Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 20 de 31
Filter
1.
ACM International Conference Proceeding Series ; : 491-498, 2022.
Article in English | Scopus | ID: covidwho-20244025

ABSTRACT

In this paper has been proposed a methodology for ensuring the financial security of enterprises in the context of recession caused by the COVID-19 pandemic. Based on pre-crisis data related to the new coronavirus infection pandemic and multi-component modeling of the dynamics of industrial production in the Republic of Uzbekistan during the "corona crisis,"this study seeks to identify the dynamics of growth by economic activity type and recovery rate in order to identify areas of state support for industrial production. In this paper has been investigated issues of financial security management of textile enterprises. On the basis of secondary statistics, the growth of textile production in the regions of the Republic of Uzbekistan in 2008-2020 was analyzed and the factors influencing it were identified. By the author have been presented the main tasks and conditions for the financial security of enterprises, as well as developed scientific and practical recommendations for eliminating factors affecting the financial security of textile enterprises. © 2022 Owner/Author.

2.
Information and Computer Security ; 31(2):172-198, 2023.
Article in English | ProQuest Central | ID: covidwho-2325839

ABSTRACT

PurposeWith increased remote working, employers are concerned with employees' commitment and compliance with security procedures. Through the lens of psychological capital, this study aims to investigate whether strong organizational values can improve employees' commitment to the organization and security behaviors.Design/methodology/approachUsing Qualtrics platform, the authors conducted an online survey. The survey participants are college-educated, full-time employees. The authors used structural equation modeling to analyze 289 responses.FindingsThe results indicate perceived importance of organizational values is associated with increased organizational commitment and information security behavior. The authors find that psychological capital partially mediates these relations suggesting that employees' psychological capital effectively directs employees toward an affinity for the organization and information security behavior. The results highlight the importance of organizational values for improving security behavior and organizational commitment. Second, the results suggest that psychological capital is an effective mechanism for this influence. Finally, the authors find that individual differences (gender, organizational level and education) are boundary conditions on their findings, providing a nuanced view of their results and offering opportunities for further investigation.Originality/valueTo the best of the authors' knowledge, this study is the first to explore organizational values in relation to information security behaviors. In addition, this study investigates the underlying mechanism of this relationship by showing psychological capital's mediating role in this relationship. Therefore, the authors suggest organizations create a supportive environment that appreciates innovation, quality services, diversity and collaboration. Furthermore, organizations should communicate the importance of these values to their employees to motivate them to have a stronger affective commitment and a more careful set of security behaviors.

3.
Sustainability ; 15(7):6019, 2023.
Article in English | ProQuest Central | ID: covidwho-2302900

ABSTRACT

In the post pandemic era, the telecommuting of business employees has widely become acceptable in organizations, which demands extensive dependence on digital technologies. In addition, this poses additional security threats for business employees as well as organizations. In order to better respond to security threats, business employees must have a higher level of awareness of the potential threats that are relevant to digital infrastructure used within the workplace. In this paper, we present a quantitative study conducted in line with the theory of planned behavior to gain insight into employee behavior toward information security within different business sectors in Saudi Arabia. The key factors chosen for our model were password management, infrastructure security management, email management, organizational security policy, organizational support and training, and the perception of the level of security. We have applied structured equation modelling to identify most of the relevant factors based on the respondents' feedback. The results based on the business employee behavior showed that they respondents did not perceive all of the constructs of our model as relevant security factors, which can potentially result in security lapses. This indicates that more security-related measures should be put in place and that business employees should be updated periodically about potential security threats. To this effect, we divided the studied security measures into those which should be implemented at organizational and individual levels. The results will potentially help business managers to design appropriate security trainings, guidelines, and policies for their employees to ensure more information security awareness and protect their technological infrastructure, especially within home office environments.

4.
Sustainability ; 15(8):6334, 2023.
Article in English | ProQuest Central | ID: covidwho-2300805

ABSTRACT

This article confronts telework issues by analyzing how certain factors (motivation, dependence on coordination, self-organizing abilities and stress) impact job performance, as well as some of their interrelations. The research has been carried out with 219 Romanian employees. With the help of Confirmatory Factor Analysis and Structural Equations Modeling, the model led to the following conclusions: employee motivation has a significant positive impact on performance;employees' dependence on coordination has a significant negative impact on performance;employees' dependence on coordination has a moderately intense but significant positive correlation with the level of stress perceived during teleworking;and employees' ability to self-organize their activity is strongly and significantly linked to the level of motivation perceived. The hypothesis that perceived stress has a significant negative impact on performance has not been confirmed. These results add to the specialized literature on telework and can be the basis for future developments of managerial teleworking strategies. The implications are particularly valuable in the context of Corporate Social Responsibility considering the impact of telework on employees, organizations, and society in general.

