Search results
21 – 30 of 64Abstract
Details
Keywords
The aim of this chapter is to investigate the meaning of terrorism, with a view to highlighting the main hurdles in the way of creating a working definition, as well as…
Abstract
Purpose
The aim of this chapter is to investigate the meaning of terrorism, with a view to highlighting the main hurdles in the way of creating a working definition, as well as the necessity of developing definitions and classifications of this phenomenon.
Design methodology/approach
This chapter provides an overview of the literature on terrorism as a social/political phenomenon. It is therefore based on secondary sources.
Findings
While most literature on the topic finds it pointless or impossible to define terrorism, here we argue just the opposite. Common critiques of current definitions may be overcome by using multiple definitions and classifications.
Research limitations/implications
The chapter provides the methodological foundations for a comprehensive theoretical analysis of terrorism.
Originality/value of the chapter
The chapter applies insights from methodology of social sciences to the problem of defining terrorism.
Details
Keywords
Jane Andrew, Max Baker, James Guthrie and Ann Martin-Sardesai
This paper explores how neoliberalism restrains the ability of governments to respond to crises through budgetary action. It examines the immediate budgetary responses to…
Abstract
Purpose
This paper explores how neoliberalism restrains the ability of governments to respond to crises through budgetary action. It examines the immediate budgetary responses to the COVID-19 pandemic by the Australian government and explores how the conditions created by prior neoliberal policies have limited these responses.
Design/methodology/approach
A review and examination of the prior literature on public budgeting and new public management are provided. The idea of a “neoliberal straitjacket” is used to frame the current budgetary and economic situation in Australia.
Findings
The paper examines the chronology of Australia's budgetary responses to the economic and health crisis created by COVID-19. These responses have taken the form of tax breaks and a temporary payment scheme for individuals made unemployed by the pandemic.
Practical implications
The insights gained from this paper may help with future policy developments and promote future research on similar crises.
Originality/value
The analysis of Australia's policies in dealing with the pandemic may offer insights for other countries struggling to cope with the fiscal consequences of COVID-19.
Details
Keywords
Cornelis van Dorsser and Poonam Taneja
The paper aims to present an integrated foresight framework and method to support decision-makers who are confronted with today’s complex and rapidly changing world. The…
Abstract
Purpose
The paper aims to present an integrated foresight framework and method to support decision-makers who are confronted with today’s complex and rapidly changing world. The method aims at reducing the degree of uncertainty by addressing the inertia or duration of unfolding trends and by placing individual trends in a broader context.
Design/methodology/approach
The paper presents a three-layered framework and method for assessing megatrends based on their inertia or duration. It suggests that if long-term trends and key future uncertainties are studied in conjunction at a meta-level and placed in a broader multi-layered framework of trends, it can result in new insights.
Findings
The application of the proposed foresight method helps to systematically place a wide range of unrelated trends and key uncertainties in the context of a broader framework of trends, thereby improving the ability to understand the inertia, direction and mutual interaction of these trends.
Research limitations/implications
The elaboration of identified trends and key uncertainties is partly case-specific and subject to interpretation. It is aimed at illustrating the potential use of the framework.
Practical implications
The paper presents a new approach that may, by itself or in combination with existing foresight methods, offer new means for anticipating future developments.
Social implications
The use of the proposed framework has potential to provide better insight in the complexity of today’s rapid-changing world and the major transitions taking place. It aims to result in sharper foresight by reducing epistemic uncertainty for decision-makers.
Originality/value
The paper demonstrates how megatrends, Kondratieff waves and century-long trends can be placed in an integrated framework and analysed in conjunction.
Details
Keywords
Salvatore Ammirato, Francesco Sofo, Alberto Michele Felicetti and Cinzia Raso
Most recent developments in the Internet of Things (IoT) technologies can boost the efficacy of business process management (BPM) to improve process performance. The…
Abstract
Purpose
Most recent developments in the Internet of Things (IoT) technologies can boost the efficacy of business process management (BPM) to improve process performance. The purpose of this paper is to describe a method for redesigning bank branch (BB) protection systems contributing to make BBs “smarter.”
Design/methodology/approach
Based upon a multiple case study approach, the paper deployed a four-step business process reengineering design from an information system development perspective. To overcome limitations of information scarcity required for modeling activities, a multimethod approach to data gathering and results validation was adopted. The approach was based on a comprehensive literature review and an in-depth qualitative survey involving a sample of six security managers of primary Italian banking groups.
