scholarly journals How does intellectual capital align with cyber security?

2019 ◽  
Vol 20 (5) ◽  
pp. 621-641 ◽  
Author(s):  
Karen Renaud ◽  
Basie Von Solms ◽  
Rossouw Von Solms

Purpose The purpose of this paper is to position the preservation and protection of intellectual capital as a cyber security concern. The paper outlines the security requirements of intellectual capital to help boards of directors (BoDs) and executive management teams to understand their responsibilities and accountabilities in this respect. Design/methodology/approach The research methodology is desk research. In other words, we gathered facts and existing research publications that helped us to define key terms, to formulate arguments to convince BoDs of the need to secure their intellectual capital and to outline actions to be taken by BoDs to do so. Findings Intellectual capital, as a valuable business resource, is related to information, knowledge and cyber security. Hence, preservation thereof is also related to cyber security governance and merits attention from BoDs. Research limitations/implications This paper clarifies BoDs intellectual capital governance responsibilities, which encompass information, knowledge and cyber security governance. Practical implications The authors hope that BoDs will benefit from the clarifications, and especially from the positioning of intellectual capital in cyber space. Social implications If BoDs know how to embrace their intellectual capital governance responsibilities, this will help to ensure that such intellectual capital is preserved and secured. Originality/value This paper extends a previous paper published by Von Solms and Von Solms, which clarified the key terms of information and cyber security, and the governance thereof. The originality and value is the focus on the securing of intellectual capital, a topic that has not yet received a great deal of attention from security researchers.

2018 ◽  
Vol 26 (1) ◽  
pp. 2-9 ◽  
Author(s):  
Basie von Solms ◽  
Rossouw von Solms

Purpose The purpose of this paper is to define cybersecurity and cybersecurity governance in simplified terms – to explain to the boards of directors and executive management their responsibilities and accountabilities in this regard. Design/methodology/approach The primary research methodology utilized in this paper is desk research. A literature study is followed by some discussion in terms of the contribution made. Findings Clearly define the relationship between cybersecurity and information security, especially from a governance perspective. Research limitations/implications The paper is based predominantly on an ISO standard. Originality/value The simplification of terminology to be used in the governance of cybersecurity, together with assistance to the guiding of boards of directors regarding their duties and responsibilities as far as cybersecurity is concerned.


Subject China and the global internet governance regime. Significance Cyber security was a leading topic at the Global Conference on Cyberspace that took place on April 16-17 in The Hague. As online tensions escalate and cyber attacks grow in prevalence, the direction of Chinese policy will be crucial in determining the future of the global internet. At the same time, the United States has lost much political capital and bargaining power. Impacts China may try to establish alternative internet structures and systems. China's conception of national sovereignty will hold back the cooperation procedures necessary to manage cyber space incidents. Without international cooperation, countries and companies may seek to retaliate against cyber attacks rather than merely ward them off.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Francisca Tejedo-Romero ◽  
Joaquim Filipe Ferraz Esteves Araujo

PurposeThe main objective of this paper is to analyse the content and extent of human capital disclosure by Spanish companies. It studies various factors related to the board of directors’ composition and functioning. These factors can be seen as mechanisms of corporate governance and the moderating role of managerial ownership, which help predict the behaviour of managers in relation to the human capital disclosure.Design/methodology/approachThis study develops and applies a more comprehensive framework for coding information on human capital, integrating the intellectual capital and social responsibility perspectives in order to explain the content and extent of human capital disclosure. The research was based on a content analysis of 210 corporate reports from 2007 to 2016. A system-GMM estimator was used to test the hypotheses in four dynamic linear regression models of balanced panel data in order to address concerns of endogeneity.FindingsThe results show that companies are adapting to new regulations and voluntarily disclosing information on human capital – a trend which signals their commitment to responsible attitudes towards employees and stakeholders. The results also show that board composition and functioning are mechanisms of supervision, control and legitimacy that promote human capital disclosure, with managerial ownership acting as moderator for aligning interests between managers and stakeholders.Originality/valueThis study contributes to the literature on human capital disclosure by introducing a broader conception of human capital to coding information. It accomplishes this through considering aspects of the intellectual capital and social responsibility approaches, which provide a better understanding of companies’ human capital disclosure. In addition, it seeks to enrich the debate about the effects of corporate governance mechanisms– such as boards of directors and managerial ownership – on human capital disclosure.


