Search results

1 – 10 of 74
Open Access
Article
Publication date: 2 May 2023

Rukiye Orman, Elif Şi̇mşek and Meryem Ayşegül Kozak Çakır

Micro-credentials, which have been widely used in re-skilling and skills development, provide advantages for improvement in the professional career. As a complementary approach to…

2684

Abstract

Purpose

Micro-credentials, which have been widely used in re-skilling and skills development, provide advantages for improvement in the professional career. As a complementary approach to career and professional development in formal education, it can be said that micro-credentials are preferred for supporting professional development and/or to acquiring new skills to find a job in a new field (Fisher and Leder, 2022). This study aims to provide a detailed perspective on conceptual framework and the use of micro-credentials in higher education.

Design/methodology/approach

Many questions have arisen regarding micro-credentials, applicability, quality assurance, inclusion in formal educational settings and how to include them in traditional education systems, especially in higher education institutions. Oliver (2019) emphasizes that there is little research on micro-credentials or their derivatives in the literature. There is still uncertainty on micro-credential on behalf of students, employers or employees. In addition, although there are studies on micro-credentials in the USA, Europe and Australia, there is very little research around countries such as Turkey (Yilik, 2021). This study discusses the use of micro-credentials in the world and their reflections on higher education.

Findings

As it is shown in this article, micro-credentials have the potential to challenge or complement traditional ways of how learning is taking place, understood, recognized and certified. Research on micro-credentials is still in its infancy and could benefit a lot from more research. Especially research on employers' recognition and appreciation of digital credentials needs to be studied. Also, empirically confirming propositions of literature on micro-credentials could be beneficial.

Originality/value

This study is original in terms of discussing the use of micro-credential in the world and their reflections on higher education and presenting suggestions on this subject.

Details

Higher Education Evaluation and Development, vol. 17 no. 2
Type: Research Article
ISSN: 2514-5789

Keywords

Open Access
Article
Publication date: 17 October 2019

Sherali Zeadally, Farhan Siddiqui, Zubair Baig and Ahmed Ibrahim

The aim of this paper is to identify some of the challenges that need to be addressed to accelerate the deployment and adoption of smart health technologies for ubiquitous…

28122

Abstract

Purpose

The aim of this paper is to identify some of the challenges that need to be addressed to accelerate the deployment and adoption of smart health technologies for ubiquitous healthcare access. The paper also explores how internet of things (IoT) and big data technologies can be combined with smart health to provide better healthcare solutions.

Design/methodology/approach

The authors reviewed the literature to identify the challenges which have slowed down the deployment and adoption of smart health.

Findings

The authors discussed how IoT and big data technologies can be integrated with smart health to address some of the challenges to improve health-care availability, access and costs.

Originality/value

The results of this paper will help health-care designers, professionals and researchers design better health-care information systems.

Details

PSU Research Review, vol. 4 no. 2
Type: Research Article
ISSN: 2399-1747

Keywords

Open Access
Article
Publication date: 9 November 2021

Zareef Mohammed

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…

3818

Abstract

Purpose

Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.

Design/methodology/approach

Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.

Findings

Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.

Originality/value

These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 12 October 2023

Michael Rothgang and Bernhard Lageman

This study, a conceptual paper, aims an answer the question, how significant cluster ambidexterity is for the resilience of individual clusters.

Abstract

Purpose

This study, a conceptual paper, aims an answer the question, how significant cluster ambidexterity is for the resilience of individual clusters.

Design/methodology/approach

The authors draw up an abductive synopsis of empirical information and relevant theoretical sources. A case study is used to illustrate some of the findings.

Findings

The results of the analysis show that the ambidexterity of a cluster can contribute to its resilience when adverse external developments arise. Ambidexterity proves to be simultaneously a common strategy of key cluster actors and a mechanism for coping with critical situations and developments that can be activated by the cluster actors and may – eventually – lead to cluster resilience. While ambidexterity does not guarantee cluster survival, it can contribute significantly to their economic resilience under adverse conditions.

Research limitations/implications

The concept is developed on a limited empirical basis and would need to be tested and deepened by comparing a wide range of case studies from different clusters.

Practical implications

A better understanding of the importance of ambidexterity for the development of industrial clusters contributes to a better fine-tuning of cluster support policies.

Originality/value

Ambidexterity as a concept originating from business administration has so far only been rudimentarily tapped for empirical and theoretical cluster research. The paper identifies and develops a path how this could be accomplished to a greater extent in the future.

Details

Competitiveness Review: An International Business Journal , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1059-5422

Keywords

Open Access
Article
Publication date: 14 August 2017

Simon C. Mueller, Alex Bakhirev, Markus Böhm, Marina Schröer, Helmut Krcmar and Isabell M. Welpe

The purpose of this paper is to develop a method to quantify the digital economy using a representative measurement approach and use it to analyze the USA, Germany, the Republic…

7171

Abstract

Purpose

The purpose of this paper is to develop a method to quantify the digital economy using a representative measurement approach and use it to analyze the USA, Germany, the Republic of Korea and Sweden.

