A general morphological analysis: delineating a cyber-security culture

2017 ◽  
Vol 25 (3) ◽  
pp. 259-278 ◽  
Author(s):  
Noluxolo Gcaza ◽  
Rossouw von Solms ◽  
Marthie M. Grobler ◽  
Joey Jansen van Vuuren

Purpose The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were deemed to be the ultimate solution. Nowadays, however, it is accepted that the process of cyber security requires much more than mere technical controls. On the contrary, it now demands a human-centred approach, including a cyber security culture. Although the role of cultivating a culture in pursuing cyber security is well appreciated, research focusing intensely on cyber security culture is still in its infancy. Additionally, knowledge on the subject is not clearly bounded and defined. Design/methodology/approach General morphological analysis (GMA) is used to define, structure and analyse the cyber security environment culture. Findings This paper identifies the most important variables in cultivating a cyber security culture. Research implications The delineation of the national cyber security domain will contribute to the relatively new domain of cyber security culture. They contribute to the research community by means of promoting a shared and common understanding of terms. It is a step in the right direction towards eliminating the ambiguity of domain assumptions. Practical implications Practically, the study can assist developing nations in constructing strategies that addresses the key factors that need to be apparent in lieu to cultivating its envisaged national culture of cyber security. Additionally, the GMA will contribute to the development of solutions or means that do not overlook interrelations of such factors. Originality/value Delineating and defining the cyber security culture domain more precisely could greatly contribute to realizing the elements that collectively play a role in cultivating such a culture for a national perspective.

Author(s):  
Shirley C. Sonesh ◽  
Angelo S. DeNisi

Purpose – Although several authors have suggested that host country nationals (HCNs) play an important role in the management of expatriates (e.g. Toh and DeNisi, 2003; Farh et al., 2010), research has also suggested that this relationship is not always good, and the flow of critical information to expatriates can be limited. This is especially true when HCNs categorize the expatriates as “out-group” members. The purpose of this paper is to examine potential determinants of categorization decisions as well as potential outcomes related to expatriate socialization. Design/methodology/approach – The paper employs a dyadic survey approach to determine the antecedents to expatriate categorization and HCN socialization behaviors from the perspective of both the expatriate and HCN. Findings – The results of survey data from 65 expatriate-HCN dyads indicated that expatriate ethnocentrism and the salience of the expatriates’ nationality were important predictors of categorization, but that categorization was related to only one dimension of socialization. However, affect was found to play a role in predicting socialization behaviors. Research limitations/implications – There is potential selection bias since expatriates chose HCNs as respondents, but results suggested this was not a serious problem. Other limitations include a relatively small sample size and the fact that a number of contextual issues such as national stereotypes and MNC strategy, are not controlled for. Practical implications – Implications of these findings for the successful management of expatriate assignments include sending over expatriates with the right relational skills, and those low in ethnocentrism, rather than just the right technical skills. Originality/value – The present study was one of the first to empirically test the potential role of categorization in the process of socialization.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Norfaridah Ali Azizan ◽  
Amirul Afif Muhamat ◽  
Sharifah Faigah Syed Alwi ◽  
Husniyati Ali ◽  
Amalia Qistina Casteneda Abdullah

PurposeWaqf (endowment) lands constitute as among the highest types of waqf (endowment) properties in Malaysia; yet it is still unable to reach its maximum potential due to various challenges such as capital, location, legal and administrative issues. Therefore, this study intends to explore these issues by focussing on the two states in Malaysia (Selangor and Perak) that have fertile lands but different management authorities.Design/methodology/approachThere were series of interviews that had been conducted with ten (10) key informants who are experts and practitioners in the areas of Shariah (Islamic law), farming, agribusiness, land management and waqf.FindingsFindings exhibit that constraints and challenges that had been highlighted in the previous literature still exist (although some improvements had been made), but there is emerging theme that the study intends to highlight which is on the needs to secure market for the agribusiness produce and the potential role of anchor company in the agribusiness. It is pertinent that for agribusiness to thrive, selecting the right anchor company that has the capacity to address the challenges is necessary. This study posits two anchor company models (Waqf Trustee-Anchor Company and Waqf Trustee-Anchor Company-Community Farmers) that can be applied for agribusiness on the waqf lands.Research limitations/implicationsThis study is based on the Malaysia's context influenced by specific country's features. Nevertheless, such findings can still be used as reference or benchmark by other endowment trustees in other countries especially for the Muslim countries as well as the non-Muslim countries that have significant Muslim populations.Social implicationsThe suggested models have potentials to improve the living condition of the B40 (below 40% household income) in Malaysia because the models encourage their participation in the agribusiness activities.Originality/valueThis study focusses on the agribusiness, which is rarely being given attention in previous literature in the context of endowment lands. Therefore, this article bridges the literature gap and at the same time attempts to provide suggestion to address the pertinent issue – the underutilised endowment lands.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Felicitas Hoppe ◽  
Nadine Gatzert ◽  
Petra Gruner