2019 ◽  
Vol 27 (1) ◽  
pp. 47-61 ◽  
Author(s):  
Qais Saif Qassim ◽  
Norziana Jamil ◽  
Maslina Daud ◽  
Ahmed Patel ◽  
Norhamadi Ja’affar

Purpose The common implementation practices of modern industrial control systems (ICS) has left a window wide open to various security vulnerabilities. As the cyber-threat landscape continues to evolve, the ICS and their underlying architecture must be protected to withstand cyber-attacks. This study aims to review several ICS security assessment methodologies to identify an appropriate vulnerability assessment method for the ICS systems that examine both critical physical and cyber systems so as to protect the national critical infrastructure. Design/methodology/approach This paper reviews several ICS security assessment methodologies and explores whether the existing methodologies are indeed sufficient to meet the cyber security assessment exercise required to validate the security of electrical power control systems. Findings The study showed that most of the examined methodologies seem to concentrate on vulnerability identification and prioritisation techniques, whilst other security techniques received noticeably less attention. The study also showed that the least attention is devoted to patch management process due to the critical nature of the SCADA system. Additionally, this review portrayed that only two security assessment methodologies exhibited absolute fulfilment of all NERC-CIP security requirements, whilst the others only partially fulfilled the essential requirements. Originality/value This paper presents a review and a comparative analysis of several standard SCADA security assessment methodologies and guidelines published by internationally recognised bodies. In addition, it explores the adequacy of the existing methodologies in meeting cyber security assessment practices required for electrical power networks.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Puzant Balozian ◽  
Dorothy Leidner ◽  
Botong Xue

PurposeIntellectual capital (IC) cyber security is a priority in all organizations. Because of the dearth in IC cyber security (ICCS) research theories and the constant call to theory building, this study proposes a theory of ICCS drawing upon tested empirical data of information systems security (ISS) theory in Lebanon.Design/methodology/approachAfter a pilot test, the authors tested the newly developed ISS theory using a field study consisting of 187 respondents, representing many industries, thus contributing to generalizability. ISS theory is used as a proxy for the development of ICCS theory.FindingsBased on a review of the literature from the past three decades in the information systems (IS) discipline and a discovery of the partial yet significant relevance of ISS literature to ICCS, this study succinctly summarized the antecedents and independent variables impacting security compliance behavior, putting the variables into one comprehensive yet parsimonious theoretical model. This study shows the theoretical and practical relevancy of ISS theory to ICCS theory building.Practical implicationsThis paper highlights the importance of ISS compliance in the context of ICCS, especially in the area of spoken knowledge in environments containing Internet-based security devices.Originality/valueThis research article is original, as it presents the theory of ICCS, which was developed by drawing upon a comprehensive literature review of the IS discipline and finding the bridges between the security of both IS and IC.


2020 ◽  
Vol 51 (3) ◽  
pp. 94-102
Author(s):  
MICHAEL M. PUTYATO ◽  
◽  
ALEXANDER S. MAKARYAN ◽  
Keyword(s):  

2017 ◽  
Vol 31 (2) ◽  
pp. 69-82 ◽  
Author(s):  
Therese R. Viscelli ◽  
Dana R. Hermanson ◽  
Mark S. Beasley

SYNOPSIS Since the early 2000s, expectations have increased for organizations to strengthen corporate governance with enterprise risk management (ERM) processes, with the accounting profession playing a major role in these efforts. The ultimate goal of an effective ERM process is to help boards and senior executives to manage risks in the context of strategy so that the organization is more likely to achieve its key objectives. We conduct semi-structured interviews of 15 ERM champions to provide insights about whether the ERM process is integrated with the strategic-planning and execution processes of the firm. We find that while the decision to launch ERM often is based on a desire for ERM to provide strategic value, the integration of ERM with strategy typically is limited. We then examine the ERM implementation process to identify possible ERM implementation practices limiting ERM's integration with strategy. We find that organizations' (1) culture and approach to preparing for ERM's launch, (2) ERM leadership structure, and (3) management of key risks appear to limit the intersection of ERM and strategy. Our summary of key findings highlights important considerations for boards of directors, executive management, and auditors as they assess the effectiveness of their risk oversight efforts in overseeing the strategic direction of the enterprise.


