Search results

1 – 10 of 263
Open Access
Article
Publication date: 3 November 2023

Nermeen Bahnasy

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites…

Abstract

Purpose

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites. Specifically, the study aims to explore the relationship between the tourism industry and local agricultural practices and how this connection influences food security in the Siwa Oasis, located in the Western Desert of Egypt.

Design/methodology/approach

The study employs a qualitative exploratory research design using in-depth interviews and focus groups to investigate the impact of the tourism economy on food security and identify potential benefits and limitations for food security in the region.

Findings

The research reveals that the tourism economy in Siwa Oasis has only a marginal contribution to food security. The study highlights a lack of a strong connection between the tourism industry and local agricultural practices within the heritage site. As a result, the potential benefits and synergies that could be achieved between tourism and agriculture have not been fully realized, leading to a limited impact on food stability.

Research limitations/implications

This study primarily relies on qualitative data from Siwa Oasis, Egypt, which may limit the generalizability of findings beyond this specific context. Additionally, while the study provides valuable insights into the complex relationship between tourism and food security, it does not quantitatively measure the magnitude of tourism's impact. Future research could incorporate quantitative methods for a more comprehensive understanding of this relationship in diverse desert-prone regions. Finally, the study highlights the need for more integrated approaches to enhance food security through tourism, but the specific strategies and policy recommendations require further investigation and adaptation to local contexts.

Practical implications

This study underscores the need for tourism development strategies that prioritize food security in desert-prone areas like Siwa Oasis. Policymakers and stakeholders should promote sustainable tourism practices that enhance local agriculture, create diversified income sources and foster equitable benefits for communities. Moreover, recognizing the seasonal nature of tourism, interventions to address food shortages during off-peak periods are crucial. Efforts should also focus on skill development and gender-inclusive opportunities within the tourism sector to ensure broader community participation. Additionally, collaborations between tourism and agriculture should be encouraged to optimize food availability and stability while preserving cultural food traditions.

Originality/value

This study adds original insights by examining the specific impact of the tourism economy on food security in dessert-prone agricultural heritage sites. The study's originality lies in its exploration of the untapped potential for synergy between the tourism and agricultural sectors and the implications for local food security. This research contributes to understanding how tourism can improve food security in specific contexts and provides valuable insights into sustainable development in heritage sites.

Details

Journal of Humanities and Applied Social Sciences, vol. 6 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Article
Publication date: 22 December 2022

Reihaneh Alsadat Tabaeeian, Behzad Hajrahimi and Atefeh Khoshfetrat

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Abstract

Purpose

The purpose of this review paper was identifying barriers to the use of telemedicine systems in primary health-care individual level among professionals.

Design/methodology/approach

This study used Scopus and PubMed databases for scientific records identification. A systematic review of the literature structured by PRISMA guidelines was conducted on 37 included papers published between 2009 and 2019. A qualitative approach was used to synthesize insights into using telemedicine by primary care professionals.

Findings

Three barriers were identified and classified: system quality, data quality and service quality barriers. System complexity in terms of usability, system unreliability, security and privacy concerns, lack of integration and inflexibility of systems-in-use are related to system quality. Data quality barriers are data inaccuracy, data timeliness issues, data conciseness concerns and lack of data uniqueness. Finally, service reliability concerns, lack of technical support and lack of user training have been categorized as service quality barriers.

Originality/value

This review identified and mapped emerging themes of barriers to the use of telemedicine systems. This paper also through a new conceptualization of telemedicine use from perspectives of the primary care professionals contributes to informatics literature and system usage practices.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 24 May 2023

Siqi Hu, Carol Hsu and Zhongyun Zhou

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional…

Abstract

Purpose

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional methods, the present study leveraged an “event” lens and dimensionalized employees' perceptions into three sub-dimensions: perceived novelty, perceived disruption and perceived criticality. Moreover, this research went a step further by examining how pedagogical and communication approaches to a SETA program affect employees' perceptions of the program. This study then investigated whether – and if so, how – these approaches impact employees' perceptions of the SETA program and their subsequent commitment to it.

