Search results

1 – 10 of over 5000
Article
Publication date: 31 December 2003

Matthew Meyer

This paper discusses the new SEC reporting requirements passed under the Sarbanes‐Oxley Act in 2002 and its impact on real estate and corporate facilities management data. It will…

Abstract

This paper discusses the new SEC reporting requirements passed under the Sarbanes‐Oxley Act in 2002 and its impact on real estate and corporate facilities management data. It will review the impact of this Act on the corporate real estate executive and how corporate real estate groups will be able to benefit from the Act to solve an intrinsic problem in the CRE world today. This problem is the lack of an enterprise‐level technology solution that can integrate and unite all of the workplace data that may be required to fulfil these new SEC reporting requirements and enable management adequately to certify an internal control system for compliance with Sarbanes‐Oxley. A case study on web‐based workplace resource management (WRM) solutions is presented to guide real estate executives to an answer to this problem, as well as to provide an overall solution for greater operational excellence and cost efficiency.

Details

Journal of Corporate Real Estate, vol. 6 no. 1
Type: Research Article
ISSN: 1463-001X

Keywords

Article
Publication date: 24 April 2020

Victoria L. Lemieux, Chris Rowell, Marc-David L. Seidel and Carson C. Woo

Distributed trust technologies, such as blockchain, propose to permit peer-to-peer transactions without trusted third parties. Yet not all implementations of such technologies…

1481

Abstract

Purpose

Distributed trust technologies, such as blockchain, propose to permit peer-to-peer transactions without trusted third parties. Yet not all implementations of such technologies fully decentralize. Information professionals make strategic choices about the level of decentralization when implementing such solutions, and many organizations are taking a hybrid (i.e. partially decentralized) approach to the implementation of distributed trust technologies. This paper conjectures that while hybrid approaches may resolve some challenges of decentralizing information governance, they also introduce others. To better understand these challenges, this paper aims first to elaborate a framework that conceptualizes a centralized–decentralized information governance continuum along three distinct dimensions: custody, ownership and right to access data. This paper then applies this framework to two illustrative blockchain case studies – a pilot Brazilian land transfer recording solution and a Canadian health data consent sharing project – to exemplify how the current transition state of blockchain pilots straddles both the old (centralized) and new (decentralized) worlds. Finally, this paper outlines the novel challenges that hybrid approaches introduce for information governance and what information professionals should do to navigate this thorny transition period. Counterintuitively, it may be much better for information professionals to embrace decentralization when implementing distributed trust technologies, as hybrid models could offer the worst of both the centralized and future decentralized worlds when consideration is given to the balance between information governance risks and new strategic business opportunities.

Design/methodology/approach

This paper illustrates how blockchain is transforming organizations and societies by highlighting new strategic information governance challenges using our original analytic framework in two detailed blockchain case studies – a pilot solution in Brazil to record land transfers (Flores et al., 2018) and another in Canada to handle health data sharing consent (Hofman et al., 2018). The two case studies represent research output of the first phase of an ongoing multidisciplinary research project focused on gaining an understanding of how blockchain technology generates organizational, societal and data transformations and challenges. The analytic framework was developed inductively from a thematic synthesis of the findings of the case studies conducted under the auspices of this research project. Each case discussed in detail in this paper was chosen from among the project's case studies, as it represents a desire to move away from the old centralized world of information governance to a new decentralized one. However, each case study also represents and embodies a transition state between the old and new worlds and highlights many of the associated strategic information governance challenges.

Findings

Decentralization continues to disrupt organizations and societies. New emerging distributed trust technologies such as blockchain break the old rules with respect to the trust and authority structures of organizations and how records and data are created, managed and used. While governments and businesses around the world clearly see value in this technology to drive business efficiency, open up new market opportunities and create new forms of value, these advantages will not come without challenges. For information executives then, the question is not if they will be disrupted, but how. Understanding the how as will be discussed in this paper provides the business know how to leverage the incredible innovation and transformation that decentralized trust technology enables before being leapfrogged by another organization. It requires a change of mindset to consider an organization as one part of a broader ecosystem, and for those who successfully do so, this paper views this as a strategic opportunity for those responsible for strategic information governance to design the future instead of being disrupted by it.

