Search results

1 – 10 of over 243000
Article
Publication date: 1 January 1991

Binshan Lin

Management of quality control has shown a shift from aninspection‐oriented approach towards a defect‐prevention andorganisation‐focused planning process. The development of a…

Abstract

Management of quality control has shown a shift from an inspection‐oriented approach towards a defect‐prevention and organisation‐focused planning process. The development of a quality control information system (QCIS) should focus on management, planning and control issues. This article examines the QCIS from the aspect of its implications for management in a computer integrated manufacturing (CIM) environment.

Details

International Journal of Operations & Production Management, vol. 11 no. 1
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 19 February 2024

Donia Waseem, Shijiao (Joseph) Chen, Zhenhua (Raymond) Xia, Nripendra P. Rana, Balkrushna Potdar and Khai Trieu Tran

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from…

Abstract

Purpose

In the online environment, consumers increasingly feel vulnerable due to firms’ expanding capabilities of collecting and using their data in an unsanctioned manner. Drawing from gossip theory, this research focuses on two key suppressors of consumer vulnerability: transparency and control. Previous studies conceptualize transparency and control from rationalistic approaches that overlook individual experiences and present a unidimensional conceptualization. This research aims to understand how individuals interpret transparency and control concerning privacy vulnerability in the online environment. Additionally, it explores strategic approaches to communicating the value of transparency and control.

Design/methodology/approach

An interpretivism paradigm and phenomenology were adopted in the research design. Data were collected through semi-structured interviews with 41 participants, including consumers and experts, and analyzed through thematic analysis.

Findings

The findings identify key conceptual dimensions of transparency and control by adapting justice theory. They also reveal that firms can communicate assurance, functional, technical and social values of transparency and control to address consumer vulnerability.

Originality/value

This research makes the following contributions to the data privacy literature. The findings exhibit multidimensional and comprehensive conceptualizations of transparency and control, including user, firm and information perspectives. Additionally, the conceptual framework combines empirical insights from both experiencers and observers to offer an understanding of how transparency and control serve as justice mechanisms to effectively tackle the issue of unsanctioned transmission of personal information and subsequently address vulnerability. Lastly, the findings provide strategic approaches to communicating the value of transparency and control.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 18 September 2023

Yu Wang, Daqing Zheng and Yulin Fang

The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore…

Abstract

Purpose

The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore the factors that influence the information-control behavior of ESN users when continuously sharing information.

Design/methodology/approach

This study specifies the information-control behaviors in the “wall posts” channel and applies communication privacy management (CPM) theory to analyze the effects of the individual-specific factor (disposition to value information), context-specific factors (work-relatedness and information richness) and risk-benefit ratio (public benefit and public risk). Data on actual information-control behaviors extracted from ESN logs are examined using multilevel mixed-effects logistic regression analysis.

Findings

The study's findings show the direct effects of the individual-specific factor, context-specific factors and risk-benefit ratio, highlighting interactions between the individual motivation factor and ESN context factors.

Originality/value

This study reshapes the relationship of CPM theory boundary rules in the ESN context, extending information-control research and providing insights into ESNs' information-control practices.

Open Access
Article
Publication date: 11 April 2016

Denise L. Anthony and Timothy Stablein

The purpose of this paper is to explore different health care professionals’ discourse about privacy – its definition and importance in health care, and its role in their…

13767

Abstract

Purpose

The purpose of this paper is to explore different health care professionals’ discourse about privacy – its definition and importance in health care, and its role in their day-to-day work. Professionals’ discourse about privacy reveals how new technologies and laws challenge existing practices of information control within and between professional groups in health care, with implications not only for patient privacy, but also for the role of information control in professions more generally.

Design/methodology/approach

The authors conducted in-depth, semi-structured interviews with n=83 doctors, nurses, and health information professionals in two academic medical centers and one veteran’s administration hospital/clinic in the Northeastern USA. Interview responses were qualitatively coded for themes and patterns across groups were identified.

Findings

The health care providers and the authors studied actively sought to uphold the protection (and control) of patient information through professional ethics and practices, as well as through the use of technologies and compliance with legal regulations. They used discourses of professionalism, as well as of law and technology, to sometimes accept and sometimes resist changes to practice required in the changing technological and legal context of health care. The authors found differences across professional groups; for some, protection of patient information is part of core professional ethics, while for others it is simply part of their occupational work, aligned with organizational interests.

