Search results

1 – 10 of 33
Article
Publication date: 30 July 2019

Nosheen Fatima Warraich, Kanwal Ameen and Amara Malik

This study aims to highlight the issues and concerns specific to information professionals (IPs) in academic libraries of Pakistan. It identifies the problems that academic…

Abstract

Purpose

This study aims to highlight the issues and concerns specific to information professionals (IPs) in academic libraries of Pakistan. It identifies the problems that academic libraries face in attracting and hiring competent IPs along with the strategies to be used to recruit and retain them in the dynamic environment of academia. Moreover, it provides a list of required skills that employers would look for while hiring IPs in academic settings.

Design/methodology/approach

Semi-structured interviews of 20 library leaders involved in hiring process were conducted from 16 public and private sector universities.

Findings

Findings identified interpersonal skills as the most desired followed by the subject knowledge and IT orientation while hiring IPs for the present and foreseeable future. Good salary package, conducive work environment with opportunities for learning and continuing professional development and speedy promotion were significant perceived factors to attract and retain the talented professionals in university library settings.

Practical implications

The study would be helpful for policymakers and administrators to hire and retain the IPs capable of developing user-centered services in academic libraries.

Originality/value

Practical suggestions made for hiring, retaining and developing IPs in academic libraries would be beneficial for other developing countries with similar context. It addressed an unexplored area in the context of a developing country and reported original research that will assist policy and decision-makers to hire and retain competent human resources.

Details

Global Knowledge, Memory and Communication, vol. 68 no. 6/7
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 3 August 2020

Waqar Ahmad Awan and Kanwal Ameen

The job market of library and information professionals has expanded from academic to industrial, special and business libraries. The unique nature of the organizations, their…

Abstract

Purpose

The job market of library and information professionals has expanded from academic to industrial, special and business libraries. The unique nature of the organizations, their data and clientele demand a different set of competencies. The purpose of this study is to explore the competencies of information professionals from the perspectives of business employers – a comparatively new job place for the library and information management professionals.

Design/Methodology/Approach

Exploratory sequential mixed methods approach was used to meet objectives of this study in two phases. In the first phase, qualitative data was extracted from panel discussion. Themes were extracted from this qualitative data. In the second phase, a questionnaire was designed which was based on qualitative themes. The instrument contained the nine-point Likert type scale and was filled by the business and industry human resource managers. The quantitatively gathered data were analysed while using descriptive and inferential statistical techniques in the Statistical Package for Social Sciences SPSS version 22.

Findings

The findings of this study indicate that work coordination, knowledge of intellectual property rights, online searching ability, leadership qualities, trustworthiness and background knowledge of the prospective organizations are the basic competencies required by the business employers.

Practical Implications

This study will guide the students on which qualities they are required to obtain to qualify for jobs of information professionals in the current employment sector. Additionally, it will provide guidelines to the continuous education programme designers, prompting them to include in their trainings the vital qualities of candidates required by the current job market.

Originality Value

This is the maiden study that has explored the competencies of library and information management professionals through exploratory sequential mixed methods.

Article
Publication date: 5 July 2013

Yvonne de Grandbois

The purpose of this paper is to find out whether and to what extent managerial skills are taught in Schools of Information globally, and whether these courses are sufficient…

991

Abstract

Purpose

The purpose of this paper is to find out whether and to what extent managerial skills are taught in Schools of Information globally, and whether these courses are sufficient preparation for management positions in information professions.

Design/methodology/approach

This is an exploratory research paper. Phase one included a literature review and a review of curricula in Schools of Information in 26 countries to see if management courses were given, as well as the type and number of courses. Phase two consisted semi‐structured interviews with 15 directors of information services in the international sector in the Geneva, Switzerland region.

Findings

The paper concludes that 73 per cent of the schools reviewed do offer management courses, although there is a wide variation between countries and schools. In the interviews it was found that 80 per cent of the directors learned their management skills on the job and 66 per cent in management development through their institutions. All interviewees said their academic courses, though relevant, were insufficient. They gave recommendations of which competencies were needed in curricula for information professionals.

Originality/value

Studies on management education have been done mostly in North American, ALA‐accredited information schools. The rest of the world needs to be researched and to find its voice. The paper is relevant to schools of information globally, as well as to information professionals in the field.

