Search results

1 – 10 of 95
Content available

Abstract

Purpose

N/A

Design/methodology/approach

N/A

Findings

N/A

Research limitations/implications

N/A

Practical implications

N/A

Social implications

N/A

Originality/value

N/A

Contribution to Impact

N/A

Details

Digital Library Perspectives, vol. 40 no. 2
Type: Research Article
ISSN: 2059-5816

Keywords

Open Access
Article
Publication date: 24 May 2024

Aliyu Abubakar Lawan and Pekka Henttonen

This study aims to examine the connection between the integrity of records and the effectiveness of anti-corruption investigations. The objective is to determine how the quality…

Abstract

Purpose

This study aims to examine the connection between the integrity of records and the effectiveness of anti-corruption investigations. The objective is to determine how the quality of records affects the efficiency of anti-corruption investigations.

Design/methodology/approach

This study uses a qualitative, exploratory case study approach, with data collected through interviews with 15 anti-corruption investigators in 2020 in Nigeria. The data were analysed using thematic analysis.

Findings

The results indicate that the efficiency of anti-corruption investigations depends on the quality of the evidence. Proper recordkeeping, which maintains the integrity of records, is crucial for efficient anti-corruption investigations. Inadequate recordkeeping practices that do not adhere to the lifecycle concept are often driven by corruption and can significantly hinder the efficiency of anti-corruption investigations by causing delays in obtaining crucial evidence.

Originality/value

From a records management perspective, this study highlights the impact of unreliable evidence on every corruption investigation effort and the motives behind rendering the process unproductive. Accountability forums must enforce adherence to proper recordkeeping procedures to ensure the desired investigative outcomes with minimal resources, time and effort to combat corruption.

Details

Records Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 23 August 2023

Musediq Tunji Bashorun, Yusuf Ayodeji Ajani and Olaronke Oyinlola Fagbola

This paper aims to explore the deep Web as a solution for displacement and replacement challenges in libraries, addressing the challenges, benefits, strategies and case studies.

Abstract

Purpose

This paper aims to explore the deep Web as a solution for displacement and replacement challenges in libraries, addressing the challenges, benefits, strategies and case studies.

Design/methodology/approach

The paper synthesizes existing literature on deep Web integration in libraries, providing a comprehensive analysis of insights from scholarly articles, case studies and expert opinions.

Findings

The deep Web grants libraries access to unique content, improving information access, fostering collaboration and enabling personalized content. However, security, privacy, ethics and data protection must be considered.

Originality/value

This paper contributes to the literature by providing a comprehensive examination of deep Web integration in libraries, offering valuable recommendations for navigating the changing landscape and leveraging the deep Web’s potential.

Details

Library Hi Tech News, vol. 41 no. 3
Type: Research Article
ISSN: 0741-9058

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

Article
Publication date: 22 May 2024

Derek Friday, Steven Alexander Melnyk, Morris Altman, Norma Harrison and Suzanne Ryan

The vulnerability of customers to malware attacks through weak supplier links has prompted a need for collaboration as a strategic alternative in improving supply chain…

Abstract

Purpose

The vulnerability of customers to malware attacks through weak supplier links has prompted a need for collaboration as a strategic alternative in improving supply chain cybersecurity (SCC). Current studies overlook the fact that the effectiveness of cybersecurity strategies is dependent on the form of interfirm relationship mechanisms within which supply chain digital assets are embedded. This paper analyses the association between interfirm collaborative cybersecurity management capabilities (ICCMC) and cybersecurity parameters across a supply chain and proposes an agenda for future research.

Design/methodology/approach

A systematic literature review (SLR) is conducted, employing text mining software to analyse content extracted from 137 scholarly articles on SCC from January 2013 to January 2022.