Design/methodology/approach

Utilizing a factorial-based scenario survey, this study empirically tested a model of the above relationships via covariance-based structural equation modeling.

Findings

The results of this research showed that pedagogical approaches were more effective than communication approaches and that employees' perceptions of the SETA program accounted for a large variance in their commitment to SETA.

Originality/value

First, this research deepens understanding of the protection of information assets by elaborating on the different approaches that organizations can take to encourage employees' commitment to SETA. Second, the study enriches the SETA literature by theorizing a SETA program as an organizational “event”, which represents a major shift from the conventional approach. Third, the study adds to the theoretical knowledge of the event lens by extending it to the SETA context and investigating the relationship among three event strength components.

Open Access
Article
Publication date: 6 October 2023

Renata Konrad, Solomiya Sorokotyaha and Daniel Walker

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute…

Abstract

Purpose

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute response phase until more established humanitarian aid organizations can enter. Nevertheless, scant research exists regarding the role of grassroots associations in providing humanitarian assistance during a military conflict. The purpose of this paper is to understand the role of grassroots associations and identify important themes for effective operations.

Design/methodology/approach

This paper adopts a case-study approach of three Ukrainian grassroots associations that began operating in the immediate days of the full-scale invasion of Ukraine. The findings are based on analyzing primary sources, including interviews with Ukrainian volunteers, and are supported by secondary sources.

Findings

Grassroots associations have local contacts and a contextual understanding of population needs and can respond more rapidly and effectively than large intergovernmental agencies. Four critical themes regarding the operations of grassroots associations emerged: information management, inventory management, coordination and performance measurement. Grassroots humanitarian response operations during conflict are challenged by personal security risks, the unpredictability of unsolicited supplies, emerging volunteer roles, dynamic transportation routes and shifting demands.

Originality/value

Grassroots responses are central to humanitarian responses during the acute phase of a military conflict. By examining the operations of grassroots associations in the early months of the 2022 war in Ukraine, the authors provide a unique perspective on humanitarian logistics. Nonetheless, more inclusive models of humanitarian responses are needed to harness the capacities and resilience of grassroots operations in practice.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 1 November 2023

Herbert Mattord, Kathleen Kotwica, Michael Whitman and Evan Battaglia

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Abstract

Purpose

The purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.

Design/methodology/approach

This paper is the first phase in a planned multiphase project to better understand current practices in security optimization efforts being implemented by commercial organizations exploring means and methods to operate securely while reducing operating costs. The research questions being examined are: What are the general levels of interest in cybersecurity and corporate security convergence? How well do the perspectives on convergence align between organizations? To what extent are organizations pursuing convergence? and How are organizations achieving the anticipated outcomes from convergence?

Findings

In organizations, the evolution to a more optimized security structure, either merged or partnered, was traditionally due to unplanned or unforeseen events; e.g. a spin-off/acquisition, new security leadership or a negative security incident was the initiator. This is in contrast to a proactive management decision or formal plan to change or enhance the security structure for reasons that include reducing costs of operations and/or improving outcomes to reduce operational risks. The dominant exception was in response to regulatory requirements. Preliminary findings suggest that outcomes from converged organizations are not necessarily more optimized in situations that are organizationally merged under a single leader. Optimization may ultimately depend on the strength of relationships and openness to collaboration between management, cybersecurity and corporate security personnel.

Research limitations/implications

This report and the number of respondents to its survey do not support generalizable findings. There are too few in each category to make reliable predictions and in analysis, there was an insufficient quantity of responses in most categories to allow supportable conclusions to be drawn.

Practical implications

Practitioners may find useful contextual clues to their needs for convergence or in response to directives for convergence from this report on what is found in some other organizations.

Social implications

Improved effectiveness and/or reduced costs for organizational cybersecurity would be a useful social outcome as organizations become more efficient in the face of increasing levels of cyber security threats.

