Search results
1 – 10 of over 10000A survey of current work on database systems is presented. The area is divided into three main sectors: data models, data languages and support for database operations. Data…
Abstract
A survey of current work on database systems is presented. The area is divided into three main sectors: data models, data languages and support for database operations. Data models are presented as the link between the database and the real world. Languages range from formal algebraic languages to attempts to use a dialogue in English to formulate queries. The support includes hardware for content addressing, database machines and software techniques for optimizing and evaluating group expressions. Mathematical models are used to organize this support. Throughout there is a tutorial component and evaluation, which in both cases is related to the application of database ideas to documentation.
Abstract
Details
Keywords
Alira Srdoc, Alojzij Sluga and Ivan Bratko
According to many authors, differences in firm performances are increasingly attributed to tacit knowledge that cannot easily be transmitted or imitated. On the other hand…
Abstract
Purpose
According to many authors, differences in firm performances are increasingly attributed to tacit knowledge that cannot easily be transmitted or imitated. On the other hand, current quality management models knowledge typically relates only to people. Situations, in which knowledge that is related to people is not available, sufficient, reliable or lucrative for application, are not considered. This paper aims to investigate how to overcome this gap.
Design/methodology/approach
Based on the adopted classification, types of knowledge typically present in an organisation are identified, and are discussed. Techniques for acquiring and formalising tacit knowledge are explored, and related criteria are defined. Particular attention is shown to knowledge management and artificial intelligence techniques.
Findings
A new approach to quality management called deep quality concept (DQC) is conceptualised, and mechanisms and concepts needed to acquire and integrate formalised knowledge into quality systems are identified. Other concepts that need to be incorporated are also identified. Finally, a new quality management model based on the DQC is developed.
Research limitations/implications
In further research the main points of the presented theoretical framework need to be validated through real examples from practice, and the resulting quality standard, i.e. award criteria, as well as the related handbooks completed and formalised.
Practical implications
Knowledge‐related and other relevant concepts need to be incorporated into contemporary quality management systems, as systematically and carefully as conventional quality management concepts. Knowledge of methods and tools suitable for that also needs to be assimilated.
Originality/value
In the paper a novel knowledge‐focused approach to quality management is presented. For this reason the paper is of great value for quality management theory and practice.
Details
Keywords
When library systems are managed as a continuing process rather than as discrete projects, they are managed by the same people who guide other library activities and not by…
Abstract
When library systems are managed as a continuing process rather than as discrete projects, they are managed by the same people who guide other library activities and not by specialists. The ongoing management of automation should reflect the style and philosophy of the library. The management issues associated with hardware, software, databases, staff, and the institutional environment are discussed.
Blockchains, also known as “distributed ledger technologies” (DLT) are perhaps the emerging innovation that, in the years leading up to and including 2019, is raising the highest…
Abstract
Blockchains, also known as “distributed ledger technologies” (DLT) are perhaps the emerging innovation that, in the years leading up to and including 2019, is raising the highest expectations for HRM in the 4.0 business environment. In essence, a blockchain is a very specific type of database, with characteristics that made it the ideal application for cryptocurrencies like Bitcoin. Within the context of digital- or e-HRM, there is potential to improve human resource management (HRM) processes using blockchains for employment screening, credential and educational verification, worker contracts and payments, among others, notwithstanding questions about its efficiency vis-à-vis conventional alternatives (Maurer, 2018; Zielinski, 2018). The research questions examined in this chapter include the following: What are the main characteristics of blockchains? Will they be adopted in a widespread form, specifically by HRM departments? Constructs from Diffusion of Innovations (DOI) theory (Rogers, 2003) are used to inform the Human Resources scholarly and practitioner communities; this robust theory may help companies allocate resources (e.g., budgets, personnel, managerial time, etc.) in an evidence-informed manner. As of this writing, very few blockchain applications, such as credential verification and incident reporting, seem to hold a strong potential for adoption.
Details
Keywords
Daisy Mathur Jain and Reema Khurana
The purpose of this paper is to study sustainability of the global business model of software outsourcing with perspective of Indian vendors.
Abstract
Purpose
The purpose of this paper is to study sustainability of the global business model of software outsourcing with perspective of Indian vendors.
Design/methodology/approach
In order to obtain results as per the stated purpose, the authors have done an extensive literature review search in the e‐journals databases: ABI/INFORM Complete, EBSCO Business Source Complete, Emerald Management Xtra and Science Direct. Over and above these databases and journals, NASSCOM reports, survey and some books were also referred for literature review. Finally 59 references listed at the end of the paper were used for the stated purpose.
Findings
The paper studies trends in software industry and outsourcing models, which Indian vendors are offering to their global clients. Each model is evaluated analytically for its advantages and shortcomings subsequently the paper concludes by stating the need for a sustainable global business model in software outsourcing from Indian perspective.