Design/methodology/approach

The research approach of this paper is based on a developed methodology to identify firms of the digital economy by measuring the market capitalization of selected countries in comparison over time using financial databases.

Findings

Comparing the market capitalization of the digital economy, the USA lead both in absolute as well as in relative terms. The 11 firms with the largest market capitalization are all American. For Germany, the results show that policy measures should be undertaken to ameliorate competitiveness in the field.

Research limitations/implications

This current measurement only includes public firms. An interesting avenue for future research would be to transfer the approach to investigate private firms.

Originality/value

Previous research has focused on comparing information and communication technologies adoption and infrastructure as well as innovation hubs between countries. The authors are not aware of any paper to date which has compared market capitalization in the digital economy between countries using a representative sample. This paper offers a research approach to measure and compare the digital economy between countries. The methodology could be applied to other countries which seek to benchmark their performance and derive policy measures to be able to compete with jurisdictions leading in the digital economy.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 5
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 26 November 2021

Charles H. Cho, Joanna Krasodomska, Paulette Ratliff-Miller and Justyna Godawska

This study examines the internationalization effects of corporate social responsibility (CSR) reporting, specifically aiming to identify and compare the CSR reporting practices of…

2616

Abstract

Purpose

This study examines the internationalization effects of corporate social responsibility (CSR) reporting, specifically aiming to identify and compare the CSR reporting practices of large US multi-national corporations (MNCs) and their Polish subsidiaries.

Design/methodology/approach

Based on content analysis and using a disclosure index, the authors examined the CSR information posted on, or linked to, the corporate websites of a sample of 60 US-based MNCs and their subsidiaries operating in Poland.

Findings

The findings indicate that US companies, despite operating in a less regulated environment, had more extensive disclosure than their Polish subsidiaries and covered more CSR-related topics. CSR disclosures within the US subsample were analogous in volume and detail. By contrast, only about half of Polish companies provided CSR disclosures, which were more diverse in volume and in the types of activities disclosed. The authors did not find a significant positive correlation between the CSR disclosures of the two subsamples.

Originality/value

The study contributes to the literature on internationalization processes and sustainability practices. It provides insights into the CSR reporting of companies located in Central and Eastern European countries. The findings also have implications for policymakers in incentivizing the enhancement of the reporting disclosure practices of companies.

Open Access
Article
Publication date: 27 April 2020

Robert Weinhandl, Zsolt Lavicza and Tony Houghton

Flipped classroom approaches (FCA) are an educational innovation that could increase students' learning outcomes in, and their enjoyment of, mathematics or STEM education. To…

2202

Abstract

Purpose

Flipped classroom approaches (FCA) are an educational innovation that could increase students' learning outcomes in, and their enjoyment of, mathematics or STEM education. To integrate FCA into education sustainably, professional teacher development (PTD) is a promising tool. The research aim is to explore which aspects should be considered when developing and implementing professional mathematics or STEM teacher development for flipped approaches.

Design/methodology/approach

A total of 20 expert interviews were conducted and analysed according to a synthesis of grounded theory approaches and qualitative interview study principles.

Findings

Evaluating the interview data indicates that the characteristics of different teacher types in PTD, learning activities in PTD and the DSE model derived in this study could be vital elements in professional mathematics or STEM teacher development for flipped approaches.

Originality/value

Evaluating the interview data indicates that the characteristics of different teacher types in PTD, learning activities in PTD and the DSE model derived in this study could be vital elements in professional mathematics or STEM teacher development for flipped approaches.

Open Access
Book part
Publication date: 9 May 2023

Volker Stocker, William Lehr and Georgios Smaragdakis

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…

Abstract

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Open Access
Article
Publication date: 1 June 2015

Cheri MacLeod

This paper describes a small research project undertaken in a technical college in Qatar on the use of iPads in the classroom. iPads were trialed for a semester each in…

Abstract

This paper describes a small research project undertaken in a technical college in Qatar on the use of iPads in the classroom. iPads were trialed for a semester each in mathematics and physics classes; students completed pre- and post-surveys. Classroom observations were carried out and interviews were conducted with both faculty (N=3) and students (N=19). Over 80% of students reported positively on the iPad as being “helpful” to “very helpful” for learning new things and course materials, for increasing their interaction with online course materials and getting course information and for exploring additional material related to course topics. Faculty perceptions of iPad use in class were also positive.

Details

Learning and Teaching in Higher Education: Gulf Perspectives, vol. 12 no. 1
Type: Research Article
ISSN: 2077-5504

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6344

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

1 – 10 of 74