Research limitations/implications

This paper presents a novel analytic framework for strategic information governance challenges as we transition from a traditional world of centralized records and information management to a new decentralized world. This paper analyzes these transitions and their implications for strategic information governance along three trajectories: custody, ownership and right to access records and data, illustrating with reference to our case studies.

Practical implications

This paper predicts a large number of organizations will miss the opportunities of the new decentralized trust world, resulting in a rather major churning of organizations, as those who successfully participate in building the new model will outcompete those stuck in the old world or the extremely problematic hybrid transition state. Counterintuitively, this paper argues that it may be much less complex for information executives to embrace decentralization as fast as they can, as in some ways the hybrid model seems to offer the worst of both the centralized and future decentralized worlds with respect to information governance risks.

Social implications

This paper anticipates broader societal consequences of the predicted organization churn, in particular with respect to uncertainty about the evidence that records provide for public accountability and contractual rights and entitlements.

Originality/value

Decentralized trust technologies, such as blockchain, permit peer-to-peer transactions without trusted third parties. Of course, such radical shifts do not happen overnight. The current transition state of blockchain pilots straddles both the old and new worlds. This paper presents a theoretical framework categorizing strategic information governance challenges on a spectrum of centralized to decentralized in three primary areas: custody, ownership and right to access records and data. To illustrate how decentralized trust is transforming organizations and societies, this paper presents these strategic information governance challenges in two blockchain case studies – a pilot Brazilian land transfer recording solution and a Canadian health data consent sharing project. Drawing on the theoretical framework and case studies, this paper outlines what information executives should do to navigate this thorny transition period.

Details

Records Management Journal, vol. 30 no. 3
Type: Research Article
ISSN: 0956-5698

Keywords

Article
Publication date: 8 May 2007

Katerina Pramatari

This paper aims to give an overview of supply chain collaboration practices and the way the underlying enabling technologies have evolved, from the classical EDI approach, to web

11339

Abstract

Purpose

This paper aims to give an overview of supply chain collaboration practices and the way the underlying enabling technologies have evolved, from the classical EDI approach, to web‐based and RFID‐enabled collaboration.

Design/methodology/approach

The paper discusses alternative technological approaches and the role they play in supporting collaboration. The research presented in this paper is empirical in nature, based on three different case studies from the grocery retail sector depicting different aspects of implementing supply chain collaboration practices.

Findings

From the examination of these cases, interesting lessons are derived regarding the suitability and criticality of the technological approach used to support collaboration, especially regarding the use of a centralized web‐platform as compared to the classical EDI approach and to a decentralized solution based on web services.

Research limitations/implications

Research is limited to the specific case studies and further validation of the research findings through qualitative and quantitative methods would be appropriate.

Practical implications

The paper provides support to practitioner regarding the selection of the appropriate technological approach to support collaboration. Furthermore, it gives insight regarding the maturity of current technologies in relation to collaboration requirements and to what extent can the technology be an enabler or a barrier in a collaboration initiative.

Originality/value

The paper links the technological and the supply‐chain collaboration perspective in order to derive interesting conclusions relevant to both academics and practitioners. The cases presented are quite unique and have not been widely studied, representing interesting and novel approaches to the way that technology has been employed to support collaboration practices.

Details

Supply Chain Management: An International Journal, vol. 12 no. 3
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 1 June 2004

Nada K. Kakabadse, Andrew Kakabadse, Pervaiz K. Ahmed and Alexander Kouzmin

Improved integration, centralized databases, access through Web browsers and application service providers (ASPs) are some of the current trends impacting on organizational…

2106

Abstract

Improved integration, centralized databases, access through Web browsers and application service providers (ASPs) are some of the current trends impacting on organizational decisions regarding IS/IT outsourcing. Web‐based technology liberated the client/server IT model from the limits of geographical boundaries delimited by a local area network. Partnering with the right ASPs could provide organizations with the new synergy required for competitive advantage. This paper outlines the development of a “solutions” innovation business model of rental‐based sourcing, charters current ASPs and the differences in IS/IT provision and offers an audit of the benefits and costs of ASPs to businesses and other stakeholders. Future challenges are mapped out for consideration as are strategic choices associated with continued outsourcing, as distinct from in‐sourcing, of IS/IT.

