Search results

1 – 10 of 181
Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1366

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 11 June 2024

Julian Rott, Markus Böhm and Helmut Krcmar

Process mining (PM) has emerged as a leading technology for gaining data-based insights into organizations’ business processes. As processes increasingly cross-organizational…

Abstract

Purpose

Process mining (PM) has emerged as a leading technology for gaining data-based insights into organizations’ business processes. As processes increasingly cross-organizational boundaries, firms need to conduct PM jointly with multiple organizations to optimize their operations. However, current knowledge on cross-organizational process mining (coPM) is widely dispersed. Therefore, we synthesize current knowledge on coPM, identify challenges and enablers of coPM, and build a socio-technical framework and agenda for future research.

Design/methodology/approach

We conducted a literature review of 66 articles and summarized the findings according to the framework for Information Technology (IT)-enabled inter-organizational coordination (IOC) and the refined PM framework. The former states that within inter-organizational relationships, uncertainty sources determine information processing needs and coordination mechanisms determine information processing capabilities, while the fit between needs and capabilities determines the relationships’ performance. The latter distinguishes three categories of PM activities: cartography, auditing and navigation.

Findings

Past literature focused on coPM techniques, for example, algorithms for ensuring privacy and PM for cartography. Future research should focus on socio-technical aspects and follow four steps: First, determine uncertainty sources within coPM. Second, design, develop and evaluate coordination mechanisms. Third, investigate how the mechanisms assist with handling uncertainty. Fourth, analyze the impact on coPM performance. In addition, we present 18 challenges (e.g. integrating distributed data) and 9 enablers (e.g. aligning different strategies) for coPM application.

Originality/value

This is the first article to systematically investigate the status quo of coPM research and lay out a socio-technical research agenda building upon the well-established framework for IT-enabled IOC.

Details

Business Process Management Journal, vol. 30 no. 8
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 9 May 2023

Ali Abdallah Alalwan, Abdullah M. Baabdullah, Mutaz M. Al-Debei, Ramakrishnan Raman, Hitmi Khalifa Alhitmi, Amjad A. Abu-ElSamen and Yogesh K. Dwivedi

There is always a need to discover how a paradox between a customer’s desire for a more personalized experience and their privacy and security concerns would shape their intention…

1009

Abstract

Purpose

There is always a need to discover how a paradox between a customer’s desire for a more personalized experience and their privacy and security concerns would shape their intention to continue using contactless payment methods. However, personalization–privacy paradox has not been well-covered over the area of contactless payment. Therefore, this study aims to empirically examine the impact of personalization–privacy paradox on the customers’ continued intention (CIN) to use contactless payment.

Design

/methodology/approach – The empirical part of the current study was conducted in Saudi Arabia by collecting the primary data using online questionnaire from a convenience sample size of 297 actual users of contactless payment methods.

Findings

Based on structural equation modeling, personalization and privacy invasion were approved to significantly impact perceived value of information disclosure (PVD). Strong causal associations were confirmed between perceived severity, structural assurance and response cost with privacy invasion. Finally, both PVD and privacy invasion significantly predict CIN.

Research limitations/implications

There are other important factors (i.e. technology interactivity, technology readiness, social influence, trust, prior experience, etc.) were not tested in the current study. Therefore, future studies would pay more attention regarding the impact of these factors. The current study data were also collected using a convenience sample of actual users of contactless payment methods. Therefore, there is a concern regarding the generalizability of the current study results to other kind of customers who have not used contactless payment.

Originality/value

This study has integrated both personalization–privacy paradox and protection motivation theory in one model. The current study holds value in providing a new and complete picture of the inhibitors and enablers of customers’ CIN to use contactless payment, including new types of inhibitors. Furthermore, personalization–privacy paradox has not been fully examined over the related area of Fintech and contactless payment in general. Therefore, this study was able to extend the theoretical horizon personalization–privacy paradox to new area (i.e. contactless payment) and new cultural context (Saudi Arabia).

Details

International Journal of Bank Marketing, vol. 42 no. 1
Type: Research Article
ISSN: 0265-2323

Keywords

Open Access
Article
Publication date: 1 June 2023

Edward Ayebeng Botchway, Kofi Agyekum, Hayford Pittri and Anthony Lamina

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Abstract

Purpose

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Design/methodology/approach

The study adopts face-to-face and telephone interviews. This study uses a semi-structured interview guide to solicit the views of 25 interviewees on the subject under consideration. Qualitative responses to the interview are thematically analyzed using NVivo 11 Pro analysis application software.

Findings

The findings reveal five importance and seven vulnerabilities in the deployment of PAC devices in the institution. Key among the importance of deploying the devices are “prevent unwanted premise access or intrusions,” “prevent disruptions to university/staff operations on campus” and “protect students and staff from outside intruders.” Key among the identified vulnerabilities are “tailgating”, “delay in emergent cases” and “power outage may affect its usage.”

