Search results

1 – 10 of over 33000
Article
Publication date: 21 March 2016

Gabriel M. Lentner and Peter Parycek

This paper aims at providing an overview of different approaches toward identity management pertaining to citizen to government (C2G) eGovernment applications.

1274

Abstract

Purpose

This paper aims at providing an overview of different approaches toward identity management pertaining to citizen to government (C2G) eGovernment applications.

Design/methodology/approach

The paper adopts a comparative law methodology. It asks how different legal systems deal with the same problem. The different legal frameworks of Austria, Germany, Liechtenstein and the Swiss Canton of Zug are analyzed and compared pertaining to identification and authentication. The process of comparison involves three phases: the descriptive phase (describing and analyzing the legislation to be compared), the identification phase (identifying the differences and similarities between the systems compared) and the explanatory phase (attempting to explain the resemblances and similarities between the systems).

Findings

Each of the four countries adopted different legal solutions. This is due to the different legal culture and the existing legal framework in which the legislator, in most cases, seeks to fit in the respective eGovernment solution, rather than adopting a completely new solution.

Originality/value

This study reveals different possibilities for legislatures to regulate electronic C2G procedures, ranging from a combination of electronic identity (eID) and electronic signature to pragmatic eID models in combination with further electronic authentication functionalities. The focus of the study is the legal framework and not the technical solution.

Details

Transforming Government: People, Process and Policy, vol. 10 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 15 August 2016

Dimitrios G. Katehakis, George Pangalos and Andriana Prentza

The purpose of the paper is to present a framework for moving cross-border ePrescription (eP) and Patient Summary (PS) services forward, bearing in mind the needs and requirements…

Abstract

Purpose

The purpose of the paper is to present a framework for moving cross-border ePrescription (eP) and Patient Summary (PS) services forward, bearing in mind the needs and requirements of the European e-health space for cross-border eP and PS services, the limitations of the already developed solutions, as well as outcomes available from other domains.

Design/methodology/approach

The outcomes of previous and current large-scale pilot projects, aiming toward the delivery of electronic cross-border services, are examined. Integration of generic building blocks (BBs) is considered for the further development of cross-border eP and PS, in line with the European Directive on patients’ rights in cross-border health care.

Findings

The e-health domain is expected to greatly benefit from mitigating non-domain concerns such as those for electronic identification, end point detection, non-repudiation and the use of electronic signatures and trust establishments for basic cross-border public services in Europe.

Research limitations/implications

Research limitations are related to the fact that electronic identification, electronic signature and semantic issues have not been fully addressed yet at a European level to support cross-border services.

Practical implications

Practical implications are related to the cooperation, European level compatibility and sustainability of the underlying national infrastructures required to support reliable and secure exchange of medical data, as well as the readiness to address continuously evolving interoperability, legal and security requirements in a cross-border setting.

Originality/value

The need for consolidating the existing outcomes of non-health specific BBs is examined for two high-priority e-health services. Ongoing progress is presented, together with related issues that need to be resolved for improving technical certainty and making it easier to use health-care services abroad in cases of emergency.

Details

Transforming Government: People, Process and Policy, vol. 10 no. 3
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 16 August 2011

Sharon Premchand‐Mohammed

The purpose of this paper is to describe the challenges and examine the impact of the transition from print to electronic resources at a medium‐sized academic library at a

2108

Abstract

Purpose

The purpose of this paper is to describe the challenges and examine the impact of the transition from print to electronic resources at a medium‐sized academic library at a multi‐campus Caribbean university, The University of the West Indies (UWI), with particular reference to the St Augustine campus.

Design/methodology/approach

Through a review of the literature on the shift from print to electronic resources, the paper uses the experiences of The UWI St Augustine to provide a model that can be used by other libraries.

Findings

Libraries have successfully built a “hybrid” collection of print and electronic resources despite challenges with information and communications technology (ICT) infrastructure, balancing costs, licencing model and strategies for selection, acquisition and management of electronic resources. There are some key steps which libraries can follow when transitioning from print to electronic resources.

Research limitations/implications

The paper focuses on the experiences and lessons learnt in moving a collection from print to a hybrid of print and electronic resources. However, this by no means encapsulates all the issues associated with any such undertaking.

Practical implications

The paper provides some key steps that a library can take in transitioning its collection from print to a print‐electronic hybrid.

