Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of 24
To view the access options for this content please click here
Article
Publication date: 14 June 2020

A Clark-Wilson and ANSI role-based access control model

Tamir Tsegaye and Stephen Flowerday

An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of…

HTML
PDF (1006 KB)

Abstract

Purpose

An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of healthcare. However, this can create security and privacy risks to patient information. This paper aims to present a model for securing the EHR based on role-based access control (RBAC), attribute-based access control (ABAC) and the Clark-Wilson model.

Design/methodology/approach

A systematic literature review was conducted which resulted in the collection of secondary data that was used as the content analysis sample. Using the MAXQDA software program, the secondary data was analysed quantitatively using content analysis, resulting in 2,856 tags, which informed the discussion. An expert review was conducted to evaluate the proposed model using an evaluation framework.

Findings

The study found that a combination of RBAC, ABAC and the Clark-Wilson model may be used to secure the EHR. While RBAC is applicable to healthcare, as roles are linked to an organisation’s structure, its lack of dynamic authorisation is addressed by ABAC. Additionally, key concepts of the Clark-Wilson model such as well-formed transactions, authentication, separation of duties and auditing can be used to secure the EHR.

Originality/value

Although previous studies have been based on a combination of RBAC and ABAC, this study also uses key concepts of the Clark-Wilson model for securing the EHR. Countries implementing the EHR can use the model proposed by this study to help secure the EHR while also providing EHR access in a medical emergency.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/ICS-08-2019-0100
ISSN: 2056-4961

Keywords

  • Access control
  • Role-based access control
  • Attribute-based access control
  • Clark-Wilson
  • Security
  • Privacy
  • Electronic health record

To view the access options for this content please click here
Article
Publication date: 1 August 2019

Behind the cloak of competence: brain injury and mental capacity legislation

Sophie Moore, Rebecca Wotus, Alyson Norman, Mark Holloway and Jackie Dean

Brain Injury Case Managers (BICMs) work closely with individuals with Acquired Brain Injury (ABI), assessing needs, structuring rehabilitation interventions and providing…

HTML
PDF (384 KB)

Abstract

Purpose

Brain Injury Case Managers (BICMs) work closely with individuals with Acquired Brain Injury (ABI), assessing needs, structuring rehabilitation interventions and providing support, and have significant experience of clients with impairments to decision making. The purpose of this paper is to explore the application of the Mental Capacity Act (MCA) and its guidance when applied to ABI survivors. This research aimed to: first, highlight potential conflicts or tensions that application of the MCA might pose, and second, identify approaches to mitigate the problems of the MCA and capacity assessments with ABI survivors. It is hoped that this will support improvements in the services offered.

Design/methodology/approach

Using a mixed method approach, 93 BICMs responded to an online questionnaire about decision making following ABI. Of these, 12 BICMs agreed to take part in a follow-up semi-structured telephone interview.

Findings

The data revealed four main themes: disagreements with other professionals, hidden disabilities, vulnerability in the community and implementation of the MCA and capacity assessments.

Practical implications

The findings highlight the need for changes to the way mental capacity assessments are conducted and the need for training for professionals in the hidden effects of ABI.

Originality/value

Limited research exists on potential limitations of the application of the MCA for individuals with an ABI. This paper provides much needed research on the difficulties surrounding mental capacity and ABI.

Details

The Journal of Adult Protection, vol. 21 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/JAP-02-2019-0007
ISSN: 1466-8203

Keywords

  • Brain injury
  • Social care
  • Mental capacity
  • Case management
  • Executive impairment
  • Lack of insight

To view the access options for this content please click here
Article
Publication date: 1 February 1998

A study of the impact of training in a management development program based on 360 feedback

Robert T. Rosti and Frank Shipper

Training programs are infrequently evaluated and when they are evaluated they often rely on pre‐experimental designs and feedback of the participants. This statement is…

HTML
PDF (107 KB)

Abstract

Training programs are infrequently evaluated and when they are evaluated they often rely on pre‐experimental designs and feedback of the participants. This statement is also true of management development programs based on 360 feedback. In this study the effects of a training program administered with 360 feedback are evaluated using pre‐ and post‐observations of the participants’ managerial skills in control and experimental groups. The results indicate that changes in individual skills could not be contributed to the training program, but that changes in the overall profiles of skills could. Why this could occur is discussed as well as suggestions for improving training evaluation.

