Search results

1 – 10 of 190
Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 21 May 2024

Matthew Tickle, Sarah Schiffling and Gaurav Verma

This paper aims to explore the impact of fourth-party logistics (4PL) adoption on the agility, adaptability and alignment (AAA) capabilities within humanitarian supply chains…

Abstract

Purpose

This paper aims to explore the impact of fourth-party logistics (4PL) adoption on the agility, adaptability and alignment (AAA) capabilities within humanitarian supply chains (HSCs).

Design/methodology/approach

Semi-structured interviews with individuals from a large non-government organisation were combined with secondary data to assess the influence of 4PL adoption on AAA capabilities in HSCs.

Findings

The results indicate that HSCs exhibit some of the AAA antecedents but not all are fully realised. While 4PL positively affects the AAA capabilities of HSCs, its adoption faces challenges such as the funding environment, data security/confidentiality and alignment with humanitarian principles. The study suggests an AAA antecedent realignment, positioning alignment as a precursor to agility and adaptability. It also identifies three core antecedents in HSCs: flexibility, speed and environmental uncertainty.

Practical implications

The study shows the positive impact 4PL adoption can have on the AAA capabilities of HSCs. The findings have practical relevance for those wishing to optimise HSC performance through 4PL adoption, by identifying the inhibiting factors to its adoption as well as strategies to address them.

Originality/value

This research empirically explores 4PL’s impact on AAA capabilities in HSCs, highlighting the facilitating and hindering factors of 4PL adoption in this environment as well as endorsing a realignment of AAA antecedents. It also contributes to the growing research on SC operations in volatile settings.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 8 March 2023

Louise Holly, Shannon Thom, Mohamed Elzemety, Beatrice Murage, Kirsten Mathieson and Maria Isabel Iñigo Petralanda

This paper introduces a new set of equity and rights-based principles for health data governance (HDG) and makes the case for their adoption into global, regional and national…

3737

Abstract

Purpose

This paper introduces a new set of equity and rights-based principles for health data governance (HDG) and makes the case for their adoption into global, regional and national policy and practice.

Design/methodology/approach

This paper discusses the need for a unified approach to HDG that maximises the value of data for whole populations. It describes the unique process employed to develop a set of HDG principles. The paper highlights lessons learned from the principle development process and proposes steps to incorporate them into data governance policies and practice.

Findings

More than 200 individuals from 130 organisations contributed to the development of the HDG principles, which are clustered around three interconnected objectives of protecting people, promoting health value and prioritising equity. The principles build on existing norms and guidelines by bringing a human rights and equity lens to HDG.

Practical implications

The principles offer a strong vision for HDG that reaps the public good benefits of health data whilst safeguarding individual rights. They can be used by governments and other actors as a guide for the equitable collection and use of health data. The inclusive model used to develop the principles can be replicated to strengthen future data governance approaches.

Originality/value

The article describes the first bottom-up effort to develop a set of principles for HDG.

Details

International Journal of Health Governance, vol. 28 no. 3
Type: Research Article
ISSN: 2059-4631

Keywords

Open Access
Article
Publication date: 1 February 2023

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

4622

Abstract

Purpose

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

Design/methodology/approach

The study uses a qualitative approach involving the use of structured questionnaires. The questionnaires were made available to the staff of 17 licensed banks in South Africa who deal with management, operation, administration and banking services. Two hypotheses were formulated and non-parametric statistical analyses involving the use of Chi-square test, Fischer’s Exact test and Spearman’s correlation were carried out. The two hypotheses formulated were tested to draw a conclusion.

Findings

The results obtained indicate that the impact of cyberfraud in the South African banking industry is highly significant and has affected the reputation of some of the banks. This calls for the need to review the diverse ways of curbing cyberfraud to lessen their impact and that of associated fraud risks on the banking operation.

Practical implications

This study provides an analysis on the relationship cyberfraud occurrences and the reputation of South African banks. The implementation of the recommendations may reinforce the existing security measures in the fight against cyberfraud.

Originality/value

The novelty of this study lies in the fact that the assessment of the impact of cyberfraud on the banking industry in South Africa has not been sufficiently highlighted by the existing literature.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7439

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 26 May 2023

Sasha Romanosky and Elizabeth L. Petrun Sayers

The purpose of this study is to examine how companies integrate cyber risk into their enterprise risk management practices. Data breaches have become commonplace, with thousands…

2931

Abstract

Purpose

The purpose of this study is to examine how companies integrate cyber risk into their enterprise risk management practices. Data breaches have become commonplace, with thousands occurring each year, and some costing hundreds of millions of dollars. Consequently, cyber risk has become one of the gravest risks facing organizations, and has attracted boardroom-level attention. On the other hand, companies already manage many kinds of difficult and growing risks, and that firms lose less than 1% of annual revenues as a result of cyber incidents. Therefore, how should firms appropriately address cyber risk? Is it indeed a materially different kind of risk area, or is it simply just one more risk that can seamlessly be integrated into existing enterprise risk management (ERM) practices?

