The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational security…
Abstract
Purpose
The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational security governance (OSG) objectives pose significant challenges for organizations considering the ever-increasing vulnerability from lack of or misuse of appropriate controls. In recent years, there have been several cases of colossal losses to businesses due to inadequate security governance measure. In many cases, organizations do not even know as to what their ISG objectives might be. Following an extensive empirical study, this paper proposes 6 fundamental and 17 means objectives for designing security governance. The objectives were developed from individual values of information technology and security executives across a wide range of firms. The study comprised 52 interview respondents across 9 firms, which resulted in 23 OSG objectives. Theoretically, the study was grounded in Catton’s (1959) value theory and Keeney’s (1992) value-focused thinking. The objectives provide a useful basis for strategic planning for information security governance.
Design/methodology/approach
This research is grounded in value-focused thinking methodology. Step 1: develop a comprehensive list of personal values underlying the problem being explored. The researcher undertakes extensive interviews, using relevant probes, to elicit underlying values of respondents. Step 2: change the values enlisted to a common form and convert them into objectives. The data collected in Step 1 is collated and presented in a common form, which enables cross-comparison and easy interpretation. Step 3: classify the objectives as means and fundamental for the decision context. Objectives are clustered into groups and then classified into fundamental and means.
Findings
This study uses a value-focused approach to develop OSG objectives. Incorporating individual values in developing governance objectives would facilitate alignment of individual and organizational values about OSG. This study proposes 6 fundamental and 17 means objectives for OSG. The study provides a comprehensive list of OSG that is rooted in values of stakeholders in an organization.
Originality/value
The main contributions study can be classified in two categories. First, it represents a collective set of OSG objectives which touch upon technical, formal, informal, moral and ethical dimensions of governance. This is a unique, synthesized and cohesive framework for OSG, which incorporates several aspects of OSG into one platform, thus allowing the development of a comprehensive security management program. Second, some of the objectives developed in this research (“establish corporate control strategy”, “establish punitive structure”, “establish clear control development process”, “ensure formal control assessment functionality” and “maximize group cohesiveness”) have not been emphasized enough in security governance literature.
Details
Keywords
Shalini Sahni, Sushma Verma and Rahul Pratap Singh Kaurav
The widespread uptake of digital technology tools for online teaching and learning reached its peak during the nationwide lockdown triggered by the COVID-19 pandemic. It…
Abstract
Purpose
The widespread uptake of digital technology tools for online teaching and learning reached its peak during the nationwide lockdown triggered by the COVID-19 pandemic. It transformed the higher education institutions (HEIs) marketplace both in developed and developing countries. However, in this process of digital transformation, several HEIs, specifically from developing countries, faced major challenges. That threatened to affect their sustainability and performance. In this vein, this study conducts a bibliometric review to map the challenges during the COVID-19 pandemic and suggest strategies for HEIs to cope with post-pandemic situations in the future.
Design/methodology/approach
This comprehensive review encompasses 343 papers published between 2020 and 2023, employing a systematic approach that combines bibliometrics and content analysis to thoroughly evaluate the articles.
Findings
The investigation revealed a lack of published work addressing the specific challenges faced by the faculty members affecting their well-being. The study underscores the importance of e-learning technology adoption for higher education sustainability by compelling both students and teachers to rely heavily on social media platforms to maintain social presence and facilitate remote learning. The reduced interpersonal interaction during the pandemic has had negative consequences for academic engagement and professional advancement for both educators and students.
Practical implications
This has implications for policymakers and the management of HEIs, as it may prove useful in reenvisioning and redesigning future curricula. The paper concludes by developing a sustainable learning framework using a blended approach. Additionally, we also provide directions for future research to scholars.
Originality/value
This study has implications for policymakers and HEI management to rethink the delivery of future courses with a focus on education and institute sustainability. Finally, the research also proposes a hybrid learning framework for sustainability and forms a robust foundation for scholars in future research.
