Forthcoming and Online First Articles

International Journal of Business Continuity and Risk Management

International Journal of Business Continuity and Risk Management (IJBCRM)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Business Continuity and Risk Management (7 papers in press)

Regular Issues

  • Enhancing Digital Content Integrity in Social Networks: a Systematic Review of Semi-Fragile Watermarking Techniques for Crisis Management and Risk Mitigation   Order a copy of this article
    by Bijay Kumar Paikaray, Satyajit Pattnaik, Damodharan V. S., Jayanta Mondal, Priya Lakshmi Narasimhan, Tiruveeduula Gopikirishna 
    Abstract: Digital watermarking is one of the advancing technologies that has played a vital role in data integrity. With diverse applications in mind, researchers and developers have explored and crafted various watermarking methods for embedding data into digital multimedia content. This research delves into the cutting-edge world of semi-fragile watermarking techniques, reshaping how end users safeguard and verify the integrity of digital content on the edge of social networks. To grasp the direction, various approaches have been thoroughly examined and implemented to aid the researcher in understanding. Understanding the latest techniques for hardware requirements, dataset utilization, and performance metrics is essential. Hence, the main aim of this research paper is to carry out a methodical literature review that evaluates research deficiencies, current developments, and obstacles, and tackles research inquiries, offering insightful perspectives for future studies. Ultimately, this systematic review could serve as a foundation for prospective researchers.
    Keywords: Semi-Fragile; Digital watermarking; Media Forensics; Content Tracking; DWT; DCT.
    DOI: 10.1504/IJBCRM.2025.10070015
     
  • Strengthening Crisis Management and Business Resiliency through Multi-Resolution Passive Forgery Detection for Digital Image Authenticity   Order a copy of this article
    by Bhavani Ranbida, Debabala Swain, Bijay Kumar Paikaray 
    Abstract: In the last years, due to the huge availability and easy access of image editing tools, a massive forgery of digital images transpires over the web. The image forgery issue has become a big concern in ensuring the originality and authenticity of digital information. Multiple approaches have been proposed to identify this counterfeit detection in digital images. This paper has comprehensively analysed the recently used methods for multi-resolution passive digital image forgery detection. Based on the analysis and result, we discuss key points of different proposed methods and compare their performance such as accuracy, advantages, and disadvantages. Based on the analysis, we can conclude the possible future research directions in a multi-resolution passive image forgery detection approach and evaluate the procedure for more accuracy while detecting the forged region. The main aim is to identify forged regions in digital images without modifying the original information.
    Keywords: Multi-Resolution; Passive Image; Forgery Detection; Image Forensics; Copy-Move; Splicing; Digital Image Authenticity.
    DOI: 10.1504/IJBCRM.2025.10070021
     
  • Estimating Cyber Attack Risk from Healthcare Employee Behaviour using a HEXACO Machine Learning Model   Order a copy of this article
    by Kenneth David Strang  
    Abstract: Cyber attack risk is examined by collecting a sample from healthcare business employees using the previously validated six-factor HEXACO personality theory construct from the psychology discipline. Cybercrime theories and studies are reviewed from sociology, criminology and computer science. The research design involved developing a predictive logistic regression model using machine learning. Control variables were added to capture fixed participant demographics. The result was a significant model with 95% classification accuracy, and a 60% McFadden effect size. Two of the six HEXCACO factors predicted cyber attack risk: Humility and openness, while none of the control variables had any impact.
    Keywords: HEXACO personality theory; cyber attack; cybersecurity; machine learning; employee attributes; healthcare business; psychology.
    DOI: 10.1504/IJBCRM.2025.10070402
     
  • Competitive strategies in Colombian and Peruvian SMEs: a Comparative Study   Order a copy of this article
    by Juan Gabriel Vanegas, Jorge A. Restrepo-Morales, Martin M. Grados-Vasquez, Diego López-Cadavid, Lucio W. Olórtiga-Cóndor 
    Abstract: This study analyses the competitive strategies adopted by 50 SMEs during crises, 24 in Colombia and 26 in Peru. By applying the Analytic Hierarchy Process to 294 decision matrices derived from these firms, it was found that differentiation and service development are essential for SMEs in both countries. However, Colombian firms tend to focus on core competencies and diversification within their existing markets (concentric strategies and diversification into related areas), whilst Peruvian SMEs focus on highly segmented and customised products. The findings demonstrate the importance of innovation, market awareness and adaptability to manage crises effectively. This research provides valuable insights into the strategic approaches adopted by small firms in developing countries and offers guidance to entrepreneurs and policy makers on how to promote resilience and competitiveness in challenging times.
    Keywords: crisis management; strategic management; competitive strategies; SMEs; analytic hierarchy process; developing countries; Colombia; PerĂº.
    DOI: 10.1504/IJBCRM.2025.10070528
     
