Search results

1 – 10 of over 2000
Article
Publication date: 3 April 2023

Efrosini Siougle, Sophia Dimelis and Nikolaos Malevris

This study explores the link between ISO 9001 certification, personal data protection and firm performance using financial balance sheet and survey data. The security aspect of…

Abstract

Purpose

This study explores the link between ISO 9001 certification, personal data protection and firm performance using financial balance sheet and survey data. The security aspect of data protection is analyzed based on the major requirements of the General Data Protection Regulation and mapped to the relevant controls of the ISO/IEC 27001/27002 standards.

Design/methodology/approach

The research analysis is based on 96 ISO 9001–certified and non-certified publicly traded manufacturing and service firms that responded to a structured questionnaire. The authors develop and empirically test their theoretical model using the structural equation modeling technique and follow a difference-in-differences econometric modeling approach to estimate financial performance differences between certified and non-certified firms accounting for the level of data protection.

Findings

The estimates indicate three core dimensions in the areas of “policies, procedures and responsibilities,” “access control management” and “risk-reduction techniques” as desirable components in establishing the concept of data security. The estimates also suggest that the data protection level has significantly impacted the performance of certified firms relative to the non-certified. Controlling for the effect of industry-level factors reveals a positive relationship between data security and high-technological intensity.

Practical implications

The results imply that improving the level of compliance to data protection enhances the link between certification and firm performance.

Originality/value

This study fills a gap in the literature by empirically testing the influence of data protection on the relationship between quality certification and firm performance.

Details

International Journal of Productivity and Performance Management, vol. 73 no. 3
Type: Research Article
ISSN: 1741-0401

Keywords

Article
Publication date: 21 February 2024

Azra Rafique, Kanwal Ameen and Alia Arshad

This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the…

Abstract

Purpose

This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the scholarly community and the academics’ online searching behaviour at a higher education institution in Pakistan.

Design/methodology/approach

The study used an explanatory sequential mixed methods approach. Raw transaction log data were collected for quantitative analysis, and the interview technique was used for qualitative data collection and thematic analysis.

Findings

Log analysis revealed that HEC subscribed databases were used significantly, and among those, scholarly databases covering various subjects were more frequently used than subject-specific society-based databases. Furthermore, the users frequently accessed the needed e-journal articles through search engines like Google and Google Scholar, considering them sources of free material instead of the HEC subscribed databases.

Practical implications

It provides practical implications for examining the evidence-based use patterns of e-journal databases. It suggests the need for improving the access management of HEC databases, keeping in view the usage statistics and the demands of the scholars. The study may also help create market venues for the publishers of scholarly databases by offering attractive and economical packages for researchers of various disciplines in developing and underdeveloped countries. The study results also guide the information professionals to arrange orientation and information literacy programs to improve the searching behaviour of their less frequent users and enhance the utilization of these subscribed databases.

Originality/value

The study is part of a PhD project and, to the best of the authors’ knowledge, is the first such work in the context of a developing country like Pakistan.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 14 September 2022

Mythili Boopathi, Meena Chavan, Jeneetha Jebanazer J. and Sanjay Nakharu Prasad Kumar

The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that…

Abstract

Purpose

The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method.

Design/methodology/approach

This paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques.

Findings

The SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively.

Originality/value

The DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 23 December 2022

Konstantinos Chytas, Anastasios Tsolakidis, Evangelia Triperina and Christos Skourlas

The purpose of this paper is to introduce an interactive system that relies on the educational data generated from the online Universities services to assess, correct and…

Abstract

Purpose

The purpose of this paper is to introduce an interactive system that relies on the educational data generated from the online Universities services to assess, correct and ameliorate the learning process for both students and faculty.

Design/methodology/approach

In the presented research, data from the online services, provided by a Greek University, prior, during and after the COVID-19 outbreak, are analyzed and utilized in order to ameliorate the offered learning process and provide better quality services to the students. Moreover, according to the learning paths, their presence online and their participation in the services of the University, insights can be derived for their performance, so as to better support and assist them.

Findings

The system can deduce the future learning progression of each student, according to the past and the current performance. As a direct consequence, the exploitation of the data can provide a road map for the strategic planning of universities, can indicate how the learning process can be updated and amended, both online and in person, as well as make the learning experience more essential, effective and efficient for the students and aiding the professors to provide a more meaningful and to-the-point learning experience.