Findings

The co-occurrence analysis strongly confirms the potential of ICCMC to reinforce SCC. Furthermore, we establish that relational factors could have multiple roles: as antecedents for ICCMC, and as factors that directly affect SCC parameters. The analysis reveals knowledge gaps in SCC theory grounding, including a fragmented and sparse representation of SCC parameters and the potential presence of an omitted variable – SCC – that could improve subsequent testing of causal relationships for theory development.

Originality/value

The paper’s contribution is at the intersection of interfirm collaboration and mandating cybersecurity requirements across a supply chain. Our paper contributes to closing a social-technical gap by introducing social aspects such as the Relational View and the importance of developing ICCMC to reinforce SCC. We offer a method for testing co-occurrences in SLRs, a comprehensive definition of SCC, and a framework with propositions for future research on increasing the effectiveness of collaborative cybersecurity management. We position collaboration as a necessary condition for the transition from cybersecurity of a firm to cybersecurity across a supply chain, and its ecosystem.

Details

International Journal of Physical Distribution & Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 11 May 2023

Alexander Joseph Vanhee and Rachel McNealey

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate…

Abstract

Purpose

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate whether aspects of an individual’s residence affect their likelihood of becoming identity theft victims.

Design/methodology/approach

The authors conduct logistic regressions of whether a respondent was an identity theft victim in the past year using the following variables as key predictors: number of housing units in a residence, whether the respondent operates a business out of their residence and if residence access is restricted.

Findings

The results suggest that location influences the likelihood of identity theft to a modest degree though some aspects of location (possibly those related to rewards perceptions) may be more relevant than others. Meanwhile, though location may influence initial target selection, whether someone is victimized may be more dependent on factors such as personal behavior.

Originality/value

To the best of the authors’ knowledge, this manuscript represents one of the first investigations into the relationship between microlevel place and the incidence of identity theft. Furthermore, it provides evidence that one does exist which bears further inquiry.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 10 January 2024

Khurram Shahzad, Shakeel Ahmad Khan and Abid Iqbal

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the…

244

Abstract

Purpose

For the provision of smart library services to end users, tools of the Internet of Things (IoT) play a significant role. The study aims to discover the factors influencing the adoption of IoT in university libraries, investigate the impact of IoT on university library services and identify challenges to adopt IoT applications in university libraries.

Design/methodology/approach

A systematic literature review was carried out to address the objectives of the study. The 40 most relevant research papers published in the world’s leading digital databases were selected to conduct the study.

Findings

The findings illustrated that rapid growth in technology, perceived benefits, the networked world and the changing landscape of librarianship positively influenced the adoption of IoT in university libraries. The study also displayed that IoT supported library professionals to initiate smart library services, assisted in service efficiency, offered context-based library services, provided tracking facilities and delivered effective management of library systems. Results also revealed that a lack of technical infrastructure, security and privacy concerns, a lack of technological skills and unavailability of policy and strategic planning caused barriers to the successful adoption of IoT applications in university libraries.

Originality/value

The study has provided theoretical implications through a valuable addition to the current literature. It has also offered managerial implications for policymakers to construct productive policies for the implementation of IoT applications in university libraries for the attainment of fruitful outcomes. Finally, the study provides a baseline for understanding the adoption of IoT in academic libraries.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Book part
Publication date: 28 May 2024

Siddhartha Roy

For the past few years, in a purely competitive and dynamic environment, the supply chain plays a crucial role to adapt the business as it is very contingent on collaborative…

Abstract

For the past few years, in a purely competitive and dynamic environment, the supply chain plays a crucial role to adapt the business as it is very contingent on collaborative integration as well as flexibility. Many specialized applications are implemented to improve the flow control of the supply chain. One of the most important new technological applications in the supply chain is blockchain technology which has garnered the attention of many business owners as this technology can be quickly adapted to the dynamic business environment. Blockchain technology has been gaining importance and acceptability over the past few years. Blockchain technology has found significant success in all fields, including the banking and finance sector, health, manufacturing, transportation, and many others. Recently, the researchers have contributed significantly toward understanding blockchain technology and its application in the organizational and technology-specific factors that play a crucial role in driving its adoption in the supply chain. Blockchain technology plays a vital role to maintain trust among the stakeholder of the supply chain. The purpose of this chapter is to discuss a theoretical framework for blockchain adoption in the supply chain in business. The outcomes of this chapter endorse that companies invest in blockchain technology so that the supply chain becomes more transparent, flexible, and secure. In the end, this chapter has also given contemplations on the security issues of implementing blockchain in the field of collaboration and integration.

