Search results

1 – 10 of 281
Open Access
Article
Publication date: 9 October 2019

Luke Bacon, Kathleen Azali, Alexandra Lara Crosby and Benjamin Forster

The purpose of this study is to identify shared themes and concerns of two local and critical archives by comparing their design and day-to-day practice.

2591

Abstract

Purpose

The purpose of this study is to identify shared themes and concerns of two local and critical archives by comparing their design and day-to-day practice.

Design/methodology/approach

The action research has drawn on the experience of collaboration between a Sydney-based community space (Frontyard) and the Surabaya-based co-working community (C2O) over one year. Each space houses a small physical library of books, which is the focus of this analysis.

Findings

Hacking has emerged as a key value of both archives. A hacking approach has shaped the design of each space and the organisation each archive. Hacking frames the analysis of each collection in this study.

Practical implications

Pragmatic and political understanding of such archives have implications for better quality and more authentic exchange between the communities that make use of these libraries in Indonesia and Australia.

Originality/value

While some work on local critical archives has been done in Indonesia and Australia, no research to date has made specific comparisons with the aim of sharing knowledge. Because these archives are often temporary and ephemeral, documenting the work that goes into them, and their practitioners’ perspectives, is urgent, making possible shared knowledge that can inform the ways communities make decisions about their own heritage.

Details

Global Knowledge, Memory and Communication, vol. 68 no. 8/9
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 29 April 2020

P.J. White, Hannah R. Marston, Linda Shore and Robert Turner

In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with…

Abstract

In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with unprecedented wicked problems such as these, the rigour of design and creative processes can tested. COVID-19 has demonstrated how important human centred design responses are in understanding the worldviews and ecosystems of users. Ad hoc design responses or design hacks have demonstrated that they have a role to play in how we create our future individual, community and societal ecosystems.

In terms of age friendly design, this pandemic makes us envision what should be, furthermore, how we could create better products and services through technology. For our ageing communities “Cocooning” and other social restriction measures have exposed technological deficiencies for the needs of older people and opens up questions of our future preparedness for a growing ageing society. Now more than ever, designers need to understand the behavioural mind-set of older people in their own ecosystem and understand existing mental models.

In this opinion piece we posit what acts of design hacking can lead us to greater understanding of users mental models and therefore better understanding of technology needs for both older and younger adults. While presenting various examples of how design hacking is conducted by citizens and participants alike, it shows that it offers designers differing perspectives, experiences and inspiration for technology.

Details

Emerald Open Research, vol. 1 no. 2
Type: Research Article
ISSN: 2631-3952

Keywords

Open Access
Article
Publication date: 4 December 2017

Se-Chang Oh, Min-Soo Kim, Yoon Park, Gyu-Tak Roh and Chin-Woo Lee

The centralized processes of today’s power trading systems are complex and pose a risk of price tampering and hacking. The decentralized and unmodifiable nature of the blockchain…

11181

Abstract

Purpose

The centralized processes of today’s power trading systems are complex and pose a risk of price tampering and hacking. The decentralized and unmodifiable nature of the blockchain technology that has recently been highlighted offers the potential to improve this power trading process. The purpose of this study is to implement a system to apply the blockchain technology to the problem of power trading.

Design/methodology/approach

The authors modeled the power trading problem as the interaction between admin, producer and consumer nodes. And a power trading scenario has been created for this model using a blockchain platform called Multichain which is both fast and highly scalable. To verify this scenario, they implemented a trading system using Savoir, a Python-based JsonRPC module.

Findings

Experimental results show that all processes, such as blockchain creation, node connectivity, asset issuance and exchange transactions have been correctly handled according to the scenario.

