Search results
1 – 10 of over 131000
Georges A. Tanguay and Marie-Christine Therrien
We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and the…
Abstract
We argue that national security is a public good and its production can be analyzed in a strategic context. We first present the context of the border between Canada and the United States. Next, we discuss the options of status quo and adoption of a common security perimeter relative to sovereignty and security. We show that efficient border policies could require cooperation among countries but motivating such collaboration may be difficult since joint border security policies may involve a prisoners’ dilemma problem. On the other hand, we show that the likelihood of joint increased security will be higher if there are country-specific benefits for a country improving security at its border. If this is the case, we demonstrate it is possible to reach optimal security using independent border policies.
The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a leading role…
Abstract
The purpose of this paper is to reconsider the role of Russia in the current world environment, focusing attention on its role in global security. Russia can play a leading role in contributing to global security or it can play a major role in undermining global security. The next section will present an interpretation of the nature of global security, followed by a discussion of recent changes in the global situation. Next, the current position of Russia in the global system and how that position has changed will be considered. Finally, the global security agenda and the contribution that Russia can make to this agenda will be examined. It will be shown that Russia can play a major role in the achievement of global security.
Naurin Farooq Khan, Hajra Murtaza, Komal Malik, Muzammil Mahmood and Muhammad Aslam Asadi
This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive…
Abstract
Purpose
This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive analysis using machine learning (ML) algorithms.
Design/methodology/approach
This study employs a total of 241 questionnaire-based responses in a nonmandated security setting and uses multimethod approach. The research model includes both security intention and behavior making use of a valid smartphone security behavior scale. Structural equation modeling (SEM) – explanatory analysis was used in understanding the relationships. ML algorithms were employed to predict the accuracy of the PMT model in an experimental evaluation.
Findings
The results revealed that the threat-appraisal element of the PMT did not have any influence on the intention to secure smartphone while the response efficacy had a role in explaining the smartphone security intention and behavior. The ML predictive analysis showed that the protection motivation elements were able to predict smartphone security intention and behavior with an accuracy of 73%.
Research limitations/implications
The findings imply that the response efficacy of the individuals be improved by cybersecurity training programs in order to enhance the protection motivation. Researchers can test other PMT models, including fear appeals to improve the predictive accuracy.
Originality/value
This study is the first study that makes use of theory-driven SEM analysis and data-driven ML analysis to bridge the gap between smartphone security’s theory and practice.
Details
Keywords
Mohanad Rezeq, Tarik Aouam and Frederik Gailly
Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict…
Abstract
Purpose
Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict. These security checkpoints have become highly utilized because of the complex security procedures and increased truck traffic, which significantly slow the delivery of relief aid. This paper aims to improve the process at security checkpoints by redesigning the current process to reduce processing time and relieve congestion at checkpoint entrance gates.
Design/methodology/approach
A decision-support tool (clearing function distribution model [CFDM]) is used to minimize the effects of security checkpoint congestion on the entire humanitarian supply network using a hybrid simulation-optimization approach. By using a business process simulation, the current and reengineered processes are both simulated, and the simulation output was used to estimate the clearing function (capacity as a function of the workload). For both the AS-IS and TO-BE models, key performance indicators such as distribution costs, backordering and process cycle time were used to compare the results of the CFDM tool. For this, the Kerem Abu Salem security checkpoint south of Gaza was used as a case study.
Findings
The comparison results demonstrate that the CFDM tool performs better when the output of the TO-BE clearing function is used.
Originality/value
The efforts will contribute to improving the planning of any humanitarian network experiencing congestion at security checkpoints by minimizing the impact of congestion on the delivery lead time of relief aid to the final destination.
Details
Keywords
Moza Tahnoon Al Nahyan, Jawaher Majdi Al Ahbabi, Mesheal Abdulmohsen Alabdulrahman, Ibrahim Alhosani, Fauzia Jabeen and Sherine Farouk
Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19…
Abstract
Purpose
Grounded in social cognitive career theory, this study investigates how employees' perceptions of job security and well-being affected their performance during the COVID-19 pandemic. It also examines the moderating effects of perceived organizational support and psychological capital on well-being and performance.
Design/methodology/approach
Using a two-wave time-lagged design, data were collected from 279 frontline employees in public service organizations in Saudi Arabia.
Findings
The study’s results show that perceived job security significantly affects job performance. Employee well-being significantly and positively influences job performance and partially mediates the relationship between perceived job security and job performance. Additionally, perceived organizational support and psychological capital positively moderated the relationship between employee well-being and job performance during the pandemic.
Practical implications
This study suggests that policymakers and practitioners need to prioritize addressing the job security concerns and well-being of frontline employees during a pandemic to enhance employee performance.
Originality/value
Our findings present significant implications for policymakers in the context of job security and performance within public organizations in emerging countries.
