Search results
1 – 4 of 4Ruti Gafni and Yair Levy
Artificial intelligence (AI) can assist in the worldwide shortage of cybersecurity workers in technical and managerial roles. Thus, the purpose of this study was to investigate…
Abstract
Purpose
Artificial intelligence (AI) can assist in the worldwide shortage of cybersecurity workers in technical and managerial roles. Thus, the purpose of this study was to investigate the role of AI in automating many of the routine tasks associated with cybersecurity. As such, AI enables cybersecurity personnel to reduce their workloads and focus on more strategic aspects of their work.
Design/methodology/approach
This study is an exploratory field study. The authors started by conducting a literature review to assess the possibility that AI tools can provide and how they can improve cybersecurity efficacy. Following this, the authors identified the specific core tasks for two cybersecurity work roles (technical and managerial) and searched for specific commercial tools that can perform each of the tasks. Then, the authors used the free ChatGPT 3.5 to list the current cybersecurity systems that use AI for the associated tasks, which the authors then reviewed with the tools’ documentation and websites to confirm these tasks were conducted or assisted by AI.
Findings
Results indicated that all 14 cybersecurity tasks of the technical work role are currently noted to be performed by commercial cybersecurity systems with AI-integrated capabilities, while only 11 of the 17 managerial work role tasks currently appear to be performed by AI.
Practical implications
The rapid integration of AI capabilities into commercial cybersecurity systems may suggest that the cybersecurity workforce must be currently trained on how to use AI tools in their daily operations, especially as it pertains to technical cybersecurity work roles.
Social implications
The cybersecurity workforce shortage is reported to exceed four million cybersecurity workers worldwide in 2023. Thus, further understanding of the role of AI in improving the efficiency of technical and managerial cybersecurity tasks is significant.
Originality/value
The value of this research lies in the initial assessment of the current AI capabilities of commercial cybersecurity systems, which will ultimately provide the “super-human” performances resulting from human-AI teaming.
Details
Keywords
Michael J Rooney, Yair Levy, Wei Li and Ajoy Kumar
The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password…
Abstract
Purpose
The increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as “password workarounds” or “shadow security.” These deviant password behaviors can put individuals and organizations at risk, resulting in a data breach. This paper aims to engage IS users and Subject Matter Experts (SMEs), focused on designing, developing and empirically validating the Password Workaround Cybersecurity Risk Taxonomy (PaWoCyRiT) – a 2x2 taxonomy constructed by aggregated scores of perceived cybersecurity risks from Password Workarounds (PWWAs) techniques and their usage frequency.
Design/methodology/approach
This research study was a developmental design conducted in three phases using qualitative and quantitative methods: (1) A set of 10 PWWAs that were identified from the literature were validated by SMEs along with their perspectives on the PWWAs usage and risk for data breach; (2) A pilot study was conducted to ensure reliability and validity and identify if any measurement issues would have hindered the results and (3) The main study data collection was conducted with a large group of IS users, where also they reported on coworkers' engagement frequencies related to the PWWAs.
Findings
The results indicate that statistically significant differences were found between SMEs and IS users in their aggregated perceptions of risks of the PWWAs in causing a data breach, with IS users perceiving higher risks. Engagement patterns varied between the two groups, as well as factors like years of IS experience, gender and job level had statistically significant differences among groups.
Practical implications
The PaWoCyRiT taxonomy that the we have developed and empirically validated is a handy tool for organizational cyber risk officers. The taxonomy provides organizations with a quantifiable means to assess and ultimately mitigate cybersecurity risks.
Social implications
Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. Thus, the taxonomy that the authors have developed and empirically validated provides broader implications for society, as it assists organizations in all industries with the ability to mitigate the risks of data breaches that can result from PWWAs.
Originality/value
The taxonomy the we have developed and validated, the PaWoCyRiT, provides organizations with insights into password-related risks and behaviors that may lead to data breaches.
Details
Keywords
Sachin Kumar Raut, Ilan Alon, Sudhir Rana and Sakshi Kathuria
This study aims to examine the relationship between knowledge management and career development in an era characterized by high levels of youth unemployment and a demand for…
Abstract
Purpose
This study aims to examine the relationship between knowledge management and career development in an era characterized by high levels of youth unemployment and a demand for specialized skills. Despite the increasing transition to a knowledge-based economy, there is a significant gap between young people’s skills and career readiness, necessitating an in-depth analysis of the role of knowledge management at the individual, organizational and national levels.
Design/methodology/approach
The authors conducted a qualitative study using the theory-context-characteristics-methodology approach based on a systematic literature review. The authors created an ecological framework for reflecting on knowledge management and career development, arguing for a multidisciplinary approach that invites collaboration across sectors to generate innovative and reliable solutions.
Findings
This study presents a comprehensive review of the existing literature and trends, noting the need for more focus on the interplay between knowledge management and career development. It emphasizes the need for businesses to promote the acquisition, storage, diffusion and application of knowledge and its circulation and exchange to create international business human capital.
Practical implications
The findings may help multinational corporations develop managerial training programs and recruitment strategies, given the demand for advanced knowledge-based skills in the modern workspace. The study also discusses the influences of education, experience and job skills on business managers’ performance, guiding the future recruitment of talents.
Originality/value
To the best of the authors’ knowledge, this review is among the first to assess the triadic relationship between knowledge management, career development and the global unemployment crisis. The proposed multidisciplinary approach seeks to break down existing silos, thus fostering a more comprehensive understanding of how to address these ongoing global concerns.
Details