Search results
1 – 10 of 24Tamir Tsegaye and Stephen Flowerday
An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of…
Abstract
Purpose
An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of healthcare. However, this can create security and privacy risks to patient information. This paper aims to present a model for securing the EHR based on role-based access control (RBAC), attribute-based access control (ABAC) and the Clark-Wilson model.
Design/methodology/approach
A systematic literature review was conducted which resulted in the collection of secondary data that was used as the content analysis sample. Using the MAXQDA software program, the secondary data was analysed quantitatively using content analysis, resulting in 2,856 tags, which informed the discussion. An expert review was conducted to evaluate the proposed model using an evaluation framework.
Findings
The study found that a combination of RBAC, ABAC and the Clark-Wilson model may be used to secure the EHR. While RBAC is applicable to healthcare, as roles are linked to an organisation’s structure, its lack of dynamic authorisation is addressed by ABAC. Additionally, key concepts of the Clark-Wilson model such as well-formed transactions, authentication, separation of duties and auditing can be used to secure the EHR.
Originality/value
Although previous studies have been based on a combination of RBAC and ABAC, this study also uses key concepts of the Clark-Wilson model for securing the EHR. Countries implementing the EHR can use the model proposed by this study to help secure the EHR while also providing EHR access in a medical emergency.
Details
Keywords
Sophie Moore, Rebecca Wotus, Alyson Norman, Mark Holloway and Jackie Dean
Brain Injury Case Managers (BICMs) work closely with individuals with Acquired Brain Injury (ABI), assessing needs, structuring rehabilitation interventions and providing…
Abstract
Purpose
Brain Injury Case Managers (BICMs) work closely with individuals with Acquired Brain Injury (ABI), assessing needs, structuring rehabilitation interventions and providing support, and have significant experience of clients with impairments to decision making. The purpose of this paper is to explore the application of the Mental Capacity Act (MCA) and its guidance when applied to ABI survivors. This research aimed to: first, highlight potential conflicts or tensions that application of the MCA might pose, and second, identify approaches to mitigate the problems of the MCA and capacity assessments with ABI survivors. It is hoped that this will support improvements in the services offered.
Design/methodology/approach
Using a mixed method approach, 93 BICMs responded to an online questionnaire about decision making following ABI. Of these, 12 BICMs agreed to take part in a follow-up semi-structured telephone interview.
Findings
The data revealed four main themes: disagreements with other professionals, hidden disabilities, vulnerability in the community and implementation of the MCA and capacity assessments.
Practical implications
The findings highlight the need for changes to the way mental capacity assessments are conducted and the need for training for professionals in the hidden effects of ABI.
Originality/value
Limited research exists on potential limitations of the application of the MCA for individuals with an ABI. This paper provides much needed research on the difficulties surrounding mental capacity and ABI.
Details
Keywords
Robert T. Rosti and Frank Shipper
Training programs are infrequently evaluated and when they are evaluated they often rely on pre‐experimental designs and feedback of the participants. This statement is…
Abstract
Training programs are infrequently evaluated and when they are evaluated they often rely on pre‐experimental designs and feedback of the participants. This statement is also true of management development programs based on 360 feedback. In this study the effects of a training program administered with 360 feedback are evaluated using pre‐ and post‐observations of the participants’ managerial skills in control and experimental groups. The results indicate that changes in individual skills could not be contributed to the training program, but that changes in the overall profiles of skills could. Why this could occur is discussed as well as suggestions for improving training evaluation.
Details
Keywords
Stephen Sweet, Jacquelyn Boone James and Marcie Pitt-Catsouphes
Increased access to flexible work arrangements has the prospect of enhancing work-family reconciliation. Under consideration is extent that managers assumed lead roles in…
Abstract
Purpose
Increased access to flexible work arrangements has the prospect of enhancing work-family reconciliation. Under consideration is extent that managers assumed lead roles in initiating discussions, the overall volume of discussions that occurred, and the outcomes of these discussions.
Methodology/approach
A panel analysis of 950 managers over one and a half years examines factors predicting involvement in a change initiative designed to expand flexible work arrangement use in a company in the financial activities supersector.
