sec Information Systems Success in the Public Sector: Stakeholders' Perspectives and Emerging Alignment Model By Published On :: Full Article
sec Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior By Published On :: Full Article
sec Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration By Published On :: Full Article
sec The Interface between Technological Protection Measures and the Exemptions to Copyright under Article 6 Paragraph 4 of the Infosoc Directive and Section 1201 of the Digital Millennium Copyright Act By Published On :: Full Article
sec Applying and Evaluating Understanding-Oriented ICT User Training in Upper Secondary Education By Published On :: Full Article
sec A Model of Introducing e-Learning System at Vocational College for Business Secretaries By Published On :: Full Article
sec Intelligent System for Information Security Management: Architecture and Design By Published On :: Full Article
sec Using a Learner-Centered Approach to Teach ICT in Secondary Schools: An Exploratory Study By Published On :: Full Article
sec Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises: A Research Agenda By Published On :: Full Article
sec A Framework for Information Security Management Based on Guiding Standards: A United States Perspective By Published On :: Full Article
sec SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security By Published On :: Full Article
sec Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption By Published On :: Full Article
sec Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol By Published On :: Full Article
sec Didactics of ICT in Secondary Education: Conceptual Issues and Practical Perspectives By Published On :: Full Article
sec Software Engineering Frameworks: Perceptions of Second-Semester Students By Published On :: Full Article
sec A Packet Sniffer (PSniffer) Application for Network Security in Java By Published On :: Full Article
sec Securing the Information and Communications Technology Global Supply Chain from Exploitation: Developing a Strategy for Education, Training, and Awareness By Published On :: Full Article
sec Information Security in Education: Are We Continually Improving? By Published On :: 2015-06-03 This paper will shed light on the lack of the development of appropriate monitoring systems in the field of education. Test banks can be easily purchased. Smart phones can take and share pictures of exams. A video of an exam given through Blackboard can easily be made. A survey to determine the extent of cheating using technology was given to several university students. Evidence is provided that shows security is lacking as evidenced by the number of students who have made use of technological advances to cheat on exams. The findings and conclusion may serve as evidence for administrators and policy makers to re-assess efforts being made to increase security in online testing. Full Article
sec CAPTCHA – Security affecting User Experience By Published On :: 2016-05-15 CAPTCHA - Completely Automated Public Turing test to tell Computers and Humans Apart - is a test with the aim to distinguish between malicious automatic software and real users in the era of Cyber security threats. Various types of CAPTCHA tests were developed, in order to address accessibility while implementing security. This research focuses on the users’ attitudes and experiences related to use of the different kinds of tests. A questionnaire accompanied by experiencing five different CAPTCHA tests was performed among 212 users. Response times for each test and rate of success were collected automatically. The findings demonstrate that none of the existing tests are ideal. Although the participants were familiar with the Text-based test, they found it the most frustrating and non-enjoyable. Half of the participants failed in the Arithmetic-based test. While most of the participants found the picture and game based test enjoyable, their response time for those tests was the largest. The age factor was encountered as influencing both the attitude of the user and the performance, while younger users are more tolerant, have a better success rate, and are faster, the elder users found the tests annoying and time-consuming. Full Article
sec The Impact of a University Experience Program on Rural and Regional Secondary School Students: Keeping the Flame Burning By Published On :: 2017-04-23 Aim/Purpose: The uptake of university by regional students has been problematic for various reasons. This paper discusses a program, initiated by a South Australian regional university campus, aimed at attracting regional students into higher education. Background: A qualitative descriptive approach to study was used to determine the value of the program on participating students and school staff. Year 10 students from Roxby Downs, Port Augusta and Port Lincoln high schools were invited to participate in a two-day regionally-focussed school-university engagement program that linked students with the university campus and local employers. Methodology: A survey was administered to determine the impact of the program. Perceptions about the program by school staff were gathered using a modified One-Minute Harvard questionnaire. While 38 Year 10 students and 5 school staff members participated, 37 students and 3 staff evaluated the program. Findings: The findings revealed that the majority of the students would like to attend university, but financial and social issues were important barriers. The students learned about the regional university, what it can offer in terms of programs and support, and the employment prospect following university. The school staff benefited by developing a closer relationship with students and becoming better informed about the regional university. Recommendation for Practitioners: One way by which university uptake may be increased is to provide similar immersion programs featuring engagement with employers, our recommendation to other regional universities. In increasing the levels of education, individuals, communities and the society in general are benefited. Full Article
