Search results

1 – 2 of 2
Article
Publication date: 1 December 2005

Adebisi Adewole

The purpose of this paper is to examine the challenges that small firms in the UK clothing manufacturing sector encounter. It has been suggested that small manufacturers' main…

9351

Abstract

Purpose

The purpose of this paper is to examine the challenges that small firms in the UK clothing manufacturing sector encounter. It has been suggested that small manufacturers' main problems are based on an inadequate information‐sharing structure. This research will explore the strategic significance of information to effective supply chain decisions in small garment‐manufacturing firms.

Design/methodology/approach

The paper is designed to employ Porter's five forces to explain the key factors influencing competition in the UK garment manufacturing industry and the relationship of information technology as a facilitator of shared information. In‐depth interviews and observations are conducted in a multiple case approach.

Findings

Empirical evidence shows that the slow and inefficient reaction of small garment manufacturers to competitive pressures is associated with inaccurate and untimely information sharing among trading partners.

Research limitations/implications

The methodological approach justified the particularity, the specificity, and the boundedness required in case studies and demonstrates the depth of thoroughness and authentic explanations. It might, however, be useful to obtain a broader and wider sampling frame in any future research.

Practical implications

A successful supply chain will have implications for the upstream and downstream managers, who need to integrate their supply chains as part of a team that creates and adds value to the garments that end up in the hands of the consumers.

Originality/value

This paper has been able to stimulate concerns and interests in owner/managers of small garment manufacturers with special reference to their information needs. The evidence obtained demonstrated the overriding need for structured information strategies that will encourage the efficient flow of accurate and timely information across their supply chains.

Details

Supply Chain Management: An International Journal, vol. 10 no. 5
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 20 June 2019

Jacqueline M. Archibald and Karen Renaud

Penetration tests have become a valuable tool in the cyber security defence strategy in terms of detecting vulnerabilities. Although penetration testing has traditionally focussed…

Abstract

Purpose

Penetration tests have become a valuable tool in the cyber security defence strategy in terms of detecting vulnerabilities. Although penetration testing has traditionally focussed on technical aspects, the field has started to realise the importance of the human in the organisation, and the need to ensure that humans are resistant to cyberattacks. To achieve this, some organisations “pentest” their employees, testing their resilience and ability to detect and repel human-targeted attacks. In a previous paper, the authors reported on PoinTER (Prepare TEst Remediate), a human pentesting framework, tailored to the needs of SMEs. This paper aims to propose improvements to refine the framework. The improvements are based on a derived set of ethical principles that have been subjected to ethical scrutiny

Design/methodology/approach

The authors conducted a systematic literature review of academic research, a review of actual hacker techniques, industry recommendations and official body advice related to social engineering techniques. To meet the requirements to have an ethical human pentesting framework, the authors compiled a list of ethical principles from the research literature which they used to filter out techniques deemed unethical.

Findings

Drawing on social engineering techniques from academic research, reported by the hacker community, industry recommendations and official body advice and subjecting each technique to ethical inspection, using a comprehensive list of ethical principles, the authors propose the refined GDPR-compliant and privacy respecting PoinTER framework. The list of ethical principles, as suggested, could also inform ethical technical pentests.

Originality/value

Previous work has considered penetration testing humans, but few have produced a comprehensive framework such as PoinTER. PoinTER has been rigorously derived from multiple sources and ethically scrutinised through inspection, using a comprehensive list of ethical principles derived from the research literature.

Details

Information & Computer Security, vol. 27 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 2 of 2