Originality/value

Nowadays, educational activities in academia are strongly supported by online services, information systems and online educational materials. The learning design in the academic setting is primarily facilitated in the University premises. However, the exploitation of the contemporary technologies and supporting materials that are available online can enrich and transform the educational process and its results.

Details

Data Technologies and Applications, vol. 57 no. 3
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 2 August 2023

Hien Thi Thanh Nguyen, Wu-Yuin Hwang, Thao Pham, Tuyen Thi Thanh Truong and Hsin-Wei Chang

This study aims to examine the effects of the proposed mobile Web library application (MWLA) on the search experience and its impact on learners’ engagement, interaction and…

Abstract

Purpose

This study aims to examine the effects of the proposed mobile Web library application (MWLA) on the search experience and its impact on learners’ engagement, interaction and overall learning outcomes within an institutional repository. Furthermore, the study investigates learners’ acceptance of the MWLA system.

Design/methodology/approach

The study suggests implementing an MWLA with Algolia’s search service to improve the institutional repository and enhance learners’ access to reliable information. It involved an experiment with 85 undergraduate students divided into experimental and control groups (CGs), where the experimental group (EG) used MWLA for search tasks, and the CG used the traditional library website. The study evaluated the acceptance and learning behaviours of the EG towards MWLA, considering factors such as usefulness, ease of use, mobility, accessibility, satisfaction and intention to use.

Findings

The findings of this study provide empirical evidence that the EG, which used the MWLA, demonstrated superior performance compared to the CG across all institutional repository collections, resulting in improved learning outcomes. Participants were highly satisfied with MWLA and found it user-friendly and beneficial for improving search skills. MWLA’s portability and accessibility motivated active learner engagement.

Originality/value

The powerful search bar of MWLA significantly enhanced learners’ search efficiency, resulting in more effective retrieval of relevant materials. Moreover, learners who actively engaged with previews and full-text content, using appropriate keywords and syntax, achieved higher scores and were more likely to access previews, abstracts and full texts of documents using the sorting-by-year or by-advisor feature.

Article
Publication date: 11 March 2022

Snehal R. Rathi and Yogesh D. Deshpande

Affective states in learning have gained immense attention in education. The precise affective-states prediction can increase the learning gain by adapting targeted interventions…

Abstract

Purpose

Affective states in learning have gained immense attention in education. The precise affective-states prediction can increase the learning gain by adapting targeted interventions that can adjust the changes in individual affective states of students. Several techniques are devised for predicting the affective states considering audio, video and biosensors. Still, the system that relies on analyzing audio and video cannot certify anonymity and is subjected to privacy problems.

Design/methodology/approach

A new strategy, termed rider squirrel search algorithm-based deep long short-term memory (RiderSSA-based deep LSTM) is devised for affective-state prediction. The deep LSTM training is done by the proposed RiderSSA. Here, RiderSSA-based deep LSTM effectively predicts the affective states like confusion, engagement, frustration, anger, happiness, disgust, boredom, surprise and so on. In addition, the learning styles are predicted based on the extracted features using rider neural network (RideNN), for which the Felder–Silverman learning-style model (FSLSM) is considered. Here, the RideNN classifies the learners. Finally, the course ID, student ID, affective state, learning style, exam score and course completion are taken as output data to determine the correlative study.

Findings

The proposed RiderSSA-based deep LSTM provided enhanced efficiency with elevated accuracy of 0.962 and the highest correlation of 0.406.

Originality/value

The proposed method based on affective prediction obtained maximal accuracy and the highest correlation. Thus, the method can be applied to the course recommendation system based on affect prediction.

Details

Kybernetes, vol. 52 no. 9
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 11 May 2023

Alexander Joseph Vanhee and Rachel McNealey

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate…

Abstract

Purpose

The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate whether aspects of an individual’s residence affect their likelihood of becoming identity theft victims.

Design/methodology/approach

The authors conduct logistic regressions of whether a respondent was an identity theft victim in the past year using the following variables as key predictors: number of housing units in a residence, whether the respondent operates a business out of their residence and if residence access is restricted.

Findings

The results suggest that location influences the likelihood of identity theft to a modest degree though some aspects of location (possibly those related to rewards perceptions) may be more relevant than others. Meanwhile, though location may influence initial target selection, whether someone is victimized may be more dependent on factors such as personal behavior.