sec The Role of Informing Systems in Securing Sanity and Wisdom of the Globalizing Society in the Context of Civilization Sustainability in the 21st Century: The Case of Poland By Published On :: 2018-05-18 Aim/Purpose: To monitor Sustainability Development Goals (SDG) established by the United Nations through the hierarchical architecture of informing systems Background: The paper discusses the case of Poland and its Gdansk region Contribution: The solution combines the big-picture of civilization with small-picture of a nation, regions, cities, and firms Findings: The presented solution can be implemented if the political will can be secured. Recommendations for Practitioners: Take the main idea of this paper and adapt to your local case. Recommendation for Researchers: Develop some prototypes of presented informing systems and test in your local environment Impact on Society: The success of the sustainability of globalizing society can be secured if the coherent informing systems can be applied to the planning, monitoring, and implementation of the UN's universal SDG. Future Research: Work on the modeling of costs and benefits of the presented solution. Full Article
sec Medical Image Security Using Quantum Cryptography By Published On :: 2018-05-18 Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication. Contribution: This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured. Findings: This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred Recommendations for Practitioners: This security mechanism is recommended for healthcare providers and practitioners to ensure the privacy of patients’ medical information. Recommendation for Researchers: This paper opens a new chapter in secured medical records Impact on Society Quantum key distribution promises network security based on the fundamental laws of quantum mechanics by solving the problems of secret-key cryptography . Future Research: The use of post-quantum cryptography can be further researched. Full Article
sec An Empirical Examination of the Effects of CTO Leadership on the Alignment of the Governance of Big Data and Information Security Risk Management Effectiveness By Published On :: 2021-06-03 Aim/Purpose: Board of Directors seek to use their big data as a competitive advantage. Still, scholars note the complexities of corporate governance in practice related to information security risk management (ISRM) effectiveness. Background: While the interest in ISRM and its relationship to organizational success has grown, the scholarly literature is unclear about the effects of Chief Technology Officers (CTOs) leadership styles, the alignment of the governance of big data, and ISRM effectiveness in organizations in the West-ern United States. Methodology: The research method selected for this study was a quantitative, correlational research design. Data from 139 participant survey responses from Chief Technology Officers (CTOs) in the Western United States were analyzed using 3 regression models to test for mediation following Baron and Kenny’s methodology. Contribution: Previous scholarship has established the importance of leadership styles, big data governance, and ISRM effectiveness, but not in a combined understanding of the relationship between all three variables. The researchers’ primary objective was to contribute valuable knowledge to the practical field of computer science by empirically validating the relationships between the CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness. Findings: The results of the first regression model between CTOs leadership styles and ISRM effectiveness were statistically significant. The second regression model results between CTOs leadership styles and the alignment of the governance of big data were not statistically significant. The results of the third regression model between CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness were statistically significant. The alignment of the governance of big data was a significant predictor in the model. At the same time, the predictive strength of all 3 CTOs leadership styles was diminished between the first regression model and the third regression model. The regression models indicated that the alignment of the governance of big data was a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness. Recommendations for Practitioners: With big data growing at an exponential rate, this research may be useful in helping other practitioners think about how to test mediation with other interconnected variables related to the alignment of the governance of big data. Overall, the alignment of governance of big data being a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness suggests the significant role that the alignment of the governance of big data plays within an organization. Recommendations for Researchers: While this exact study has not been previously conducted with these three variables with CTOs in the Western United States, overall, these results are in agreement with the literature that information security governance does not significantly mediate the relationship between IT leadership styles and ISRM. However, some of the overall findings did vary from the literature, including the predictive relationship between transactional leadership and ISRM