Research limitations/implications
The paper studies business of software at a global level and subsequently narrows its focus on the models being provided by the Indian vendors. It identifies need for a sustainable model to be used by the Indian vendors; the limitation of the paper is it concludes with the need identification and is from an Indian vendor perspective. The needs identified can be further used as a basis for hypothesis formulation, questionnaire design, data survey and analysis so that blue print of the proposed model can finally emerge, also the study can be expanded to include global vendors.
Practical implications
The following paper analytically studies current trends in global business of software sourcing, and identifies pros and cons of the models adopted by Indian vendors. It identifies the need for a sustainable global business model for software outsourcing; in case the need is fulfilled it will definitely add value to India as a software sourcing destination and lead to more revenue generation which will eventually culminate into a large‐scale and long term economic and social impact. The study also has several research and public policy formulation implications.
Originality/value
The paper is completely original work of the authors where the value addition is clearly seen by studying the advantages and shortcomings of the existing models of software outsourcing adopted by Indian vendors and identifying the need for sustainability therein.
Details
Keywords
Shuchih Ernest Chang and Chin‐Shien Lin
This paper aims to examine the influence of organization culture on the effectiveness of implementing information security management (ISM).
Abstract
Purpose
This paper aims to examine the influence of organization culture on the effectiveness of implementing information security management (ISM).
Design/methodology/approach
Based on a literature review, a model of the relationship between organizational culture and ISM was formulated, and both organizational culture characteristics and ISM effectiveness were measured empirically to investigate how various organizational culture traits influenced ISM principles, by administrating questionnaires to respondents in organizations with significant use of information systems.
Findings
Four regression models were derived to quantify the impacts of organizational culture traits on the effectiveness of implementing ISM. Whilst the control‐oriented organizational culture traits, effectiveness and consistency, have strong effect on the ISM principles of confidentiality, integrity, availability and accountability, the flexibility‐oriented organizational culture traits, cooperativeness and innovativeness, are not significantly associated with the ISM principles with one exception that cooperativeness is negatively related to confidentiality.
Research limitations/implications
The sample is limited to the organizational factors in Taiwan. It is suggested to replicate this study in other countries to reconfirm the result before adopting its general implications. Owing to the highly intrusive nature of ISM surveys, a cautious approach with rapport and trust is a key success factor in conducting empirical studies on ISM.
Practical implications
A culture conducive to information security practice is extremely important for organizations since the human dimension of information security cannot totally be solved by technical and management measures. For understanding and improving the organization behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM.
Originality/value
A research model was proposed to study the impacts of organizational factors on ISM, after a broad survey on related researches. The validated model and its corresponding study results can be referenced by enterprise managers and decision makers to make favorable tactics for achieving their goals of ISM – mitigating information security risks.
Details
Keywords
Héctor Rubén Morales, Marcela Porporato and Nicolas Epelbaum
The technical feasibility of using Benford's law to assist internal auditors in reviewing the integrity of high-volume data sets is analysed. This study explores whether Benford's…
Abstract
Purpose
The technical feasibility of using Benford's law to assist internal auditors in reviewing the integrity of high-volume data sets is analysed. This study explores whether Benford's distribution applies to the set of numbers represented by the quantity of records (size) that comprise the different tables that make up a state-owned enterprise's (SOE) enterprise resource planning (ERP) relational database. The use of Benford's law streamlines the search for possible abnormalities within the ERP system's data set, increasing the ability of the internal audit functions (IAFs) to detect anomalies within the database. In the SOEs of emerging economies, where groups compete for power and resources, internal auditors are better off employing analytical tests to discharge their duties without getting involved in power struggles.
Design/methodology/approach
Records of eight databases of an SOE in Argentina are used to analyse the number of records of each table in periods of three to 12 years. The case develops step-by-step Benford's law application to test each ERP module records using Chi-squared (χ²) and mean absolute deviation (MAD) goodness-of-fit tests.
Findings
Benford's law is an adequate tool for performing integrity tests of high-volume databases. A minimum of 350 tables within each database are required for the MAD test to be effective; this threshold is higher than the 67 reported by earlier researches. Robust results are obtained for the complete ERP system and for large modules; modules with less than 350 tables show low conformity with Benford's law.
Research limitations/implications
This study is not about detecting fraud; it aims to help internal auditors red flag databases that will need further attention, making the most out of available limited resources in SOEs. The contribution is a simple, cheap and useful quantitative tool that can be employed by internal auditors in emerging economies to perform the first scan of the data contained in relational databases.
Practical implications
This paper provides a tool to test whether large amounts of data behave as expected, and if not, they can be pinpointed for future investigation. It offers tests and explanations on the tool's application so that internal auditors of SOEs in emerging economies can use it, particularly those that face divergent expectations from antagonist powerful interest groups.
Originality/value
This study demonstrates that even in the context of limited information technology tools available for internal auditors, there are simple and inexpensive tests to review the integrity of high-volume databases. It also extends the literature on high-volume database integrity tests and our knowledge of the IAF in Civil law countries, particularly emerging economies in Latin America.
Details
Keywords