Details

Contemporary Issues in International Trade
Type: Book
ISBN: 978-1-83797-321-7

Keywords

Article
Publication date: 17 August 2023

P.S. JosephNg

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that…

73

Abstract

Purpose

This study aims to highlight that security and flexibilities remain the main points of contention in the cordiality business. This research points to planning a framework that empowers hotel users to get to the room using a mobile access key. Advancing secured facilities, mobile phone “Near Field Communication” (NFC) innovation as the entrance device by carrying out an application containing an imitated mobile key for explicit verification access is used.

Design/methodology/approach

The proposed system is evaluated by triangulation of experimental, numerical and rational evaluation using partial least square structural equation modeling (PLS-SEM) with Malaysian hotel guests and employees.

Findings

The discoveries with the hypothesis supported validated that the suggested solution can eliminate physical cards, boost protection and encourage a contactless ecosystem. Theoretical, management and societal contributions are discussed here.

Research limitations/implications

This experiment comes with the constraints that it was conducted in only two hotels and does not fully reflect the choices of a wider range of travellers. Secondly, the cost of existing NFC smart locks is still relatively high, and along with the development of technology, the price will decrease when supply exceeds demand.

Practical implications

To promote high-security attributes, NFC technology as the access system by implementing an application containing an emulated smart key for specific authentication access is used. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Social implications

To promote high-security attributes, NFC technology is used as the access system by implementing an application containing an emulated smart key for specific authentication access. The host-card emulation enables cost-effectiveness profit and initiating a defence system in the pandemic era.

Originality/value

The novelty of this study comes from the use of commonly available smartphone NFC features that are yet to be applied in the tourism ecosystem. The research provokes the applied concept of mobile smartkeys.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 2 May 2024

Bolaji David Oladokun, Oluwole Olumide Durodolu, Adeyinka Tella, Yusuf Ayodeji Ajani and Abayomi Kehinde Owolabi

This paper aims to explore the decline of the metaverse and the concurrent growth of online videos, examining their implications for libraries. It analyzes factors contributing to…

Abstract

Purpose

This paper aims to explore the decline of the metaverse and the concurrent growth of online videos, examining their implications for libraries. It analyzes factors contributing to the metaverse decline, such as technical issues and privacy concerns, and explores the emergence and popularity of online video platforms.

Design/methodology/approach

This study applied the interpretive content/document analysis of literature harvested from different databases of Scopus, Web of Science and Directory of Open Access Journals. Given the shift in digital consumption patterns and their impact on libraries, the paper systematically reviews the literature to elucidate the changing landscape of digital engagement and its implications for library services and outreach efforts.

Findings

The paper identifies technical issues, privacy concerns and a lack of interoperability as key factors contributing to the decline of the metaverse. Conversely, the growth of online videos is driven by the emergence of platforms, increasing accessibility to high-speed internet and a diversification of content offerings. These trends reshape user preferences and behaviors, presenting both challenges and opportunities for libraries.

Originality/value

The decline of the metaverse and the rise of online videos underscore the importance of adaptation and innovation for libraries. To remain relevant in the digital age, libraries must transform their services to meet the demand for on-demand content and multimedia resources. The findings highlight the need for libraries to invest in digital literacy and media literacy programs, embrace emerging technologies and forge strategic partnerships with online video platforms. By adapting to changing trends and user preferences, libraries will continue to fulfill their mission of providing access to information and knowledge in the digital age.

Details

Library Hi Tech News, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0741-9058

Keywords

1 – 10 of 95