Search results
1 – 10 of 528This paper aims to expose the challenges facing the attempt by Jamaica to introduce a new digital ID system without adequate regard to public consultation and the rights of…
Abstract
Purpose
This paper aims to expose the challenges facing the attempt by Jamaica to introduce a new digital ID system without adequate regard to public consultation and the rights of citizens.
Design/methodology/approach
The method used is critical text analysis and policy analysis, providing background and relevant factors leading up to the legislative changes under review. Extensive literature sources were consulted and the relevant sections of the Jamaican constitution referenced and analysed.
Findings
The case study may have national peculiarities not applicable in other jurisdictions. Its introduction acknowledges that the Jamaican Government may amend and re-submit the legislation, absent the flawed clauses. The paper however will remain valid given its detailed analysis and exposure of risks associated with biometric data collection, face recognition technology and data storage flaws.
Practical implications
It will be a practical example of the risks associated with flawed biometric data collection and the role of Courts in reviewing such legislation. Referrals to the Courts can be used as a remedy, as occurred not only in Jamaica but also in many other jurisdictions, including India and Kenya.
Social implications
The paper foregrounds the rights of citizens to be consulted on the collection and storage of their sensitive biometric data. The social implications and risks of violating the constitutional rights of citizens were made evident, and can be an example to other jurisdictions.
Originality/value
The paper is the first of its kind to provide detailed data and analysis on an outright rejection by the Courts of a country's ID legislation on grounds that it violated the constitution and rights of citizens. It shows the ethical and social challenges in proposing and implementing legislation without adequate public consultation on such sensitive matters as biometric data. It also exposes some of the challenges of artificial intelligence and face recognition technologies in ID data collection, including flaws related to race, gender and coding.
Details
Keywords
Siti Nurdiyana Atikah Sulaiman and Mohammad Nabil Almunawar
The purpose of this paper is to investigate factors that influence customers’ adoption of biometric-based point-of-sale in Brunei.
Abstract
Purpose
The purpose of this paper is to investigate factors that influence customers’ adoption of biometric-based point-of-sale in Brunei.
Design/methodology/approach
This paper extends technology acceptance model constructs with trust and some other variables as the framework to investigate their influence on the attitude toward the usage of a biometric point-of-sale terminal for payments in Brunei. Nine variables may influence user’s perception toward usage. The nine variables are needed, perceived ease of use, perceived usefulness, experience, innovativeness, privacy, security, trust and attitude toward usage. Multiple regression analysis was conducted to test hypotheses related to these nine variables.
Findings
It is found that the innovativeness of an individual and similar experience corresponds toward trust, which is positively related to attitude toward usage. Perceived usefulness and trust have significantly influenced the intention of individuals to use biometrics as an authentication method for payment.
Research limitations/implications
The nature of this research is to gather the public’s opinion and perception as much as it is deemed possible to get a bigger and clearer picture of the study. As the target respondence is citizens and residents of Brunei without any specification or exclusion, a large response would be needed to have a more reliable and accurate result. However, only 205 respondents can be gathered in this study. Had there been a longer time frame, it would be best to gather a lot more responses.
Originality/value
This paper explores the adoption of biometric authentication in large-scale point-of-terminals. It identifies factors that influence adoption. The results of this study could assist future researchers in which direction to take to further explore biometric as an authentication method for payment. In addition to this, it could also provide banks and financial technology in Brunei a clearer picture of the Brunei market and Bruneians perspective on the biometric system.
Details
Keywords
One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience…
Abstract
One day seminar held in London by the IEE and the Association for Biometrics presented recent progress in the development and application of biometrics. Speakers told the audience how the terrorist attacks in the USA in September 2001 have created new opportunities for biometrics due to new initiatives to introduce biometric‐enabled passports. Papers presented at the seminar covered standards development and biometric implementation guidance. New organisations for promoting the application of biometrics both in the UK and Europe were outlined.
Details
Keywords
C.R. Vishnu, Proshayan Chatterjee, Sai Pradyumna Maddali and Temidayo O. Akenroye
The public distribution system (PDS) is an Indian food security system established to manage the distribution of food grains at affordable prices. As a result of the population…
Abstract
Purpose
The public distribution system (PDS) is an Indian food security system established to manage the distribution of food grains at affordable prices. As a result of the population explosion, the long-established PDS system finds it challenging to maintain operational efficiency, quality, trust and transparency. This paper explores the possibility of leveraging blockchain technology to overcome these operational hurdles.
Design/methodology/approach
Through a literature review and expert interactions, the present research identifies critical success factors in terms of enablers and barriers that influence the adoption of blockchain technology in PDS. Furthermore, we propose two independent interpretive structural models (ISM) and MICMAC to characterize these attributes.
Findings
The research identifies 15 distinct enablers and ten barriers that influence the diffusion of the latest technology in the sector at focus. The analyses disclose the interrelationships/dependencies among these enablers and between barriers, along with their individual driving power and dependence power.
Practical implications
The research showcases the importance of automating the system and illustrates how the features of blockchain technology can assist in augmenting stakeholder satisfaction levels. However, poor or nonexistent government regulations and patronage are found to be the major impediments to adoption. The research also delineates the cost implications of this barrier through its interrelationships with other barriers.
Originality/value
Interesting inferences are drawn from the models that offer actionable insights for the industry, government and technologists for improving PDS performance. Such interventions will ensure national food security through enhanced trust and transparency, which can further improve efficiency and effectiveness.