effectiveness. With the finding of partial mediation indicated in this study, this also suggests that the alignment of the governance of big data provides a partial intervention between CTOs leadership styles and ISRM effectiveness. Impact on Society: Big data breaches are increasing year after year, exposing sensitive information that can lead to harm to citizens. This study supports the broader scholarly consensus that to achieve ISRM effectiveness, better alignment of governance policies is essential. This research highlights the importance of higher-level governance as it relates to ISRM effectiveness, implying that ineffective governance could negatively impact both leadership and ISRM effectiveness, which could potentially cause reputational harm. Future Research: This study raised questions about CTO leadership styles, the specific governance structures involved related to the alignment of big data and ISRM effectiveness. While the research around these variables independently is mature, there is an overall lack of mediation studies as it relates to the impact of the alignment of the governance of big data. With the lack of alignment around a universal framework, evolving frameworks could be tested in future research to see if similar results are obtained. Full Article
sec Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study By Published On :: 2023-06-13 Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools. Full Article
sec Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress] By Published On :: 2024-06-23 Aim/Purpose. Capture the Flag (CTF) challenges are a popular form of cybersecurity education where students solve hands-on tasks in a game-like setting. These exercises provide learning experiences with various specific technologies and subjects, as well as a broader understanding of cybersecurity topics. Competitions reinforce and teach problem-solving skills that are applicable in various technical and non-technical environments outside of the competitions. Background. The Information Search Process (ISP) is a framework developed to under-stand the process by which an individual goes about studying a topic, identifying emotional ties connected to each step an individual takes. As the individual goes through the problem-solving process, there is a clear flow from uncertainty to clarity; the individual’s feelings, thoughts, and actions are all interconnected. This study aims to investigate the learning of cybersecurity concepts within the framework of the ISP, specifically in the context of CTF competitions. Methodology. A comprehensive research methodology designed to incorporate quantitative and qualitative analyses to draw the parallels between the participants’ emotional experiences and the affective dimensions of learning will be implemented to measure the three primary goals. Contribution. This study contributes significantly to the broader landscape of cybersecurity education and cognitive-emotional experiences in problem-solving. Findings. The study has three primary goals. First, we seek to enhance our under-standing of the emotional and intellectual aspects involved in problem-solving, as demonstrated by the ISP approach. Second, we aim to gain in-sights into how the presentation of CTF challenges influences the learning experience of participants. Lastly, we strive to contribute to the improvement of cybersecurity education by identifying actionable steps for more effective teaching of technical skills and approaches. Recommendations for Practitioners. Competitions reinforce and teach problem-solving skills applicable in various technical and non-technical environments outside of the competitions. Recommendations for Researchers. The Information Search Process (ISP) framework may enhance our understanding of the emotional and intellectual aspects involved in problem-solving as we study the emotional ties connected to each step an individual takes as the individual goes through the problem-solving process. Impact on Society. Our pursuit of advancing our understanding of cybersecurity education will better equip future generations with the skills and knowledge needed to ad-dress the evolving challenges of the digital landscape. This will better pre-pare them for real-world challenges. Future Research. Future studies would include the development of a cybersecurity curriculum on vulnerability exploitation and defense. It would include practice exploiting practical web and binary vulnerabilities, reverse engineering, system hardening, security operations, and understanding how they can be chained together. Full Article
sec Do Project Management Tools and Outcomes Differ in Organizations of Varying Size and Sector? By Published On :: Full Article
sec A Methodology for Increasing Business Process Maturity in Public Sector By Published On :: Full Article
sec Interest in ICT Studies and Careers: Perspectives of Secondary School Female Students from Low Socioeconomic Backgrounds By Published On :: Full Article
sec Secure Software Engineering: A New Teaching Perspective Based on the SWEBOK By Published On :: Full Article
sec Introduction to the Special Section on Game-based Learning: Design and Applications (GbL) By Published On :: Full Article
sec Social Networking, Teaching, and Learning: Introduction to Special Section on Social Networking, Teaching, and Learning (SNTL) By Published On :: Full Article
