Search results

1 – 10 of 320
Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6359

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 24 May 2022

Luis Hernan Contreras Pinochet, Cesar Alexandre de Souza, Adriana Backx Noronha Viana and Guillermo Rodríguez-Abitia

This research aims to propose the development of a model that identifies, in essential services, the determining factors affecting the technological advances offered by different…

4156

Abstract

Purpose

This research aims to propose the development of a model that identifies, in essential services, the determining factors affecting the technological advances offered by different smart technologies in supermarket retail channels that influence citizens' quality of life, amidst the coronavirus disease 2019 (COVID-19) pandemic.

Design/methodology/approach

The data were collected using a cross-sectional questionnaire survey (n = 469). The authors applied the structural equation modeling (SEM) technique to test the hypotheses, along with the partial least squares (PLS) method for estimating latent variables and combining with the necessary condition analysis (NCA) method.

Findings

According to the results of the NCA method, the results were adequate, and more attention should be paid to the quality of life construct after finding the bottleneck point of 50%. In this sense, adaptive resilience was characterized as the main necessary predictor construct for quality of life. In addition, Generation Z and Millennials have the highest frequency of use in all smart technologies, with “assisted purchase” being the most widely used.

Social implications

Finally, the effect of the pandemic changed the consumption routine with supermarkets, not being a mere option but a necessity in the context of a smart city.

Originality/value

As a result, the proposed model was consistent, showing that all direct and indirect SEM paths were validated, highlighting data security and privacy and resilience issues. In addition, the NCA method complemented the procedures performed in the SEM phase.

Details

Revista de Gestão, vol. 31 no. 1
Type: Research Article
ISSN: 1809-2276

Keywords

Open Access
Article
Publication date: 14 February 2024

Chao Lu and Xiaohai Xin

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…

Abstract

Purpose

The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.

Design/methodology/approach

For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.

Findings

The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.

Research limitations/implications

This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.

Originality/value

The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 18 no. 2
Type: Research Article
ISSN: 2071-1395

Keywords

Open Access
Article
Publication date: 30 October 2023

Giacomo Pigatto, John Dumay, Lino Cinquini and Andrea Tenucci

This research aims to examine and understand the rationales and modalities behind the use of disclosure before, during and after a corporate governance scandal involving CPA…

Abstract

Purpose

This research aims to examine and understand the rationales and modalities behind the use of disclosure before, during and after a corporate governance scandal involving CPA Australia (CPAA).

Design/methodology/approach

Data beyond CPAA's annual reports were collected, such as news articles, media releases, an independent review panel (IRP) report, and the Chief Operating Officer's letter to members. These disclosures were manually coded and analysed through the word counts and word trees in NVivo. This study also relied on Norbert Elias' conceptual tool of power games among networks of actors – figurations – to model the scandal as a power game between the old Board, the press, concerned members, the IRP and the new Board. This study analysed the data to reveal a collective and in fieri power balance that changed with the phases of the scandal.

Findings

A mix of voluntary, involuntary, requested and absent disclosures was important in triggering, managing and ending the CPAA scandal. Moreover, communication and disclosure fulfilled a constitutive role since both: mobilised actors, enabled coordination among actors, contributed to pursuing shared goals and influenced power balances. Such a constitutive role was at the heart of the ability of coalitions of figurations to challenge and restore the powerful status quo.

Originality/value

This research introduces to accounting studies the collective and in fieri dimensions of power from figurational theory. Moreover, the research sheds new light on using voluntary, involuntary, requested and absent disclosures before, during and after a corporate crisis.

Details

Accounting, Auditing & Accountability Journal, vol. 36 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Open Access
Article
Publication date: 30 March 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA…

3421

Abstract

Purpose

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.

Design/methodology/approach

This exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.

Findings

In this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.

Originality/value

This research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 3 November 2023

Nermeen Bahnasy

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites…

Abstract

Purpose

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites. Specifically, the study aims to explore the relationship between the tourism industry and local agricultural practices and how this connection influences food security in the Siwa Oasis, located in the Western Desert of Egypt.

Design/methodology/approach

The study employs a qualitative exploratory research design using in-depth interviews and focus groups to investigate the impact of the tourism economy on food security and identify potential benefits and limitations for food security in the region.

Findings

The research reveals that the tourism economy in Siwa Oasis has only a marginal contribution to food security. The study highlights a lack of a strong connection between the tourism industry and local agricultural practices within the heritage site. As a result, the potential benefits and synergies that could be achieved between tourism and agriculture have not been fully realized, leading to a limited impact on food stability.

Research limitations/implications

This study primarily relies on qualitative data from Siwa Oasis, Egypt, which may limit the generalizability of findings beyond this specific context. Additionally, while the study provides valuable insights into the complex relationship between tourism and food security, it does not quantitatively measure the magnitude of tourism's impact. Future research could incorporate quantitative methods for a more comprehensive understanding of this relationship in diverse desert-prone regions. Finally, the study highlights the need for more integrated approaches to enhance food security through tourism, but the specific strategies and policy recommendations require further investigation and adaptation to local contexts.