Details
Keywords
The purpose of this paper is to examine the way in which library and information science (LIS) issues have been handled in the formulation of recent UK Higher Education policy…
Abstract
Purpose
The purpose of this paper is to examine the way in which library and information science (LIS) issues have been handled in the formulation of recent UK Higher Education policy concerned with research quality evaluation.
Design/methodology/approach
A chronological review of decision making about digital rights arrangements for the 2008 Research Assessment Exercise (RAE), and of recent announcements about the new shape of metrics‐based assessment in the Research Excellence Framework, which supersedes the RAE. Against this chronological framework, the likely nature of LIS practitioner reactions to the flow of decision making is suggested.
Findings
It was found that a weak grasp of LIS issues by decision makers undermines the process whereby effective research evaluation models are created. LIS professional opinion should be sampled before key decisions are made.
Research limitations/implications
This paper makes no sophisticated comments on the complex research issues underlying advanced bibliometric research evaluation models. It does point out that sophisticated and expensive bibliometric consultancies arrive at many conclusions about metrics‐based research assessment that are common knowledge amongst LIS practitioners.
Practical implications
Practical difficulties arise when one announces a decision to move to a new and specific type of research evaluation indicator before one has worked out anything very specific about that indicator.
Originality/value
In this paper, the importance of information management issues to the mainstream issues of government and public administration is underlined. The most valuable conclusion of this paper is that, because LIS issues are now at the heart of democratic decision making, LIS practitioners and professionals should be given some sort of role in advising on such matters.
Details
Keywords
The interview explores the Live Enterprise model at Infosys. The idea is to enable mature companies to transform into a business with digital native agility, with many small teams…
Abstract
Purpose
The interview explores the Live Enterprise model at Infosys. The idea is to enable mature companies to transform into a business with digital native agility, with many small teams innovating while leveraging shared digital infrastructure, in an environment of continuous evolution and learning.
Design/methodology/approach
Jeff Kavanaugh, Vice President and Global Head of Infosys Knowledge Institute, the research and thought leadership arm of Infosys, explains how the model promotes rapid experimentation through the digital runway, innovation at the edges by distributed micro-teams and extreme automation at scale for repeatable processes and functions. He and co-author Rafee Tarafdar describe the inner workings of this model in their new book “The Live Enterprise: Create a Continuously Evolving and Learning Organization”.
Findings
Outcomes are made possible by four capabilities: hybrid talent, a design-to-evolve mindset, a digital runway and a ‘micro is the new mega’ approach to transformational change.
Practical implications
Micro is the new mega because the Live Enterprise model uses frequent micro-change releases at scale in short sprints. The cumulative effect of these many small changes compounds quickly to transformational change
Originality/value
Essential reading for executives at mature companies who need to compete in the new digital environment. Offers such revolutionary ideas as: Employee experience (EX) is as important as customer experience (CX) in the live enterprise
Social media regulation in India.
Details
DOI: 10.1108/OXAN-DB238152
ISSN: 2633-304X
Keywords
Geographic
Topical
Amita Mital, Archana Panwar and Yuvaraj Jawalgi
Discussion of the case will enable students to identify the cornerstones of industry development using simple frameworks like PESTLE and five forces that shape strategy. They will…
Abstract
Learning outcomes
Discussion of the case will enable students to identify the cornerstones of industry development using simple frameworks like PESTLE and five forces that shape strategy. They will be able to identify critical success factors and evaluate how a firm gets competitive advantage. They will also be able to assess whether the advantage is sustainable for the firms and along which dimensions they have only competitive parity. The issues of contemporary firms growing through the use of network strategies is also highlighted and students will learn to appreciate the role of platforms and connectivity for gaining sustainable advantage.
Case overview/synopsis
This case describes the growth strategy of NoPaperForms, a start-up in the domain of enrolment automation for higher education in India. Naveen Goyal, the founder CEO sensed an opportunity in this growing industry segment and acquired it from the founder, Vishal Shah in 2017. The ultimate objective of an educational institute was to attract talent, Goyal evolved a comprehensive enrolment solution starting with the time a prospective student made an inquiry for enrolment till the time he/she paid for enrolment. It was a complete panel, bundled and packaged in a single system taking care of lead management, lead nurturing, application management, fee payment, post-application management and enrolment. He developed it into a unique blend of a customer relationship management (CRM), which was unique in the country. At this juncture, Goyal was exploring growth avenues. On the client side, he had the alternatives of focusing on the B2C segment or diversifying from B2B to B2C. Geographically, he had the options of expanding to tier II and tier III cities, which were the next growth hubs. The option of growing internationally was also on the cards. The purpose of the case is to analyse the opportunities in the education technology sector, specific to student enrolment and leverage the competencies of the firm to detail the future strategy of the firm.
Complexity academic level
The case can be used in a MBA program for a course in Strategic Management in the module of strategy formulation after fundamental concepts and theories of Strategic Management have been discussed.
Supplementary materials
Teaching notes are available for educators only.
Subject code
CSS 11: Strategy.
Details
Keywords
Wilson Abel Alberto Torres, Nandita Bhattacharjee and Bala Srinivasan
The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system…
Abstract
Purpose
The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with an individual and cannot be revoked or cancelled, especially when biometric data are compromised, leading to privacy issues.
Design/methodology/approach
By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris.
Findings
The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol.
Research limitations/implications
The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated.
Originality/value
The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.
Details