Details
Keywords
Sawinder Kaur, Vivek Mumbarkar, Paramjit S. Panesar, Sushma Gurumayum and Prasad Rasane
The purpose of this study is to isolate yellow pigment producing fungal strain and to determine the media requirement for growth and secondary metabolite production.
Abstract
Purpose
The purpose of this study is to isolate yellow pigment producing fungal strain and to determine the media requirement for growth and secondary metabolite production.
Design/methodology/approach
Fifteen soil samples were collected and studied for a pigment producing fungal sources. Selection of a fungus was based on pigment produced and further conditions, such as effect of media composition and light wavelength on pigment production and growth parameters were optimised.
Findings
Out of the isolates analysed, Epicoccum nigrum was selected for further study as this strain has the potential for pigment production. Among all the media evaluated, potato dextrose agar (PDA) was found to be the best media for growth and sporulation, whilst sabouraud dextrose agar (SDA) was only 29 per cent as capable as the best medium. The radial growth rate in case of PDA was 3 ± 0.02 mm/day, while in case of SDA, it was only 1.09 mm/day. Whilst starch as a carbon source was found to increase the radial growth to 5.15 ± 0.02 mm/day, sucrose significantly (p < 0.05) influenced the sporulation (224,000 ± 1,550 spores/ml) of Epicoccum nigrum. Amongst the various nitrogen sources analysed, peptone significantly increased (p < 0.05) the radial growth (6.55 ± 0.02 mm/day) as well as sporulation (220,000 ± 2,100 spores/ml). The observations also indicated that E. nigrum is able to sense and differentiate between light in different wavelength ranges and respond differently in growth and sporulation. The light passing through a red colour sheet resulted in better radial growth (8.5 ± 0.02 mm/day) in comparison to unfiltered light (3 ± 0.02 mm/day). Yellow pigment production in terms of hue values was significantly influenced by the presence of dextrose, peptone and darkness.
Research limitations/implications
The isolated strain could be studied for variable conditions and stress factors for optimal production of the pigment. Recovery and purification studies could be carried out at pilot and industrial scale.
Practical implications
The isolation of a strain producing valuable microbial pigment will increase the alternatives of natural food colours and enhance the its commercial applications
Originality/value
This study identifies Epicoccum nigrum as a potential source of microbial pigment and facilitates its growth and production for possible applications in industrial pigment production.
Details
Keywords
Sudhakar Jyothula and Sushma K.
The purpose of this paper is to present a single-precision floating-point multiplier where a low-power operation is attained through the reduction of switching activity. A…
Abstract
Purpose
The purpose of this paper is to present a single-precision floating-point multiplier where a low-power operation is attained through the reduction of switching activity. A floating-point multiplier is the basic building block for many applications such as digital signal processing (DSP) processors and multimedia applications involving a large dynamic range.
Design/methodology/approach
A floating-point multiplier was implemented in asynchronous logic such as multi-threshold null conventional logic and the proposed multi-threshold dual spacer dual rail delay insensitive logic (MTD3L). The proposed logic deals with high performance and energy efficiency.
Findings
The Institute of Electrical and Electronics Engineering (IEEE) has provided a standard to define the floating-point representation, which is known as the IEEE 754 standard. Rounding has not been implemented because it is not suitable for high-precision applications.
Originality/value
The performance aspects of the proposed asynchronous MTD3L floating-point multiplier are obtained using a Mentor Graphics tool and are compared with those of the existing asynchronous logic.