2019 ◽  
Vol 38 (10) ◽  
pp. 796-811 ◽  
Author(s):  
Stuart Allen ◽  
Louis W. Fry

Purpose Spiritual topics emerge in executive leadership coaching. However, the scholarly literature has emphasized the performance development aspects of executive coaching (EC) more than the development of executives’ inner lives, although there is some evidence of practitioners addressing spiritual topics. Executive leaders have spiritual needs and executive coaches may be well positioned to address the intersection of the leaders’ work and spiritual lives, provided coaches observe skill boundaries and the limitations of the coaching context. The purpose of this paper is to discuss the merits of including spiritual development (SDev) in EC and how executive coaches can incorporate it in their practice. Design/methodology/approach EC, SDev and spiritual direction are compared, drawing attention to conflicting and complementary aspects of SDev applied in EC. Organizations’, clients’ and coaches’ likely concerns about such integration are explored and addressed. Suitable contexts, principles, a basic developmental framework and practical steps for executive coaches considering the inclusion of SDev in EC are proposed. Findings The paper provides coaches, consultants, executives and those charged with executive development with a foundational understanding of the role of SDev in EC. Originality/value A framework is provided for professionals involved in executive management development to address executive leaders’ spiritual needs through EC.


2018 ◽  
Vol 19 (5) ◽  
pp. 935-964 ◽  
Author(s):  
Neha Smriti ◽  
Niladri Das

Purpose The purpose of this paper is to examine the effect of intellectual capital (IC) on financial performance (FP) for Indian companies listed on the Centre for Monitoring Indian Economy Overall Share Price Index (COSPI). Design/methodology/approach Hypotheses were developed according to theories and literature review. Secondary data were collected from Indian companies listed on the COSPI between 2001 and 2016, and the value-added intellectual coefficient (VAIC) of Pulic (2000) was used to measure IC and its components. A dynamic system generalized method of moments (SGMM) estimator was employed to identify the variables that significantly contribute to firm performance. Findings Indian listed firms appear to be performing well and efficiently utilizing their IC. Overall, human capital had a major impact on firm productivity during the study period. Furthermore, the empirical analysis showed that structural capital efficiency and capital employed efficiency were equally important contributors to firm’s sales growth and market value. The growing importance of the contribution of IC to value creation was consistently reflected in the FP of these Indian companies. Practical implications This study has robust theoretical grounds and employs a validated methodology. The present study extends knowledge of IC among academicians and managers and highlights its contribution to value creation. The findings may help stakeholders and policymakers in developing countries properly reallocate intellectual resources. Originality/value This study is the first study to evaluate IC and its relationship with traditional measures of firm performance among Indian listed firms using dynamic SGMM and VAIC models.


2015 ◽  
Vol 16 (1) ◽  
pp. 174-198 ◽  
Author(s):  
Stefania Veltri ◽  
Andrea Venturelli ◽  
Giovanni Mastroleo

Purpose – The purpose of this paper is to propose a method to measure intellectual capital (IC) in firms involved in strategic alliances, an area that has received scant attention in the literature, as existing research is focused mainly on organizational level mainly and increasingly on macro-level unit such as regions or nations. There are very few works at the meso-level (i.e. alliances, clusters), and the paper aims to fill this void, by providing researchers and practitioners with a tool capable of combining measurement and management aims, developed at organizational level with the active participation of the researchers. Design/methodology/approach – The method of analysis is based on a model formalized through a fuzzy expert system (FES). The FES are able to merge the capabilities of an expert system to simulate the decision-making process with the vagueness typical of human reasoning, maintaining the ability to still have a numeric value as a response. Its construction requires the participation of experts, whose knowledge of the problem is accumulated in the form of blocks of rules. These features make it possible to formalize the decision-making process related to the IC valuation, handling qualitative and quantitative variables, and exploring the cognitive mechanisms underlying this process. Findings – The outcome of the application is a system designed to measure the intangible performance deriving from participation in a strategic alliance using FES. This study contributes to the broadening of the research community’s understanding regarding the alternative measurement of IC created within strategic alliances. Research limitations/implications – To the best of the authors’ knowledge, IC literature lacks methods expressly designed to measure the incremental value of IC originating from collaboration among firms. From a measurement perspective, the results may be regarded as valuable proof that IC performance within strategic alliances can be measured quantitatively. Practical implications – On the management side, the possibility of retracing the determinants of different IC intermediate indicators composing the final IC index allows strategic alliances managers to use this information for decision-making purposes. Originality/value – To the best of the authors’ knowledge this is the first study applying FES to measure IC in a firm belonging to a strategic alliance. In the authors’ opinion, fuzzy logic methodology, recently applied in empirical work designed to evaluate IC, represents a reliable methodology because of the “fuzzy” nature of IC.


Sign in / Sign up

Export Citation Format

Share Document