Details

Journal of Managerial Psychology, vol. 13 no. 1/2
Type: Research Article
DOI: https://doi.org/10.1108/02683949810369147
ISSN: 0268-3946

Keywords

  • Competences
  • Development
  • Feedback
  • Management
  • Training

To view the access options for this content please click here
Book part
Publication date: 17 February 2015

Discussing Work-Life Fit: Factors that Predict Managerial Promotion of Flexible Work Arrangements

Stephen Sweet, Jacquelyn Boone James and Marcie Pitt-Catsouphes

Increased access to flexible work arrangements has the prospect of enhancing work-family reconciliation. Under consideration is extent that managers assumed lead roles in…

HTML
PDF (219 KB)
EPUB (412 KB)

Abstract

Purpose

Increased access to flexible work arrangements has the prospect of enhancing work-family reconciliation. Under consideration is extent that managers assumed lead roles in initiating discussions, the overall volume of discussions that occurred, and the outcomes of these discussions.

Methodology/approach

A panel analysis of 950 managers over one and a half years examines factors predicting involvement in a change initiative designed to expand flexible work arrangement use in a company in the financial activities supersector.

Findings

The overall volume of discussions, and tendencies for managers to initiate discussions, is positively predicted by managers’ prior experiences with flexibility, training to promote flexibility, and supervisory responsibilities. Managers were more inclined to promote flexibility when they viewed it as a supervisory responsibility and when they believed that it offered career rewards. An experiment demonstrated that learning of professional standards demonstrated outside of one’s own unit increased promotion of flexible work options. Discussions of flexibility led to many more approvals than denials of use, and also increased the likelihood of subsequent discussions occurring, indicating that promoting discussions of flexible work arrangements can be a path toward expanding use.

Originality

The study identifies specific factors that can lead managers to support exploration of flexible work arrangement use.

Details

Work and Family in the New Economy
Type: Book
DOI: https://doi.org/10.1108/S0277-283320150000026018
ISBN: 978-1-78441-630-0

Keywords

  • Flexible schedules
  • telework
  • supportive supervisor behaviors
  • alternate work arrangements

To view the access options for this content please click here
Book part
Publication date: 28 June 2016

What Matters with PMS? Critical Check Points in the Success of PMS

Tarmo Kadak and Erkki K. Laitinen

The assessment of the success of Performance Management Systems (PMS) is difficult because there are many success factors, they are mutually dependent on each other, and…

HTML
PDF (465 KB)
EPUB (643 KB)

Abstract

Purpose

The assessment of the success of Performance Management Systems (PMS) is difficult because there are many success factors, they are mutually dependent on each other, and located at different hierarchical levels of an organization. Therefore, there is a need to describe the complete logical chain, which makes PMS successful for an organization and to find out a comprehensive list of key factors (KF) affecting the success of PMS. The objective of this research paper is to develop a method to assess success of a PMS based on a logical chain of 14 KF.

Methodology/approach

The research first develops a logical chain based on the 14 KFs on the basis of prior studies and then carries out a survey about these KFs (15 check points) of PMS and their connection to organizational performance for a small sample of firms from two EU countries.

Findings

There are next findings of this study which indicate following: KFs of PMS affect organizational performance; successful PMS improves organizational performance; PMS is successful for the organization when the completeness of the logical chain in PMS is high.

Practical implications

The practical contribution of this study is that findings show that firms can assess their own PMSs and compare their check point values against the values of successful PMS group. This kind of analysis indicates directly improvement potential for the different check points in PMS.

Details

Performance Measurement and Management Control: Contemporary Issues
Type: Book
DOI: https://doi.org/10.1108/S1479-351220160000031004
ISBN: 978-1-78560-915-2

Keywords

  • Performance management systems
  • performance measures
  • chain of check points
  • PMS design

To view the access options for this content please click here
Article
Publication date: 1 April 2004

Cyberterrorism, computer crime, and reality

C. Bryan Foltz

The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is…

HTML
PDF (149 KB)

Abstract

The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat limited. Government officials and experts are often heard claiming that the world is unprepared for cyberterrorism; however, other officials and experts state that cyberterrorism does not pose a threat to anyone. Examines the reasons for these disparate viewpoints and reviews the theoretical and actual forms in which cyberterrorism may occur. Further, proposes the use (and refocusing) of an existing model of computer security to help understand and defend against cyberterrorism.