Findings
The intelligent protection system resulting from the application of the methodology to the Italian BB sector was able to improve the security management process. Lead time and actors’ workload were reduced; running costs decreased; quality of information improved as well as the overall effectiveness of the protection system against criminal attacks.
Originality/value
The specific IoT technologies proposed are new. Additionally, to date, their application to BB security management has not been analyzed in the BPM literature. The value resides in the highly applicable results of the methodology to the BB network of a banking group both inside and outside of Italy.
Details
Keywords
Jeffrey Nowacki and Dale Willits
The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.
Abstract
Purpose
The purpose of this paper is to use Maguire’s (2003) theory of police organizations to explain whether police agencies dedicate specific personnel to cybercrime response.
Design/methodology/approach
Data from this study come from the 2013 Law Enforcement Management and Statistics survey. Maguire’s (2003) theory of the organizational structure of police organizations is used to measure organizational variables related to context, complexity and control. Logistic regression is used to examine whether these organizational characteristics are related to cybercrime response.
Findings
The results suggest that organizational context, complexity and control are related to cybercrime response. Specifically, in terms of context, larger agencies, agencies whose officers engage in more non-routine tasks, and agencies governed by an active collective bargaining agreement are more likely to dedicate specific resources to cybercrime. In terms of complexity, agencies with more hierarchical layers, agencies that utilize more specialization and agencies that make greater use of civilian employees are more likely to dedicate specific personnel to cybercrime. Finally, regarding control, agencies that assign non-sworn personnel to administrative tasks are more likely to dedicate resources to cybercrime response.
Originality/value
This study is one of the first to use this framework to examine the relationship between organizational characteristics and cybercrime response. It shows that this perspective can be useful for understanding police organizations and police policies, programs and strategies.
Details
Keywords
Sheshadri Chatterjee, Arpan Kumar Kar, Yogesh K. Dwivedi and Hatice Kizgin
The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.
Abstract
Purpose
The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.
Design/methodology/approach
A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares.
Findings
The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities.
Research limitations/implications
The conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes.
Practical implications
This study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes.
Originality/value
There are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.
Details
Keywords
Marc Bogdanowicz and Joe Leyten
Information and communications technologies are encroaching on every sphere of modern life. New modes of networking and cross‐referencing are revolutionizing our…
Abstract
Information and communications technologies are encroaching on every sphere of modern life. New modes of networking and cross‐referencing are revolutionizing our management of data and thus the concept of knowledge itself. Now the advent of embedded technology and artificial intelligence promise to re‐open the debate about whether we are becoming masters of technology or its slaves. Co‐ordinating public policy with product‐oriented R&D has never been more important, for either the economic or cultural future of Europe.
Details
Keywords
The purpose of this paper is to explore the differences and similarities between computer ethics, internet ethics and cyberethics as reflected in the contents of the…
Abstract
Purpose
The purpose of this paper is to explore the differences and similarities between computer ethics, internet ethics and cyberethics as reflected in the contents of the published literature as well as the search trends on Google.
Design/methodology/approach
The paper opted for an informetrics approach, and more specifically content analysis, to investigate the inter-relationships between computer ethics, internet ethics and cyberethics. The data sources for this study included Google Trends, Google Scholar and the Web of Science citation indexes. Different search queries were used, depending on the structure of each data source, to extract the relevant data sets.
Findings
Using different methods and techniques to analyse the data, the paper provides an alternative means of investigating relationships among concepts. The findings indicate that there is still no clear distinction between the concepts in terms of subject and title terms used to describe the published literature on the three concepts, as well as the research areas where the three concepts are applied. Going by the current trend, the paper envisages that cyberethics may, in the future, become a broader term to include computer ethics and internet ethics.
Research limitations/implications
The data sources that were selected for the study might have not been comprehensive in the coverage of the published literature on the three concepts and therefore there is need for further research, which will expand the scope of the data sources.
Practical implications
The paper’s findings may apply in the practice of indexing and abstracting as well as thesaurus construction as far as the three terms are concerned.
Originality/value
The paper offers an alternative technique that can be used to investigate relationships among concepts. The value of the paper could include curriculum development of programmes dealing with ethical issues that arise when developing and using computers and related technologies.
Details