Originality/value

Although the literature speaks to different aspects of implementing electronic resources, this paper provides a roadmap for similar libraries with the lessons learnt and simple steps that a library should take when considering to move its collection from print to some level of electronic resources.

Article
Publication date: 1 August 1998

Derek Law

Progress towards achieving the concepts of Universal Bibliographic Control and Universal Access to Publications is outlined in relation to printed publications and discussed in…

551

Abstract

Progress towards achieving the concepts of Universal Bibliographic Control and Universal Access to Publications is outlined in relation to printed publications and discussed in the context of electronic information. The unique problems relating to consistent identification of electronic materials are indicated and various metadata projects for recording and searching electronic files are outlined. The problems of access to electronic materials are discussed and various relevant international projects considered.

Details

Library Review, vol. 47 no. 5/6
Type: Research Article
ISSN: 0024-2535

Keywords

Book part
Publication date: 7 July 2017

Edoardo Colombo and Rodolfo Baggio

This chapter presents a summary of the presentations and the discussions concerning electronic distribution channels in tourism and hospitality held at the 2015 t-Forum. Both…

Abstract

This chapter presents a summary of the presentations and the discussions concerning electronic distribution channels in tourism and hospitality held at the 2015 t-Forum. Both academics and practitioners examined the present situation and elaborated on the problems and possible ways to overcome them. The main topics that emerged were distribution channels and their best use and optimization, interoperability between the many different technological systems, the need for a standardized representation of data and transactions, and the role of the Internet and Web as source of information useful for market analysis and product planning. Finally, the importance and the necessity of a more intense collaboration among all the stakeholders and between academic researchers and the industry was emphasized.

Details

Knowledge Transfer to and within Tourism
Type: Book
ISBN: 978-1-78714-405-7

Keywords

Book part
Publication date: 12 May 2022

Kathleen Lynne Lane, Eric Alan Common, David James Royer and Wendy Peia Oakes

Increased attention has been placed on identifying and installing evidence-based practices (EBPs) to effectively and efficiently serve students with and at-risk for learning and…

Abstract

Increased attention has been placed on identifying and installing evidence-based practices (EBPs) to effectively and efficiently serve students with and at-risk for learning and behavioral challenges. Council for Exceptional Children's (CEC, 2014) Standards for Evidence-Based Practices in Special Education are often used to examine a range of strategies, practices, and programs to ascertain if they are indeed EBPs. Systematic reviews conducted to evaluate the evidence base of these potential EBPs are important as they inform practice. We contend it is important to provide well-vetted procedures for training scholars to conduct systematic reviews with replicable precision. We offer this chapter to assist scholars in conducting systematic reviews to quality appraise the methodological rigor of a body of literature using the CEC Standards for EBPs. We focus on (1) project management considerations and (2) steps and phases to support the development and dissemination of high quality, methodologically rigorous systematic literature reviews.

Details

Delivering Intensive, Individualized Interventions to Children and Youth with Learning and Behavioral Disabilities
Type: Book
ISBN: 978-1-80262-738-1

Keywords

Article
Publication date: 9 November 2010

William Lorchirachoonkul and John P.T. Mo

The purpose of this paper is to describe a virtualisation model of RFID enabled infrastructure incorporating non‐standard radio frequency identification (RFID) components. The…

1950

Abstract

Purpose

The purpose of this paper is to describe a virtualisation model of RFID enabled infrastructure incorporating non‐standard radio frequency identification (RFID) components. The model is implemented as a software service that draws upon other sources of internet services.

Design/methodology/approach

In a global supply chain environment, circumstances at different locations may not allow RFID system to be used. Some supply chain members do not have compatible network infrastructure in place. These include RFID frameworks such as China's National Product Codes and Japan's ubiquitous identification which are utilised around the world. There is also a reachability problem for consignments going offsite. The paper introduces a service abstraction layer (SAL) in the RFID architecture to remove dependency on specific RFID framework. From this principle, the paper introduces a new virtual infrastructure that interfaces with emerging identification technologies.

Findings

The model bridges the gaps that exist between various RFID standards, as well as utilising various technologies to emulate data capture devices so that the information chain remains intact across the global network. The resulting system significantly reduces the costs of commissioning and operating costs of existing RFID infrastructures.

Research limitations/implications

The new system has been tested in real industry environment with defined scope and coverage. The implication due to full roll out of the technologies in global supply chains still requires further investigation.