Findings
The overall volume of discussions, and tendencies for managers to initiate discussions, is positively predicted by managers’ prior experiences with flexibility, training to promote flexibility, and supervisory responsibilities. Managers were more inclined to promote flexibility when they viewed it as a supervisory responsibility and when they believed that it offered career rewards. An experiment demonstrated that learning of professional standards demonstrated outside of one’s own unit increased promotion of flexible work options. Discussions of flexibility led to many more approvals than denials of use, and also increased the likelihood of subsequent discussions occurring, indicating that promoting discussions of flexible work arrangements can be a path toward expanding use.
Originality
The study identifies specific factors that can lead managers to support exploration of flexible work arrangement use.
Details
Keywords
Tarmo Kadak and Erkki K. Laitinen
The assessment of the success of Performance Management Systems (PMS) is difficult because there are many success factors, they are mutually dependent on each other, and…
Abstract
Purpose
The assessment of the success of Performance Management Systems (PMS) is difficult because there are many success factors, they are mutually dependent on each other, and located at different hierarchical levels of an organization. Therefore, there is a need to describe the complete logical chain, which makes PMS successful for an organization and to find out a comprehensive list of key factors (KF) affecting the success of PMS. The objective of this research paper is to develop a method to assess success of a PMS based on a logical chain of 14 KF.
Methodology/approach
The research first develops a logical chain based on the 14 KFs on the basis of prior studies and then carries out a survey about these KFs (15 check points) of PMS and their connection to organizational performance for a small sample of firms from two EU countries.
Findings
There are next findings of this study which indicate following: KFs of PMS affect organizational performance; successful PMS improves organizational performance; PMS is successful for the organization when the completeness of the logical chain in PMS is high.
Practical implications
The practical contribution of this study is that findings show that firms can assess their own PMSs and compare their check point values against the values of successful PMS group. This kind of analysis indicates directly improvement potential for the different check points in PMS.
Details
Keywords
The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is…
Abstract
The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat limited. Government officials and experts are often heard claiming that the world is unprepared for cyberterrorism; however, other officials and experts state that cyberterrorism does not pose a threat to anyone. Examines the reasons for these disparate viewpoints and reviews the theoretical and actual forms in which cyberterrorism may occur. Further, proposes the use (and refocusing) of an existing model of computer security to help understand and defend against cyberterrorism.
Details
Keywords
Frank Shipper, Joel Kincaid, Denise M. Rotondo and Richard C. Hoffman
Multinationals increasingly require a cadre of skilled managers to effectively run their global operations. This exploratory study examines the relationship between…
Abstract
Multinationals increasingly require a cadre of skilled managers to effectively run their global operations. This exploratory study examines the relationship between emotional intelligence (EI) and managerial effectiveness among three cultures. EI is conceptualized and measured as self‐other agreement concerning the use of managerial skills using data gathered under a 360‐degree feedback process. Three hypotheses relating to managerial self‐awareness of both interactive and controlling skills are examined using data from 3,785 managers of a multinational firm located in the United States (US), United Kingdom (UK), and Malaysia. The two sets of managerial skills examined were found to be stable across the three national samples. The hypotheses were tested using polynomial regressions, and contour plots were developed to aid interpretation. Support was found for positive relationships between effectiveness and EI (self‐awareness). This relationship was supported for interactive skills in the US and UK samples and for controlling skills in the Malaysian and UK samples. Self‐awareness of different managerial skills varied by culture. It appears that in low power distance (PD) cultures such as the United States and United Kingdom, self‐awareness of interactive skills may be crucial relative to effectiveness whereas in high PD cultures, such as Malaysia self‐awareness of controlling skills may be crucial relative to effectiveness. These findings are discussed along with the implications for future research.
States that traditional information security models address only the micro view of how to maintain a secure environment by controlling the flows of information within…
Abstract
States that traditional information security models address only the micro view of how to maintain a secure environment by controlling the flows of information within protection systems and the access to controlled data items. Argues that these models do not aim to, and cannot, reflect the information security level of an organization. Describes an information security model using a hypertext approach. The model aims to prepare a macro view of the current information security situation in order to provide an overview of the information security risk to a wider audience in an organization. An administrative information system has been analysed to demonstrate the hypertext information security model.
