Search results

1 – 10 of 240
Open Access
Article
Publication date: 29 May 2024

Mohanad Rezeq, Tarik Aouam and Frederik Gailly

Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict…

Abstract

Purpose

Authorities have set up numerous security checkpoints during times of armed conflict to control the flow of commercial and humanitarian trucks into and out of areas of conflict. These security checkpoints have become highly utilized because of the complex security procedures and increased truck traffic, which significantly slow the delivery of relief aid. This paper aims to improve the process at security checkpoints by redesigning the current process to reduce processing time and relieve congestion at checkpoint entrance gates.

Design/methodology/approach

A decision-support tool (clearing function distribution model [CFDM]) is used to minimize the effects of security checkpoint congestion on the entire humanitarian supply network using a hybrid simulation-optimization approach. By using a business process simulation, the current and reengineered processes are both simulated, and the simulation output was used to estimate the clearing function (capacity as a function of the workload). For both the AS-IS and TO-BE models, key performance indicators such as distribution costs, backordering and process cycle time were used to compare the results of the CFDM tool. For this, the Kerem Abu Salem security checkpoint south of Gaza was used as a case study.

Findings

The comparison results demonstrate that the CFDM tool performs better when the output of the TO-BE clearing function is used.

Originality/value

The efforts will contribute to improving the planning of any humanitarian network experiencing congestion at security checkpoints by minimizing the impact of congestion on the delivery lead time of relief aid to the final destination.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 4
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 25 June 2024

Martin Lukes and Manuel Feldmann

The study responds to the calls for multilevel approaches in entrepreneurship research and seeks to answer whether the relationships between personal values and entrepreneurship…

Abstract

Purpose

The study responds to the calls for multilevel approaches in entrepreneurship research and seeks to answer whether the relationships between personal values and entrepreneurship remain stable across different economic conditions, using the unemployment rate as a moderator. It pays attention to the solo self-employed and women, as these groups are particularly vulnerable when crises occur.

Design/methodology/approach

We use Schwartz's theory of human values, which has been understudied in entrepreneurship and follow a correlational research design with micro and macro variables. Multilevel logistic regression is applied to the data from the large sample of 151,032 individuals participating in six waves of the European Social Survey. Solo self-employed are distinguished from those employing others, and analyses are run separately for men and women to understand gender differences.

Findings

The findings show that self-direction and achievement are positively, and benevolence and security negatively related to entrepreneurship. The high unemployment rate lowers the positive relationships with self-direction and achievement and mitigates the negative relationship with security, but only for the solo self-employed and not for employers. Results mostly hold for both genders.

Research limitations/implications

The study suggests that security-related values should not be omitted from entrepreneurship research focused on entrepreneurs' values. It also emphasizes the need to distinguish between various subgroups of entrepreneurs and their motivation, which is important for efficient active labor market policies.

Originality/value

The study utilizes multilevel analyses that account for individual- and country-level influences on entrepreneurial activity. It contributes to understanding how economic context influences value salience and supports the applicability of Schwartz's theory of human values in entrepreneurship.

Details

Journal of Small Business and Enterprise Development, vol. 31 no. 8
Type: Research Article
ISSN: 1462-6004

Keywords

Open Access
Article
Publication date: 17 April 2024

Elham Rostami and Fredrik Karlsson

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for…

Abstract

Purpose

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs.

Design/methodology/approach

A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. The authors extracted 890 sentences from these ISPs that included one or more of the analyzed keywords. These sentences were analyzed using the new metric – keyword loss of specificity – to assess to what extent the selected keywords were used for pinpointing and guiding actionable advice. Thus, the authors classified the extracted sentences as either actionable advice or other information, depending on the type of information conveyed.

Findings

The results show a significant keyword loss of specificity in relation to pieces of actionable advice in ISPs provided by Swedish public agencies. About two-thirds of the sentences in which the analyzed keywords were used focused on information other than actionable advice. Such dual use of keywords reduces the possibility of pinpointing and communicating clear, actionable advice.

Research limitations/implications

The suggested metric provides a means to assess the quality of how keywords are used in ISPs for different purposes. The results show that more research is needed on how keywords are used in ISPs.

Practical implications

The authors recommended that ISP designers exercise caution when using keywords in ISPs and maintain coherency in their use of keywords. ISP designers can use the suggested metrics to assess the quality of actionable advice in their ISPs.

Originality/value

The keyword loss of specificity metric adds to the few quantitative metrics available to assess ISP quality. To the best of the authors’ knowledge, applying this metric is a first attempt to measure the quality of actionable advice in ISPs.

Details

Information & Computer Security, vol. 32 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 1 February 2024

David Hedberg, Martin Lundgren and Marcus Nohlberg

This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.

Abstract

Purpose

This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.