Design/methodology/approach

The authors performed thematic analysis based on semi-structured interviews, with non-probabilistic, purposive sampling, to answer two main questions. First, how do firms manage enterprise risks, generally? And second, how are they integrating cyber risk into these existing processes?

Findings

The authors find that there is considerable variation in the approach and sophistication in ERM practices, such as whether they are driven more like an auditing function, or as a risk champion. The authors also find that despite the novelty of cyber risk, it can be integrated like other enterprise risks, and that cyber risk is most often seen as an operational risk (similar to workplace accidents or fraud), rather than a strategic risk, emerging from, for example, technology innovation and R&D.

Research limitations/implications

The generalization of the results is limited by the sample size and variation of firms interviewed. While the authors attempted to interview enterprise risk managers across a wide variation of firms, there were clear limitations in the scope. That being said, the authors were fortunate to be able to examine ERM and cyber risk practices across small and large, private and publicly traded companies, from a variety of business sectors.

Practical implications

The authors believe these finding are important because they present evidence that while cyber risk may be new, it does not require specialized handling or processes to track it at the enterprise level. While some firms may choose to provide special accommodations or attention because of their data collection or business practices, this approach is neither necessary nor required of all firms in all situations.

Originality/value

This research is one of the only papers that, to the best of the authors’ knowledge, examines how cyber risk is integrated at an enterprise level.

Details

Management Research Review, vol. 47 no. 1
Type: Research Article
ISSN: 2040-8269

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

7303

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 11 August 2023

Michael Nii Laryeafio and Omoruyi Courage Ogbewe

Qualitative research that involves the use of human participants calls for the need to protect those participants to give their honest view during data collection. This is an…

17662

Abstract

Purpose

Qualitative research that involves the use of human participants calls for the need to protect those participants to give their honest view during data collection. This is an important part of every primary data collection in qualitative studies using interviews. This paper aims to investigate all available ethical considerations that need to be observed by the researcher when conducting primary data collection through interview and to explore the theories that underpin the ethics in qualitative studies.

Design/methodology/approach

This paper systemically reviewed existing qualitative data on ethics and gathered information that were analysed and presented on the topic area.

Findings

The findings show that ethical considerations deal with the various approaches adopted by the researcher to make the participants feel safe to participate in any given researcher. During an interview process in qualitative research, the findings show that anonymity, voluntary participation, privacy, confidentiality, option to opt out and avoiding misuse of findings are ethical considerations that must be observed by the researcher. The outcome of the investigation also shows that deontology and utilitarianism, rights and virtue are the main theories that underpin ethical considerations in research.

Originality/value

The rights of the research participants need to be respected in qualitative research to assist in gathering accurate information to achieve the objectives of study. This and other ethical principles such as anonymity, privacy, confidentiality, voluntary participation and option to opt out guide the researcher to systematically adhere to data collection approaches that yield valid results in qualitative data collection using interviews.

Details

Journal of Ethics in Entrepreneurship and Technology, vol. 3 no. 2
Type: Research Article
ISSN: 2633-7436

Keywords

Open Access
Article
Publication date: 20 January 2023

Marisa Agostini, Daria Arkhipova and Chiara Mio

This paper aims to identify, synthesise and critically examine the extant academic research on the relation between big data analytics (BDA), corporate accountability and…

3548

Abstract

Purpose

This paper aims to identify, synthesise and critically examine the extant academic research on the relation between big data analytics (BDA), corporate accountability and non-financial disclosure (NFD) across several disciplines.

Design/methodology/approach

This paper uses a structured literature review methodology and applies “insight-critique-transformative redefinition” framework to interpret the findings, develop critique and formulate future research directions.

Findings

This paper identifies and critically examines 12 research themes across four macro categories. The insights presented in this paper indicate that the nature of the relationship between BDA and accountability depends on whether an organisation considers BDA as a value creation instrument or as a revenue generation source. This paper discusses how NFD can effectively increase corporate accountability for ethical, social and environmental consequences of BDA.

Practical implications

This paper presents the results of a structured literature review exploring the state-of-the-art of academic research on the relation between BDA, NFD and corporate accountability. This paper uses a systematic approach, to provide an exhaustive analysis of the phenomenon with rigorous and reproducible research criteria. This paper also presents a series of actionable insights of how corporate accountability for the use of big data and algorithmic decision-making can be enhanced.

Social implications

This paper discusses how NFD can reduce negative social and environmental impact stemming from the corporate use of BDA.

Originality/value

To the best of the authors’ knowledge, this paper is the first one to provide a comprehensive synthesis of academic literature, identify research gaps and outline a prospective research agenda on the implications of big data technologies for NFD and corporate accountability along social, environmental and ethical dimensions.

Details

Sustainability Accounting, Management and Policy Journal, vol. 14 no. 7
Type: Research Article
ISSN: 2040-8021

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Access

Only Open Access

Year

Last 12 months (190)

Content type

1 – 10 of 190