  • Cognitive Computing in Crisis Management: Ethical Considerations, Societal Security Implications, and Strategic Directions for Organisational Resilience and Risk Governance   Order a copy of this article
    by Rakesh Kumar, Ayushi Sharma, Damodharan V. S., Girija Nandini, Bijay Kumar Paikar, Madhusmita Mohanty 
    Abstract: This Research aims to review the ethical considerations and societal Security implications of cognitive computing technology. Cognitive computing is transforming in different sectors like healthcare, education, and supply chain management, but ethical concerns like accountability, compliance risk, and bias persist. The study review the social implications of cognitive computing, a technique used in fast decision-making, repetitive tasks, and cyber security protection. An extensive assessment of pertinent material from various sources, different databases like Scopus, web of Science Google Scholar which included Research papers, books, proceedings etc. The study reviewed on ethical and social issues related to privacy, data protection, human behaviour, and job determinants. Different algorithms of cognitive computing to enhance efficiency in different sectors. These technologies can reduce the management burden in the organisation.
    Keywords: Cognitive Computing; Ethical Issues; Social Security Implication Artificial Intelligence.
    DOI: 10.1504/IJBCRM.2025.10070751
     
  • BORA-BN, an Integrated Approach for Risk Assessment in the Process Industry   Order a copy of this article
    by Abderraouf Bouafia, Mohammed Bougofa, Ammar Chakhrit 
    Abstract: The presented paper exhibits the conversion of the barriers operability risk analysis method (BORA) into a flexible tool, the Bayesian network framework (BN), aiming to strengthen safety risk assessments in industries. BORA is traditionally employed to assess the performance of barrier safety in multi-systems, which eventually encounter many limitations in dynamic risk assessment, dependency, and uncertainty usage. The integration of BN addresses these limitations and offers an adaptive model that can handle probabilistic approaches. This conversion permits an instantaneous updating of risk level values, leveraging the interdependencies of safety barriers and incorporating the newest data and information. The proposed methodology includes the transformation of BORAs into a network of probabilistic variables, which enhance the predictive precision and decision making. This paper highlights the significance of the proposed approach, including uncertainty and sensitivity analysis. The case study illustrates in practice the benefits of the usage of the BORA-BN in the industry.
    Keywords: Bayesian network; Barrier's operability risk analysis (BORA); Risk assessment; Probabilistic assessment; RIF's weight and score; Sensitivity analysis RoV.
    DOI: 10.1504/IJBCRM.2025.10070754
     
  • AI in Marketing: Strengthening Business Continuity by Navigating Security, Privacy, and Trust Amid Behavioural, Ethical, and Technological Challenges   Order a copy of this article
    by Rakesh Kumar, Damodharan V. S., Satyajit Pattnaik, Girija Nandini, Bijay Kumar Paikaray 
    Abstract: Aim of this study to address the Artificial intelligence (AI) issues in marketing Research. This study conducted a comprehensive analysis of this issue using AI tools. AI can address ethical concerns, lack of regulation, and fear of duplication. It can connect marketing, customers, and the organisation's ecosystem, promoting transparent communication and a positive organisational environment. Advanced tools like ChatGPT, chatbots, Power BI, and Excel can provide more accurate and efficient data collection, analysis, and prediction. However, issues like data theft, compromised accuracy, and lack of awareness about AI tools in marketing research remain continue. The study identified several challenges related to security, trust, privacy, etc. The study highlights the potential of using AI tools in marketing research in the future. The study recommended effective tools to address these issues. AI-driven marketing algorithms can improve effectiveness of behavioural and culture dilemmas and potentially changing society. The study examined the background of AI in marketing research as well as issues related to security, privacy, trust, and ethics. The study delves into how AI can be more effective in marketing research.
    Keywords: Artificial intelligence; Security; Privacy; Trust; Marketing Research; Business; Virtual; Ethical.
    DOI: 10.1504/IJBCRM.2025.10071476