Search results

1 – 10 of 133
Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Open Access
Article
Publication date: 2 January 2024

Ewald Aschauer and Reiner Quick

This study aims to investigate why and how shared service centres (SSCs) are implemented as well as how they affect audit firm practice and audit quality.

1689

Abstract

Purpose

This study aims to investigate why and how shared service centres (SSCs) are implemented as well as how they affect audit firm practice and audit quality.

Design/methodology/approach

In this qualitative study guided by the theoretical framework of institutional theory, the authors conducted 25 semi-structured interviews in seven European countries, including 16 interviews with audit partners from Big 4 firms, 6 with audit team members, 2 with interviewees from second-tier audit firms and 1 with a member of an oversight body.

Findings

The authors show that the central rationale for audit firms to implement SSCs is economic rather than external legitimacy. The authors find that SSC implementation has substantial effects on audit practices, particularly those related to standardisation, coordination and monitoring activities. The authors also highlight the potential impacts on audit quality.

Originality/value

By exploring the motivation for and effects of SSC implementation amongst audit firms, the authors offer insights into the best practices related to subsequent change processes and audit quality.

Details

Accounting, Auditing & Accountability Journal, vol. 37 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Open Access
Article
Publication date: 26 March 2024

Thembekile Debora Sepeng, Ann Lourens, Karl Van der Merwe and Robert Gerber

The purpose of this paper is to show that third-party quality audits (TPQAs) facilitate performance improvement and give confidence to organisations concerning the process quality…

Abstract

Purpose

The purpose of this paper is to show that third-party quality audits (TPQAs) facilitate performance improvement and give confidence to organisations concerning the process quality of services and products. However, because of inconsistencies and unethical practices often observed in the industry, organisations question the significance of TPQA. A perception exists that its initial purpose as an impartial tool ensuring quality of deliverables is no longer upheld. Hence, the need to determine and explain the influence of the ISO 19011 standard interpretation on the application of the audit guidelines in performing TPQA, to promote consistency in the audit process.

Design/methodology/approach

The study employed document analysis of the ISO 19011 standard, followed by semi-structured interviews with certification managers (CBs) to gain insight related to their interpretation and application of the ISO 19011 guidelines.

Findings

The CBs interpret the ISO 19011 guidelines differently; hence, their application of the standard to compile their audit documents differ. Adherence to the principles of auditing particularly, integrity and independence were found as the core of the audit process while their disregard reflects failure of the real intent of auditing. The inconsistencies in the audit procedures and documents developed for auditors are ascribed to some CBs’ personal interpretations.

Originality/value

The study explores how the different interpretations of the ISO 19011 standard prevail and are perceived by the CBs and auditors. The findings aim to support standardisation and reduce the variations across and amongst the different CBs and auditors.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Open Access
Article
Publication date: 19 February 2024

Mamekwa Katlego Kekana, Marius Pretorius and Nicole Varela Aguiar De Abreu

Business rescue, as a mechanism to aid financially distressed companies in South Africa, has received considerable academic and practical recognition. However, the business rescue…

Abstract

Purpose

Business rescue, as a mechanism to aid financially distressed companies in South Africa, has received considerable academic and practical recognition. However, the business rescue plan is an overlooked and, perhaps, underdeveloped aspect of the regime. For stakeholders, this is the ultimate decision-making document. Creditors are the most influential stakeholders in business rescue proceedings owing to their voting rights. For creditors to make informed decisions and exercise their votes meaningfully, the business rescue plan should be transparent and adequately disclose relevant and reliable information. This study aims to identify creditors’ primary information needs to enhance the sufficiency and decision-usefulness of business rescue plans, not only to entice the vote of creditors but to enforce accountability from practitioners.

Design/methodology/approach

Using a qualitative research design, semi-structured interviews were conducted with 14 executives from 10 South African financial institutions.

Findings

The findings reveal that comprehensive disclosure of financial, commercial and legal information in business rescue plans was a critical antecedent for stakeholder decision-making. Additionally, leadership and social impact information were influential determinants. This study advances academic knowledge and, for practitioners, adds value to the development of business rescue plans. This can enhance creditors' confidence in supporting the rescue effort and approving the plan.

Practical implications

This study advances academic knowledge and, for practitioners, adds value to the development of business rescue plans. This can enhance creditors' confidence in supporting the rescue effort and approving the plan.

Originality/value

The originality of this article lies in its investigation of how creditors assess the information in BR plans as a precursor to supporting the company’s reorganisation in a creditor-friendly business rescue system such as South Africa. This study provides novel insights into the decision-making process, particularly how creditors assess BR plans, address information asymmetry and vote on the plan.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Open Access
Article
Publication date: 25 April 2022

Vuyokazi Precious Camngca, Christopher Amoah and Emma Ayesu-Koranteng

The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of…

2164

Abstract

Purpose

The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of information technology in project implementation has been increasing in the construction sector (CS) lately. However, the same cannot be seen in public sectors responsible for implementing government projects in South Africa. This study aimed to investigate the causes and effects of the underutilisation of information communication technology (ICT) in the building section of a public sector in a municipality in South Africa.

