Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 14 March 2016

Adrienne Muir, Rachel Spacey, Louise Cooke and Claire Creaser

This paper aims to consider selected results from the Arts and Humanities Research Council (AHRC)-funded “Managing Access to the internet in Public Libraries” (MAIPLE) project…

4814

Abstract

Purpose

This paper aims to consider selected results from the Arts and Humanities Research Council (AHRC)-funded “Managing Access to the internet in Public Libraries” (MAIPLE) project, from 2012-2014. MAIPLE has explored the ways in which public library services manage use of the internet connections that they provide for the public. This included the how public library services balance their legal obligations and the needs of their communities in a public space and the ethical dilemmas that arise.

Design/methodology/approach

The researchers used a mixed-method approach involving a review of the literature, legal analysis, a questionnaire survey and case studies in five public library authorities.

Findings

UK public library services use a range of methods to regulate internet access. The research also confirms previous findings that filtering software is an ubiquitous tool for controlling access to and protecting library users from “inappropriate”, illegal and harmful internet content. There is a general, if sometimes reluctant, acceptance of filtering software as a practical tool by library staff, which seems to contrast with professional codes of ethics and attitudes in other countries. The research indicates that public library internet access will be a valued service for some time to come, but that some aspects of how public library services regulate internet access is currently managed can have socially undesirable consequences, including blocking legitimate sites and preventing users from accessing government services. Education could play a greater part in helping the general population to exercise judgement in selection of materials to view and use. This does not preclude implementing stricter controls to protect children, whilst allowing public libraries to continue providing a social good to those who are unable to otherwise participate in the digital age.

Research limitations/implications

The response to the survey was 39 per cent meaning that findings may not apply across the whole of the UK. The findings of this study are compared with and supplemented by other quantitative sources, but a strength of this study is the depth of understanding afforded by the use of case studies.

Originality/value

This paper provides both a quantitative and qualitative analysis of how internet access is managed in UK public libraries, including how library services fulfil their legal obligations and the ethical implications of how they balance their role in facilitating access to information with their perceived role as a safe and trusted environment for all members of their communities. The findings add to the international discussion on this issue and stimulate debate and policy making in the UK.

Details

Journal of Information, Communication and Ethics in Society, vol. 14 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Article
Publication date: 16 July 2021

Zehra Sayed and Henrik Agndal

This paper analyzes how information systems (IS) can serve as tools of neo-colonial control in offshore outsourcing of research and development work. It draws on critical work…

1959

Abstract

Purpose

This paper analyzes how information systems (IS) can serve as tools of neo-colonial control in offshore outsourcing of research and development work. It draws on critical work examining business and knowledge process outsourcing.

Design/methodology/approach

The paper reports an empirical study of how laboratory information management systems (LIMS) shape offshore outsourcing practices involving Western client firms and Indian contract research organizations (CROs) in the pharmaceutical industry. The study adopted a multi-actor perspective, involving interviews with representatives of Western clients, Indian CROs, system validation auditors, and software vendors. The analysis was iterative and interpretative, guided by postcolonial sensitivity to themes of power and control.

Findings

The study found that LIMS act as tools of neo-colonial control at three levels. As Western clients specify particular brands of LIMS, they create a hierarchy among local CROs and impact the development of the local LIMS industry. At inter-organizational level, LIMS shape relationships by allowing remote, real-time and retrospective surveillance of CROs’ work. At individual level, the ability of LIMS to support micro-modularizing of research leads to routinization of scientific discovery, negatively impacting scientists’ work satisfaction.

Originality/value

By examining multiple actors’ perceptions of IS, this paper looks beyond the rhetoric of system efficiency characteristic of most international business research. As it explores dynamics of power and control surrounding IS, it also questions the proposition that outsourcing of high-end work will move emerging economies upstream in the value chain.

Details

critical perspectives on international business, vol. 18 no. 3
Type: Research Article
ISSN: 1742-2043

Keywords

Open Access
Article
Publication date: 23 October 2023

Daniel Cookman

This study aims to identify European positioning on the use of remote customer onboarding solutions in combating financial crime.

Abstract

Purpose

This study aims to identify European positioning on the use of remote customer onboarding solutions in combating financial crime.

Design/methodology/approach

This study is a desktop research that examines European Banking Authority (EBA) policy statements relating to the use of innovative solutions in combating financial crime.