sec Accounting Information Systems Effectiveness: Evidence from the Nigerian Banking Sector By Published On :: 2017-12-04 Aim/Purpose: The purpose of this study is to investigate the interrelationship among the quality measures of information system success, including system quality, information, quality, and service quality, that eventually influence accounting information systems effectiveness. Background: It is generally believed that investment in an information system offers opportunities to organizations for business process efficiency and effectiveness. Despite huge investments in accounting information systems, banks in Nigeria have not realized the full potential benefits of using these systems because of persistent failures. Few studies have been conducted to address the problem. Methodology: A survey research design was used to collect data, and a total of 287 questionnaires were retrieved from respondents in the Nigerian banking sector. Contribution: This study contributes to the understanding of the most important antecedent factors of the quality measures, the interrelationship among the quality measures, and the influence of these measures on the accounting information systems effectiveness. Findings: The result of the study revealed that security, ease of use, and efficiency are key features of system quality, while the information quality dimension includes accuracy, timeliness, and completeness. The result of the study further revealed that information quality and system quality have significant influences on accounting information systems effectiveness. Recommendations for Practitioners: This study provides practitioners with important measures for evaluation of AIS effectiveness in the context of Nigerian banks. Recommendation for Researchers: Future researchers may build on the findings of current study to conduct fur-ther research in the area of AIS effectiveness in different contexts. Future Research: This study examines only three quality measures of Delone and Mclean model and antecedents of information and system quality measures, neglecting contingency factor. Therefore, future study should include other factors to the AIS effectiveness model to help in developing more specific theory in AIS domain. Full Article
sec Understanding Internal Information Systems Security Policy Violations as Paradoxes By Published On :: 2017-01-17 Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful. Full Article
sec Knowledge Management Orientation, Market Orientation, and SME’s Performance: A Lesson from Indonesia’s Creative Economy Sector By Published On :: 2018-07-16 Aim/Purpose: Two research objectives were addressed in this study. The first objective was to determine the effect of knowledge management orientation behaviour on business performance, and the second objective was to investigate the mediating effect of market orientation in the relationship between knowledge management orientation behaviour and business performance. Background: In business strategic perspective, the idea of knowledge management has been discussed widely. However, there is a lack of study exploring the notion of knowledge management orientation especially in the perspective of Indonesia’s creative economy sector. Methodology: One hundred and thirty one participants were involved in this study. They were economy creative practitioners in Indonesia. Data were analysed by using Partial Least Squares. Contribution: Upon the completion of the research objectives, this study contributes to both theoretical and practical perspectives. From a theoretical standpoint, this study proposes a conceptual model explaining the relationship among knowledge management orientation behaviour, market orientation, and business performance in Indonesia’s creative economy sector. As this study found a significant effect of knowledge sharing in market orientation and market orientation in business performance, the study showed the mediation role of market orientation in the relationship between knowledge sharing and business performance. From a practical perspective, this study implies a guideline for business practitioners in enhancing business through the application of knowledge management orientation behaviour. Findings: The results show that organizing memory, knowledge absorption, and knowledge receptivity has a direct significant effect on business performance. However, in affecting business performance, knowledge sharing must be mediated by market orientation. Recommendations for Practitioners: Based on the results of the study, practitioners should enhance their behaviour in implementing knowledge management in terms of increasing business performance. In addition, it is suggested that business practitioners must be market driven, as market orientation was found to have an important role in affecting business performance. Recommendation for Researchers: Future researchers might integrate other constructs such as innovation, marketing capabilities, or organizational learning with this current conceptual model to have more comprehensive insight about the relationship between knowledge management orientation and business performance. Impact on Society: This study suggests that business practitioners must have knowledge management driven behaviour as well as market orientation to enhance the performance of their business. Future Research: Future research might add other variables to make the conceptual model more comprehensive and also replicate this study into different industrial settings. Full Article