Design/methodology/approach

A qualitative approach was adopted for the study, using a public sector in one of the municipalities as a case study. Face-to-face interviews were conducted among the building unit workers, using unstructured interview questions. The data collected were analysed using the ATLAS.ti software.

Findings

The findings indicate a lack of understanding of existing and newly available ICT software and hardware technology among staff within the building technology due to lack of digitalisation in construction projects implementation, inadequate system upgrades, lack of adequate ICT resources, lack of financial resources for internet and software application subscriptions and lack of ICT training leading. The issues mentioned above have led to the outsourcing of projects professionals, slow pace of electronic emails, untrained professionals, usage of different and unlicensed software, resulting in the underutilisation of ICT within the whole building section. This change also adversely affects all officials, especially the junior officials who have graduated using the most recent ICT technology during their studies.

Research limitations/implications

The building department of only one public sector was used for the study; therefore, the findings may not be generalisable. The case study public sector’s name is withheld for confidentiality purposes.

Practical implications

Adequate change management and continuous development, combined with the allocation of proper resources, would be necessary for all staff members. Enormous investments had to be made in the ICT equipment by providing a sufficient budget in the building section of the public sectors. The building section within public sectors should provide change management to all aged skills staff by attending seminars to learn new ICT technology applied within its work environment.

Originality/value

The study established the causes of the underutilisation of ICT in the CS, especially in the public work departments and municipalities, and how this contributes to service delivery.

Details

Journal of Facilities Management , vol. 22 no. 1
Type: Research Article
ISSN: 1472-5967

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7142

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 28 February 2024

Andrea Caccialanza

The deeper understanding of the disclosure of external and internal dynamics of family firms necessarily places the issue of sustainability as one of the most pressing needs from…

Abstract

Purpose

The deeper understanding of the disclosure of external and internal dynamics of family firms necessarily places the issue of sustainability as one of the most pressing needs from both a research and managerial perspective. Therefore, this perspective article contributes to the debate of sustainability performance disclosure in family firms, proposing a research agenda.

Design/methodology/approach

This study has organized the discussion around those elements that most significantly impact the propensity to disclose, with a specific focus on the interconnections and interrelations within them. The proposed research agenda is developed around three key elements: “how” firms disclose, “the reason why” they do it and “what” disclose of their performance(s).

Findings

To better understand “how” family firms should disclose their performance, it is suggested to engage in proactive stakeholder engagement to preserve long-term socioemotional wealth. “The reason why” for disclosure is still associated with the legitimization of family firms from an economic, social and environmental point of view. Finally, the “what” depends on several factors, such as the regulatory framework and the market involved.

Practical implications

This paper contains suggestions for family firm managers, consultants and policymakers that are approaching corporate social responsibility (CSR) and non-financial reporting or sustainability disclosure overall, providing an overview of relevant factors influencing this transition process.

Originality/value

This paper suggests a logical framework to combine these three elements of the debate as strictly interrelated to foster the sustainability performance disclosure of family firms.

Details

Journal of Family Business Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2043-6238

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1052

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 24 April 2024

Zeeshan Hamid and Yasir Mansoor Kundi

This paper aims to explore the mechanisms by which employees’ happiness at work (HAW) can be promoted. Drawing on the social exchange theory (SET), this study examined the…

Abstract

Purpose

This paper aims to explore the mechanisms by which employees’ happiness at work (HAW) can be promoted. Drawing on the social exchange theory (SET), this study examined the relationships among discretionary human resource (HR) practices, perceived organizational support (POS), meaning of work (MOW) and HAW.

Design/methodology/approach

A three-path mediation model was developed to test the proposed relationships. The data were collected from Pakistani business professionals (n = 361), and hypotheses were tested using the PROCESS macro for SPSS .

Findings

The results suggest that POS mediates the relationship between discretionary HR practices and HAW. Also, MOW mediated the relationship between discretionary HR practices and HAW. Hence, both POS and MOW were found to be independent mediators. Further, the data provided support for the serial mediation of POS and MOW in the relationship between discretionary HR practices and HAW.

Practical implications

This research provides insights to organizations and their management on how discretionary HR practices can enhance employees’ POS, MOW and HAW.

Originality/value

The findings show that discretionary HR practices are associated with employees’ HAW. In addition, two mediators (POS and MOW) were found to serially mediate the aforesaid relationships. These findings are novel, as no prior research has used this nascent methodological approach to deepen our understanding by examining the associations between discretionary HR practices, POS, MOW and employees’ HAW.

Details

Evidence-based HRM: a Global Forum for Empirical Scholarship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-3983

Keywords

Access

Only Open Access

Year

Last 3 months (133)

Content type

1 – 10 of 133