Search results

1 – 10 of 528
Article
Publication date: 2 July 2020

Hopeton S. Dunn

This paper aims to expose the challenges facing the attempt by Jamaica to introduce a new digital ID system without adequate regard to public consultation and the rights of…

Abstract

Purpose

This paper aims to expose the challenges facing the attempt by Jamaica to introduce a new digital ID system without adequate regard to public consultation and the rights of citizens.

Design/methodology/approach

The method used is critical text analysis and policy analysis, providing background and relevant factors leading up to the legislative changes under review. Extensive literature sources were consulted and the relevant sections of the Jamaican constitution referenced and analysed.

Findings

The case study may have national peculiarities not applicable in other jurisdictions. Its introduction acknowledges that the Jamaican Government may amend and re-submit the legislation, absent the flawed clauses. The paper however will remain valid given its detailed analysis and exposure of risks associated with biometric data collection, face recognition technology and data storage flaws.

Practical implications

It will be a practical example of the risks associated with flawed biometric data collection and the role of Courts in reviewing such legislation. Referrals to the Courts can be used as a remedy, as occurred not only in Jamaica but also in many other jurisdictions, including India and Kenya.

Social implications

The paper foregrounds the rights of citizens to be consulted on the collection and storage of their sensitive biometric data. The social implications and risks of violating the constitutional rights of citizens were made evident, and can be an example to other jurisdictions.

Originality/value

The paper is the first of its kind to provide detailed data and analysis on an outright rejection by the Courts of a country's ID legislation on grounds that it violated the constitution and rights of citizens. It shows the ethical and social challenges in proposing and implementing legislation without adequate public consultation on such sensitive matters as biometric data. It also exposes some of the challenges of artificial intelligence and face recognition technologies in ID data collection, including flaws related to race, gender and coding.

Details

Journal of Information, Communication and Ethics in Society, vol. 18 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 19 August 2021

Siti Nurdiyana Atikah Sulaiman and Mohammad Nabil Almunawar

The purpose of this paper is to investigate factors that influence customers’ adoption of biometric-based point-of-sale in Brunei.

Abstract

Purpose

The purpose of this paper is to investigate factors that influence customers’ adoption of biometric-based point-of-sale in Brunei.

Design/methodology/approach

This paper extends technology acceptance model constructs with trust and some other variables as the framework to investigate their influence on the attitude toward the usage of a biometric point-of-sale terminal for payments in Brunei. Nine variables may influence user’s perception toward usage. The nine variables are needed, perceived ease of use, perceived usefulness, experience, innovativeness, privacy, security, trust and attitude toward usage. Multiple regression analysis was conducted to test hypotheses related to these nine variables.

Findings

It is found that the innovativeness of an individual and similar experience corresponds toward trust, which is positively related to attitude toward usage. Perceived usefulness and trust have significantly influenced the intention of individuals to use biometrics as an authentication method for payment.

Research limitations/implications

The nature of this research is to gather the public’s opinion and perception as much as it is deemed possible to get a bigger and clearer picture of the study. As the target respondence is citizens and residents of Brunei without any specification or exclusion, a large response would be needed to have a more reliable and accurate result. However, only 205 respondents can be gathered in this study. Had there been a longer time frame, it would be best to gather a lot more responses.

Originality/value

This paper explores the adoption of biometric authentication in large-scale point-of-terminals. It identifies factors that influence adoption. The results of this study could assist future researchers in which direction to take to further explore biometric as an authentication method for payment. In addition to this, it could also provide banks and financial technology in Brunei a clearer picture of the Brunei market and Bruneians perspective on the biometric system.

Details

Journal of Science and Technology Policy Management, vol. 13 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 1 June 2004

Anna Kochan

One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience…

1469

Abstract

One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience how the terrorist attacks in the USA in September 2001 have created new opportunities for biometrics due to new initiatives to introduce biometric‐enabled passports. Papers presented at the seminar covered standards development and biometric implementation guidance. New organisations for promoting the application of biometrics both in the UK and Europe were outlined.