Practical implications

This study underscores the need for tourism development strategies that prioritize food security in desert-prone areas like Siwa Oasis. Policymakers and stakeholders should promote sustainable tourism practices that enhance local agriculture, create diversified income sources and foster equitable benefits for communities. Moreover, recognizing the seasonal nature of tourism, interventions to address food shortages during off-peak periods are crucial. Efforts should also focus on skill development and gender-inclusive opportunities within the tourism sector to ensure broader community participation. Additionally, collaborations between tourism and agriculture should be encouraged to optimize food availability and stability while preserving cultural food traditions.

Originality/value

This study adds original insights by examining the specific impact of the tourism economy on food security in dessert-prone agricultural heritage sites. The study's originality lies in its exploration of the untapped potential for synergy between the tourism and agricultural sectors and the implications for local food security. This research contributes to understanding how tourism can improve food security in specific contexts and provides valuable insights into sustainable development in heritage sites.

Details

Journal of Humanities and Applied Social Sciences, vol. 6 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Open Access
Article
Publication date: 12 December 2023

Sun-Joong Yoon

In 2022, US financial regulators proposed to mandate a single central clearing mechanism for treasury bonds and repo transactions to stabilize financial markets. The systemic…

Abstract

In 2022, US financial regulators proposed to mandate a single central clearing mechanism for treasury bonds and repo transactions to stabilize financial markets. The systemic risks inherent in repo markets were first highlighted by the global financial crisis and, as a response, global financial authorities such as the Financial Stability Board (FSB) and Bank for International Settlements (BIS) have advocated for the introduction of a central counterparty (CCP). This study examines the structural characteristics of Korean repo markets and proposes the introduction of CCPs as a way to mitigate systemic risk. To this end, the author analyzes the structural differences between US and European repo markets and estimates the potential consequences of introducing CCP clearing in local repo markets. In general, CCPs offer two benefits: they can reduce required capital through netting in multilateral transactions, and they can mitigate the effects of risk transfer by isolating counterparty risk during periods of turbulence. In Korea, the latter effect is expected to play a pivotal role in mitigating potential risks.

Details

Journal of Derivatives and Quantitative Studies: 선물연구, vol. 32 no. 1
Type: Research Article
ISSN: 1229-988X

Keywords

Open Access
Article
Publication date: 14 March 2024

Elvira Anna Graziano, Flaminia Musella and Gerardo Petroccione

The objective of this study is to investigate the impact of the COVID-19 pandemic on the consumer payment behavior in Italy by correlating financial literacy with digital payment…

Abstract

Purpose

The objective of this study is to investigate the impact of the COVID-19 pandemic on the consumer payment behavior in Italy by correlating financial literacy with digital payment awareness, examining media anxiety and financial security, and including a gender analysis.

Design/methodology/approach

Consumers’ attitudes toward cashless payments were investigated using an online survey conducted from November 2021 to February 2022 on a sample of 836 Italian citizens by considering the behavioral characteristics and aspects of financial literacy. Structural equation modeling (SEM) was used to test the hypotheses and to determine whether the model was invariant by gender.

Findings

The analysis showed that the fear of contracting COVID-19 and the level of financial literacy had a direct influence on the payment behavior of Italians, which was completely different in its weighting. Fear due to the spread of news regarding the pandemic in the media indirectly influenced consumers’ noncash attitude. The preliminary results of the gender multigroup analysis showed that cashless payment was the same in the male and female subpopulations.

Originality/value

This research is noteworthy because of its interconnected examination. It examined the effects of the COVID-19 pandemic on people’s payment choices, assessed their knowledge, and considered the influence of media-induced anxiety. By combining these factors, the study offered an analysis from a gender perspective, providing understanding of how financial behaviors were shaped during the pandemic.

Details

EuroMed Journal of Business, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1450-2194

Keywords

Open Access
Article
Publication date: 6 October 2023

Renata Konrad, Solomiya Sorokotyaha and Daniel Walker

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute…

Abstract

Purpose

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute response phase until more established humanitarian aid organizations can enter. Nevertheless, scant research exists regarding the role of grassroots associations in providing humanitarian assistance during a military conflict. The purpose of this paper is to understand the role of grassroots associations and identify important themes for effective operations.

Design/methodology/approach

This paper adopts a case-study approach of three Ukrainian grassroots associations that began operating in the immediate days of the full-scale invasion of Ukraine. The findings are based on analyzing primary sources, including interviews with Ukrainian volunteers, and are supported by secondary sources.

Findings

Grassroots associations have local contacts and a contextual understanding of population needs and can respond more rapidly and effectively than large intergovernmental agencies. Four critical themes regarding the operations of grassroots associations emerged: information management, inventory management, coordination and performance measurement. Grassroots humanitarian response operations during conflict are challenged by personal security risks, the unpredictability of unsolicited supplies, emerging volunteer roles, dynamic transportation routes and shifting demands.

Originality/value

Grassroots responses are central to humanitarian responses during the acute phase of a military conflict. By examining the operations of grassroots associations in the early months of the 2022 war in Ukraine, the authors provide a unique perspective on humanitarian logistics. Nonetheless, more inclusive models of humanitarian responses are needed to harness the capacities and resilience of grassroots operations in practice.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Access

Only Open Access

Year

Last 6 months (320)

Content type

1 – 10 of 320