Research limitations/implications

This qualitative study of physicians, nurses, and health information professionals revealed some differences in views and practices for protecting patient information in the changing technological and legal context of health care that suggest some professional groups (doctors) may be more likely to resist such changes and others (health information professionals) will actively adopt them.

Practical implications

New technologies and regulations are changing how information is used in health care delivery, challenging professional practices for the control of patient information that may change the value or meaning of medical records for different professional groups.

Originality/value

Qualitative findings suggest that professional groups in health care vary in the extent of information control they have, as well in how they view such control. Some groups may be more likely to (be able to) resist changes in the professional control of information that stem from new technologies or regulatory policies. Some professionals recognize that new IT systems and regulations challenge existing social control of information in health care, with the potential to undermine (or possibly bolster) professional self-control for some but not necessarily all occupational groups.

Details

Journal of Health Organization and Management, vol. 30 no. 2
Type: Research Article
ISSN: 1477-7266

Keywords

Article
Publication date: 1 March 1999

K.H. Spencer Pickett

Using the backdrop of an (apparently) extended visit to the West Indies, analogies with key concerns of internal audit are drawn. An unusual and refreshing way of exploring the…

40004

Abstract

Using the backdrop of an (apparently) extended visit to the West Indies, analogies with key concerns of internal audit are drawn. An unusual and refreshing way of exploring the main themes ‐ a discussion between Bill and Jack on tour in the islands ‐ forms the debate. Explores the concepts of control, necessary procedures, fraud and corruption, supporting systems, creativity and chaos, and building a corporate control facility.

Details

Management Decision, vol. 37 no. 2
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 1 December 2001

Peter A. Corning

Norbert Wiener’s cybernetic paradigm represents one of the seminal ideas of the twentieth century. Nevertheless, its full potential has yet to be realized. For instance…

Abstract

Norbert Wiener’s cybernetic paradigm represents one of the seminal ideas of the twentieth century. Nevertheless, its full potential has yet to be realized. For instance, cybernetics is relatively little used as an analytical tool in the social sciences. One reason, it is argued here, is that Wiener’s framework lacks a crucial element – a functional definition of information. Although so‐called Shannon information has made many valuable contributions and has many important uses, it is blind to the functional properties of information. Here a radically different approach to information theory is described. After briefly critiquing the literature in information theory, a new kind of cybernetic information will be proposed called “control information.” Control information is not a “thing” but an attribute of the relationships between things. It is defined as: the capacity (know‐how) to control the acquisition, disposition and utilization of matter/energy in purposive (cybernetic) processes. This concept is briefly elucidated, and a formalization proposed in terms of a common unit of measurement, namely the quantity of “available energy” that can be controlled by a given unit of information in a given context. However, other metrics are also feasible, from money to allocations of human labor. Some illustrations are briefly provided and some of the implications are discussed.

Details

Kybernetes, vol. 30 no. 9/10
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 26 August 2014

Michele Rubino and Filippo Vitolla

The purpose of this paper is to analyze how the COBIT framework, integrated within the internal control framework, enables improvement in the quality of financial reporting while…

5913

Abstract

Purpose

The purpose of this paper is to analyze how the COBIT framework, integrated within the internal control framework, enables improvement in the quality of financial reporting while helping to reduce or eliminate the material weaknesses (MWs) of internal control over financial reporting (ICFR). The Control Objectives for Information and Related Technology (COBIT) model is a framework for information technology (IT) management and IT governance. It is a supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. Preliminarily, the analysis in this paper illustrates how the Committee of Sponsoring Organizations (COSO) framework impacts on the MWs, highlighting strengths and weaknesses. This paper shows how these limits can be overcome with the use of the COBIT framework.

Design/methodology/approach

This is a conceptual paper that aims to highlight the relationship between COBIT and COSO, by illustrating how the IT processes reduce or eliminate the main MW categories.

Findings

The analysis indicates that the implementation of the COBIT framework, or more generally the adoption of effective IT controls, provides important benefits to the entire company or organization. IT control objectives have a direct impact on the IT control weaknesses and indirectly on the other categories of material weaknesses.