Details

Sensor Review, vol. 24 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Book part
Publication date: 4 December 2020

Abstract

Details

Application of Big Data and Business Analytics
Type: Book
ISBN: 978-1-80043-884-2

Article
Publication date: 18 April 2024

C.R. Vishnu, Proshayan Chatterjee, Sai Pradyumna Maddali and Temidayo O. Akenroye

The public distribution system (PDS) is an Indian food security system established to manage the distribution of food grains at affordable prices. As a result of the population…

Abstract

Purpose

The public distribution system (PDS) is an Indian food security system established to manage the distribution of food grains at affordable prices. As a result of the population explosion, the long-established PDS system finds it challenging to maintain operational efficiency, quality, trust and transparency. This paper explores the possibility of leveraging blockchain technology to overcome these operational hurdles.

Design/methodology/approach

Through a literature review and expert interactions, the present research identifies critical success factors in terms of enablers and barriers that influence the adoption of blockchain technology in PDS. Furthermore, we propose two independent interpretive structural models (ISM) and MICMAC to characterize these attributes.

Findings

The research identifies 15 distinct enablers and ten barriers that influence the diffusion of the latest technology in the sector at focus. The analyses disclose the interrelationships/dependencies among these enablers and between barriers, along with their individual driving power and dependence power.

Practical implications

The research showcases the importance of automating the system and illustrates how the features of blockchain technology can assist in augmenting stakeholder satisfaction levels. However, poor or nonexistent government regulations and patronage are found to be the major impediments to adoption. The research also delineates the cost implications of this barrier through its interrelationships with other barriers.

Originality/value

Interesting inferences are drawn from the models that offer actionable insights for the industry, government and technologists for improving PDS performance. Such interventions will ensure national food security through enhanced trust and transparency, which can further improve efficiency and effectiveness.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 23 May 2008

Nicholas Joint

The purpose of this paper is to examine the way in which library and information science (LIS) issues have been handled in the formulation of recent UK Higher Education policy…

1363

Abstract

Purpose

The purpose of this paper is to examine the way in which library and information science (LIS) issues have been handled in the formulation of recent UK Higher Education policy concerned with research quality evaluation.

Design/methodology/approach

A chronological review of decision making about digital rights arrangements for the 2008 Research Assessment Exercise (RAE), and of recent announcements about the new shape of metrics‐based assessment in the Research Excellence Framework, which supersedes the RAE. Against this chronological framework, the likely nature of LIS practitioner reactions to the flow of decision making is suggested.

Findings

It was found that a weak grasp of LIS issues by decision makers undermines the process whereby effective research evaluation models are created. LIS professional opinion should be sampled before key decisions are made.

Research limitations/implications

This paper makes no sophisticated comments on the complex research issues underlying advanced bibliometric research evaluation models. It does point out that sophisticated and expensive bibliometric consultancies arrive at many conclusions about metrics‐based research assessment that are common knowledge amongst LIS practitioners.

Practical implications

Practical difficulties arise when one announces a decision to move to a new and specific type of research evaluation indicator before one has worked out anything very specific about that indicator.

Originality/value

In this paper, the importance of information management issues to the mainstream issues of government and public administration is underlined. The most valuable conclusion of this paper is that, because LIS issues are now at the heart of democratic decision making, LIS practitioners and professionals should be given some sort of role in advising on such matters.

Details

Library Review, vol. 57 no. 5
Type: Research Article
ISSN: 0024-2535

Keywords

Open Access
Article
Publication date: 14 August 2021

Brian Leavy

The interview explores the Live Enterprise model at Infosys. The idea is to enable mature companies to transform into a business with digital native agility, with many small teams…

1668

Abstract

Purpose

The interview explores the Live Enterprise model at Infosys. The idea is to enable mature companies to transform into a business with digital native agility, with many small teams innovating while leveraging shared digital infrastructure, in an environment of continuous evolution and learning.