5.
Journal of Security and Strategic Analyses ; 8(2):124-144, 2022.
Article in English | ProQuest Central | ID: covidwho-2277186

ABSTRACT

UNSC debate on the maritime security-initiated discussion on response and reaction plan not only for particular countries and regions overall. The Eastern part of the Indian Ocean (IO) has been a boiling cauldron due to the race of maritime hegemony, maritime alliances for economic cum security dimensions and choking important points of maritime trade in crisis. The outbreak of Covid heavily restricted global supply chains. Security cooperation should focus on 'reassurance' rather than 'deterrence' to create the desired security order in which multilateral frameworks may be formed. In this scenario, security interactions would help nation-states converge their national interests and minimize a zero-sum security situation. UNSC debate on maritime security demands for cooperative security approach through a framework of likeminded states. Pakistan foresees this debate as an increasing challenge by constructing the role of the Pakistan Navy to perform and ensure its capacities for maritime security in the long run. The paper presents the response to Indian Duplicities in the wake of the Russian proposal for maritime security management at UNSC in 2021. Strategic analysis with qualitative research method and exploratory approach is adopted in this research with pertinent and feasible findings.

6.
Round Table ; 109(3):326-327, 2020.
Article in English | ProQuest Central | ID: covidwho-2268285

ABSTRACT

Canada was among the earliest countries to report a confirmed case of the novel coronavirus (Covid-19) on 25 January 2020. By April 18, Canada reported 31,927 cases and 1,310 deaths, the 13th highest in the world. While numbers have since increased, the public health tragedy which has played out in the USA has provided some comfort that it could be far worse. Despite sharing the world's longest undefended border with the world's Covid-19 epicentre, cases and deaths per million population in Canada remain 2.5 and 3.2 times lower. This will not be fully explained until the pandemic eventually plays out, but clear differences in each country's response can be discerned. From a public health perspective, Canada's pandemic response has been shaped by lessons from the 2003 SARS outbreak which caused 44 deaths in Toronto. The Public Health Agency of Canada was subsequently formed, along with new public health bodies in three provinces including the British Columbia Centre for Disease Control and Public Health Ontario. These capacities added to Canada's publicly-funded and universally accessible health care system. By contrast, the epidemic monitoring and command groups within the US National Security Council and Department of Homeland Security, set up by the Obama Administration following the 2014 Ebola virus outbreak in West Africa, was largely dismantled in 2018 by the Trump Administration.

7.
International Affairs ; 99(2):865-866, 2023.
Article in English | Academic Search Complete | ID: covidwho-2262257

ABSTRACT

Although the book's title might suggest that this is a specialist read for scholars of global health security, I would recommend it for anyone interested in modern security challenges. What do states need to do to protect themselves from security threats?. [Extracted from the article] Copyright of International Affairs is the property of Oxford University Press / USA and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full . (Copyright applies to all s.)

8.
Int J Inf Secur ; 22(3): 737-748, 2023.
Article in English | MEDLINE | ID: covidwho-2245870

ABSTRACT

Society has become increasingly dependent on IT infrastructure and services. Additionally, the pandemic of COVID-19 forced the transition of the traditional way of working (i.e., physical presence) into a more modern and flexible one (i.e., working remotely). This has led to an increase of cyberattacks, as a direct consequence of the increase of the attack surface but subsequently also led to an increased necessity for the protection of information systems. Toward the protection of information systems, cyber insurance is considered as a strategy for risk management, where necessary. Cyber insurance is emerging as an important tool to protect organizations against cyberattack-related losses. In this work, we extensively examine the relevant literature on cybersecurity insurance, research and practice, in order to draft the current landscape and present the trends.

9.
Trends in Organized Crime ; 25(4):466-486, 2022.
Article in English | ProQuest Central | ID: covidwho-2175041
10.
Management, Enterprise and Benchmarking in the 21st Century ; : 47-55, 2022.
Article in English | ProQuest Central | ID: covidwho-2167641

ABSTRACT

One of the great challenges of the 21st century is digitalisation, which has brought with it the emergence of Industry 4.0 and the high connectivity of smart devices. This accelerated development has significantly transformed the way individuals live and think, as well as their vulnerability. In the literature on the relationship between digital devices and individuals, there are significant differences in the way individuals' security is threatened and the factors and behaviours that facilitate and enhance their security. The COVID-19 pandemic and its aftermath, which has dominated the last 2-3 years, only adds to the importance of this area of study. The aim of the present research is to examine the differences and similarities between publications on information security awareness, cyber security awareness and internet safety awareness and to summarise their results, for which a literature review was conducted.