PurposeThis article aims to gain insights on the current state of small- and medium-sized enterprises’ (SMEs’) cyber risk management process and to derive future research directions.Design/methodology/approachThis is done by collecting market insights from 37 recent industry surveys and structuring them based on the steps of the risk management process. From this analysis, major challenges are derived and future fields of research identified.FindingsThe results indicate that deficiencies in risk culture as well as the strained market for IT experts are the major obstacles with respect to the implementation of cyber risk management in SMEs, and that these challenges are similar across countries. The findings suggest that especially the relationship between cyber security culture and cyber risk management should be investigated further, and that a stronger link between the research streams on enterprise risk management and cyber risk management would be desirable.Originality/valueThis paper contributes to the literature by providing a systematic overview on the current state of SMEs' cyber risk management from a market perspective. The findings provide support for the existing academic literature by emphasizing the central role of cyber security culture (perception, knowledge, attitude) for a successful cyber risk management, which however should be addressed in more depth in future (empirical) research.


Author(s):  
Abhilash Panda ◽  
Andrew Bower

Purpose The purpose of this paper is to concentrate on the place of cyber security risk in the framework of global commitments adopted in 2015 to reduce disaster risks in an all-hazards approach. It explores the correlations between traditional risks associated with critical infrastructures – as understood by the Sendai framework – cyber security risks and the cascading effects characteristic of today’s complex and interrelated shocks and stresses. It takes a step further, expanding the focus of traditionally understood technological risks to explore cyber security risks, at the heart of our societies’ digital transformations,and showcase opportunities from the European context. Design/methodology/approach By reviewing existing literature on cyber security, disaster resilience and cascading disasters, this paper highlights current challenges and good practices undertaken by various governments. Findings Understanding disaster risks is a precondition to improving the mitigation of impacts of existing risks and preventing new risks. Effective risk reduction relies on a solid understanding of losses resulting from events to inform future actions, and on the assessment of risks relying on a robust evidence base and state-of-the-art scientific capacity to model and simulate potential hazards. In this context, embedding cyber security risks, and the complexity of cascading impacts in improving the understanding of disaster risks, calls for appropriate methods and tools allowing for a multi-risk and holistic focus to the assessment of risks and the planning of risk management capacities that follow. Research limitations/implications Globally and in Europe, focus on interconnected risk and their impacts is steadily increasing. Risk assessments are still conservative; incorporation of cyber resilience into national and local level DRR plans is yet not visible. Originality/value Existing research is restricted to cyber security and disaster resilience, as separated subjects. This paper, for the first time, brings together the interconnection between the two topic options to address them.


2017 ◽  
Vol 29 (3) ◽  
pp. 569-588 ◽  
Author(s):  
Massoud Moslehpour ◽  
Wing-Keung Wong ◽  
Kien Van Pham ◽  
Carrine K. Aulia

Purpose The purpose of this paper is to bridge the gap in the literature to examine key factors that influence Taiwanese consumers to repurchase Korean beauty products. Design/methodology/approach This study uses a quantitative approach to test the proposed hypotheses using structural equation modeling. Causal research design is used in this research to identify cause-and-effect relationship among the constructs. Primary data collection is used to gather data. This study provides the better understanding about key factors that influence Taiwanese consumers’ repurchase intention (RI) of Korean cosmetics products. Findings Results show that perceived price (PP) and country of origin (COO) significantly influence word-of-mouth (WOM). PP, COO and WOM significantly influence RI. WOM is the most influential variable toward RI, followed by COO and PP. Originality/value Very few studies have examined a general construct of RI related to beauty product. The findings of this study imply several practical directions for marketers of beauty product industries specifically for Taiwanese consumers. This study helps to know what factors become basic consideration for Taiwanese consumers in repurchasing Korean beauty products. Second, it underscores the role of WOM between the independent variables (PP and COO) and RI as the dependent variable.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Farshid Riahi Dorcheh ◽  
Seyed Hossein Razavi Hajiagha ◽  
Misagh Rahbari ◽  
Vahid Jafari-Sadeghi ◽  
Hannan Amoozad Mahdiraji