Details

Information Management & Computer Security, vol. 12 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/09685220410530799
ISSN: 0968-5227

Keywords

  • Computer crime
  • Information systems
  • Data security
  • Terrorism

To view the access options for this content please click here
Article
Publication date: 1 March 2003

A CROSS‐CULTURAL EXPLORATORY STUDY OF THE LINKAGE BETWEEN EMOTIONAL INTELLIGENCE AND MANAGERIAL EFFECTIVENESS

Frank Shipper, Joel Kincaid, Denise M. Rotondo and Richard C. Hoffman

Multinationals increasingly require a cadre of skilled managers to effectively run their global operations. This exploratory study examines the relationship between…

HTML
PDF (1.3 MB)

Abstract

Multinationals increasingly require a cadre of skilled managers to effectively run their global operations. This exploratory study examines the relationship between emotional intelligence (EI) and managerial effectiveness among three cultures. EI is conceptualized and measured as self‐other agreement concerning the use of managerial skills using data gathered under a 360‐degree feedback process. Three hypotheses relating to managerial self‐awareness of both interactive and controlling skills are examined using data from 3,785 managers of a multinational firm located in the United States (US), United Kingdom (UK), and Malaysia. The two sets of managerial skills examined were found to be stable across the three national samples. The hypotheses were tested using polynomial regressions, and contour plots were developed to aid interpretation. Support was found for positive relationships between effectiveness and EI (self‐awareness). This relationship was supported for interactive skills in the US and UK samples and for controlling skills in the Malaysian and UK samples. Self‐awareness of different managerial skills varied by culture. It appears that in low power distance (PD) cultures such as the United States and United Kingdom, self‐awareness of interactive skills may be crucial relative to effectiveness whereas in high PD cultures, such as Malaysia self‐awareness of controlling skills may be crucial relative to effectiveness. These findings are discussed along with the implications for future research.

Details

The International Journal of Organizational Analysis, vol. 11 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/eb028970
ISSN: 1055-3185

To view the access options for this content please click here
Article
Publication date: 1 October 1997

Hypertext information security model for organizations

Lam‐for Kwok

States that traditional information security models address only the micro view of how to maintain a secure environment by controlling the flows of information within…

HTML
PDF (140 KB)

Abstract

States that traditional information security models address only the micro view of how to maintain a secure environment by controlling the flows of information within protection systems and the access to controlled data items. Argues that these models do not aim to, and cannot, reflect the information security level of an organization. Describes an information security model using a hypertext approach. The model aims to prepare a macro view of the current information security situation in order to provide an overview of the information security risk to a wider audience in an organization. An administrative information system has been analysed to demonstrate the hypertext information security model.

Details

Information Management & Computer Security, vol. 5 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/09685229710184512
ISSN: 0968-5227

Keywords

  • Data security
  • Hypertext
  • Modelling
  • Risk management

To view the access options for this content please click here
Article
Publication date: 1 December 1996

Removal of all unauthorized access paths in production software

Charles Cresson Wood

Presents a policy considered necessary to prevent breaches of security when software is moved from development to production. Contends that although information is a…

HTML
PDF (15 KB)

Abstract

Presents a policy considered necessary to prevent breaches of security when software is moved from development to production. Contends that although information is a valuable, global commodity it is often unprotected. Presents suggestions to prevent encryption code from being broken. Gives guidelines for the security of encryption keys. Looks at the costs and benefits of encryption, packet encryption and the Internet. Discusses US policy, the US Computer Security Act and the US government proposals for information security

Details

Information Management & Computer Security, vol. 4 no. 5
Type: Research Article
DOI: https://doi.org/10.1108/09685229610153148
ISSN: 0968-5227

Keywords

  • Computer security
  • Data security
  • Encryption
  • Information control
  • Internet

To view the access options for this content please click here
Book part
Publication date: 26 November 2020