sec Identification of Influential Factors in Implementing IT Governance: A Survey Study of Indonesian Companies in the Public Sector By Published On :: 2018-03-15 Aim/Purpose: This study is carried out to determine the factors influencing the implementation of IT governance in public sector. Background: IT governance in organizations plays strategic roles in deciding whether IT strategies and investments of both private and public organizations could be efficient, consistent, and transparent. IT governance has the potential to be the best practice that could improve organizational performance and competency. Methodology: The study involves qualitative and quantitative approaches, where data were collected through questionnaire, observation, interview, and document study through a sample of 367 respondents. The collected data were analyzed using Structured Equation Modeling (SEM) for validating the model and testing the hypotheses. Besides, semi-structured interview, observation, and document study were also carried out to obtain the management’s feedback on the implementation of IT governance and its activities. Contribution: The results of this study contribute to knowledge regarding good IT governance. Practically, this study can be used as a guideline for the future development and good IT governance. Findings: The findings reveal that policy has a significant direct influence on system planning, the management of IT investment, system realization, operation and maintenance, and organizational culture. The existence of IT governance policies, the success of the IT process can work well. Monitoring and evaluation processes also significantly affect system plan-ning, management of IT investment, system realization, operation and maintenance, and organizational culture. It indicates the process of monitoring and evaluation required for indications of financial efficiency, infrastructure, resources, risk and organizational success. Recommendations for Practitioners: It is important for organizational management to pay more attention to the organization’s internal controls in order to create good IT governance. Recommendation for Researchers: A comparative study between Indonesia and developing countries on the implementation of IT governance is needed to capture the differences be-tween those countries. Impact on Society: Knowledge of the factors influencing the implementation of IT governance as an effort to implement and improve the quality of IT governance. Future Research: Future studies should look further at the policy and IT governance models, specifically in public organizations, besides other influencing factors. Moreover, the outcome of this study could be generated as a guideline for the advanced development of IT governance and as a point of improvement as a way to generate a better good IT governance. It is essential because such evidence is lacking in current literature. Full Article
sec The Effects of the Critical Success Factors for ERP Implementation on the Comprehensive Achievement of the Crucial Roles of Information Systems in the Higher Education Sector By Published On :: 2018-02-10 Aim/Purpose: The aim of this study is to examine empirically the effects of certain key Critical Success Factors (CSFs) for the implementation of Enterprise Resource Planning (ERP) Systems on the comprehensive achievement of the crucial roles of Computer-Based Information Systems (CBISs) Background: The effects of the CSFSs were examined in the higher education sector in the Kingdom of Saudi Arabia (KSA) using a case study of the ERP adoption in Prince Sattam Bin Abdulaziz University. Methodology: A theoretical model was proposed based on the literature written on the CSFs and the roles of CBISs in business. The model encompasses six key CSFs and their associations with the realization of the crucial roles of CBISs. To test the proposed model, a questionnaire was developed by considering the most frequently used measurements items in the ERP’s literature. The data were collect-ed from 219 key stakeholders. Contribution: This study acts as one of the few empirical studies in assessing the effects of the important CSFs for ERP implementation upon its successful implementation. Its outcomes provide more insights and clarifications about the effects of six key CSFs on the comprehensive achievement of the crucial CBIS’s roles. Particularly, the uniqueness of this study lies in addressing the effects of these CSFs on the achievement of the vital CBIS’s roles collectively rather than the achievement of each role individually. Moreover, the study examined these effects in the higher education environment, which is characterized by its own special business processes and services. Findings: The results reveal that the six key CSFs have a positive relationship with the comprehensive achievement of the crucial roles of CBISs. These findings are consistent with many previous studies on the effects of the CSFs on the realization of the expected benefits of the enterprise systems. Recommendations for Practitioners: The managers and other key stakeholders should carefully manage the vital aspects of the CSFs in order to realize the promised ERP’s benefits, including the CBIS’s roles. Future Research: Additional empirical examinations are needed to investigate the effects of the rest of the CSFs on realizing the roles of information systems. Full Article
