Search results
1 – 10 of over 132000
Georges A. Tanguay and Marie-Christine Therrien
We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and the…
Abstract
We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and the United States. Next, we discuss the options of status quo and adoption of a common security perimeter relative to sovereignty and security. We show that efficient border policies could require cooperation among countries but motivating such collaboration may be difficult since joint border security policies may involve a prisoners’ dilemma problem. On the other hand, we show that the likelihood of joint increased security will be higher if there are country-specific benefits for a country improving security at its border. If this is the case, we demonstrate it is possible to reach optimal security using independent border policies.
The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a leading role…
Abstract
The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a leading role in contributing to global security or it can play a major role in undermining global security. The next section will present an interpretation of the nature of global security, followed by a discussion of recent changes in the global situation. Next, the current position of Russia in the global system and how that position has changed will be considered. Finally, the global security agenda and the contribution that Russia can make to this agenda will be examined. It will be shown that Russia can play a major role in the achievement of global security.
Naurin Farooq Khan, Hajra Murtaza, Komal Malik, Muzammil Mahmood and Muhammad Aslam Asadi
This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive…
Abstract
Purpose
This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive analysis using machine learning (ML) algorithms.
Design/methodology/approach
This study employs a total of 241 questionnaire-based responses in a nonmandated security setting and uses multimethod approach. The research model includes both security intention and behavior making use of a valid smartphone security behavior scale. Structural equation modeling (SEM) – explanatory analysis was used in understanding the relationships. ML algorithms were employed to predict the accuracy of the PMT model in an experimental evaluation.
Findings
The results revealed that the threat-appraisal element of the PMT did not have any influence on the intention to secure smartphone while the response efficacy had a role in explaining the smartphone security intention and behavior. The ML predictive analysis showed that the protection motivation elements were able to predict smartphone security intention and behavior with an accuracy of 73%.
Research limitations/implications
The findings imply that the response efficacy of the individuals be improved by cybersecurity training programs in order to enhance the protection motivation. Researchers can test other PMT models, including fear appeals to improve the predictive accuracy.
Originality/value
This study is the first study that makes use of theory-driven SEM analysis and data-driven ML analysis to bridge the gap between smartphone security’s theory and practice.
Details
Keywords
Mohanad Rezeq, Tarik Aouam and Frederik Gailly
Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict…
Abstract
Purpose
Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict. These security checkpoints have become highly utilized because of the complex security procedures and increased truck traffic, which significantly slow the delivery of relief aid. This paper aims to improve the process at security checkpoints by redesigning the current process to reduce processing time and relieve congestion at checkpoint entrance gates.
Design/methodology/approach
A decision-support tool (clearing function distribution model [CFDM]) is used to minimize the effects of security checkpoint congestion on the entire humanitarian supply network using a hybrid simulation-optimization approach. By using a business process simulation, the current and reengineered processes are both simulated, and the simulation output was used to estimate the clearing function (capacity as a function of the workload). For both the AS-IS and TO-BE models, key performance indicators such as distribution costs, backordering and process cycle time were used to compare the results of the CFDM tool. For this, the Kerem Abu Salem security checkpoint south of Gaza was used as a case study.
Findings
The comparison results demonstrate that the CFDM tool performs better when the output of the TO-BE clearing function is used.
Originality/value
The efforts will contribute to improving the planning of any humanitarian network experiencing congestion at security checkpoints by minimizing the impact of congestion on the delivery lead time of relief aid to the final destination.
Details
Keywords
Moza Tahnoon Al Nahyan, Jawaher Majdi Al Ahbabi, Mesheal Abdulmohsen Alabdulrahman, Ibrahim Alhosani, Fauzia Jabeen and Sherine Farouk
Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19…
Abstract
Purpose
Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19 pandemic. It also examines the moderating effects of perceived organizational support and psychological capital on well-being and performance.
Design/methodology/approach
Using a two-wave time-lagged design, data were collected from 279 frontline employees in public service organizations in Saudi Arabia.
Findings
The study’s results show that perceived job security significantly affects job performance. Employee well-being significantly and positively influences job performance and partially mediates the relationship between perceived job security and job performance. Additionally, perceived organizational support and psychological capital positively moderated the relationship between employee well-being and job performance during the pandemic.
Practical implications
This study suggests that policymakers and practitioners need to prioritize addressing the job security concerns and well-being of frontline employees during a pandemic to enhance employee performance.
Originality/value
Our findings present significant implications for policymakers in the context of job security and performance within public organizations in emerging countries.