研究目的
本研究以社會認知生涯理論為基礎,去探討在2019冠狀病毒病疫情期間,僱員對職業保障和福祉的看法如何影響他們的工作績效; 研究亦擬探討感知組織支持和心理資本對福祉和工作績效所起的調節作用。
研究方法
研究人員使用雙波時間遞延設計收集數據; 數據取自於沙特阿拉伯的公共服務組織內工作的279名一線員工。
研究結果
研究結果顯示,僱員的感知職業保障會對他們的工作績效有顯著的影響; 另外,僱員的福祉會正面和顯著地影響他們的工作績效; 而且,僱員的福祉也會局部地調節感知職業保障與工作績效之間的關係。再者,研究人員發現,在大流行期間,感知組織支持和心理資本正面調節了僱員福祉與工作績效之間的關係。
研究的啟示
研究結果建議政策制定者和從業人員必須於大流行肆虐期間,優先處理有關職業保障的關注和一線員工的福祉,俾能提升僱員的工作績效。
研究的原創性
本研究的結果為政策制定者提供了重要的啟示,幫助他們於公共組織的環境內,能更有效地處理關於職業保障和僱員工作績效的事宜。
Details
Keywords
Ho Jun Song, Nina Shin, Hyun Mo Koo and Wan Seon Shin
This research deals with the critical factors of quality and their significance to perceived security as an effort to build a formidable loyalty of customers in a technology…
Abstract
Purpose
This research deals with the critical factors of quality and their significance to perceived security as an effort to build a formidable loyalty of customers in a technology driven service environment. The primary purpose of this study is to investigate the key contributing elements of functional and service quality on perceived security and to further analyze its impact on customer satisfaction and loyalty.
Design/methodology/approach
A hypothesized structure model is proposed and justified using the data collected in the manufacturing and telecommunication service sectors in South Korea through survey with total 647 respondents. To clarify the reliability of model and validity of the proposed hypothesis, AMOS 24.0 software was utilized. Furthermore, two moderating variables were adopted for the depth understanding.
Findings
This study reveals that service quality dominantly influences the level of perceived security due to its characteristics that are mostly formed on the stage of customer-contact activity. This study further provides a strategic methodology for manufacturing and telecommunication firms to foster sustainable growth by focusing on perceived security during the service delivery process.
Originality/value
This finding is particularly important as Ontact technology becomes increasingly critical during the COVID-19 pandemic. It is worthwhile noting that the research outcome of this study may, in turn, trigger the trust issue that need to be combined with quality in the era of Industry 4.0.
Details
Keywords
Hafiez Sofyani and Emile Satia Darma
This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The…
Abstract
Purpose
This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The investigation was situated within the framework of a hacker attack that compromised the security of customer data at one of Indonesia’s largest Islamic bank.
Design/methodology/approach
A survey questionnaire method was used, and the sample population comprised users of Islamic bank in Indonesia. The respondents were then selected purposively with the criteria of individuals who were using mobile banking services. Furthermore, data collection in this study was carried out by distributing questionnaires online. To validate the questionnaire, consultation and validation were conducted by engaging four experts and conducting a pilot study. Hypothesis testing was performed using the structural equation modeling method based on partial least squares.
Findings
The results of the partial least square structural model assessment showed that application efficiency and data security positively influenced the intention to continue using Islamic bank, while application architecture had no effect. Furthermore, data security could not moderate the relationship between application architecture and efficiency toward the intention to continue using Islamic bank.
Practical implications
The results of this study suggested that Islamic banking practitioners must prioritize the enhancement of digital banking services, with a specific focus on improving application efficiency and ensuring robust data security. These two dimensions were critical determinants influencing the intention to continue using Islamic bank.
Originality/value
This study addressed the issue of data security as a moderator, particularly in the context of hacker attacks targeting a major Islamic bank in Indonesia. Furthermore, this current report expounded on the study conducted by Mir et al. (2022) by introducing novel dimensions to the e-service quality of internet banking.
Details
Keywords
Dien Van Tran, Phuong V. Nguyen, Linh Phuong Le and Sam Thi Ngoc Nguyen
This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to…
Abstract
Purpose
This paper aims to investigate the influence of cybersecurity awareness and compliance attitudes on the protective behaviours exhibited by employees. This study also aims to explore the complex correlation between the level of awareness about cybersecurity measures and attitudes towards compliance with these measures. Additionally, it looks at how these factors collectively impact employees’ behaviour to protect organisational assets and information.
Design/methodology/approach
This study uses a quantitative research methodology in which primary data are gathered using a survey questionnaire distributed to personnel employed at Vietnamese organisations. The data are analysed, and the validity of the measurement and structural equation model is assessed using a partial least squares–structural equation model approach after the collection of all the survey responses.
Findings
The provision of policies and security education, training and awareness programmes are strongly and positively associated with cybersecurity awareness. Moreover, cybersecurity awareness plays an important role in shaping attitudes and intentions towards information security policy compliance (ISPC). Attitude is positively associated with intention towards ISPC and employee protective behaviour. Finally, the intention towards ISPC is significant in shaping employee protective behaviour.
Originality/value
This study contributes to the understanding of the antecedents of cybersecurity in developing countries such as Vietnam. Furthermore, it provides a comprehensive framework for understanding intention and protective behaviour through cybersecurity awareness and compliance attitudes. By combining the theory of planned behaviour and protection motivation theory with institutional governance, this study extends previous research on the effects of these variables on employee protective behaviour.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details