11.
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics ; 34(8):1302-1312, 2022.
Article in Chinese | Scopus | ID: covidwho-2055455

ABSTRACT

It is important for social public security and urban management to explore the spread of infectious diseases. A city-level structured prediction and simulation model for COVID-19 is proposed. This model is consisted of SEIR and social network model on the basis of latest infectious disease dynamics theory and real geographic networks. The prediction region is divided into multiple levels. Specifically, a bipartite network is applied to simulate the relationship between public facilities and community nodes at the macro level, and a modified SEIR is applied to simulate the infection within nodes at the micro level. Besides, intelligent agent is applied to track the individual transmission process. The contrast experimental results based on the confirmed and cursed cases of Wuhan and Beijing in 2020 published by National Health Commission, show that the proposed model has better flexibility and higher accuracy, and reflects the distribution and movement of people more directly. © 2022 Institute of Computing Technology. All rights reserved.

12.
2022 IEEE World Conference on Applied Intelligence and Computing, AIC 2022 ; : 462-466, 2022.
Article in English | Scopus | ID: covidwho-2051929

ABSTRACT

To meet the demands for highest level security of today's world, a sophisticated security management system is essential. An access control system generally categorized into biometric and non-biometric types based upon contact or contactless in operation. This research work aims to survey the preferences of people, for understanding the role and need of access control systems during the difficult pandemic situation through an online survey. This survey finds that various access control solutions fail to provide the required security during this worldwide pandemic due to their contact-based operations. Henceforth, a feasible integrated electronic access control system requires to be adopted to fulfill the expectations of users amid global pandemic. © 2022 IEEE.

13.
Quaestus ; - (19):140-149, 2021.
Article in English | ProQuest Central | ID: covidwho-2045104

ABSTRACT

The scientific paperwork pointed out the importance of information and information systems that represent important business assets and one of the most important resources of any organization. The specificity of information protection and security in the conditions of the pandemic caused by COVID 19, requires a systematic approach in order to provide timely, reliable and accurate information. The process of information security and protection is a complex process, multidisciplinary in the function of achieving the ultimate goal, which is secure and reliable information. This approach requires reliable and secure information systems in organizations that are information carriers in the conditions of a pandemic caused by COVID 19.

14.
2nd IEEE International Conference on Cyber Security and Resilience, CSR 2022 ; : 382-387, 2022.
Article in English | Scopus | ID: covidwho-2029225

ABSTRACT

Since the provision of digital services in our days (e.g. container management, transport of COVID vaccinations or LNG) in most economic sectors (e.g. maritime, health, energy) involve national, EU and non-EU stakeholders compose complex Supply Chain Services (SCS). The security of the SCS is most important and it emphasized in the NIS 2 directive [3] and it is a shared responsibility of all stakeholders involved that will need to be compliant with a scheme. In this paper we present an overview of the proposed Cybersecurity Certification Scheme for Supply Chain Services (EUSCS) as proposed by the European Commission (EC) project CYRENE [1]. The EUSCS scheme covers all the three assurance levels defined in the Cybersecurity Act (CSA) [2] taking into consideration the criticality of SCS according to the NIS 2 directive [3], the ENISA Threat Landscape for Supply Chain Attacks [4] and the CYRENE extended online Information Security Management System (ISMS) that allows all SCS stakeholders to provide and access all information needed for certification purposes making the transition from current national schemes in the EU easier. © 2022 IEEE.

15.
Journal of Risk and Financial Management ; 15(8):348, 2022.
Article in English | ProQuest Central | ID: covidwho-2023843

ABSTRACT

This study aims to construct a mathematical model to determine the dimensions of an economic, social, and environmental project with the goal of sustainable management. By identifying the optimal weights, the synergy values for sustainable management can be maximized. Taking aesthetic medicine companies as examples, this study attempts to construct the index projects of the economic, social, and environmental dimensions of sustainable management in an uncertain environment. Linear relationships (a combination of fixed synergistic values and varying synergistic values) are used to calculate the import optimal weight under optimistic, normal, and pessimistic circumstances. This study helped companies to introduce triple bottom line (TBL) indices to plan their issues under sustainable management and development, thus, enabling the parent company to achieve the optimal weight for the project costs to put in its subsidiaries. Additionally, this study prioritizes the weight of the influence on the management of the aesthetic medicine industry according to the risk probabilities, to minimize the uncertainties of risk management in corporate management and reduce the possibility of direct and indirect cost losses caused by financial distress, functional fluctuations, and negative impact on the medical equipment market, thereby maximizing the estimated total project value under sustainable management. This study constructs an aesthetic medicine-specific mathematical model concept using the triple bottom line model as the basis for sustainable corporate management and proposes an approach to obtain sustainable weight in uncertain conditions. By doing so, companies can add various managerial methods for the same industry, and new ideas are provided to the academic community to discuss the development of decision-making assessment criteria for risk assessments in sustainable management.