sec Information Technology Capabilities and SMEs Performance: An Understanding of a Multi-Mediation Model for the Manufacturing Sector By Published On :: 2019-09-09 Aim/Purpose: Despite the fact that the plethora of studies demonstrate the positive impact of information technology (IT) capabilities on SMEs performance, the understanding of underlying mechanisms through which IT capabilities affect the firm performance is not yet clear. This study fills these gaps by explaining the roles of absorptive capacity and corporate entrepreneurship. The study also elaborates the effect of IT capability dimensions (IT integration and IT alignment) upon the SMEs performance outcomes through the mediating sequential process of absorptive capacity and corporate entrepreneurship. Methodology: This study empirically tests a theoretical model based on the Dynamic Capability View (DCV), by using the partial least square (PLS) technique with a sample of 489 manufacturing SMEs in Pakistan. A survey is employed for the data collection by following the cluster sampling approach. Contribution: This research contributes to the literature of IT by bifurcating the IT capability into two dimensions, IT integration and IT alignment, which allows us to distinguish between different sources of IT capabilities. Additionally, our findings shed the light on the dynamic capability view by theoretically and empirically demonstrating how absorptive capacity and corporate entrepreneurship sequentially affect the firms' performance outcomes. At last, this study contributes to the literature of SMEs by measuring the two levels of performance: innovation performance and firm performance. Findings: The results of the analysis show that the absorptive capacity and the corporate entrepreneurship significantly mediate the relationship between both dimensions of IT capability and performance outcomes. Full Article
sec The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel By Published On :: 2020-07-02 Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter. Full Article
sec Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem By Published On :: 2021-07-27 Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity. Full Article
sec Establishing a Security Control Framework for Blockchain Technology By Published On :: 2021-07-27 Aim/Purpose: The aim of this paper is to propose a new information security controls framework for blockchain technology, which is currently absent from the National and International Information Security Standards. Background: Blockchain technology is a secure and relatively new technology of distributed digital ledgers, which is based on inter-linked blocks of transactions, providing great benefits such as decentralization, transparency, immutability, and automation. There is a rapid growth in the adoption of blockchain technology in different solutions and applications and within different industries throughout the world, such as finance, supply chain, digital identity, energy, healthcare, real estate, and the government sector. Methodology: Risk assessment and treatments were performed on five blockchain use cases to determine their associated risks with respect to security controls. Contribution: The significance of the proposed security controls is manifested in complementing the frameworks that were already established by the International and National Information Security Standards in order to keep pace with the emerging blockchain technology and prevent/reduce its associated information security risks. Findings: The analysis results showed that the proposed security controls herein can mitigate relevant information security risks in blockchain-based solutions and applications and, consequently, protect information and assets from unauthorized disclosure, modification, and destruction. Recommendations for Practitioners: The performed risk assessment on the blockchain use cases herein demonstrates that blockchain can involve security risks that require the establishment of certain measures in order to avoid them. As such, practitioners should not blindly assume that through the use of blockchain all security threats are mitigated. Recommendation for Researchers: The results from our study show that some security risks not covered by existing Standards can be mitigated and reduced when applying our proposed security controls. In addition, researchers should further justify the need for such additional controls and encourage the standardization bodies to incorporate them in their future editions. Impact on Society: Similar to any other emerging technology, blockchain has several drawbacks that, in turn, could have negative impacts on society (e.g., individuals, entities and/or countries). This is mainly due to the lack of a solid national and international standards for managing and mitigating risks associated with such technology. Future Research: The majority of the blockchain use cases in this study are publicly published papers. Therefore, one limitation of this study is the lack of technical details about these respective solutions, resulting in the inability to perform a comprehensive risk identification properly. Hence, this area will be expanded upon in our future work. In addition, covering other standardization bodies in the area of distributed ledger in blockchain technology would also prove fruitful, along with respective future design of relevant security architectures. Full Article
sec The Influence of Soft Skills on Employability: A Case Study on Technology Industry Sector in Malaysia By Published On :: 2021-07-11 Aim/Purpose: This research investigates the influence of soft skills on graduates’ employability in the technology industry, using the technology industry sector in Malaysia as a case. Background: Organizations are looking for appropriate mechanisms to hire qualified employees with strong soft skills and hard skills. This requires that job candidates possess a set of qualifications and skills which impact their employability. Methodology: Fuzzy Delphi analysis was conducted as preliminary study to identify the critical soft skills required by technology industry sector. The preliminary study produced ten critical soft skills to form a conceptual model of their influence on employability. Then, an online questionnaire survey was distributed in two industry companies in Malaysia to collect research data, and regression analysis was conducted to validate the conceptual