Details
Keywords
Terrorism has historically been spawned by inequitable, unjust systems with inadequate democratic options to articulate popular aspirations and ensure conflict resolution. The…
Abstract
Terrorism has historically been spawned by inequitable, unjust systems with inadequate democratic options to articulate popular aspirations and ensure conflict resolution. The event of September 11, 2001 changed it all when terrorism hit the center of the increasingly globalized post-Cold War international system. The 9/11 incident has played as the role of a catalyst in initiating joint governmental policies to combat international terrorism both in India and the USA. After the incident, the former US President, George W. Bush, announced to the world community to fight against international terrorism collectively on the basis of a zero-tolerance policy. India has been the victim of cross-border terrorism promoted by Pakistan for a long time. India is the world’s largest democracy and one of its fastest-growing economics. Due to the recurrence of terrorist attacks, its security system and its socioeconomic structure have had to face tremendous pressure. Just after the 9/11 incident (attack on WTC) world’s largest (India) and oldest (USA) democracies have come closer to jointly fight against international terrorism. Both al-Qaida and the Taliban were the common enemies for Washington and New Delhi. At the governmental level, a number of policies and working groups have been organized by the two countries in order to diminish global terrorism. This chapter intends to explore the effects of joint governmental policies by India and the USA for combating international terrorism.
Details
Keywords
Sushma Priyadarsini Yalla, Som Sekhar Bhattacharyya and Karuna Jain
Post 1991, given the advent of liberalization and economic reforms, the Indian telecom sector witnessed a remarkable growth in terms of subscriber base and reduced competitive…
Abstract
Purpose
Post 1991, given the advent of liberalization and economic reforms, the Indian telecom sector witnessed a remarkable growth in terms of subscriber base and reduced competitive tariff among the service providers. The purpose of this paper is to estimate the impact of regulatory announcements on systemic risk among the Indian telecom firms.
Design/methodology/approach
This study employed a two-step methodology to measure the impact of regulatory announcements on systemic risk. In the first step, CAPM along with the Kalman filter was used to estimate the daily β (systemic risk). In the second step, event study methodology was used to assess the impact of regulatory announcements on daily β derived from the first step.
Findings
The results of this study indicate that regulatory announcements did impact systemic risk among telecom firms. The study also found that regulatory announcements either increased or decreased systemic risk, depending upon the type of regulatory announcements. Further, this study estimated the market-perceived regulatory risk premiums for individual telecom firms.
Research limitations/implications
The regulatory risk premium was either positive or negative, depending upon the different types of regulatory announcements for the telecom sector firms. Thus, this study contributes to the theory of literature by testing the buffering hypothesis in the context of Indian telecom firms.
Practical implications
The study findings will be useful for investors and policy-makers to estimate the regulatory risk premium as and when there is an anticipated regulatory announcement in the Indian telecom sector.
Originality/value
This is one of the first research studies in exploring regulatory risk among the Indian telecom firms. The research findings indicate that regulatory risk does exist in the telecom firms of India.
Details
Keywords
Ridhima Bhanot Sharma and Sumanjit Dass
After completion of the case study, the students will be able to understand the complexity of diversification and market expansion strategies in a growing consumer-driven market…
Abstract
Learning outcomes
After completion of the case study, the students will be able to understand the complexity of diversification and market expansion strategies in a growing consumer-driven market context, apply strategic frameworks to analyze the Indian oral care market, analyze brand positioning principles to develop a marketing strategy for Aquawhite and evaluate and identify the pros and cons of the various decisions taken during market diversification.
Case overview/synopsis
This case study seeks to examine the market expansion dilemmas faced by Aquawhite, a brand in the oral health-care sector, and the role of key decision-makers in addressing these challenges. This case study aims to provide insights into the complexities of brand extension and market expansion strategies in the context of a developing consumer-driven market. This case study is structured as a qualitative analysis based on publicly available information, including Aquawhite’s historical data, market trends and industry reports. Additionally, insights from relevant interviews with key stakeholders within the company have been considered to present a comprehensive view. This case study highlights the dilemmas faced by Aquawhite as it navigates market expansion. It reveals the critical role of Nikhil Nanda, the managing director in addressing these dilemmas and shaping the brand’s future. This case study emphasizes the need for a strategic approach that balances market dynamics with brand identity.
Complexity academic level
This case study is suitable for use in undergraduate and postgraduate-level courses on marketing management and strategic management. This case study provides insights into brand development, market entry and expansion strategies. It can be used to discuss the marketing mix, segmentation and targeting, as well as competitive analysis.
Supplementary materials
Teaching notes are available for educators only.
