scholarly journals Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs)

2019 ◽  
Vol 27 (3) ◽  
pp. 393-410 ◽  
Author(s):  
Maria Bada ◽  
Jason R.C. Nurse

PurposeThe purpose of this study is to focus on organisation’s cybersecurity strategy and propose a high-level programme for cybersecurity education and awareness to be used when targeting small- and medium-sized enterprises/businesses (SMEs/SMBs) at a city-level. An essential component of an organisation’s cybersecurity strategy is building awareness and education of online threats and how to protect corporate data and services. This programme is based on existing research and provides a unique insight into an ongoing city-based project with similar aims.Design/methodology/approachTo structure this work, a scoping review was conducted of the literature in cybersecurity education and awareness, particularly for SMEs/SMBs. This theoretical analysis was complemented using a case study and reflecting on an ongoing, innovative programme that seeks to work with these businesses to significantly enhance their security posture. From these analyses, best practices and important lessons/recommendations to produce a high-level programme for cybersecurity education and awareness were recommended.FindingsWhile the literature can be informative at guiding education and awareness programmes, it may not always reach real-world programmes. However, existing programmes, such as the one explored in this study, have great potential, but there can be room for improvement. Knowledge from each of these areas can, and should, be combined to the benefit of the academic and practitioner communities.Originality/valueThe study contributes to current research through the outline of a high-level programme for cybersecurity education and awareness targeting SMEs/SMBs. Through this research, literature in this space was examined and insights into the advances and challenges faced by an on-going programme were presented. These analyses allow us to craft a proposal for a core programme that can assist in improving the security education, awareness and training that targets SMEs/SMBs.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Harmen S. Wijbenga ◽  
Paul C. van Fenema ◽  
Nynke Faber

Purpose The purpose of the study is to diagnose recurrent logistics problems in a public organization’s network of logistics entities, determining the maturity level of each supply chain (SC) function, and trying to link problems within the SC functions to the maturity level by using the case study method. Design/methodology/approach Extant research on supply chain management (SCM) maturity is combined with notions of SC flows and disciplines. The resulting SCM Disciplines Maturity model comprises multiple diagnostic steps. It is illustrated by means of a developmental case study at a large public organization facing recurrent logistics problems in routine processes. Findings The model is shown to be a useful instrument to obtain insight into linkages between recurrent logistics problems and the way an SCM organization harbors multiple SCM disciplines. Originality/value The paper examines recurrent logistics problems in relation to SCM maturity, a relatively unknown research subject. It shows how SCM maturity thinking can support the diagnosis of recurrent problems. In a rapidly changing world, it enables further research on diagnosis as a dynamic capability.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


2017 ◽  
Vol 59 (7/8) ◽  
pp. 706-719 ◽  
Author(s):  
Sarah Jeanne Pannone

Purpose The purpose of this paper is to investigate how a homeschool education influences entrepreneurial characteristics and activity. Design/methodology/approach A collective case study design was used to investigate how a homeschool education influences entrepreneurial characteristics and activity. Findings From the participant interviews, surveys, and document analysis, three salient themes emerged. First, participants noted that their home education, at least in later years, was largely self-directed and that this independent, self-motivated type of learning impacted their subsequent entrepreneurial activities. Next, participants also related that they believed the alternative nature of their homeschooling education and its emphasis on being comfortable with being different influenced their entrepreneurial pathway. Finally, the third theme to surface was the idea that homeschooling helped develop an internal locus of control, a belief that is helpful in entrepreneurial undertakings. Research limitations/implications Research limitations included a lack of generalizability due to a small sample size and possible selection bias. Practical implications Despite these shortcomings, however, several implications exist. For example, the findings from this study show that homeschooling may be a viable alternative education method for parents looking to encourage entrepreneurial traits and activities in their children. Social implications Future areas of research were also identified, including a call to research the role locus of control plays in homeschooled students. Originality/value This study addresses an area that, to the knowledge of this researcher, is completely lacking from the research literature.