Findings

Technological advancements in biometric data and software tools provide a unique opportunity to address potential paper customer onboarding process deficiencies. Electronic remote customer onboarding solutions equip credit, financial institutions and investment firms with an alternative FTE cost-saving solution, in their pursuit of revenue generation. Whilst the EBA and Financial Action Task Force have provided approval for the utilisation of innovative solutions and AML technologies in combatting financial crime. Hesitancy remains on the ability of credit and financial institutions to use technological solutions as a “magic solution” in preventing the materialisation of money laundering/terrorist financing related risks. Analysis of policy suggests a gravitation towards the increased use of the aforementioned technologies in the interim.

Originality/value

Capitalisation of European banking authority.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 11 September 2017

Michel van Eeten

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…

5186

Abstract

Purpose

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.

Design/methodology/approach

This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.

Findings

While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.

Originality/value

This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 6 May 2014

Rachel Spacey, Louise Cooke, Adrienne Muir and Claire Creaser

The purpose of this paper is to review current knowledge, research and thinking about the difficulties facing public libraries offering internet access to their users in ensuring…

8640

Abstract

Purpose

The purpose of this paper is to review current knowledge, research and thinking about the difficulties facing public libraries offering internet access to their users in ensuring legally compliant and non-offensive use of this facility whilst still adhering to the professional value of freedom of access to information.

Design/methodology/approach

A range of recently published sources (1997-2013) relating to the technical and organisational measures used to manage public internet access primarily in public libraries in the UK with some limited international examples were reviewed and analysed. This work was undertaken as the underpinning research for an AHRC-funded project, MAIPLE (Managing Access to the internet in Public Libraries).

Findings

The provision of public internet access is a well-established component of the role of public libraries, but is seen as a potential problem due to the possibility of misuse, and it appears that simplistic technical solutions have disappointed. Legislation increases the need for more effective solutions that can provide a balance between the need for legal compliance, a welcoming environment for users, and the protection of key freedoms. A range of measures are being adopted worldwide in response to this dilemma.

Originality/value

Research exploring internet access in public libraries and its management in the UK is numerically small and much of it dates back to the start of the twenty-first century. This review presents a comprehensive analysis of the available literature and is of relevance to practitioners and academics in the fields of public librarianship.

Details

Journal of Documentation, vol. 70 no. 3
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 20 June 2019

Teemu Mikael Lappi, Kirsi Aaltonen and Jaakko Kujala

This paper aims to increase the current understanding of the connection between operational level information and communication technology (ICT) projects and national level…

11628

Abstract

Purpose

This paper aims to increase the current understanding of the connection between operational level information and communication technology (ICT) projects and national level digital transformation by researching how project governance structures and practices are applied in an e-government context.

Design/methodology/approach

An elaborative qualitative study through public documentary analysis and empirical multi-case research on Finnish central government is used.

Findings

The study constructs a multi-level governance structure with three main functions and applies this in an empirical setting. The results also describe how different governance practices and processes, focusing on project portfolio management, are applied vertically across different organizational levels to connect the ICT projects with the national digitalization strategy.

Originality/value

This study integrates project governance and portfolio management knowledge into public sector digitalization, thus contributing to project management, e-government and ICT research streams by improving the current understanding on the governance of ICT projects as part of a larger-scale digitalization. This study also highlights perceived gaps between current governance practices and provides implications to managers and practitioners working in the field to address these gaps.

Details

Transforming Government: People, Process and Policy, vol. 13 no. 2
Type: Research Article
ISSN: 1750-6166

Keywords

Open Access
Article
Publication date: 30 November 2021

Koraljka Golub, Pawel Michal Ziolkowski and Goran Zlodi

The study aims to paint a representative picture of the current state of search interfaces of Swedish online museum collections, focussing on search functionalities with…

2700

Abstract

Purpose

The study aims to paint a representative picture of the current state of search interfaces of Swedish online museum collections, focussing on search functionalities with particular reference to subject searching, as well as the use of controlled vocabularies, with the purpose of identifying which improvements of the search interfaces are needed to ensure high-quality information retrieval for the end user.

Design/methodology/approach

In the first step, a set of 21 search interface criteria was identified, based on related research and current standards in the domain of cultural heritage knowledge organization. Secondly, a complete set of Swedish museums that provide online access to their collections was identified, comprising nine cross-search services and 91 individual museums' websites. These 100 websites were each evaluated against the 21 criteria, between 1 July and 31 August 2020.

Findings

Although many standards and guidelines are in place to ensure quality-controlled subject indexing, which in turn support information retrieval of relevant resources (as individual or full search results), the study shows that they are not broadly implemented, resulting in information retrieval failures for the end user. The study also demonstrates a strong need for the implementation of controlled vocabularies in these museums.

