Forthcoming and Online First Articles

International Journal of Services and Standards

International Journal of Services and Standards (IJSS)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Services and Standards (3 papers in press)

Regular Issues

  • The Effects of the Legal Environment on Cybersecurity   Order a copy of this article
    by Kam Chan, Barbara Farrell, Patricia Healy, Maria Tan 
    Abstract: Cybersecurity failure poses a risk to all firms. Cyber attackers exploit vulnerabilities to steal assets and information, jeopardizing the victim's ability to deliver products or services. Understanding the ways to strengthen cybersecurity can help mitigate the risk of cybersecurity failures. Examining the effects of a country's legal environment on cybersecurity, this study finds that the strength of cybersecurity is positively associated with the strength of laws in place and the extent of legal enforcement. In addition, we observe stronger cybersecurity in countries with more resources and higher percentages of internet users. This study helps regulators understand the factors affecting cybersecurity. Analyzing factors determining cybersecurity allows investors to predict and assess international differences in cybersecurity risks.
    Keywords: cybersecurity; legal environment; rule of law.
    DOI: 10.1504/IJSS.2022.10047146
  • The antecedents and consequences of customer’s attitude toward social media adoption: A meta-analytic approach   Order a copy of this article
    by Ying-Kai Liao, Tuan Dao, That Pham Thi 
    Abstract: This study aims to draw conclusions about the relationships between antecedents and consequences of customers’ attitude toward social media. A quantitative meta-analysis is conducted to validate eight research hypotheses from journal and conferences paper published between 2004 and 2020. The results show that the factors posited by the technology acceptance model (TAM), the knowledge sharing model (KSM), and motivation, opportunity, and ability (MOA) have a significant influence on attitudes and behavioral intentions toward social media adoption. In addition, social influence and customer values have a significant impact on attitudes and behavioral intentions toward social media adoption. Our research findings contribute significant references for researchers in order to validate the influence of TAM, KSM, and MOA. This study results also provide critical references for practitioners to build and develop their social media marketing strategies.
    Keywords: Technology acceptance model; Knowledge sharing model; Motivation; opportunity; and ability model; Meta-analysis.
    DOI: 10.1504/IJSS.2022.10050557
  • Protective Shields: The Drivers of Adopting Information Security Standards and Complementarity with Different Security Standards   Order a copy of this article
    by Chia-Ming Sun, Kui-Ying Lin, Yu-Hsin Lai 
    Abstract: Information security is a serious issue threatening businesses. Thus, effective strategies are needed to protect critical organisational information. Research indicates that organisations should implement IT governance and security using best practices from different frameworks rather than relying on individual existing frameworks. This study explores key factors influencing adoption and implementation of information security management systems from the perspective of the ISO 27001 certification process. We provide insight into how organisations seek support and guidance from different standards and frameworks. Using the grounded theory methodology, we interviewed fourteen participants with information security competence who work in manufacturing, financial or consulting services industries. We identified response themes relating to ISO 27001 adoption factors and implementation drivers. We also examined differences between ISO 27001 and CIS Controls. Our results suggest that effective integration of ISO 27001 certification and and CIS Controls allows organisations to achieve best practices in IT governance and security.
    Keywords: Information Security Management Systems; Cyber Security Risk; Information Security Standards; Information Security Governance.
    DOI: 10.1504/IJSS.2022.10052703