2017 ◽  
Vol 33 (2) ◽  
pp. 4-6
Author(s):  
Richard Calvi

Purpose According to Christopher (2000), in a lot of sectors, the competition is a question of supply chain against supply chain. The winner in term of competitive advantage should be the one, who is able to obtain more than the competitor from the available resources. In strategic literature, Dyer and Singh (1998) are the first who introduced the concept of “relational competency” to explain why some companies gain their competitive advantage not directly from their internal resources but mainly because they are able better to combine external resources. Design/methodology/approach This paper is a case study. Findings The author describes the different phases and strategic decisions in the building of a real supplier eco-system. Research limitations/implications It is a sole case study. Practical implications This study is a description of a success story. Originality/value This study is a description of an external resource management in action.


2017 ◽  
Vol 22 (1) ◽  
pp. 30-34
Author(s):  
Robert Stănciulescu

Abstract Specialized studies show how a fighter should physically be, not just any fighter, but the one who possesses the qualities and features of the ideal model, i.e. those elements that define the near-perfect fighter. The demands of the modern battlefield impose a high quality human potential that provides a good basis for the selection and training of fighters. Resistance to physical, climate, season and weather condition demands, to the prolonged efforts fighting requires is one of the important conditions of success. The paper presents information with particular impact in optimizing exercise capacity for future officers of the land forces, emphasizing once again the idea that a high level of motric ability is an essential objective.


2018 ◽  
Vol 10 (3) ◽  
pp. 344-356
Author(s):  
Michael Shattan ◽  
Adam Seybert ◽  
Robert Boone Gilbreath ◽  
Stephen Dahunsi ◽  
Howard L. Hall

Purpose The purpose of this paper is to explore the role of tabletop exercises (TTXs) in graduate nuclear security education, their effectiveness and their relationship to traditional forms of classroom instruction. The paper highlights both the benefits and challenges of TTX implementation—the former including higher student motivation and material retention, and the latter including motivational shifts toward “winning” and possible student exclusionary behavior. Design/methodology/approach Survey results from 49 former students in a US university were collected electronically and combined with anecdotal evidence from student, facilitator and teaching assistant interviews following five iterations of a specifically designed, semester-long, TTX case study. The case study focused on securing a fictional nuclear facility. Findings Students found the TTX more memorable and retained more course material when asked to compare the TTX’s effectiveness to long-term course projects in other courses. Their in-class motivations tended to shift from traditional classroom motivations toward “winning,” and “not letting down their classmates.” In some iterations, students also observed classmates becoming more tempted to cheat or otherwise violate academic ethics. Mitigation strategies to prevent such temptations (e.g. removing direct student vs student TTX structures) were found to be effective. Originality/value This is the first report on the effective use of a semester-long TTX in a graduate nuclear security classroom. The flexibility of this instructional tool demonstrates its applicability to other classroom subjects including homeland security, emergency management, disease outbreak management and public policy among others.


2019 ◽  
Vol 25 (3) ◽  
pp. 391-413 ◽  
Author(s):  
Andrea Caputo ◽  
Raffaele Fiorentino ◽  
Stefano Garzella

PurposeThe purpose of this paper is to examine some of the new capabilities that are required for the facilitation of business processes management (BPM) in the current political and technological landscape. Specifically, the goal is to investigate the role of firm boundaries, from a business processes perspective, in new contexts in which the affirmation of digitalization requires more integration across a complex network of partners.Design/methodology/approachThe paper is based on a review of relevant literature on BPM, firm boundaries and negotiation. By critically integrating this literature, a framework is developed with the objective of supporting the management of boundaries.FindingsBPM, new competitive contexts, and the technological landscape require the development and management of boundary capabilities. Among these capabilities, “boundary management” – how managers coordinate resources, activities and business processes on the boundaries of the firm – should play a key role. Moreover, as managers must continuously interact with multiple partners in digital supply chains, the organizational model of negotiation serves as a means of effectively managing firm boundaries.Practical implicationsThe framework offers insights and guidelines that can help practitioners manage the boundaries of business processes. The authors encourage a focus on business processes occurring at firm boundaries. Furthermore, the authors encourage the development of new capabilities in response to the needs of practitioners to ensure best practices of negotiation.Originality/valueThis study shifts the emphasis of BPM from the boundaries of management to the management of boundaries. By shedding light on new capabilities required, this paper enriches the BPM literature and can assist, on the one hand, in reconfiguring business processes in the new political and technological landscape and, on the other hand, in facilitating effective negotiation.