Practical implications

The adoption of the framework allows managers to implement effective ICFR. In particular, the COBIT approach provides managers with a more evolved tool in terms of compliance with the Sarbanes–Oxley Act requirements. This framework also improves the reliability of financial reporting in relation to the requirements of Public Company Accounting Oversight Board’s Auditing Standards No. 2 and 5.

Originality/value

The analysis provides an interdisciplinary approach, connecting accounting and information systems themes, and suggest solutions and tools than can help managers to address the internal control weaknesses. This paper addresses an area of relevance to both practitioners and academics and expands existing accounting literature.

Details

Managerial Auditing Journal, vol. 29 no. 8
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 1 June 1998

K.H. Spencer Pickett

Using the backdrop of an (apparently) extended visit to the West Indies, analogies with key concerns of internal audit are drawn. An unusual and refreshing way of exploring the…

38383

Abstract

Using the backdrop of an (apparently) extended visit to the West Indies, analogies with key concerns of internal audit are drawn. An unusual and refreshing way of exploring the main themes ‐ a discussion between Bill and Jack on tour in the islands ‐ forms the debate. Explores the concepts of control, necessary procedures, fraud and corruption, supporting systems, creativity and chaos, and building a corporate control facility.

Details

Managerial Auditing Journal, vol. 13 no. 4/5
Type: Research Article
ISSN: 0268-6902

Keywords

Book part
Publication date: 14 July 2006

Lori S. Kopp and James L. Bierstaker

This study contributes to the cognitive processes and expertise research in judgment and decision-making in auditing. It uses the levels-of-processing theory (Craik & Lockhart…

Abstract

This study contributes to the cognitive processes and expertise research in judgment and decision-making in auditing. It uses the levels-of-processing theory (Craik & Lockhart, 1972) to investigate the amount of auditor attention given to information during internal control documentation procedures, and the effect of this attention on internal control information acquisition and risk assessment. Based on levels-of-processing, the attention required to complete an internal control questionnaire (ICQ) is predicted to result in the acquisition of more internal control information than when a completed ICQ is reviewed. In addition, auditors who complete an ICQ should assess control risk more like experts’ than auditors, who review an ICQ completed by another individual. Results suggest that the audit seniors who completed an ICQ retained significantly more internal control information than audit seniors who reviewed an ICQ completed by another individual. This result held when separately examining the internal control strengths and weaknesses. In addition, audit seniors who completed an ICQ-assessed control risk at a level comparable to the control risk assessments of audit managers in the same firm.

Details

Advances in Accounting Behavioral Research
Type: Book
ISBN: 978-1-84950-448-5

Open Access
Article
Publication date: 10 July 2023

Moses Muhwezi, Henry Mutebi, Samuel Ssekajja Mayanja, Benjamin Tukamuhabwa, Sheila Namagembe and Robert Kalema

Procuring relief products and services is a challenging process for humanitarian organizations (HOs), yet it accounts for approximately 65% of relief operations’ costs (Moshtari…

1902

Abstract

Purpose

Procuring relief products and services is a challenging process for humanitarian organizations (HOs), yet it accounts for approximately 65% of relief operations’ costs (Moshtari et al., 2021). This paper aims to examine how procurement internal controls, materials and purchasing procedure standardization influence information integration and procurement performance.

Design/methodology/approach

In this study, partial least square structural equation models and multigroup analysis were used to analyze data collected from 170 HOs.

Findings

Procurement internal controls and material and purchasing procedure standardization fully mediate between information integration and procurement performance.

Research limitations/implications

The study focuses only on HOs. Since humanitarian procurement projects take place over a period of several years, it is difficult to capture the long-term effects of information integration, procurement internal controls, material and purchasing procedure standardization and procurement performance. In this regard, a longitudinal study could be undertaken, provided that the required resources are available.

Practical implications

Procurement managers should implement information integration practices within acceptable procurement internal controls and standardize material and purchasing procedures to boost procurement performance.

Originality/value

By integrating information through procurement internal controls and standardizing material and purchasing procedures, procurement performance in a humanitarian setting can be systematically optimized.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 13 no. 4
Type: Research Article
ISSN: 2042-6747

Keywords

1 – 10 of over 243000