The Hybrid Shopping Mile and Its Orbital Customer Journey Mapping

Zeynep Bilgin-Wührer and Gerhard A. Wührer

Understanding the customer has been the focus of attention of businesses and academia for many decades. Starting in 1960s, complex buyer behavior models developed by…

HTML
PDF (576 KB)
EPUB (30 KB)

Abstract

Understanding the customer has been the focus of attention of businesses and academia for many decades. Starting in 1960s, complex buyer behavior models developed by Nicosia, by Howard and Sheth (1969), were followed by Engel, Blackwell and Miniard in 1978 (Engel, Blackwell, & Miniard, 1990) to understand the buying process, shaping the thoughts today about consumers’ experiences in an omnichannel world. Interest in customer perceptions and expectations (Parasuraman, Berry, & Zeithaml, 1991), SERVQUAL (Parasuraman, Zeithaml, & Leonard, 1985) and SERVPERV (Cronin & Taylor, 1994) moved the academia to discuss the relationship marketing (Morgan & Hunt, 1994; Parvatiyar & Sheth, 1999; Peterson, 1995; Sheth & Parvatiyar, 1995). Wilson’s model (1995) of buyer–seller relationships extended the former models with additional concepts like social bonds, comparison level of alternatives, power roles, technology, structural bonds and cooperation as influencers on relationship development stages. His emphasis reflects a high relevancy in the omnichannel world of customers’ interactions today. Winer (2001), a pioneer to discuss the customer relationship management focused on a database to know about customers’ purchase history and interests. The millennium look at customer lifetime value is again relationship focused. For Fader, Hardie, and Lee (2005) rather the long-term focus of the consumer value and actions are important to understand the loyalty and nonlinear nature of relations. While Reinartz and Kumar (2003) focused on profitable customer lifetime and customer heterogeneity, Verhoef (2003) analyzed the impact of customers’ relationship perceptions and relationship marketing instruments on both customer retention and customer share development. The customer-centric thinking was first discussed by Grönroos (2006) within a new definition of marketing. The service dominant logic (Vargo & Lusch, 2008) resulted in the next highlight, the co-creation of value with customer involvement and customer advisory (Güngör, 2012; Güngör & Bilgin, 2011; Messner, 2007) empowering the customers and giving them the control over the supplier networks. Different factors will be influential at different stages of the buying process of customer clusters. The Web- and non-Web-based customer-centric measures can be multifold. Andersson, Movin, Mähring, Teigland, and Wennberg (2018) and Bank (2018) emphasize the importance of technology readiness focus throughout the customer–supplier journey. The question to be answered is, to which extent the empowered customers and the suppliers of this age are ready to adopt, embrace and finally use new technologies in the omnichannel world of holistic interactions that form new visions, expectations, values and desires in a tremendous speed. Ideas and experiences are shared and exchanged in online communities without the need of the involvement of the suppliers. This “holistic view” challenges firms further through the seamlessness it requires to create unity. Customer-centric research needs a new push for the development of instruments and measures to cope with the consumer decision process challenges. Process thinking is needed to capture the purchasing habits in an omnichannel world and to build a new thought for customer journey experience with the aim to understand technology-linked value propositions of customer clusters to optimize channel interactions. Customer journeys have to focus and describe the online/offline experiences at the hybrid shopping mile, trace the behavioral influential factors of the customers’ and sellers’ world in a technological environment. This chapter will discuss “Technology based Orbit Interactions” for “The Hybrid Shopping Mile and its Customer Journey Mapping” with a “Customer Intelligence Framework.” The outcome of the hybrid customer journey mapping gives orientation for customer-management decisions in developing new approaches.

Details

Managing Customer Experiences in an Omnichannel World: Melody of Online and Offline Environments in the Customer Journey
Type: Book
DOI: https://doi.org/10.1108/978-1-80043-388-520201012
ISBN: 978-1-80043-389-2

Keywords

  • Customer centricity
  • lifetime value
  • decision making
  • information sources
  • channel choice
  • consumer rights
  • brand-owned touchpoints
  • customer-owned touchpoints

Access
Only content I have access to
Only Open Access
Year
  • Last 3 months (1)
  • Last 6 months (1)
  • Last 12 months (3)
  • All dates (24)
Content type
  • Article (19)
  • Book part (5)
1 – 10 of 24
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here