PurposeIn recent years, and especially during the coronavirus disease 2019 (COVID-19) pandemic, the significant role of agriculture, specifically red meat, in household consumption has been increased. On the other hand, the lack of proper policymaking in the production and pricing of red meat and the lack of a comprehensive study on the beef supply chain has led to a reduction in the role of this protein product in the household food basket. Thus, in this research, comprehensive strategic planning considering the effect of the COVID-19 pandemic has been illustrated to overcome the aforementioned problems.Design/methodology/approachTo study the intended objectives, first, using qualitative methods, the strengths, weaknesses, opportunities and threats (SWOT) to the studied company's supply chain in Iran were identified and then using the SWOT-Quantitative Strategic Planning Matrix (QSPM) technique, the surrounding strategies have been analysed.FindingsThe results indicate that the most important strength of the studied company is the “access to the red meat market of the retirement plan”; the most important weakness is the “lack of required and on-time funding, especially in the condition of the COVID-19 pandemic”; the highest-ranked opportunity is the “access to banking facilities” and the main threat to the company is the “COVID-19 pandemic limitations and health protocols”. In the same vein, by examining the attractiveness score of internal and external factors, it was observed that diversity and competitive strategies would have a higher priority. Finally, the QSPM illustrated that activating the full capacity of existing infrastructure has the highest priority.Originality/valueAccording to the red meat supply chain and the link amongst different market levels, identifying, analysing and improving the beef supply chain is of particular importance. One of the threats facing the international community is the emergence of events such as the COVID-19 pandemic, which requires businesses to choose the right strategy to deal with the issue. Therefore, the main distinction of this study is to identify, analyse and improve the red meat supply chain of a real case due to the condition of the COVID-19 pandemic.


Author(s):  
M. Pleskach

The article is devoted to the issue on balancing the important interests of a person, a society and the state in cyber space by means of administrative law. The purpose of this article is to determine the legal nature and the role of the correspondence of the important interests of a person, a society and the state in cyber space in the context of administrative and legal provision of cyber security. The paper also deals with a proper balance between the law-enforcement interests of the state and the respect for fundamental human rights. The method of analysis has revealed in clarifying some features of concepts "interest", "need", "right". The method of synthesis has been used to define common concepts, for example "person's interest in cyberspace". Comparative legal method has been used in the process of comparison of the legislation of Ukraine and the international legislation that governs the issue on balancing the important interests of a person, a society and the state in cyber space. The author of this research presents the possible structure of person's cyber security through a set of important person's rights and interests in cyberspace, for example, the right to access to the Internet; the right to protect personal data in cyberspace; the right to be protected from aggressive marketing technologies in cyberspace, the prohibition of monitoring, including through cookies, HTTP, HTML5 markers or other technologies; the right to education, the right to access knowledge through the use of cyberspace etc. Conclusions and proposals of this research can be used for further research and for improving the administrative and information legislation of Ukraine, including the Law of Ukraine "On the Fundamental Principles of Cyber Security of Ukraine". Keywords: the balance of interests of the person, society and state, cyber space usage, public interest, private interest.


2020 ◽  
Vol 52 (1) ◽  
pp. 65-80
Author(s):  
Hector Augusto Torres ◽  
Andres Chiappe ◽  
Yasbley Segovia

Purpose The purpose of this paper is to identify in the specialized literature published in the past 20 years about sales training, some elements or key factors that could be applied to the use of information and communication technologies (ICT) as a support for the learning of the detection of business opportunities. Design/methodology/approach This is a study of a documentary nature in which a method of systematic literature review was applied to 132 studies published in journals indexed in Scopus and Scielo on sales training processes. The analysis of the data combined a process of categorization and frequencies statistical analysis. Findings The results highlight the role of ICT and specifically the use of mobile devices to support the strengthening of training in sales in terms of relationship, opportunity and flexibility in communication with the client, the construction of positive emotional environments and experiential/situated training. Originality/value The originality of this study lies in the extraction and interpretation of key factors focused on addressing a guiding question about the relationships between the use of ICT and sales training.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Stuart Reid

