguard facility users. This paper thus aims to investigate and compare the safety and security measures that are provided in the student housing of two universities in South Africa.

Design/methodology/approach

A mixed method approach was adopted; interview was used to collect qualitative data, whereas a questionnaire was used as an instrument to collect quantitative data. Content analysis was used to analyse the qualitative data, whereas both descriptive and inferential statistics were used to analyse the quantitative data.

Findings

It became evident that university B had a better provision of safety and security measures in the student housing than university A. The study also found that both universities had some lapses in the safety and security measures provided in the student housing. Measures that were lacking in both universities were weapon detector, closed-circuit television (CCTV), water sprinkler system, burglar bars on the doors, lift for disabled students, disabled toilet facility, traffic light, tags for vehicles, first aid box, accident book and medically trained personnel.

Research limitations/implications

Data were collected from only two universities, making it difficult to generalise the findings of the research. For a broader perspective, a study that expands the number of participating universities is recommended.

Practical implications

The facility management and safety department in the universities can use the recommendations to improve on the safety and security measures required in the student housing. Moreover, the recommendations can contribute to the development of policy frameworks for student housing safety.

Originality/value

There is a paucity of studies on student housing safety/security worldwide, and South Africa in particular. With this study, the authors contribute to the body of knowledge in this area of research.

Details

Journal of Facilities Management , vol. ahead-of-print no. ahead-of-print
Type: Research Article
DOI: https://doi.org/10.1108/JFM-11-2020-0080
ISSN: 1472-5967

Keywords

  • Security
  • Safety
  • Provision
  • Measures
  • Student housing

Access
Only content I have access to
Only Open Access
Year
  • Last week (352)
  • Last month (965)
  • Last 3 months (2539)
  • Last 6 months (5155)
  • Last 12 months (9721)
  • All dates (98131)
Content type
  • Article (69781)
  • Book part (12775)
  • Executive summary (6132)
  • Expert briefing (5333)
  • Earlycite article (2865)
  • Case study (1030)
  • Graphic analysis (215)
1 – 10 of over 98000
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here