Subject code
CSS 8: Marketing.
Details
Keywords
The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation…
Abstract
Purpose
The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation (5 G) technology. NOMA is used for serving many mobile users, both in power and code domains. This paper considers the power-domain NOMA, which is now discussed as NOMA.
Design/methodology/approach
The first part of the paper discusses NOMA-based cooperative relay systems using different relay strategies over different channel models. In various research works, the analytical expressions of many performance metrics were derived, measured and simulated for better performance of the NOMA systems. In the second part, a brief introduction to diversity techniques is discussed. The multiple input and multiple output system merged with cooperative NOMA technology, and its future challenges were also presented in this part. In the third part, the paper surveys some new conceptions such as cognitive radio, index modulation multiple access, space-shift keying and reconfigurable intelligent surface that can be combined with NOMA systems for better performance.
Findings
The paper presents a brief survey of diverse research projects being carried out in the field of NOMA. The paper also surveyed two different relaying strategies that were implemented in cooperative NOMA over different channels and compared several performance parameters that were evaluated and derived in these implementations.
Originality/value
The paper provides a scope for recognizable future work and presents a brief idea of the new techniques that can be united with NOMA for better performance in wireless systems.
Details
Keywords
N.V. Brindha and V.S. Meenakshi
Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of…
Abstract
Purpose
Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of the harmful attacks in the MANET, which produces fake identities similar to legitimate nodes in the network. It is a serious threat to the MANET when a malicious node uses the fake identities to enter the network illegally.
Design/methodology/approach
A MANET is an independent collection of mobile nodes that form a temporary or arbitrary network without any fixed infrastructure. The nodes in the MANET lack centralized administration to manage the network and change their links to other devices frequently.
Findings
So for securing a MANET, an approach based on biometric authentication can be used. The multimodal biometric technology has been providing some more potential solutions for the user to be able to devise an authentication in MANETs of high security.
Research limitations/implications
The Sybil detection approach, which is based on the received signal strength indicator (RSSI) variations, permits the node to be able to verify the authenticity of communicating nodes in accordance with their localizations.
Practical implications
As the MANET node suffers from a low level of memory and power of computation, there is a novel technique of feature extraction that is proposed for the multimodal biometrics that makes use of palm prints that are based on a charge-coupled device and fingerprints, along with the features that are fused.
Social implications
This paper proposes an RSSI-based multimodal biometric solution to detect Sybil attack in MANETs.
Originality/value
The results of the experiment have indicated that this method has achieved a performance which is better compared to that of the other methods.
Details
Keywords
Rohit Raj, Arpit Singh, Vimal Kumar and Pratima Verma
Recent technological advancements, often linked to Industry 4.0, require organizations to be more agile and innovative. Blockchain technology (BT) holds immense potential in…
Abstract
Purpose
Recent technological advancements, often linked to Industry 4.0, require organizations to be more agile and innovative. Blockchain technology (BT) holds immense potential in driving organizations to achieve efficiency and transparency in supply chains. However, there exist some insurmountable challenges associated with the adoption of BT in organizational supply chains (SC). This paper attempts to categorically identify and systematize the most influential challenges in the implementation of BT in SC.
Design/methodology/approach
This study resorts to an extensive literature review and consultations with experts in the field of supply chain management (SCM), information technology and academia to identify, categorize and prioritize the major challenges using VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) and Combined Compromise Solution method (CoCoSo).
Findings
The top three classes of challenges revealed in this study are privacy challenges (PC), infrastructure challenges (IC) and transparency challenges (TC). Maintaining a balance between data openness and secrecy and rectification of incorrect/erroneous input are the top two challenges in the PC category, integration of BT with sustainable practices and ensuring legitimacy are the top two challenges in the IC category, and proper and correct information sharing in organizations was the top most challenge in the TC category.
Originality/value
Future scholars and industry professionals will be guided by the importance of the challenges identified in this study to develop an economical and logical approach for integrating BT to increase the efficiency and outcome of supply chains across several industrial sectors.