Originality/value

Convergence as a concept has been around for some time now in both the practice and research communities. It was initially promoted formally by ASIS International and ISACA in 2005. Yet there is no universally agreed-upon definition for the term or the practices undertaken to achieve it. In addition, the business drivers and practices undertaken to achieve it are still not fully understood. If convergence or optimization of converged operations offers a superior operational construct compared to other structures, it is incumbent to discover if there are measurable benefits. This research hopes to define the concept of security collaboration optimization more fully. The eventual goal is to develop and promote a tool useful for organizations to measure where they are on such a continuum.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 21 December 2023

Meena Subedi

The current study uses an advanced machine learning method and aims to investigate whether auditors perceive financial statements that are principles-based as less risky. More…

Abstract

Purpose

The current study uses an advanced machine learning method and aims to investigate whether auditors perceive financial statements that are principles-based as less risky. More specifically, this study aims to explore the association between principles-based accounting standards and audit pricing and between principles-based accounting standards and the likelihood of receiving a going concern opinion.

Design/methodology/approach

The study uses an advanced machine-learning method to understand the role of principles-based accounting standards in predicting audit fees and going concern opinion. The study also uses multiple regression models defining audit fees and the probability of receiving going concern opinion. The analyses are complemented by additional tests such as economic significance, firm fixed effects, propensity score matching, entropy balancing, change analysis, yearly regression results and controlling for managerial risk-taking incentives and governance variables.

Findings

The paper provides empirical evidence that auditors charge less audit fees to clients whose financial statements are more principles-based. The finding suggests that auditors perceive financial statements that are principles-based less risky. The study also provides evidence that the probability of receiving a going-concern opinion reduces as firms rely more on principles-based standards. The finding further suggests that auditors discount the financial numbers supplied by the managers using rules-based standards. The study also reveals that the degree of reliance by a US firm on principles-based accounting standards has a negative impact on accounting conservatism, the risk of financial statement misstatement, accruals and the difficulty in predicting future earnings. This suggests potential mechanisms through which principles-based accounting standards influence auditors’ risk assessments.

Research limitations/implications

The authors recognize the limitation of this study regarding the sample period. Prior studies compare rules vs principles-based standards by focusing on the differences between US generally accepted accounting principles (GAAP) and international financial reporting standards (IFRS) or pre- and post-IFRS adoption, which raises questions about differences in cross-country settings and institutional environment and other confounding factors such as transition costs. This study addresses these issues by comparing rules vs principles-based standards within the US GAAP setting. However, this limits the sample period to the year 2006 because the measure of the relative extent to which a US firm is reliant upon principles-based standards is available until 2006.

Practical implications

The study has major public policy suggestions as it responds to the call by Jay Clayton and Mary Jo White, the former Chairs of the US Securities and Exchange Commission (SEC), to pursue high-quality, globally accepted accounting standards to ensure that investors continue to receive clear and reliable financial information globally. The study also recognizes the notable public policy implications, particularly in light of the current Chair of the International Accounting Standards Board (IASB) Andreas Barckow’s recent public statement, which emphasizes the importance of principles-based standards and their ability to address sustainability concerns, including emerging risks such as climate change.

Originality/value

The study has major public policy suggestions because it demonstrates the value of principles-based standards. The study responds to the call by Jay Clayton and Mary Jo White, the former Chairs of the US SEC, to pursue high-quality, globally accepted accounting standards to ensure that investors continue to receive clear and reliable financial information as business transactions and investor needs continue to evolve globally. The study also recognizes the notable public policy implications, particularly in light of the current Chair of the IASB Andreas Barckow’s recent public statement, which emphasizes the importance of principles-based standards and their ability to address sustainability concerns, including emerging risks like climate change. The study fills the gap in the literature that auditors perceive principles-based financial statements as less risky and further expands the literature by providing empirical evidence that the likelihood of receiving a going concern opinion is increasing in the degree of rules-based standards.

Article
Publication date: 29 February 2024

Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…

Abstract

Purpose

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.

Design/methodology/approach

This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.

Findings

This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.

Research limitations/implications

This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.

Originality/value

This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 24 July 2023

Weihua Wang, Dong Yang and Yaqin Zheng

The purpose of this study is to understand the psychological mechanism that affects consumer trust by focusing on the formation and influence process of psychological contracts…

Abstract

Purpose

The purpose of this study is to understand the psychological mechanism that affects consumer trust by focusing on the formation and influence process of psychological contracts, and taking this opportunity, explore the influence paths of food quality, food safety and service quality on consumer trust in the online food market, and provide theoretical suggestions for building trust in food businesses' consumers.