Design/methodology/approach

This study is based on an empirical study consisting of semistructured interviews with representatives from both branded and independent auto workshops. The data was analyzed using thematic analysis. A version of the capability maturity model was introduced to the respondents as a self-evaluation of their cybersecurity awareness.

Findings

Cybersecurity was not found to be part of the current auto workshop work culture, and that there is a gap between independent workshops and branded workshops. Specifically, in how they function, approach problems and the tools and support available to them to resolve (particularly regarding previously unknown) issues.

Research limitations/implications

Only auto workshop managers in Sweden were interviewed for this study. This role was picked because it is the most likely to have come in contact with cybersecurity-related issues. They may also have discussed the topic with mechanics, manufacturers or other auto workshops – thus providing a broader view of potential issues or challenges.

Practical implications

The challenges identified in this study offers actionable advice to car manufacturers, branded workshops and independent workshops. The goal is to further cooperation, improve knowledge sharing and avoid unnecessary safety or security issues.

Originality/value

As cars become smarter, they also become potential targets for cyberattacks, which in turn poses potential threats to human safety. However, research on auto workshops, which has previously ensured that cars are road safe, has received little research attention with regards to the role cybersecurity can play in repairs and maintenance. Insights from auto workshops can therefore shed light upon the unique challenges and issues tied to the cybersecurity of cars, and how they are kept up-to-date and road safe in the digital era.

Details

Information & Computer Security, vol. 32 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 25 June 2024

Michael Herburger, Andreas Wieland and Carina Hochstrasser

Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material…

1322

Abstract

Purpose

Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material, information and financial flows and impacting the availability, integrity and confidentiality of SC assets. While SC resilience (SCRES) research has received much attention in recent years, the purpose of this study is to investigate specific capabilities for building SCRES to cyber risks. Based on a nuanced understanding of SC cyber risk characteristics, this study explores how to build SC cyber resilience (SCCR) using the perspective of dynamic capability (DC) theory.

Design/methodology/approach

Based on 79 in-depth interviews, this qualitative study examines 28 firms representing 4 SCs in Central Europe. The researchers interpret data from semistructured interviews and secondary data using the DC perspective, which covers sensing, seizing and transforming.

Findings

The authors identify SCRES capabilities, in general, and SCCR-specific capabilities that form the basis for the realignment of DCs for addressing cyber risks in SCs. The authors argue that SCRES capabilities should, in general, be combined with specific capabilities for SCCR to deal with SC cyber risks. Based on these findings, 10 propositions for future research are provided.

Practical implications

Practitioners should collaborate specifically to address cyber threats and risks in SCs, integrate new SC partners and use new approaches. Furthermore, this study shows that cyber risks need to be treated differently from traditional SC risks.

Originality/value

This empirical study enriches the SC management literature by examining SCRES to cyber risks through the insightful lens of DCs. It identifies DCs for building SCCR, makes several managerial contributions and is among the few that apply the DC approach to address specific SC risks.

Details

Supply Chain Management: An International Journal, vol. 29 no. 7
Type: Research Article
ISSN: 1359-8546

Keywords

Open Access
Article
Publication date: 17 June 2024

Ki Seong Park, Gyeong Lyeob Cho, Yong Min Kim and Heikki Hiilamo

This case study focuses on an alternative minimum-security model, the Safety Income (SI) Model, representing a nuanced departure from both established policies and UBI. StI is a…

Abstract

Purpose

This case study focuses on an alternative minimum-security model, the Safety Income (SI) Model, representing a nuanced departure from both established policies and UBI. StI is a welfare system that supplements households earning below the standard median income with 50% of the difference between the standard median and their current earnings. The quantitative case study presents the set-up of SI and assesses the cost of its implementation in South Korea. By employing a computable general equilibrium model method, the study compares the impacts of SI, UBI and the existing scheme in South Korea on income disparities, labor market outcomes and Gross Domestic Product.

Design/methodology/approach

In the past decade, the Universal Basic Income (UBI) concept has gained international significant traction as a potential remedy for poverty and inequality. However, the practical implications of UBI implementation remain under extensive debate. It is unclear if UBI is an effective model for poverty alleviation.

Findings

The analyses show that SI outperforms the other two welfare systems across all studied economic indicators. SI demonstrates more substantial reductions in income inequality compared with UBI and the existing scheme, minimal impact on unemployment rates compared with other schemes and a relatively modest decrease in GDP, making it a more favorable choice for South Korea when developing the minimum-security system within the specified budget constraint.

Originality/value

This research contributes to the discourse surrounding basic income, economic security, poverty alleviation and inclusive social policies.