Design/methodology/approach

Jeff Kavanaugh, Vice President and Global Head of Infosys Knowledge Institute, the research and thought leadership arm of Infosys, explains how the model promotes rapid experimentation through the digital runway, innovation at the edges by distributed micro-teams and extreme automation at scale for repeatable processes and functions. He and co-author Rafee Tarafdar describe the inner workings of this model in their new book “The Live Enterprise: Create a Continuously Evolving and Learning Organization”.

Findings

Outcomes are made possible by four capabilities: hybrid talent, a design-to-evolve mindset, a digital runway and a ‘micro is the new mega’ approach to transformational change.

Practical implications

Micro is the new mega because the Live Enterprise model uses frequent micro-change releases at scale in short sprints. The cumulative effect of these many small changes compounds quickly to transformational change

Originality/value

Essential reading for executives at mature companies who need to compete in the new digital environment. Offers such revolutionary ideas as: Employee experience (EX) is as important as customer experience (CX) in the live enterprise

Details

Strategy & Leadership, vol. 49 no. 4
Type: Research Article
ISSN: 1087-8572

Expert briefing
Publication date: 31 August 2018

Social media regulation in India.

Details

DOI: 10.1108/OXAN-DB238152

ISSN: 2633-304X

Keywords

Geographic
Topical
Case study
Publication date: 24 May 2022

Amita Mital, Archana Panwar and Yuvaraj Jawalgi

Discussion of the case will enable students to identify the cornerstones of industry development using simple frameworks like PESTLE and five forces that shape strategy. They will…

Abstract

Learning outcomes

Discussion of the case will enable students to identify the cornerstones of industry development using simple frameworks like PESTLE and five forces that shape strategy. They will be able to identify critical success factors and evaluate how a firm gets competitive advantage. They will also be able to assess whether the advantage is sustainable for the firms and along which dimensions they have only competitive parity. The issues of contemporary firms growing through the use of network strategies is also highlighted and students will learn to appreciate the role of platforms and connectivity for gaining sustainable advantage.

Case overview/synopsis

This case describes the growth strategy of NoPaperForms, a start-up in the domain of enrolment automation for higher education in India. Naveen Goyal, the founder CEO sensed an opportunity in this growing industry segment and acquired it from the founder, Vishal Shah in 2017. The ultimate objective of an educational institute was to attract talent, Goyal evolved a comprehensive enrolment solution starting with the time a prospective student made an inquiry for enrolment till the time he/she paid for enrolment. It was a complete panel, bundled and packaged in a single system taking care of lead management, lead nurturing, application management, fee payment, post-application management and enrolment. He developed it into a unique blend of a customer relationship management (CRM), which was unique in the country. At this juncture, Goyal was exploring growth avenues. On the client side, he had the alternatives of focusing on the B2C segment or diversifying from B2B to B2C. Geographically, he had the options of expanding to tier II and tier III cities, which were the next growth hubs. The option of growing internationally was also on the cards. The purpose of the case is to analyse the opportunities in the education technology sector, specific to student enrolment and leverage the competencies of the firm to detail the future strategy of the firm.

Complexity academic level

The case can be used in a MBA program for a course in Strategic Management in the module of strategy formulation after fundamental concepts and theories of Strategic Management have been discussed.

Supplementary materials

Teaching notes are available for educators only.

Subject code

CSS 11: Strategy.

Article
Publication date: 1 June 2015

Wilson Abel Alberto Torres, Nandita Bhattacharjee and Bala Srinivasan

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system

1392

Abstract

Purpose

The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with an individual and cannot be revoked or cancelled, especially when biometric data are compromised, leading to privacy issues.

Design/methodology/approach

By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris.

Findings

The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol.

Research limitations/implications

The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated.

Originality/value

The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 528