16.
Sustainability ; 14(15):9459, 2022.
Article in English | ProQuest Central | ID: covidwho-1994184

ABSTRACT

Public travel is an important support for urban citizens’ production and life. As a collective choice behavior, there are different action logics behind the common sharing travel and public sharing travel in China. It is beneficial to provide public travel services to citizens and improve the performance of urban governance by sorting out the different public travel types and their inner choice logics. A fuzzy set of qualitative, comparative analyses reveals that citizens’ choice of common sharing travel or public sharing travel consists of two paths, in which user size, rule attainment, convenience, and travel distance are important triggers. The government and enterprises should improve the combined supply of each factor to enhance citizens’ public travel experience, guide citizens’ public travel choice behavior, and help the development of a common sharing travel industry so as to promote the construction of green transportation, public transport cities, and smart cities.

17.
Sustainability ; 14(11):6853, 2022.
Article in English | ProQuest Central | ID: covidwho-1892985

ABSTRACT

The popularization of education on the administrative compulsion law in response to major epidemic situations in China refers to the educational activities carried out by an educational subject aimed at an educational object promoting understanding and mastery of knowledge of administrative compulsion. The goal is to improve the government’s legal ability to prevent and control behavior, enhance people’s awareness of the rule of law, and provide a strong legal basis for the rule of law in the context of major epidemics. Other aims are to cultivate citizens’ legal beliefs, restrain citizens’ conduct, and maintain a stable social order. However, problems arise in the subject, content, and mode of the educational activities. Therefore, we need to discuss compulsory education in the context of major epidemic situations, including the need for a favorable educational environment, the strengthening of information distribution, and the guidance of public opinion on administrative enforcement. We should also improve education subjects to enhance the legal quality of administrative organs, perfect the education content, encourage people to support administrative compulsion in epidemic situations, and deliver education in campus online classes.

18.
The Internal Auditor ; 79(2):12, 2022.
Article in English | ProQuest Central | ID: covidwho-1842718

ABSTRACT

Curbelo discusses that businesses are investing more in anti-fraud technology amid the increase of fraud. In response to heightened fraud risk during the COVID-19 pandemic, 43% of organizations have increased their use of data analytics to fight fraud, according to a new study by the Association of Certified Fraud Examiners (ACFE). The 2022 Anti-Fraud Technology Benchmarking Report also predicts an expansion of anti-fraud technology over the next two years, with the use of machine learning and artificial intelligence in organizations expected to double.

19.
International Journal of Advanced Computer Science and Applications ; 12(10), 2021.
Article in English | ProQuest Central | ID: covidwho-1835997

ABSTRACT

One of the main concerns for organizations in today's connected world is to find out how employees follow the information security policy (ISP), as the internal employee has been identified as the weakest link in all breaches of the security policies. Several studies have examined ISP compliance from a dissuasive perspective;however, the results were mixed. This empirical study analyses the impact of organisational security factors and individual non-compliance on users’ intentions toward information security policies. A research model and hypotheses have been developed in this quantitative study. Data from 352 participants was collected through a questionnaire, which then validated the measurement model. The findings revealed that while security system anxiety and non-compliant peer behaviours negatively impact users’ compliance intentions, work impediments positively influence these intentions. Security visibility negatively influences users’ non-compliance, and security education systems positively impact work impediments. This research will help information security managers address the problem of information security compliance because it provides them with an understanding of one of the many factors underlying employee compliance behaviors.

20.
Journal of Cybersecurity and Privacy ; 1(2):219, 2021.
Article in English | ProQuest Central | ID: covidwho-1818165

ABSTRACT

Information security plays a key role in enterprises management, as it deals with the confidentiality, privacy, integrity, and availability of one of their most valuable resources: data and information. Small and Medium-sized enterprises (SME) are seen as a blind spot in information security and cybersecurity management, which is mainly due to their size, regional and familiar scope, and financial resources. This paper presents an information security and cybersecurity management project, in which a methodology based on the well-known ISO-27001:2013 standard was designed and implemented in fifty SMEs that were located in the center region of Portugal. The project was conducted by a business association located at the center of Portugal and mainly participated by SMEs. The Polytechnic of Leiria and an IT auditing/consulting team were the other two entities that participated on the project. The characterisation of the participating enterprises, the ISO-27001:2013 based methodology developed and implemented in SMEs, as well as the results obtained in this case study, are depicted and analysed in the paper. The attained results show a clear benefit to the audited and intervened SMEs, being mainly attested by the increasing of their information security management robustness and collaborators’ cyberawareness.

SELECTION OF CITATIONS
SEARCH DETAIL