Details

International Journal of Sociology and Social Policy, vol. 44 no. 13/14
Type: Research Article
ISSN: 0144-333X

Keywords

Open Access
Article
Publication date: 26 April 2024

Marcus Gerdin, Ella Kolkowska and Åke Grönlund

Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research…

Abstract

Purpose

Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and its potential effect on these results. This study aims to add to this discussion by investigating discrepancies between what the authors claim to measure (theoretical properties of variables) and what they actually measure (respondents’ interpretations of the operationalized variables). This study asks: How well do respondents’ interpretations of variables correspond to their theoretical definitions? What are the characteristics of any discrepancies between variable definitions and respondent interpretations?

Design/methodology/approach

This study is based on in-depth interviews with 17 respondents from the Swedish public sector to understand how they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior.

Findings

The authors found that respondents’ interpretations in many cases differ substantially from the theoretical definitions. Overall, the authors found four principal ways in which respondents interpreted measurement items – referred to as property contextualization, extension, alteration and oscillation – each implying more or less (dis)alignment with the intended theoretical properties of the two variables examined.

Originality/value

The qualitative method used proved vital to better understand respondents’ interpretations which, in turn, is key for improving self-reporting measurement instruments. To the best of the authors’ knowledge, this study is a first step toward understanding how precise and uniform definitions of variables’ theoretical properties can be operationalized into effective measurement items.

Open Access
Article
Publication date: 31 October 2022

Cyril Chinonso Ejidike, Modupe Cecilia Mewomo and Iruka Chijindu Anugwo

The current movement toward digitisation has promoted the adoption of smart building technology globally. Despite its advantages, its usage in developing countries such as Nigeria…

2411

Abstract

Purpose

The current movement toward digitisation has promoted the adoption of smart building technology globally. Despite its advantages, its usage in developing countries such as Nigeria is still very low. Therefore, the purpose of this paper is to investigate construction professionals' awareness of smart building concepts (SBCs) in the Nigerian construction industry and identify the parameters by which SBCs can be measured.

Design/methodology/approach

A quantitative survey was carried out using a questionnaire to gather relevant data in the study area. This paper was conducted on 363 registered construction professionals in the Nigerian construction industry. The collected data were analysed using descriptive statistics and Kruskal–Wallis H test analysis.

Findings

This paper indicated that the majority of Nigerian construction professionals are aware of SBCs. Furthermore, the Kruskal–Wallis H test shows no significant difference between the awareness level of the various construction professionals. This paper further revealed energy management systems, IT network connectivity, safety and security management systems and building automation systems as the most significant parameters in which SBCs can be measured.

Practical implications

This paper identified significant parameters influencing SBCs awareness in the Nigerian construction industry. These parameters can be integrated into the building during the design stage and can be incorporated into the policymaking process of construction firms to promote the awareness of SBCs and encourage practices related to construction sustainability.

Originality/value

This paper provides empirical evidence on the awareness of SBCs among construction professionals and significant parameters influencing awareness in the Nigerian construction industry.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 5
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 26 March 2024

Guilherme de Araujo Grigoli, Maurilio Ferreira Da Silva Júnior and Diego Pereira Pedra

This study aims to identify the main challenges to achieving humanitarian logistics in the context of United Nations peace missions in sub-Saharan Africa and to present…

1195

Abstract

Purpose

This study aims to identify the main challenges to achieving humanitarian logistics in the context of United Nations peace missions in sub-Saharan Africa and to present suggestions for overcoming the logistical gaps encountered.

Design/methodology/approach

The methodological approach of the work focuses on the comparative case study of the United Nations Mission in South Sudan, the United Nations Multidimensional Integrated Stabilisation Mission in the Central African Republic and The United Nations Organisation Stabilisation Mission in the Democratic Republic of Congo from 2014 to 2021. The approach combined a systematic literature review with the authors’ empirical experience as participant observers in each mission, combining theory and practice.

Findings

As a result, six common challenges were identified for carrying out humanitarian logistics in the three peace missions. Each challenge revealed a logistical gap for which an appropriate solution was suggested based on the best practices found in the case study of each mission.

Research limitations/implications

This paper presents limitations when addressing the logistical analysis based on only three countries under the UN mission as a case study, as well as conceiving that certain flaws in the system, in the observed period, are already in the process of correction with the adoption of the 2016–2021 strategy by the UN Global Logistic Cluster. The authors suggest that further studies can be carried out by expanding the number of cases or using countries where other bodies (AU, NATO or EU) work.

Originality/value

To the best of the authors’ knowledge, this study is the first comparative case study of humanitarian logistics on the three principal missions of the UN conducted by academics and practitioners.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 4
Type: Research Article
ISSN: 2042-6747

Keywords

Content available
Article
Publication date: 25 September 2024

Nathan Clarke and Steven Furnell

Abstract

Details

Information & Computer Security, vol. 32 no. 4
Type: Research Article
ISSN: 2056-4961

Access

Only content I have access to

Year

Last week (240)

Content type

Article (240)
1 – 10 of 240