Practical implications

Usability of the virtualised RFID infrastructures depends on the cooperation among partners in the supply chain rather than the technology level. New business rules are required when special stakeholders such as customs are included in this virtualised infrastructure.

Originality/value

The concept of virtualisation has been used in operating systems, but its application to supply chain has not been explored before. Introduction of the SAL allows interoperability of systems handling goods tracking events through the supply chain.

Details

Business Process Management Journal, vol. 16 no. 6
Type: Research Article
ISSN: 1463-7154

Keywords

Book part
Publication date: 12 January 2012

Hokey Min

Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has…

Abstract

Despite a hangover from the worldwide economic crisis, international trade rebounded nicely with a record-level growth in late 2010. A sharp rise in international trade has sparked the international traffic growth. A majority of this traffic growth originated from maritime logistics which could move cargoes in large volume and at cheaper freight costs. Due to its cost-efficiency and easy access, maritime logistics typically accounts for more than half of the worldwide freight volume. However, maritime logistics poses a greater supply chain risk, since ocean carriers used for maritime logistics are more vulnerable to unpredictable weather conditions, piracy attacks, terrorist hijacking, and cargo damages on the open sea than any other modes of transportation. Also, given the vast areas that maritime logistics covers, it is more difficult to protect maritime logistics activities from potential hazards and threats.

To better protect maritime logistics activities from potential security lapses, this chapter introduces and develops a variety of systematic security measures and tools that were successfully used by best-in-class companies and government entities across the world. Also, this chapter proposes a total maritime security management model as a way to formulate maritime risk mitigation strategies. To elaborate, this chapter sheds light on the roots of maritime security measures and tools, the ways that those measures and tools are best utilized, the roles of advanced information technology in maritime security from the global supply chain perspectives, the visualization and identification of potential maritime and its related supply chain risks, and policy guidelines that will help enhance maritime security.

Article
Publication date: 1 October 2000

Brian Rooks

Reports on the Robot & Automation show held at the Birmingham National Exhibition Centre alongside the MACH 2000 and other principal manufacturing shows. Some of the robot…

Abstract

Reports on the Robot & Automation show held at the Birmingham National Exhibition Centre alongside the MACH 2000 and other principal manufacturing shows. Some of the robot applications developed by exhibiting systems integrators are described including installations for monitoring clean room staff, acid etching of perfume bottles, laser welding of photocopier chassis and laser cutting of automotive plastic trim parts. None of the large robot manufacturers exhibited but some of the key suppliers of SCARA robots were present. The report also covers some of the robots on display in the MACH exhibition. It particularly focuses on robots for automation of EDM that is dominated by two specialist EDM equipment suppliers, not the conventional robot builders.

Details

Industrial Robot: An International Journal, vol. 27 no. 5
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 9 October 2009

Kayvan Miri‐Lavassani, Vinod Kumar, Bahar Movahedi and Uma Kumar

Though many studies and reports have been published about the scale of identity fraud (IDF), no work has been done on developing models to measure IDF. The purpose of this paper…

1665

Abstract

Purpose

Though many studies and reports have been published about the scale of identity fraud (IDF), no work has been done on developing models to measure IDF. The purpose of this paper is to propose a measurement model for IDF and test the validity of that measurement model.

Design/methodology/approach

After providing a background on the concepts of IDF, the paper discusses the related term, identity theft. Next, a measurement model is developed, based on the current practice of measurement of IDF in four countries. Exploratory factor analysis (EFA) is used in identifying the indicators and factors of IDF. After the EFA is conducted, confirmatory factor analysis is employed to test the validity of the measurement model. These tests are conducted using the data collected from Canadian financial institutions.

Findings

The review of the current empirical studies suggests that IDF should be assessed using a measurement model with 33 indicators to measure five factors of IDF. However, the analysis of Canadian financial institutions suggests that a measurement model that includes 27 indicators and four factors is most appropriate for the data.

Research limitations/implications

The measurement model developed in the present paper is based on an examination of a sample of financial institutions in Canada. Hence, the results of this paper cannot be generalized to organizations in other sectors of the economy. Further studies in other sectors of the economy are required to identify industry‐specific measurement model.

Practical implications

This paper is the first approach toward developing a model for measuring IDF.

Originality/value

This paper is the first study that attempts to scientifically identify and validate a measurement system in the area of IDF.

Details

Journal of Financial Crime, vol. 16 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of over 33000