Article
Publication date: 1 January 2006

Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer and F. Nelson Ford

This study proposes to put forward and test a theoretical model that demonstrates the influence of top management support on an organization's security culture and level of…

8190

Abstract

Purpose

This study proposes to put forward and test a theoretical model that demonstrates the influence of top management support on an organization's security culture and level of security policy enforcement.

Design/methodology/approach

The project used a combination of qualitative and quantitative techniques. The grounded theory approach was used to analyze responses to open‐ended questions answered by 220 certified information system security professionals. Using these responses, a survey instrument was developed. Survey results were analyzed using structural equation modeling.

Findings

Evidence suggests that top management support is a significant predictor of an organization's security culture and level of policy enforcement.

Research limitations/implications

During instrument validation, a special effort removed survey items that appeared overly intrusive to the respondents. In this endeavor, an expert panel of security practitioners evaluated all candidate items on a willingness‐to‐answer scale. While especially helpful in security, this scale may be used in other research domains.

Practical implications

Practitioners should understand the impact of top management support on achieving security effectiveness. Based on the findings of this study, low levels of executive support will produce an organizational culture less tolerant of good security practices. Low levels of support will diminish the level of enforcement of existing security policies.

Originality/value

Researchers developed original scales to measure levels of top management support, policy enforcement, and organizational culture. The scales demonstrated acceptable reliability and validity scores.

Details

Information Management & Computer Security, vol. 14 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 31 December 2015

Montserrat Garcia-Alsina, Josep Cobarsí-Morales and Eva Ortoll

The purpose of this paper is to summarise previous studies to develop a theoretical framework useful to describe and classify competitive intelligence (CI) practices. It is…

1499

Abstract

Purpose

The purpose of this paper is to summarise previous studies to develop a theoretical framework useful to describe and classify competitive intelligence (CI) practices. It is applied to study CI practices developed by Spanish universities, comparing usual practices with those developed during the process of adaptation of degrees to the European Higher Education Area (EHEA), with strong challenges.

Design/methodology/approach

The research employs a mixed-methods approach (semi-structured interviews and questionnaires) developed in two phases. It has focused on the academic offer, which represents 46.35 per cent of the degrees presented in 2009, belonging to 90.16 per cent of Spanish universities.

Findings

The results reveal predominance of incipient and reactive practices, oriented to the tactical level. During the adaptation process, these practices evolved due to the perception of the involvement of universities in the adaptation process. In addition, the proposed theoretical framework could be a tool to study CI both in other university management areas and other kind of organisations.

Research limitations/implications

This research has been applied only to a critic incident: the design of university academic offer to be adapted to the EHEA. More studies about CI practices in other areas of universities should be done, using the same framework proposed in this study.

Practical implications

This framework based on research done in business sector can be applied to any kind or organisations, including NGO and public sectors.

Originality/value

Management tools used in the business sector, such as CI, have been adopted by Higher Educations Institutions, but while CI has been studied in depth in the business sector, it has scarcely been studied in higher education. This framework can be applied to any kind or organisations.

Details

Aslib Journal of Information Management, vol. 68 no. 1
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 1 February 1994

Ming Singer and Craig Lange

Explores managerial professionals′ views on gender‐based preferentialhiring versus merit selection, and examines whether their views areaffected by different information frames…

1995

Abstract

Explores managerial professionals′ views on gender‐based preferential hiring versus merit selection, and examines whether their views are affected by different information frames presented to them. Results show that, although the managers sampled in the study opposed preferential hiring in general, they valued a number of the consequences of preferential hiring. Information frame had no effect on male manager′s views. However, female managers were significantly persuaded by information emphasizing advantages of gender‐based hiring.

Details

Journal of Managerial Psychology, vol. 9 no. 1
Type: Research Article
ISSN: 0268-3946

Keywords

Article
Publication date: 11 May 2015

Palaniappan Shamala, Rabiah Ahmad, Ali Hussein Zolait and Shahrin bin Sahib

Information security has become an essential entity for organizations across the globe to eliminate the possible risks in their organizations by conducting information security…

2306

Abstract

Purpose

Information security has become an essential entity for organizations across the globe to eliminate the possible risks in their organizations by conducting information security risk assessment (ISRA). However, the existence of numerous different types of risk assessment methods, standards, guidelines and specifications readily available causes the organizations to face the daunting tasks in determining the most suitable method that would augur well in meeting their needs. Therefore, to overcome this tedious process, this paper suggests collective information structure model for ISRA.