model. Contribution: This research focuses on the influence of soft skills on graduate employability in the technology industry sector, since the selection of the best candidate in the industry will improve employee performance and lead to business success. Findings: The results of regression analysis confirmed that Communication skills, Attitude, Integrity, Learnability, Motivation, and Teamwork are significantly correlated with employability, which means that these soft skills are the critical factors for employability in Malaysian technology companies. Recommendations for Practitioners: The model proposed in this article can be used by employers to give better assessment of candidates’ compatibility with the jobs available. Impact on Society: This research highlights the critical soft skills required by technology industry sector, which will reduce the unemployment percentages among graduates. Future Research: More studies are required to examine the soft skills found in the literature and to define the most important skills from a general perspective of the industry. Future research should assess the moderating role of other variables, such as skills gap, employee performance, and employee knowledge. Furthermore, it is recommended to conduct similar studies of soft skills for employability in other countries. Full Article
sec Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study By Published On :: 2021-01-18 Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further. Full Article
sec Multiple Models in Predicting Acquisitions in the Indian Manufacturing Sector: A Performance Comparison By Published On :: 2023-11-01 Aim/Purpose: Acquisitions play a pivotal role in the growth strategy of a firm. Extensive resources and time are dedicated by a firm toward the identification of prospective acquisition candidates. The Indian manufacturing sector is currently experiencing significant growth, organically and inorganically, through acquisitions. The principal aim of this study is to explore models that can predict acquisitions and compare their performance in the Indian manufacturing sector. Background: Mergers and Acquisitions (M&A) have been integral to a firm’s growth strategy. Over the years, academic research has investigated multiple models for predicting acquisitions. In the context of the Indian manufacturing industry, the research is limited to prediction models. This research paper explores three models, namely Logistic Regression, Decision Tree, and Multilayer Perceptron, to predict acquisitions. Methodology: The methodology includes defining the accounting variables to be used in the model which have been selected based on strong theoretical foundations. The Indian manufacturing industry was selected as the focus, specifically, data for firms listed in the Bombay Stock Exchange (BSE) between 2010 and 2022 from the Prowess database. There were multiple techniques, such as data transformation and data scrubbing, that were used to mitigate bias and enhance the data reliability. The dataset was split into 70% training and 30% test data. The performance of the three models was compared using standard metrics. Contribution: The research contributes to the existing body of knowledge in multiple dimensions. First, a prediction model customized to the Indian manufacturing sector has been developed. Second, there are accounting variables identified specific to the Indian manufacturing sector. Third, the paper contributes to prediction modeling in the Indian manufacturing sector where there is limited research. Findings: The study found significant supporting evidence for four of the proposed hypotheses indicating that accounting variables can be used to predict acquisitions. It has been ascertained that statistically significant variables influence acquisition likelihood: Quick Ratio, Equity Turnover, Pretax Margin, and Total Sales. These variables are intrinsically linked with the theories of liquidity, growth-resource mismatch, profitability, and firm size. Furthermore, comparing performance metrics reveals that the Decision Tree model exhibits the highest accuracy rate of 62.3%, specificity rate of 66.4%, and the lowest false positive ratio of 33.6%. In contrast, the Multilayer Perceptron model exhibits the highest precision rate of 61.4% and recall rate of 64.3%. Recommendations for Practitioners: The study findings can help practitioners build custom prediction models for their firms. The model can be developed as a live reference model, which is continually updated based on a firm’s results. In addition, there is an opportunity for industry practitioners to establish a benchmark score that provides a reference for acquisitions. Recommendation for Researchers: Researchers can expand the scope of research by including additional classification modeling techniques. The data quality can be enhanced by cross-validation with other databases. Textual commentary about the target firms, including management and analyst quotes, provides additional insight that can enhance the predictive power of the models. Impact on Society: The research provides insights into leveraging emerging technologies to predict acquisitions. The theoretical basis and modeling attributes provide a foundation that can be further expanded to suit specific industries and firms. Future Research: There are opportunities to expand the scope of research in various dimensions by comparing acquisition prediction models across industries and cross-border and domestic acquisitions. Additionally, it is plausible to explore further research by incorporating non-financial data, such as management commentary, to augment the acquisition prediction model. Full Article