Originality/value

This study offers insight into a rare area of study, especially in the Sub-Saharan Africa region. Furthermore, the study contributes to the state-of-the-art importance and vulnerabilities in deploying PAC devices in daily human activities. The study is valuable in that it has the potential to establish a foundation for future studies that may delve into investigating issues associated with the deployment of PAC devices.

Details

Frontiers in Engineering and Built Environment, vol. 4 no. 1
Type: Research Article
ISSN: 2634-2499

Keywords

Content available

Abstract

Purpose

N/A

Design/methodology/approach

N/A

Findings

N/A

Research limitations/implications

N/A

Practical implications

N/A

Social implications

N/A

Originality/value

N/A

Contribution to Impact

N/A

Details

Digital Library Perspectives, vol. 40 no. 2
Type: Research Article
ISSN: 2059-5816

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

7573

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 24 May 2024

Aliyu Abubakar Lawan and Pekka Henttonen

This study aims to examine the connection between the integrity of records and the effectiveness of anti-corruption investigations. The objective is to determine how the quality…

Abstract

Purpose

This study aims to examine the connection between the integrity of records and the effectiveness of anti-corruption investigations. The objective is to determine how the quality of records affects the efficiency of anti-corruption investigations.

Design/methodology/approach

This study uses a qualitative, exploratory case study approach, with data collected through interviews with 15 anti-corruption investigators in 2020 in Nigeria. The data were analysed using thematic analysis.

Findings

The results indicate that the efficiency of anti-corruption investigations depends on the quality of the evidence. Proper recordkeeping, which maintains the integrity of records, is crucial for efficient anti-corruption investigations. Inadequate recordkeeping practices that do not adhere to the lifecycle concept are often driven by corruption and can significantly hinder the efficiency of anti-corruption investigations by causing delays in obtaining crucial evidence.

Originality/value

From a records management perspective, this study highlights the impact of unreliable evidence on every corruption investigation effort and the motives behind rendering the process unproductive. Accountability forums must enforce adherence to proper recordkeeping procedures to ensure the desired investigative outcomes with minimal resources, time and effort to combat corruption.

Details

Records Management Journal, vol. 34 no. 1
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 13 July 2023

Kriti Priya Gupta

This study aims to understand the challenges of 5G deployment in India from the perspectives of telecom operators. These challenges are also mapped to different contexts within…

Abstract

Purpose

This study aims to understand the challenges of 5G deployment in India from the perspectives of telecom operators. These challenges are also mapped to different contexts within the technological-organizational-environmental (TOE) framework.

Design/methodology/approach

The study uses a qualitative approach comprising in-depth semi-structured interviews of employees working in telecom companies in India. Thematic analysis is used to analyse the qualitative data.

Findings

The author has identified nine challenges that are categorized under three dimensions of the TOE framework. Specifically, the findings indicate three technological challenges: hardware/device challenges, security concerns and limited use cases; two organization challenges: financial challenges and lack of skilled workforce; and four environmental challenges: inadequate infrastructure, regulatory and administrative challenges, consumers’ attitudes and competitive market conditions.

Practical implications

The results of this study would help understand the key factors that can act as barriers to the 5G rollout in India. Based on the findings of the study, the government and regulatory bodies could design conducive policies and regulatory frameworks to successfully deploy 5G in India.

Originality/value

The study is one of the very few studies to empirically examine the telecom operators’ perspectives on the challenges of 5G deployment in India. The study contributes to the TOE framework as its application in the context of identifying barriers to 5G deployment is probably for the first time.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 1
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 23 August 2023

Musediq Tunji Bashorun, Yusuf Ayodeji Ajani and Olaronke Oyinlola Fagbola

This paper aims to explore the deep Web as a solution for displacement and replacement challenges in libraries, addressing the challenges, benefits, strategies and case studies.

Abstract

Purpose

This paper aims to explore the deep Web as a solution for displacement and replacement challenges in libraries, addressing the challenges, benefits, strategies and case studies.

Design/methodology/approach

The paper synthesizes existing literature on deep Web integration in libraries, providing a comprehensive analysis of insights from scholarly articles, case studies and expert opinions.

Findings

The deep Web grants libraries access to unique content, improving information access, fostering collaboration and enabling personalized content. However, security, privacy, ethics and data protection must be considered.

Originality/value

This paper contributes to the literature by providing a comprehensive examination of deep Web integration in libraries, offering valuable recommendations for navigating the changing landscape and leveraging the deep Web’s potential.

Details

Library Hi Tech News, vol. 41 no. 3
Type: Research Article
ISSN: 0741-9058

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Access

Year

Last 6 months (181)

Content type

Article (181)
1 – 10 of 181