Search results

1 – 10 of 231
Article
Publication date: 1 March 1998

Mervyn D.J. Wilson, Anna E. Murray, Margaret A. Black and David A. McDowell

In recent times the importance of training and education have been recognised as important tools to foster economic growth within companies and industries in the global…

3635

Abstract

In recent times the importance of training and education have been recognised as important tools to foster economic growth within companies and industries in the global marketplace. Unfortunately the UK hospitality industry in general has been unwilling to train and develop its managers. This paper examines the contract catering sector of the hospitality industry in Northern Ireland. It commences by investigating the educational qualifications and training of managers within the contract catering sector and then proceeds to discuss the transference of hospitality skills and practices.

Details

Journal of European Industrial Training, vol. 22 no. 2
Type: Research Article
ISSN: 0309-0590

Keywords

Article
Publication date: 1 June 1997

Mervyn Wilson, Anna E. Murray, Margaret A. Black and David A. McDowell

The Food Safety (General Food Hygiene) Regulations 1995 stipulate the need for the control of food hazards. One such measure which satisfies this requirement is the use of hazard…

2702

Abstract

The Food Safety (General Food Hygiene) Regulations 1995 stipulate the need for the control of food hazards. One such measure which satisfies this requirement is the use of hazard analysis and critical control points (HACCP). Considers some of the problems that occur when HACCP programmes are introduced to catering establishments. Documents risks, hazards and critical control points in the case of a mediumâ€sized hospital in Northern Ireland. Cites monitoring and control procedures for the control of HACCP and proposes specific recommendations for future education and training.

Details

Managing Service Quality: An International Journal, vol. 7 no. 3
Type: Research Article
ISSN: 0960-4529

Keywords

Article
Publication date: 1 July 1997

Mervyn D.J. Wilson, Anna E. Murray, Margaret A. Black and David A. McDowell

The contract catering segment of the UK hospitality industry has expanded rapidly over the past decade, yet few contemporary hospitality researchers acknowledge the existence of…

4562

Abstract

The contract catering segment of the UK hospitality industry has expanded rapidly over the past decade, yet few contemporary hospitality researchers acknowledge the existence of this significant market sector. Seeks to rectify this by examining the size, scope and market position of the UK contract catering sector. Documents past experiences of commercial and public sector catering units to illustrate the move of contract catering management towards facilities management. Discusses future trends in an attempt to determine the future role of contract catering management within facilities.

Details

Facilities, vol. 15 no. 7/8
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 31 March 2020

David Mathuva, Samuel Kiragu and Dulacha Barako

This study aims to examine the extent and drivers of anti-money laundering (AML) disclosures in the audited annual reports of regional listed banks in Kenya.

Abstract

Purpose

This study aims to examine the extent and drivers of anti-money laundering (AML) disclosures in the audited annual reports of regional listed banks in Kenya.

Design/methodology/approach

Using the Financial Action Task Force recommendations and other guidelines, the authors develop an AML disclosure index that is used to score the extent of AML disclosures by banks. A sample of 15 listed regional banks in Kenya over the period of 2007-2017 is used. Using this sample, the authors performed fixed-effects regressions to identify the significant determinants of AML disclosures.

Findings

The study establishes a low level of AML disclosures in the audited annual reports of sampled banks. The extent to which the AML disclosures improved across three distinct regulatory regimes over the period of 2007-2017 is reported. The authors find that the AML disclosures are largely driven by corporate governance (board size and audit committee size) and the ratio of diaspora remittances to GDP.

Practical implications

Owing to the global nature of money laundering activities, the study suggests that the Central Bank of Kenya needs to internationalize AML regulations and follow internationally accepted best practices in AML to respond to emerging trends in money laundering and related crimes.

Originality/value

To the best knowledge of the researchers, this is perhaps the first study to examine the drivers of AML disclosures by banks in a developing economy in the East and Southern African region. Given the global nature of money laundering, the study makes an important and original contribution to the body of knowledge with potential for replication in other jurisdictions. The findings will also form a basis for developing an AML reporting or disclosure framework.

Details

Journal of Money Laundering Control, vol. 23 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 1 January 1990

David Leslie, David McDowell and Horst Gummer

Increasing emphases on effective and efficient use of resourcesmake it imperative that the potential of any one resource is maximised.In addressing the application of computers in…

Abstract

Increasing emphases on effective and efficient use of resources make it imperative that the potential of any one resource is maximised. In addressing the application of computers in the control function the value of a more holistic role for microprocessors in the hospitality industry is discussed. The possible enhancement in reporting quality, quantity and rate in a number of areas of hotel operations are outlined as well as the application and implications of microprocessors as planning aids in the formulation and attainment of managerial objectives.