Originality/value

In this study, the authors have proposed and implemented a power trading method that determines price according to the pure market principle and cannot be manipulated or hacked. It is based on the nature of blockchain technology that is decentralized and cannot be tampered.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 11 no. 3
Type: Research Article
ISSN: 2071-1395

Keywords

Open Access
Book part
Publication date: 19 November 2020

Judy Chang

Women who use drugs are one of the most maligned, misunderstood and maltreated groups in contemporary culture and society. Despite this, little public outcry nor empathy is given…

Abstract

Women who use drugs are one of the most maligned, misunderstood and maltreated groups in contemporary culture and society. Despite this, little public outcry nor empathy is given. As a woman who uses drugs, the author examines what lies behind this neglect. A post-structuralist approach is taken in order to examine the categories of meaning assigned to bodies under the twin ruling structures of prohibition and patriarchy. This is done with the intent to better understand and challenge the process of (masculinist) knowledge-making and practices surrounding women who use drugs that treats us as mere objects of knowledge. Furthermore, this chapter draws from feminist auto-ethnography, as the author uses own personal experiences as a woman who uses drugs, a feminist and a drug user advocate as a lens through which to give form to this analysis. Ultimately, the author argue that it is time to let go of outdated, unjust and prejudicial images by challenging established norms and practices, test and apply new theories and negotiate different identities outside of those currently available to women who use drugs. In undertaking this piece, the author hopes that the critical reflections contained within this chapter can ‘cause some trouble’, by being politically useful for the growing movement surrounding women who use drugs.

Details

The Impact of Global Drug Policy on Women: Shifting the Needle
Type: Book
ISBN: 978-1-83982-885-0

Open Access
Article
Publication date: 7 July 2023

Julianna Faludi

Social hackathons are events designed to craft social change using technology that enables citizen empowerment or addresses societal issues by deploying data. Hackathons provide a…

Abstract

Purpose

Social hackathons are events designed to craft social change using technology that enables citizen empowerment or addresses societal issues by deploying data. Hackathons provide a framework for organizing to help create prototypes and business models through interaction with technology. The relevance of the sociomateriality of the emergent technology (prototype) and organizational structure raises the question if viable and impactful solutions can be developed within such frames.

Design/methodology/approach

This study applies an inductive research methodology based on ethnographic participant observation, interviews with participants and event organizers, and qualitative insights from surveys.

Findings

Events such as social hackathons are centered around technology and share a vision of creating opportunities for change. The materiality of prototypes may define their interaction patterns. The differentiation of the embodiment and emergent structuration of technology may be a breaking point for in-group dynamics and a barrier to social innovation. The emergent structuration of technology with a longer initial phase of problem definition and ideation within a group was found to have more potential for impactful embodiment with the technological artifact. Some cases reveal that “expert” participants who shared visions of change enabled by technology were constrained by other members.

Originality/value

The paper suggests an extended view on the connection of sociomateriality, organizing and social impact.

Details

Journal of Organizational Ethnography, vol. 12 no. 2
Type: Research Article
ISSN: 2046-6749

Keywords

Open Access
Article
Publication date: 9 November 2022

Santhosh Srinivas and Huigang Liang

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is…

3370

Abstract

Purpose

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is essential to acknowledge, identify and address them. The purpose of this paper is to identify and emperically demonstrate the impact of such darksides of DT. While a firm's DT effort may have many dark sides, the authors identify data breaches as the most critical one and focus on proving their impact since it can inflict significant damage to the firm.

Design/methodology/approach

Through the lens of paradox theory, the authors argue that the DT efforts of a firm will lead to increased risk and severity of data breaches. The authors developed a one-of-a-kind longitudinal data set by combining data from multiple sources, including 3604 brands over a 10-year period, and employed a DT performance scorecard to evaluate a firm's DT effort across four key digital selling touchpoints: site, mobile, digital marketing and social media.

Findings

The findings of this study show that a firm's DT efforts pertaining to its mobile and digital marketing platforms significantly increase the likelihood and severity of a data breach event indicating that these two channels are most vulnerable and need heightened attention from firms. Furthermore, the findings suggest that the negative repercussions of some DT initiatives may be minimized as the firm becomes more innovative. The findings can help firms re-strategize their DT efforts by promoting security and also encouraging a balanced communication strategy.

Originality/value

This research is one of the first to identify, recognize and empirically illustrate the downsides of a DT effort that is otherwise thought to provide only benefits.