PurposeThe study seeks to shed light on the generative principles of enterprising by examining the practices of enterprisers in six lifestyle enterprises in Sweden. It presents a fresh approach to the study of lifestyle enterprises, resolving a nuanced treatment of the concepts of capital and habitus as often drawn upon in studies using the social theory of Pierre Bourdieu.Design/methodology/approachThis study uses a grounded theory approach to examine enterprising practices in six lifestyle enterprises in Sweden. Study materials are derived principally from ethnographic observations and active interviews. The analytical procedure follows that of grounded theory, the analysis proceeding from the first field contacts and developing iteratively as the corpus expanded, with empirical themes giving way to formative concepts and sensitizing to the theoretical architecture of Pierre Bourdieu.FindingsThe findings offer insights into lifestyle enterprising, revealing how resourcing practices of capital deployment give shape to its practice. The findings reveal that capital deployment practices are not simply about conversion but may also involve practices, without substantive change to capital forms. Furthermore, the findings highlight that habitus significantly influences capital deployment practices.Research limitations/implicationsAlthough the findings are limited to the study context, the study offers theoretical implications for study of enterprising. One is to highlight the importance of cultural capital in enterprising practices. Another is to highlight the variable construction of capitals, arising in connection to habitus. In pointing to the central generative role of habitus, the study suggests that cultural capital may underpin the formation of social capital. Overall, the findings indicate that researchers need to consider the mediating effects of habitus when investigating enterprising practices. More widely, this study responds and lends weight to, recent calls for more holistic and integrated treatments using Bourdieu's theory to further understandings of entrepreneurship as practice.Practical implicationsThis study offers implications for policy relating to enterprising practice. In particular, findings suggest that it might be wise to consider the alignment of habitus between those who provide and receive support, or in other words, having providers with the right cultural competence to offer useful help. It may be important for policy agents to be able to relate to the worldviews of those they seek to support.Originality/valueThe study directly responds to recent calls for more holistic and integrated approaches to the nascent line of inquiry using Bourdieu’s theory to gain insight into entrepreneurship as a practice, particularly in relation to the undertheorized phenomenon of lifestyle entrepreneurship. In doing so, the study serves to advance the practice-oriented conceptualization of lifestyle entrepreneurship as lifestyle entrepreneuring. The paper also offers a conceptual framework to assist researchers investigating enterprising practice.


2020 ◽  
Vol 13 (1) ◽  
pp. 103-128 ◽  
Author(s):  
Shipra Pandey ◽  
Rajesh Kumar Singh ◽  
Angappa Gunasekaran ◽  
Anjali Kaushik

Purpose The purpose of this study is to examine cyber security risks in globalized supply chains (SCs). It has been seen to have a greater impact on the performance of SCs. The information and communication technology of a firm, which enhances the efficiency and effectiveness in the SC, could simultaneously be the cause of vulnerabilities and exposure to security threats. Researchers have primarily focussed on the cyber-physical system (CPS) vulnerabilities impacting SC. This paper tries to categorize the cyber security risks occurring because of the SCs operating in CPS. Design/methodology/approach Based on the flow of information along the upstream and downstream SC, this paper tries to identify cyber security risks in the global SCs. It has further tried to categorize these cyber security risks from a strategic point of view. Findings This paper tries to identify the various cyber security risk and cyber-attacks in globalized SC for improving the performance. The 16 cyber security risks have been categorized into three categories, namely, supply risk, operational risk and demand risk. The paper proposes a framework consisting of different cyber-attacks across the information that flows in global SCs along-with suitable mitigation strategies. Research limitations/implications The paper presents the conceptual model of cyber security risks and cyber-attacks in globalized SCs based on literature review and industry experts. Further validation and scale development of these risks can be done through empirical study. Practical implications This paper provides significant managerial insights by developing a framework for understanding the cyber security risks in terms of the drivers of these risks and how to deal with them. From a managerial perspective, this framework can be used as a decision-making process while considering different cyber security risks across the stages of globalized SCs. Originality/value The major contribution of this study is the identification and categorization of cyber security risks across the global SCs in the digital age. Thus, this paper introduces a new phenomenon to the field of management that has the potential to investigate new areas of future research. Based on the categorization, the paper provides insights on how cyber security risks impact the continuity of SC operations.


Sign in / Sign up

Export Citation Format

Share Document