Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

21 – 30 of 64
To view the access options for this content please click here
Article
Publication date: 6 February 2009

Information Technology in Theory

Stuart Hannabuss

HTML

Abstract

Details

Library Review, vol. 58 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/00242530910928942
ISSN: 0024-2535

Keywords

  • Information technology
  • Communication technologies
  • Information theory
  • Telecommunications
  • Telephony
  • Information society

To view the access options for this content please click here
Book part
Publication date: 21 June 2014

What is terrorism? Concepts, definitions and classifications

Andrea Locatelli

The aim of this chapter is to investigate the meaning of terrorism, with a view to highlighting the main hurdles in the way of creating a working definition, as well as…

HTML
PDF (216 KB)
EPUB (330 KB)

Abstract

Purpose

The aim of this chapter is to investigate the meaning of terrorism, with a view to highlighting the main hurdles in the way of creating a working definition, as well as the necessity of developing definitions and classifications of this phenomenon.

Design methodology/approach

This chapter provides an overview of the literature on terrorism as a social/political phenomenon. It is therefore based on secondary sources.

Findings

While most literature on the topic finds it pointless or impossible to define terrorism, here we argue just the opposite. Common critiques of current definitions may be overcome by using multiple definitions and classifications.

Research limitations/implications

The chapter provides the methodological foundations for a comprehensive theoretical analysis of terrorism.

Originality/value of the chapter

The chapter applies insights from methodology of social sciences to the problem of defining terrorism.

Details

Understanding Terrorism
Type: Book
DOI: https://doi.org/10.1108/S1572-8323(2014)0000022001
ISBN: 978-1-78350-828-0

Keywords

  • Terrorism
  • terrorists
  • concept definition
  • types of terrorism

To view the access options for this content please click here
Article
Publication date: 20 August 2020

Australia's COVID-19 public budgeting response: the straitjacket of neoliberalism

Jane Andrew, Max Baker, James Guthrie and Ann Martin-Sardesai

This paper explores how neoliberalism restrains the ability of governments to respond to crises through budgetary action. It examines the immediate budgetary responses to…

HTML
PDF (141 KB)

Abstract

Purpose

This paper explores how neoliberalism restrains the ability of governments to respond to crises through budgetary action. It examines the immediate budgetary responses to the COVID-19 pandemic by the Australian government and explores how the conditions created by prior neoliberal policies have limited these responses.

Design/methodology/approach

A review and examination of the prior literature on public budgeting and new public management are provided. The idea of a “neoliberal straitjacket” is used to frame the current budgetary and economic situation in Australia.

Findings

The paper examines the chronology of Australia's budgetary responses to the economic and health crisis created by COVID-19. These responses have taken the form of tax breaks and a temporary payment scheme for individuals made unemployed by the pandemic.

Practical implications

The insights gained from this paper may help with future policy developments and promote future research on similar crises.

Originality/value

The analysis of Australia's policies in dealing with the pandemic may offer insights for other countries struggling to cope with the fiscal consequences of COVID-19.

Details

Journal of Public Budgeting, Accounting & Financial Management, vol. 32 no. 5
Type: Research Article
DOI: https://doi.org/10.1108/JPBAFM-07-2020-0096
ISSN: 1096-3367

Keywords

  • Public budgets
  • COVID-19
  • Pandemic
  • Australia government
  • Neoliberalism
  • Fiscal

To view the access options for this content please click here
Book part
Publication date: 1 November 2019

Opening the Black Box of Digital Activism in Education in the Neoliberal Age: Lived Experience and Patterns of Use of Social Media

Izhak Berkovich and Amit Avigur-Eshel

HTML
PDF (600 KB)
EPUB (554 KB)

Abstract

Details

Digital Protest and Activism in Public Education: Reactions to Neoliberal Restructuring in Israel
Type: Book
DOI: https://doi.org/10.1108/978-1-83867-102-020191009
ISBN: 978-1-83867-105-1

Content available
Article
Publication date: 9 March 2020

An integrated three-layered foresight framework

Cornelis van Dorsser and Poonam Taneja

The paper aims to present an integrated foresight framework and method to support decision-makers who are confronted with today’s complex and rapidly changing world. The…

Open Access
HTML
PDF (667 KB)

Abstract

Purpose

The paper aims to present an integrated foresight framework and method to support decision-makers who are confronted with today’s complex and rapidly changing world. The method aims at reducing the degree of uncertainty by addressing the inertia or duration of unfolding trends and by placing individual trends in a broader context.