Details
Keywords
Presents a policy considered necessary to prevent breaches of security when software is moved from development to production. Contends that although information is a…
Abstract
Presents a policy considered necessary to prevent breaches of security when software is moved from development to production. Contends that although information is a valuable, global commodity it is often unprotected. Presents suggestions to prevent encryption code from being broken. Gives guidelines for the security of encryption keys. Looks at the costs and benefits of encryption, packet encryption and the Internet. Discusses US policy, the US Computer Security Act and the US government proposals for information security
Details
Keywords
Zeynep Bilgin-Wührer and Gerhard A. Wührer
Understanding the customer has been the focus of attention of businesses and academia for many decades. Starting in 1960s, complex buyer behavior models developed by…
Abstract
Understanding the customer has been the focus of attention of businesses and academia for many decades. Starting in 1960s, complex buyer behavior models developed by Nicosia, by Howard and Sheth (1969), were followed by Engel, Blackwell and Miniard in 1978 (Engel, Blackwell, & Miniard, 1990) to understand the buying process, shaping the thoughts today about consumers’ experiences in an omnichannel world. Interest in customer perceptions and expectations (Parasuraman, Berry, & Zeithaml, 1991), SERVQUAL (Parasuraman, Zeithaml, & Leonard, 1985) and SERVPERV (Cronin & Taylor, 1994) moved the academia to discuss the relationship marketing (Morgan & Hunt, 1994; Parvatiyar & Sheth, 1999; Peterson, 1995; Sheth & Parvatiyar, 1995). Wilson’s model (1995) of buyer–seller relationships extended the former models with additional concepts like social bonds, comparison level of alternatives, power roles, technology, structural bonds and cooperation as influencers on relationship development stages. His emphasis reflects a high relevancy in the omnichannel world of customers’ interactions today. Winer (2001), a pioneer to discuss the customer relationship management focused on a database to know about customers’ purchase history and interests. The millennium look at customer lifetime value is again relationship focused. For Fader, Hardie, and Lee (2005) rather the long-term focus of the consumer value and actions are important to understand the loyalty and nonlinear nature of relations. While Reinartz and Kumar (2003) focused on profitable customer lifetime and customer heterogeneity, Verhoef (2003) analyzed the impact of customers’ relationship perceptions and relationship marketing instruments on both customer retention and customer share development. The customer-centric thinking was first discussed by Grönroos (2006) within a new definition of marketing. The service dominant logic (Vargo & Lusch, 2008) resulted in the next highlight, the co-creation of value with customer involvement and customer advisory (Güngör, 2012; Güngör & Bilgin, 2011; Messner, 2007) empowering the customers and giving them the control over the supplier networks. Different factors will be influential at different stages of the buying process of customer clusters. The Web- and non-Web-based customer-centric measures can be multifold. Andersson, Movin, Mähring, Teigland, and Wennberg (2018) and Bank (2018) emphasize the importance of technology readiness focus throughout the customer–supplier journey. The question to be answered is, to which extent the empowered customers and the suppliers of this age are ready to adopt, embrace and finally use new technologies in the omnichannel world of holistic interactions that form new visions, expectations, values and desires in a tremendous speed. Ideas and experiences are shared and exchanged in online communities without the need of the involvement of the suppliers. This “holistic view” challenges firms further through the seamlessness it requires to create unity. Customer-centric research needs a new push for the development of instruments and measures to cope with the consumer decision process challenges. Process thinking is needed to capture the purchasing habits in an omnichannel world and to build a new thought for customer journey experience with the aim to understand technology-linked value propositions of customer clusters to optimize channel interactions. Customer journeys have to focus and describe the online/offline experiences at the hybrid shopping mile, trace the behavioral influential factors of the customers’ and sellers’ world in a technological environment. This chapter will discuss “Technology based Orbit Interactions” for “The Hybrid Shopping Mile and its Customer Journey Mapping” with a “Customer Intelligence Framework.” The outcome of the hybrid customer journey mapping gives orientation for customer-management decisions in developing new approaches.
Details