Originality/value

To the best of the authors’ knowledge, this manuscript represents one of the first investigations into the relationship between microlevel place and the incidence of identity theft. Furthermore, it provides evidence that one does exist which bears further inquiry.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 4 September 2023

Eka Rastiyanto Amrullah, Hironobu Takeshita and Hiromi Tokuda

The agricultural extension system in Indonesia has experienced its ups and downs in line with the sociopolitical dynamics of the country. This study examines the impact of access…

Abstract

Purpose

The agricultural extension system in Indonesia has experienced its ups and downs in line with the sociopolitical dynamics of the country. This study examines the impact of access to agricultural extension on the adoption of technology and farm income of smallholder farmers in Banten, Indonesia.

Design/methodology/approach

This study uses a quasi-experimental research design to estimate the impact outcomes at the farm level, with methods that form part of the counterfactual framework.

Findings

Estimation results show that farming experience, off-farm income, irrigation, group membership, mobile phones and livestock ownership significantly affect extension access. The results of this main study show the important role of extension access to technology adoption and agricultural income. These studies found consistently positive and statistically significant effects of access to extension services on technology adoption and farm income.

Research limitations/implications

The consistent positive and significant effect of extension access implies that public investment by the government in agricultural extension can optimize the potential impact on technology adoption and agricultural income, which also affects the distribution of the welfare of rural smallholder farmers.

Originality/value

Agricultural extension as a key to increasing technology adoption. However, the impact of access to agricultural extension in Indonesia has received less attention in terms of adoption and farm income.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Article
Publication date: 20 November 2023

Afrooz Moatari-Kazerouni, Dinesh R. Pai, Alejandro E. Chicas and Amin Keramati

The authors propose a blockchain platform for managing clinical trial data to enhance data validity, integrity, trust and transparency in the pharmaceutical research process. The…

49

Abstract

Purpose

The authors propose a blockchain platform for managing clinical trial data to enhance data validity, integrity, trust and transparency in the pharmaceutical research process. The authors also provide an extensive review of how blockchain technology supports the business processes of clinical trials.

Design/methodology/approach

A systematic literature review was conducted to identify the existing applications of blockchain in pharmaceutical process management. A conceptual design for a blockchain infrastructure to address clinical trial challenges is developed by outlining the entire clinical trial value chain and identifying the coordination and communication among its stakeholders. A stakeholder analysis is conducted to ensure that the clinical trial processes satisfy the requirements and preferences of each stakeholder.

Findings

The proposed blockchain platform offers a promising solution for enhancing integrity, trust and transparency in the clinical trial process. Additionally, blockchain can help streamline communication and collaboration between stakeholders by enabling multiple parties to access and share data in real time, lowering the possibility of delays or errors in data analysis and reporting.

Practical implications

The proposed blockchain platform can benefit patients by empowering them to have better-controlled access to their data and by allowing researchers to maintain adherence to reporting requirements. Additionally, the platform can benefit granting agencies, researchers and decision-makers by ensuring the integrity of clinical trial data and streamlining communication and collaboration between stakeholders.

Originality/value

This study builds on existing blockchain applications in pharmaceutical process management by developing a blockchain framework that can address clinical trial concerns from an integrated perspective.

Details

Business Process Management Journal, vol. 30 no. 2
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 1 February 2024

David Hedberg, Martin Lundgren and Marcus Nohlberg

This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.

Abstract

Purpose

This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.

Design/methodology/approach

This study is based on an empirical study consisting of semistructured interviews with representatives from both branded and independent auto workshops. The data was analyzed using thematic analysis. A version of the capability maturity model was introduced to the respondents as a self-evaluation of their cybersecurity awareness.

Findings

Cybersecurity was not found to be part of the current auto workshop work culture, and that there is a gap between independent workshops and branded workshops. Specifically, in how they function, approach problems and the tools and support available to them to resolve (particularly regarding previously unknown) issues.

Research limitations/implications

Only auto workshop managers in Sweden were interviewed for this study. This role was picked because it is the most likely to have come in contact with cybersecurity-related issues. They may also have discussed the topic with mechanics, manufacturers or other auto workshops – thus providing a broader view of potential issues or challenges.

Practical implications

The challenges identified in this study offers actionable advice to car manufacturers, branded workshops and independent workshops. The goal is to further cooperation, improve knowledge sharing and avoid unnecessary safety or security issues.

Originality/value

As cars become smarter, they also become potential targets for cyberattacks, which in turn poses potential threats to human safety. However, research on auto workshops, which has previously ensured that cars are road safe, has received little research attention with regards to the role cybersecurity can play in repairs and maintenance. Insights from auto workshops can therefore shed light upon the unique challenges and issues tied to the cybersecurity of cars, and how they are kept up-to-date and road safe in the digital era.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 2000