Originality/value

This study is a rare piece of research which examines subject searching in online museums; the 21 search criteria and their use in the analysis of the complete set of online collections of a country represents a considerable and unique contribution to the fields of knowledge organization and information retrieval of cultural heritage. Its particular value lies in showing how the needs of end users, many of which are documented and reflected in international standards and guidelines, should be taken into account in designing search tools for these museums; especially so in subject searching, which is the most complex and yet the most common type of search. Much effort has been invested into digitizing cultural heritage collections, but access to them is hindered by poor search functionality. This study identifies which are the most important aspects to improve.

Open Access
Book part
Publication date: 23 September 2022

Henri Schildt

Digital technologies have fundamentally changed organizations, industries, and even the society. Although institutional theory provides rich array of perspectives to both the…

Abstract

Digital technologies have fundamentally changed organizations, industries, and even the society. Although institutional theory provides rich array of perspectives to both the content and dynamics of such changes, research at the intersection of institutional scholarship and digitalization has remained scarce. In this essay, I draw on the institutional logics perspective to elaborate digitalization as involving a new set of interconnected managerial beliefs and norms, organizational practices, and diverse material and social structures that together complement and challenge the established logics in organizations and institutional fields. I draw attention to two central organizing principles in the logic of digitalization: the pursuit of digital omniscience – the efforts to represent and conceive the world through digital data – and digital omnipotence – the efforts to bring activities inside and outside organizations under the control of information systems. I conclude the essay by elaborating how the institutional logics perspective can help understand organization-level efforts to leverage digitalization by incumbent corporations and new digital-native companies.

Open Access
Article
Publication date: 1 June 2023

Edward Ayebeng Botchway, Kofi Agyekum, Hayford Pittri and Anthony Lamina

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Abstract

Purpose

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Design/methodology/approach

The study adopts face-to-face and telephone interviews. This study uses a semi-structured interview guide to solicit the views of 25 interviewees on the subject under consideration. Qualitative responses to the interview are thematically analyzed using NVivo 11 Pro analysis application software.

Findings

The findings reveal five importance and seven vulnerabilities in the deployment of PAC devices in the institution. Key among the importance of deploying the devices are “prevent unwanted premise access or intrusions,” “prevent disruptions to university/staff operations on campus” and “protect students and staff from outside intruders.” Key among the identified vulnerabilities are “tailgating”, “delay in emergent cases” and “power outage may affect its usage.”

Originality/value

This study offers insight into a rare area of study, especially in the Sub-Saharan Africa region. Furthermore, the study contributes to the state-of-the-art importance and vulnerabilities in deploying PAC devices in daily human activities. The study is valuable in that it has the potential to establish a foundation for future studies that may delve into investigating issues associated with the deployment of PAC devices.

Details

Frontiers in Engineering and Built Environment, vol. 4 no. 1
Type: Research Article
ISSN: 2634-2499

Keywords

Open Access
Article
Publication date: 14 February 2020

Rosa M. Garcia-Teruel

Blockchain, which was originally created to enable peer-to-peer digital payment systems (bitcoin), is considered to have several benefits for different sectors, such as the real…

17198

Abstract

Purpose

Blockchain, which was originally created to enable peer-to-peer digital payment systems (bitcoin), is considered to have several benefits for different sectors, such as the real estate one. In a standard European-wide real estate transaction, several intermediaries are involved. As a consequence, these agreements are usually time-consuming and involve extra difficulties to cross-border operations. As blockchain, combined with smart contracts, may have an important role in these transactions, this paper aims to explore its prospective challenges, limitations and opportunities in the real estate sector and discover how the traditional intermediaries have to face a possible implementation of this technology.

Design/methodology/approach

This paper analyses the current intermediaries in the real estate sector in European Union (EU), their functions and how can blockchain strengthen the security of these transactions while reducing their time. The author uses a legal methodology to approach it.

Findings

Blockchain, combined with smart contracts, has both challenges and opportunities for the real estate sector. On the one hand, it may improve procedures, allow EU transactions and the interconnection between public administration. However, to not reduce parties rights, this blockchain should have some special features, such as the possibility of being amended.

Originality/value

This paper provides a valuable overview of all the intermediaries that could be affected by blockchain protocols. It is of interest of blockchain developers, public administrations and researchers who are working on blockchain and property conveyancing.

Details

Journal of Property, Planning and Environmental Law, vol. 12 no. 2
Type: Research Article
ISSN: 2514-9407

Keywords

1 – 10 of over 1000