Design/methodology/approach

The paper presents a three-layered framework and method for assessing megatrends based on their inertia or duration. It suggests that if long-term trends and key future uncertainties are studied in conjunction at a meta-level and placed in a broader multi-layered framework of trends, it can result in new insights.

Findings

The application of the proposed foresight method helps to systematically place a wide range of unrelated trends and key uncertainties in the context of a broader framework of trends, thereby improving the ability to understand the inertia, direction and mutual interaction of these trends.

Research limitations/implications

The elaboration of identified trends and key uncertainties is partly case-specific and subject to interpretation. It is aimed at illustrating the potential use of the framework.

Practical implications

The paper presents a new approach that may, by itself or in combination with existing foresight methods, offer new means for anticipating future developments.

Social implications

The use of the proposed framework has potential to provide better insight in the complexity of today’s rapid-changing world and the major transitions taking place. It aims to result in sharper foresight by reducing epistemic uncertainty for decision-makers.

Originality/value

The paper demonstrates how megatrends, Kondratieff waves and century-long trends can be placed in an integrated framework and analysed in conjunction.

Details

foresight, vol. 22 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/FS-05-2019-0039
ISSN: 1463-6689

Keywords

  • Uncertainty
  • Foresight
  • Decision-making
  • Kondratieff
  • Megatrends

To view the access options for this content please click here
Article
Publication date: 14 October 2019

The potential of IoT in redesigning the bank branch protection system: An Italian case study

Salvatore Ammirato, Francesco Sofo, Alberto Michele Felicetti and Cinzia Raso

Most recent developments in the Internet of Things (IoT) technologies can boost the efficacy of business process management (BPM) to improve process performance. The…

HTML
PDF (482 KB)

Abstract

Purpose

Most recent developments in the Internet of Things (IoT) technologies can boost the efficacy of business process management (BPM) to improve process performance. The purpose of this paper is to describe a method for redesigning bank branch (BB) protection systems contributing to make BBs “smarter.”

Design/methodology/approach

Based upon a multiple case study approach, the paper deployed a four-step business process reengineering design from an information system development perspective. To overcome limitations of information scarcity required for modeling activities, a multimethod approach to data gathering and results validation was adopted. The approach was based on a comprehensive literature review and an in-depth qualitative survey involving a sample of six security managers of primary Italian banking groups.

Findings

The intelligent protection system resulting from the application of the methodology to the Italian BB sector was able to improve the security management process. Lead time and actors’ workload were reduced; running costs decreased; quality of information improved as well as the overall effectiveness of the protection system against criminal attacks.

Originality/value

The specific IoT technologies proposed are new. Additionally, to date, their application to BB security management has not been analyzed in the BPM literature. The value resides in the highly applicable results of the methodology to the BB network of a banking group both inside and outside of Italy.

Details

Business Process Management Journal, vol. 25 no. 7
Type: Research Article
DOI: https://doi.org/10.1108/BPMJ-04-2018-0099
ISSN: 1463-7154

Keywords

  • Internet of Things
  • Risk management
  • Business process reengineering
  • Intelligent protection system
  • Cyber-physical system
  • Smart environment

To view the access options for this content please click here
Article
Publication date: 20 November 2019

An organizational approach to understanding police response to cybercrime

Jeffrey Nowacki and Dale Willits

The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.

HTML
PDF (208 KB)

Abstract

Purpose

The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.

Design/methodology/approach

Data from this study come from the 2013 Law Enforcement Management and Statistics survey. Maguire’s (2003) theory of the organizational structure of police organizations is used to measure organizational variables related to context, complexity and control. Logistic regression is used to examine whether these organizational characteristics are related to cybercrime response.

Findings

The results suggest that organizational context, complexity and control are related to cybercrime response. Specifically, in terms of context, larger agencies, agencies whose officers engage in more non-routine tasks, and agencies governed by an active collective bargaining agreement are more likely to dedicate specific resources to cybercrime. In terms of complexity, agencies with more hierarchical layers, agencies that utilize more specialization and agencies that make greater use of civilian employees are more likely to dedicate specific personnel to cybercrime. Finally, regarding control, agencies that assign non-sworn personnel to administrative tasks are more likely to dedicate resources to cybercrime response.