Details

International Journal of Contemporary Hospitality Management, vol. 2 no. 1
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 1 August 2001

Stephen D. McDowell and Philip E. Steinberg

Explores a number of the debates and justification used to support and advance nonâ€state governance of the Internet in the USA. Reviews public reports released leading up to the…

Abstract

Explores a number of the debates and justification used to support and advance nonâ€state governance of the Internet in the USA. Reviews public reports released leading up to the formation of the Internet Corporation for Assigned Names and Numbers (ICANN). Concludes that the scope herein is restricted to the jurisdictions and reasoning stated in the policy papers leading to the formation of the ICANN.

Details

info, vol. 3 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 14 October 2006

Malcolm Vick and Fay Gasparini

Pictures are routinely identified as possible sources for researching history yet they are widely either neglected or underused. This article explores the use of pictorial…

Abstract

Pictures are routinely identified as possible sources for researching history yet they are widely either neglected or underused. This article explores the use of pictorial materials, in particular photographs, in historical analysis. It describes some common, or standard, uses of photographs in historical writing, and critically discusses them. It identifies and examines methodological and ethical issues in using photographs as evidence. And it draws on a current project which is using a rich body of photographs as an integral part of its analysis of the history of one educational institution to explore these issues

Details

History of Education Review, vol. 35 no. 2
Type: Research Article
ISSN: 0819-8691

Keywords

Article
Publication date: 5 May 2015

Melissa Fisher

This paper aims to, by drawing on two decades of field work on Wall Street, explore the recent evolution in the gendering of Wall Street, as well as the potential effects  

1342

Abstract

Purpose

This paper aims to, by drawing on two decades of field work on Wall Street, explore the recent evolution in the gendering of Wall Street, as well as the potential effects – including the reproduction of financiers’ power – of that evolution. The 2008 financial crisis was depicted in strikingly gendered terms – with many commentators articulating a divide between masculine, greedy, risk-taking behavior and feminine, conservative, risk-averse approaches for healing the crisis. For a time, academics, journalists and women on Wall Street appeared to be in agreement in identifying women’s feminine styles as uniquely suited to lead – even repair – the economic debacle.

Design/methodology/approach

The article is based on historical research, in-depth interviews and fieldwork with the first generation of Wall Street women from the 1970s up until 2013.

Findings

In this article, it is argued that the preoccupation in feminine styles of leadership in finance primarily reproduces the power of white global financial elites rather than changes the culture of Wall Street or breaks down existent structures of power and inequality.

Research limitations/implications

The research focuses primarily on the ways American global financial elites maintain power, and does not examine the ways in which the power of other international elites working in finance is reproduced in a similar or different manner.

Practical implications

The findings of the article provide practical implications for understanding the gendering of financial policy making and how that gendering maintains or reproduces the economic system.

Social implications

The paper provides an understanding of how the gendered rhertoric of the financial crisis maintains not only the economic power of global financial elites in finance but also their social and cultural power.

Originality/value

The paper is based on original, unique, historical ethnographic research on the first generation of women on Wall Street.

Details

critical perspectives on international business, vol. 11 no. 2
Type: Research Article
ISSN: 1742-2043

Keywords

Book part
Publication date: 31 July 2012

Cynthia Townley

There is much discussion about the moral standing of animals and the scope of human responsibilities to the more-than-human world. As yet, there has been little discussion about…

Abstract

There is much discussion about the moral standing of animals and the scope of human responsibilities to the more-than-human world. As yet, there has been little discussion about whether cross-species collectives (such as a human and a dog) can constitute composite or plural agents analogous to those proposed in epistemic and moral cases. If so, fruitful new ways of understanding how we live and work with animal companions will likely emerge. This chapter takes a first step towards those new understandings by arguing that cross-species collectives are possible.

Details

Applied Ethics: Remembering Patrick Primeaux
Type: Book
ISBN: 978-1-78052-989-9

Keywords

Article
Publication date: 9 October 2017

Jeremiah D. Still, Ashley Cain and David Schuster

Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been…

Abstract

Purpose

Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been developed. This paper aims to present and explain a list of human-centered guidelines for developing usable authentication schemes.

Design/methodology/approach

The guidelines stem from research findings within the fields of psychology, human–computer interaction and information/computer science.

Findings

Instead of viewing users as the inevitable weak point in the authentication process, this study proposes that authentication interfaces be designed to take advantage of users’ natural abilities. This approach requires that one understands how interactions with authentication interfaces can be improved and what human capabilities can be exploited. A list of six guidelines that designers ought to consider when developing a new usable authentication scheme has been presented.

Research limitations/implications

This consolidated list of usable authentication guidelines provides system developers with immediate access to common design issues impacting usability. These guidelines ought to assist designers in producing more secure products in fewer costly development cycles.

Originality/value

Cybersecurity research and development has mainly focused on technical solutions to increase security. However, the greatest weakness of many systems is the user. It is argued that authentication schemes with poor usability are inherently insecure, as users will inadvertently weaken the security in their efforts to use the system. The study proposes that designers need to consider the human factors that impact end-user behavior. Development from this perspective will address the greatest weakness in most security systems by increasing end-user compliance.

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 231