2018 ◽  
Vol 11 (2) ◽  
pp. 174-201 ◽  
Author(s):  
Gabriella Engström ◽  
Kristina Sollander ◽  
Per Hilletofth ◽  
David Eriksson

PurposeThe purpose of this study is to explore reshoring drivers and barriers from a Swedish manufacturing perspective.Design/methodology/approachThis paper is a case study, including four Swedish manufacturing companies, with focus on drivers and barriers from the context of the Swedish manufacturing industry. A literature review of previously established drivers and barriers is used to map out the empirical findings and thereby identify potential gaps between the current body of literature and drivers and barriers from a Swedish manufacturing context.FindingsThe findings of the study suggest that quality issues continue to be one of the strongest reshoring drivers. Except for product quality, quality is also connected to host country’s infrastructure, communication and service. The supply chain perspective is a source of several drivers and is identified as a perspective often overlooked in offshoring decisions. Barriers related to firm specifics were more elaborately discussed by the companies, especially concerning calculation of location decision and the need to invest in resources, which allows for a higher level of capacity at the home country facility.Research limitations/implicationsThe study develops a structured table of reshoring drivers and barriers which can serve as a base for future research. Future research on the calculation of location decisions is deemed as a crucial step to further understand reshoring and aid companies in the decision-making process.Practical implicationsThe drivers and barriers identified in the study can give practitioners insight into reshoring from the perspective of the Swedish manufacturing industry and thus aid in future manufacturing location decisions. The table of drivers and barriers can also be important to understand how Sweden can strengthen its competitive advantage and motivate more companies to reshore manufacturing.Originality/valueThis is one of only few papers from the Nordic countries and also one of few case studies examining reshoring in manufacturing companies.


2019 ◽  
Vol 36 (3) ◽  
pp. 266-283 ◽  
Author(s):  
Ana Pedro ◽  
João Piedade ◽  
João Filipe Matos ◽  
Neuza Pedro

PurposeThe construction of learning scenarios is a way to plan for teaching activities, promoting the development of skills related to problem solving, collaboration, critical thinking and creativity. Using learning scenarios as a lesson planning strategy becomes a powerful tool in initial teacher education. On the one hand, it mobilizes teaching-related scientific concepts, and on the other hand, it offers opportunities to think on innovative pedagogic approaches involving strategies and capacities essential for the future teacher. Research shows that teacher education programs within real school contexts enriched with digital technologies represent an important factor in increasing the quality of teachers’ preparation and their future professional practice. The paper aims to discuss these issues.Design/methodology/approachThe authors present the analysis of practice of design and implementation of learning scenarios in teachers’ initial education courses developed with students of teaching master degrees. Activity theory is used in the analysis of a case study of a student-teacher in Computer Science.FindingsThe results have been analyzed, contributing to the specification of the principles underlying the learning scenarios in initial teacher education.Research limitations/implicationsResults show the affordances and possibilities of using learning scenarios as structuring resources for the initial teacher education practice.Originality/valueTherefore, the use of learning scenarios brings a set of potentialities to teacher training given its prospective nature.


2018 ◽  
Vol 28 (3) ◽  
pp. 252-264 ◽  
Author(s):  
Cathrine Tambudzai Nengomasha ◽  
Alfred Chikomba

Purpose The purpose of this study was to investigate the adoption and use of electronic document and records management system (EDRMS) in the public service in Namibia and Zimbabwe with the aim of establishing barriers and enablers, and best practices which each country could adopt from the other. Design/methodology/approach This multi-case study was informed by an interpretivist paradigm. Qualitative in nature, the study applied face-to-face interviews as the data collection method, supplemented by documents analysis. The study population was Namibia and Zimbabwe’s public sectors with units of analysis, being the governments’ ministries, offices and agencies which have implemented EDRMS. Findings The paper provides the state of EDRMS implementation in Namibia and Zimbabwe. It establishes how the two countries have implemented EDRMS and factors that have contributed to the success/failure of the implementation in both countries. Originality/value The paper is a response to the need for further research studies on the implementation of EDRMS in various countries.


Sign in / Sign up

Export Citation Format

Share Document