Originality/value

This study is one of the first to use this framework to examine the relationship between organizational characteristics and cybercrime response. It shows that this perspective can be useful for understanding police organizations and police policies, programs and strategies.

Details

Policing: An International Journal, vol. 43 no. 1
Type: Research Article
DOI: https://doi.org/10.1108/PIJPSM-07-2019-0117
ISSN: 1363-951X

Keywords

  • Cybercrime
  • Police organizations

To view the access options for this content please click here
Article
Publication date: 7 October 2019

Prevention of cybercrimes in smart cities of India: from a citizen’s perspective

Sheshadri Chatterjee, Arpan Kumar Kar, Yogesh K. Dwivedi and Hatice Kizgin

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

HTML
PDF (356 KB)

Abstract

Purpose

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

Design/methodology/approach

A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares.

Findings

The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities.

Research limitations/implications

The conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes.

Practical implications

This study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes.

Originality/value

There are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
DOI: https://doi.org/10.1108/ITP-05-2018-0251
ISSN: 0959-3845

Keywords

  • Smart city
  • Cyber security
  • Digital services
  • Cyber-infrastructure

To view the access options for this content please click here
Article
Publication date: 1 August 2001

Sympathy for the cyborg: research visions in the information socieity

Marc Bogdanowicz and Joe Leyten

Information and communications technologies are encroaching on every sphere of modern life. New modes of networking and cross‐referencing are revolutionizing our…

HTML
PDF (179 KB)

Abstract

Information and communications technologies are encroaching on every sphere of modern life. New modes of networking and cross‐referencing are revolutionizing our management of data and thus the concept of knowledge itself. Now the advent of embedded technology and artificial intelligence promise to re‐open the debate about whether we are becoming masters of technology or its slaves. Co‐ordinating public policy with product‐oriented R&D has never been more important, for either the economic or cultural future of Europe.

Details

Foresight, vol. 3 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/14636680110803274
ISSN: 1463-6689

Keywords

  • Information society
  • Research
  • Artificial intelligence

To view the access options for this content please click here
Article
Publication date: 21 September 2015

An informetrics view of the relationship between internet ethics, computer ethics and cyberethics

Omwoyo Bosire Onyancha

The purpose of this paper is to explore the differences and similarities between computer ethics, internet ethics and cyberethics as reflected in the contents of the…

HTML
PDF (775 KB)

Abstract

Purpose

The purpose of this paper is to explore the differences and similarities between computer ethics, internet ethics and cyberethics as reflected in the contents of the published literature as well as the search trends on Google.

Design/methodology/approach

The paper opted for an informetrics approach, and more specifically content analysis, to investigate the inter-relationships between computer ethics, internet ethics and cyberethics. The data sources for this study included Google Trends, Google Scholar and the Web of Science citation indexes. Different search queries were used, depending on the structure of each data source, to extract the relevant data sets.

Findings

Using different methods and techniques to analyse the data, the paper provides an alternative means of investigating relationships among concepts. The findings indicate that there is still no clear distinction between the concepts in terms of subject and title terms used to describe the published literature on the three concepts, as well as the research areas where the three concepts are applied. Going by the current trend, the paper envisages that cyberethics may, in the future, become a broader term to include computer ethics and internet ethics.

Research limitations/implications

The data sources that were selected for the study might have not been comprehensive in the coverage of the published literature on the three concepts and therefore there is need for further research, which will expand the scope of the data sources.

Practical implications

The paper’s findings may apply in the practice of indexing and abstracting as well as thesaurus construction as far as the three terms are concerned.

Originality/value

The paper offers an alternative technique that can be used to investigate relationships among concepts. The value of the paper could include curriculum development of programmes dealing with ethical issues that arise when developing and using computers and related technologies.

Details

Library Hi Tech, vol. 33 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/LHT-04-2015-0033
ISSN: 0737-8831

Keywords

  • Information retrieval
  • Internet
  • Ethics
  • Computers
  • Data mining

Access
Only content I have access to
Only Open Access
Year
  • Last 3 months (1)
  • Last 6 months (4)
  • Last 12 months (8)
  • All dates (64)
Content type
  • Article (52)
  • Book part (9)
  • Earlycite article (2)
  • Expert briefing (1)
21 – 30 of 64
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here