Details

European Journal of Innovation Management, vol. 7 no. 2
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 1 March 2001

Bryan H. Davidson

As the number of online journals, databases, and indexing and abstracting services continues to grow on the Internet, it is important that libraries find efficient ways to manage…

2209

Abstract

As the number of online journals, databases, and indexing and abstracting services continues to grow on the Internet, it is important that libraries find efficient ways to manage and provide access to these resources. By utilizing database driven dynamic content delivery technology, library Web administrators can obtain numerous management benefits over a static HTML site. Presents an efficient model using Microsoft Access database software and an ASP (Active Server Pages) scripting method to manage and deliver the University of Arkansas Library’s electronic subscription services. Benefits include centralized data management and maintenance, streamlined administration, customized content, and improved response to simultaneous user access. Web server platforms, programming skill levels, and data storage limitations are also discussed. A single MS Access database utilizing two relational tables is used as an example to demonstrate the underlying database organization.

Details

OCLC Systems & Services: International digital library perspectives, vol. 17 no. 1
Type: Research Article
ISSN: 1065-075X

Keywords

Article
Publication date: 7 April 2015

Chii Chang, Satish Narayana Srirama and Sea Ling

Recent smart mobile devices are capable of letting users produce various digital content, and share/upload the content to many social network services (SNS) directly via wireless…

Abstract

Purpose

Recent smart mobile devices are capable of letting users produce various digital content, and share/upload the content to many social network services (SNS) directly via wireless network connections. The phenomenon has increased the number of people using mobile SNS applications. Although the applications have become more popular, mobile users have been restricted in the virtual communities of online SNS and are not aware of the social opportunities available to them in real-time surrounding. While they spend most of their time accessing online SNS, they have missed many opportunities to interact with others for new friendships, business opportunities or information sharing. Consequently, a new breed of mobile social network (MSN) system has arisen to assist mobile users to interact with proximal people and perform various social activities. Such a proximal-based MSN environment is termed a Mobile Social Network in Proximity (MSNP).

Design/methodology/approach

Developing an MSNP system needs to address a number of issues and challenges, such as heterogeneity, content/service discovery, privacy and trust, resource management, and so on. This paper identifies and describes these challenges, and reviews a number of related solutions from existing literature. In the follow up, this paper addresses a number of open challenges in the MSNP domain.

Findings

Although various works have been proposed to enable and overcome challenges in MSNP, there are still many unsolved open challenges in terms of identification, content management, social-aware discovery, trust in public environment, adaptation, quality of service and the development of MSNP. We have addressed these challenges in this paper as future research directions in the MSNP domain.

Originality/value

This paper provides an original literature review in MSNP and identifies a number of open challenges as research direction in the MSNP domain.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 December 2003

A.C.M. Fong and S.C. Hui

We present the development of a Web‐based remote‐monitoring system as an attractive alternative to the manual task of security surveillance. The system has built‐in human motion…

Abstract

We present the development of a Web‐based remote‐monitoring system as an attractive alternative to the manual task of security surveillance. The system has built‐in human motion analysis that can alert the security personnel when suspicious activities are detected at the monitored sites. In this paper, our focus is on the architectural design of such a system. We discuss the relative strengths and weaknesses of three different architectural approaches: centralized, distributed and hybrid, and conclude that a hybrid approach is most appropriate. Our Web‐based system has been implemented for monitoring elevators (lifts) within a university environment. Objective and subjective tests have validated the effectiveness of our system. The Web‐based implementation enhances ease of operation and allows users to connect to the system via a Web browser.

Details

Kybernetes, vol. 32 no. 9/10
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 1 April 2013

Mitja Dečman and Mirko Vintar

Based on a three‐level digital preservation framework, the purpose of this paper is to suggest a solution for long‐term digital preservation for the public administration sector…

3122

Abstract

Purpose

Based on a three‐level digital preservation framework, the purpose of this paper is to suggest a solution for long‐term digital preservation for the public administration sector, in the form of a centralised intermediate repository, on the basis of the concept of cloud computing.