Design/methodology/approach

This study is based on an empirical investigation and uses partial least square structural equation modeling for analysis. Survey data were collected online from 359 APP users of online food transaction platforms in China.

Findings

Food quality, food safety and service quality influence consumer trust through the mediating effects of relational and transactional psychological contracts. However, the differences between these influencing paths are obvious and shift with changes in the marketing channels.

Practical implications

This study contributes to the body of consumer trust research by exploring online food transactions as an emerging trend in China. Some optimization strategies for food quality, food safety and service quality are provided for enterprises involved in online food transactions.

Originality/value

This is a pioneering study revealing psychological contracts as a missing but significant mediator between consumer trust and its antecedents.

Details

British Food Journal, vol. 126 no. 5
Type: Research Article
ISSN: 0007-070X

Keywords

Article
Publication date: 7 August 2023

Ogochukwu Monye

The Central Bank of Nigeria (CBN) recently relaunched Nigeria’s cashless policy initiative which seeks to reduce financial crime and tax avoidance, decrease cash dependency…

Abstract

Purpose

The Central Bank of Nigeria (CBN) recently relaunched Nigeria’s cashless policy initiative which seeks to reduce financial crime and tax avoidance, decrease cash dependency, advance the adoption of digital financial services (DFS), decrease the risks to the payment system and foster financial inclusion. This study aims to identify the unique challenges of going cashless in Nigeria, particularly in terms of infrastructural, exclusionary and cost implications of the policy on the average citizens.

Design/methodology/approach

The author applies a doctrinal research methodology to identify and reflect on key challenges of the cashless policy from the economic, regulatory and transactional perspectives.

Findings

The cashless policy initiative in Nigeria heralds value for financial integrity, financial policy regulation and user convenience. The mode of introduction, however, ushers in significant challenges and hardly considers Nigeria’s inadequate payment infrastructure, persistent financial exclusion, low levels of financial and digital literacy and capability, high cost of using DFS and pervasive proclivity for cash. As Nigerians adjust albeit inconveniently to the policy, the CBN can ameliorate the hardship by strengthening the payment infrastructure, particularly for digital payments, fostering consumer trust by safeguarding user funds and enabling consumer preferences.

Research limitations/implications

Research materials include the national regulator’s policy documents and newspaper articles that have not been published in formal reports but non-the-less adequately mirror the policy intention of the CBN and the lived experiences of Nigerians.

Practical implications

This study identifies the practical steps and regulatory measures that the CBN can take to improve acceptance and meaningful and sustainable adoption of the cashless policy by the majority of Nigerians.

Social implications

The recommendations that are proffered provide some rich insights to inform regulatory direction for the CBN to seamlessly phase-in the cashless policy and consequently drive down financial exclusion in Nigeria.

Originality/value

This study contributes to the policy discussion around the introduction of the cashless Nigeria project. The doctrinal research method highlights the policy intentions of the regulator in juxtaposition with lived experiences of Nigerians. This study offers recommendations to bolster financial inclusion, stability and integrity.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 18 September 2023

Yu Wang, Daqing Zheng and Yulin Fang

The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore…

Abstract

Purpose

The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore the factors that influence the information-control behavior of ESN users when continuously sharing information.

Design/methodology/approach

This study specifies the information-control behaviors in the “wall posts” channel and applies communication privacy management (CPM) theory to analyze the effects of the individual-specific factor (disposition to value information), context-specific factors (work-relatedness and information richness) and risk-benefit ratio (public benefit and public risk). Data on actual information-control behaviors extracted from ESN logs are examined using multilevel mixed-effects logistic regression analysis.

Findings

The study's findings show the direct effects of the individual-specific factor, context-specific factors and risk-benefit ratio, highlighting interactions between the individual motivation factor and ESN context factors.

Originality/value

This study reshapes the relationship of CPM theory boundary rules in the ESN context, extending information-control research and providing insights into ESNs' information-control practices.

Access

Year

Last month (263)

Content type

Article (263)
1 – 10 of 263