Details

Journal of Electronic Business & Digital Economics, vol. 1 no. 1/2
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Article
Publication date: 1 February 2023

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

4267

Abstract

Purpose

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

Design/methodology/approach

The study uses a qualitative approach involving the use of structured questionnaires. The questionnaires were made available to the staff of 17 licensed banks in South Africa who deal with management, operation, administration and banking services. Two hypotheses were formulated and non-parametric statistical analyses involving the use of Chi-square test, Fischer’s Exact test and Spearman’s correlation were carried out. The two hypotheses formulated were tested to draw a conclusion.

Findings

The results obtained indicate that the impact of cyberfraud in the South African banking industry is highly significant and has affected the reputation of some of the banks. This calls for the need to review the diverse ways of curbing cyberfraud to lessen their impact and that of associated fraud risks on the banking operation.

Practical implications

This study provides an analysis on the relationship cyberfraud occurrences and the reputation of South African banks. The implementation of the recommendations may reinforce the existing security measures in the fight against cyberfraud.

Originality/value

The novelty of this study lies in the fact that the assessment of the impact of cyberfraud on the banking industry in South Africa has not been sufficiently highlighted by the existing literature.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 22 June 2023

William M. Briggs

Important research once thought unassailable has failed to replicate. Not just in economics, but in all science. The problem is therefore not in dispute nor are some of the…

1291

Abstract

Purpose

Important research once thought unassailable has failed to replicate. Not just in economics, but in all science. The problem is therefore not in dispute nor are some of the causes, like low power, selective reporting, the file drawer effect, publicly unavailable data and so forth. Some partially worthy solutions have already been offered, like pre-registering hypotheses and data analysis plans.

Design/methodology/approach

This is a review paper on the replication crisis, which is by now very well known.

Findings

This study offers another partial solution, which is to remind researchers that correlation does not logically imply causation. The effect of this reminder is to eschew “significance” testing, whether in frequentist or Bayesian form (like Bayes factors) and to report models in predictive form, so that anybody can check the veracity of any model. In effect, all papers could undergo replication testing.

Originality/value

The author argues that this, or any solution, will never eliminate all errors.

Details

Asian Journal of Economics and Banking, vol. 7 no. 2
Type: Research Article
ISSN: 2615-9821

Keywords

Open Access
Article
Publication date: 13 February 2024

Gregor Pfajfar, Maciej Mitręga and Aviv Shoham

In this paper, the authors aim to introduce international dynamic marketing capabilities (IDMCs) theoretically derived from marketing capabilities (MCs), dynamic marketing…

1319

Abstract

Purpose

In this paper, the authors aim to introduce international dynamic marketing capabilities (IDMCs) theoretically derived from marketing capabilities (MCs), dynamic marketing capabilities (DMCs) and international marketing capabilities (IMCs) and provide a novel conceptualization of the concept by applying a holistic view of the international enterprise.

Design/methodology/approach

This is a literature review that maps the current research on MCs, DMCs and IMCs and serves as a basis for the theoretical conceptualization of a novel IDMCs concept as well as for the identification of research gaps and the development of future research directions on this phenomenon.

Findings

Existing typologies of MCs, DMCs and IMCs are classified into four categories: strategic, operational, analytical and value creation capabilities. A new typology of IDMCs is proposed, consisting of digital MC and dynamic internationalization capability as strategic capabilities, agile IMC, IM excellence and absorptive capability in IM as operational capabilities, IM resilience capability, IM knowledge management capability, AI-enabled IDMC and Industry 4.0-enabled IDMC as analytical capabilities, and ambidextrous IM innovation capability as value creation capability. Finally, the authors identify research gaps and develop research questions that open future research avenues for the coming years.

Originality/value

This paper offers a novel view of MCs, DMCs and IMCs and argues that, in contrast to the majority of previous research, a comprehensive understanding of these is only possible if all levels are considered simultaneously: the strategic, the operational, the analytical and the value creation level. A new conceptualization and typology of IDMCs follows this logic.

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Access

Only Open Access

Year

All dates (281)

Content type

1 – 10 of 281