Design/methodology/approach

By means of a thorough review of the literature in this area and an analysis of the current state of the art, the paper investigates a three‐level digital preservation framework with a focus on the public sector. It cross‐links this framework with the cloud computing concept, in order to propose an appropriate solution.

Findings

The mapping of six factors of digital preservation to three levels of digital preservation shows that using appropriate steps supported by suitable strategies and policies enables the public administration sector to take advantage of modern information technology and solve the demanding and critical problem of digital preservation.

Practical implications

The paper suggests an organisational and technological solution in the form of a centralised digital preservation repository within a cloud computing framework, to aid both organisations of the public sector which deal with active life cycle document phases and archives and libraries which deal with passive phases of documents and records.

Originality/value

The paper addresses the difficulties of digital preservation implementation in the public administration sector. The findings indicate that while developing and implementing digital preservation, the public administration sector should formulate common policies and solutions based on the suggested results of this paper and, in doing so, maximise the benefits of current technologies.

Article
Publication date: 7 March 2016

Avinash Ramtohul and K.M.S. Soyjaudah

Highly sensitive information pertaining to citizens and government transactions is processed in an electronic format, making information security a critical part of e-Government…

Abstract

Purpose

Highly sensitive information pertaining to citizens and government transactions is processed in an electronic format, making information security a critical part of e-Government applications and architectures. Information security measures should ideally span from authentication to authorisation and from logical/physical access control to auditing of electronic transactions and log books. The lack of such measures compromises confidentiality, integrity and availability of information. Today, most e-Government projects in developing countries in Southern Africa Developing Community (SADC) face challenges in two main areas, namely, information security and application software integration. This paper aims to discuss and analyse the information security requirements for e-Government projects and proposes an information security governance model for service-based architectures (SBAs).

Design/methodology/approach

The current state of information security in emerging economies in SADC countries was researched. The main problems identified were the lack of software integration and information security governance, policy and administration. The design consists of three basic layers: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures, implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study.

Findings

The main problems identified were the lack of software integration and information security governance, policy and administration. These challenges are causing e-government projects to stagnate.

Practical implications

The proposed approach for implementing information security in e-Government systems will ensure a holistic approach to ensuring confidentiality, integrity and non-repudiation, allowing e-Government maturity to progress from “interaction” to “online transaction” stage in emerging economies.

Originality/value

Research has not focused on developing a solution for emerging economies which are facing difficulties in integration software applications to deploy end-to-end e-services and to produce an underlying identity management architecture and information security governance to secure the e-services developed and deployed using an SBA. The work produced in this paper is specific to SBAs in e-government environments where legacy systems already exist. The work includes: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study.

Details

Journal of Science & Technology Policy Management, vol. 7 no. 1
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 21 November 2008

Barbara Carminati and Elena Ferrari

Web‐based social networks (WBSNs) are today one of the most relevant phenomena related to the advent of Web 2.0. The purpose of this paper is to discuss main security and privacy…

1545

Abstract

Purpose

Web‐based social networks (WBSNs) are today one of the most relevant phenomena related to the advent of Web 2.0. The purpose of this paper is to discuss main security and privacy requirements arising in WBSNs, with a particular focus on access control, and to survey the main research activities carried out in the field. The social networking paradigm is today used not only for recreational purposes; it is also used at the enterprise level as a means to facilitate knowledge sharing and information dissemination both at the internet and at the intranet level. As a result of the widespread use of WBSN services, millions of individuals can today easily share personal and confidential information with an incredible amount of (possible unknown) other users. Clearly, this huge amount of information and the ease with which it can be shared and disseminated pose serious security and privacy concerns.

Design/methodology/approach

The paper discusses the main requirements related to access control and privacy enforcement in WBSNs. It presents the protection functionalities provided by today WBSNs and examines the main research proposals defined so far, in view of the identified requirements.

Findings

The area of access control and privacy for WBSNs is new and, therefore, many research issues still remain open. The paper provides an overview of some of these new issues.

Originality/value

The paper provides a useful discussion of the main security and privacy requirements arising in WBSNs, with a particular focus on access control. It also surveys the main research activities carried out in the field.

Details

International Journal of Web Information Systems, vol. 4 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of over 5000