Design/methodology/approach

The proposed ISRA model was developed by deploying a questionnaire using close-ended questions administrated to a group of information security practitioners in Malaysia (N = 80). The purpose of the survey was to strengthen and add more relevant additional features to the existing framework, as it was developed based on secondary data.

Findings

Previous comparative and analyzed studies reveals that all the six types of ISRA methodologies have features of the same kind of information with a slight difference in form. Therefore, questionnaires were designed to insert additional features to the research framework. All the additional features chosen were based on high frequency of more than half percentage agreed responses from respondents. The analyses results inspire in generating a collective information structure model which more practical in the real environment of the workplace.

Practical implications

Generally, organizations need to make comparisons between methodologies and decide on the best due to the inexistence of agreed reference benchmark in ISRA methodologies. This tedious process leads to unwarranted time, money and energy consumption.

Originality/value

The collective information structure model for ISRA aims to assist organizations in getting a general view of ISRA flow and gathering information on the requirements to be met before risk assessment can be conducted successfully. This model can be conveniently used by organizations to complete all the required planning as well as to select the suitable methods to complete the ISRA.

Details

Journal of Systems and Information Technology, vol. 17 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 12 July 2013

Antonia P. Olivas

The purpose of this paper is to investigate the decision of former traditional K‐12 teachers in the USA who chose a new career path in academic libraries. It focuses on their…

268

Abstract

Purpose

The purpose of this paper is to investigate the decision of former traditional K‐12 teachers in the USA who chose a new career path in academic libraries. It focuses on their successes and challenges in higher education settings.

Design/methodology/approach

This study uses a qualitative‐methods approach which includes a brief questionnaire.

Findings

Findings indicate that former K‐12 teachers leave their traditional teaching professions due to bureaucracy but because they enjoy teaching, they seek other opportunities in education. The research also reveals that many of the participants continue to use their K‐12 training in their current instruction positions as academic librarians.

Research limitations/implications

Future research on this topic should look into more proactive ways of recruiting K‐12 teachers into positions of information literacy instructor in academic libraries.

Practical implications

Those responsible for hiring information literacy instruction librarians will learn the benefits of hiring former K‐12 teachers. The paper will also help encourage academic library leaders to help fund more training opportunities for information literacy librarians.

Social implications

All around the USA, academic libraries are fostering opportunities for their students to become information literate in the hopes of helping students succeed in college‐level research. As more former K‐12 teachers are hired in higher education academic instruction librarian positions, it could help students make a smoother transition from high school to college‐level researchers.

Originality/value

This research shows that former K‐12 teachers could be a valuable asset to higher education academic libraries.

Article
Publication date: 9 June 2022

Lily Pharris and Begona Perez-Mira

The purpose of this transcendental phenomenological qualitative research study is to understand the essence of what it is like to be an information systems professional working in…

Abstract

Purpose

The purpose of this transcendental phenomenological qualitative research study is to understand the essence of what it is like to be an information systems professional working in the USA while managing and defending against social engineering attacks on an organization. The findings add to the information system (IS) body of literature by uncovering commonly shared attitudes, motivations, experiences and beliefs held by IS professionals who are responsible for protecting their company from social engineering attacks.

Design/methodology/approach

This is a qualitative, transcendental phenomenological study that was developed to gain a deeper understanding about the essence of what it is like to be an IS professional defending a US business against social engineering attacks. This research design is used when sharing the experiences of study participants is more important than presenting the interpretations of the researcher. To target participants from the industries identified as regularly targeted by social engineers, purposive sampling was used in conjunction with the snowball sampling technique to find additional participants until saturation was reached.

Findings

Ten themes emerged from the data analysis: (1) foster a security culture, (2) prevention means education, (3) layered security means better protection, (4) prepare, defend and move on, (5) wide-ranging responsibilities, (6) laying the pipes, (7) all hands on deck, (8) continuous improvement, (9) attacks will never be eliminated and (10) moving pieces makes it harder. The ten themes, together, reveal the essence of the shared experiences of the participants with the phenomenon.

Originality/value

Understanding how to defend an enterprise from social engineering attacks is an international issue with implications for businesses and IS professionals across the world. The findings revealed that to prevent social engineer attacks, all employees – IS and non-IS professionals alike – must be unified in their desire to protect the organization. This means IS professionals and organizational leadership must establish a strong security culture, not only through layered technology and electronic controls but also through open communication between all departments and continuously engaging, training and reinforcing social engineering education, policies, procedures and practices with all employees.

Details

Information & Computer Security, vol. 31 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

1 – 10 of 33