研究目的
本研究以社會認知生涯理論為基礎,去探討在2019冠狀病毒病疫情期間,僱員對職業保障和福祉的看法如何影響他們的工作績效; 研究亦擬探討感知組織支持和心理資本對福祉和工作績效所起的調節作用。
研究方法
研究人員使用雙波時間遞延設計收集數據; 數據取自於沙特阿拉伯的公共服務組織內工作的279名一線員工。
研究結果
研究結果顯示,僱員的感知職業保障會對他們的工作績效有顯著的影響; 另外,僱員的福祉會正面和顯著地影響他們的工作績效; 而且,僱員的福祉也會局部地調節感知職業保障與工作績效之間的關係。再者,研究人員發現,在大流行期間,感知組織支持和心理資本正面調節了僱員福祉與工作績效之間的關係。
研究的啟示
研究結果建議政策制定者和從業人員必須於大流行肆虐期間,優先處理有關職業保障的關注和一線員工的福祉,俾能提升僱員的工作績效。
研究的原創性
本研究的結果為政策制定者提供了重要的啟示,幫助他們於公共組織的環境內,能更有效地處理關於職業保障和僱員工作績效的事宜。
Details
Keywords
Ho Jun Song, Nina Shin, Hyun Mo Koo and Wan Seon Shin
This research deals with the critical factors of quality and their significance to perceived security as an effort to build a formidable loyalty of customers in a technology…
Abstract
Purpose
This research deals with the critical factors of quality and their significance to perceived security as an effort to build a formidable loyalty of customers in a technology driven service environment. The primary purpose of this study is to investigate the key contributing elements of functional and service quality on perceived security and to further analyze its impact on customer satisfaction and loyalty.
Design/methodology/approach
A hypothesized structure model is proposed and justified using the data collected in the manufacturing and telecommunication service sectors in South Korea through survey with total 647 respondents. To clarify the reliability of model and validity of the proposed hypothesis, AMOS 24.0 software was utilized. Furthermore, two moderating variables were adopted for the depth understanding.
Findings
This study reveals that service quality dominantly influences the level of perceived security due to its characteristics that are mostly formed on the stage of customer-contact activity. This study further provides a strategic methodology for manufacturing and telecommunication firms to foster sustainable growth by focusing on perceived security during the service delivery process.
Originality/value
This finding is particularly important as Ontact technology becomes increasingly critical during the COVID-19 pandemic. It is worthwhile noting that the research outcome of this study may, in turn, trigger the trust issue that need to be combined with quality in the era of Industry 4.0.
Details
Keywords
Hafiez Sofyani and Emile Satia Darma
This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The…
Abstract
Purpose
This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The investigation was situated within the framework of a hacker attack that compromised the security of customer data at one of Indonesia’s largest Islamic bank.
Design/methodology/approach
A survey questionnaire method was used, and the sample population comprised users of Islamic bank in Indonesia. The respondents were then selected purposively with the criteria of individuals who were using mobile banking services. Furthermore, data collection in this study was carried out by distributing questionnaires online. To validate the questionnaire, consultation and validation were conducted by engaging four experts and conducting a pilot study. Hypothesis testing was performed using the structural equation modeling method based on partial least squares.
Findings
The results of the partial least square structural model assessment showed that application efficiency and data security positively influenced the intention to continue using Islamic bank, while application architecture had no effect. Furthermore, data security could not moderate the relationship between application architecture and efficiency toward the intention to continue using Islamic bank.
Practical implications
The results of this study suggested that Islamic banking practitioners must prioritize the enhancement of digital banking services, with a specific focus on improving application efficiency and ensuring robust data security. These two dimensions were critical determinants influencing the intention to continue using Islamic bank.
Originality/value
This study addressed the issue of data security as a moderator, particularly in the context of hacker attacks targeting a major Islamic bank in Indonesia. Furthermore, this current report expounded on the study conducted by Mir et al. (2022) by introducing novel dimensions to the e-service quality of internet banking.
Details
Keywords
Dien Van Tran, Phuong V. Nguyen, Linh Phuong Le and Sam Thi Ngoc Nguyen
This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to…
Abstract
Purpose
This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to explore the complex correlation between the level of awareness about cybersecurity measures and attitudes towards compliance with these measures. Additionally, it looks at how these factors collectively impact employees’ behaviour to protect organisational assets and information.
Design/methodology/approach
This study uses a quantitative research methodology in which primary data are gathered using a survey questionnaire distributed to personnel employed at Vietnamese organisations. The data are analysed, and the validity of the measurement and structural equation model is assessed using a partial least squares–structural equation model approach after the collection of all the survey responses.
Findings
The provision of policies and security education, training and awareness programmes are strongly and positively associated with cybersecurity awareness. Moreover, cybersecurity awareness plays an important role in shaping attitudes and intentions towards information security policy compliance (ISPC). Attitude is positively associated with intention towards ISPC and employee protective behaviour. Finally, the intention towards ISPC is significant in shaping employee protective behaviour.
Originality/value
This study contributes to the understanding of the antecedents of cybersecurity in developing countries such as Vietnam. Furthermore, it provides a comprehensive framework for understanding intention and protective behaviour through cybersecurity awareness and compliance attitudes. By combining the theory of planned behaviour and protection motivation theory with institutional governance, this study extends previous research on the effects of these variables on employee protective behaviour.
Details
Keywords
Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık
The purpose of this paper is to investigate the cyber hygiene practices of remote workers.
Abstract
Purpose
The purpose of this paper is to investigate the cyber hygiene practices of remote workers.
Design/methodology/approach
This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.
Findings
The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.
Research limitations/implications
This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.
Originality/value
This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.
Details