Search results

11 – 20 of 293
Book part
Publication date: 17 May 2018

Caitlin McClurg and Rhiannon Jones

Purpose – The purpose of this chapter is to provide an introductory exploration of how the modern Master of Library and Information Science (MLIS) may contribute to the effect of…

Abstract

Purpose – The purpose of this chapter is to provide an introductory exploration of how the modern Master of Library and Information Science (MLIS) may contribute to the effect of imposter phenomenon (IP) in graduate students and early career librarians and to offer solutions to mitigate the effect.

Design/Methodology/Approach – Six university American Library Association-accredited library master’s programs in North America were identified and compared based on publicly available information on program websites. The authors pose questions about the modern MLIS and identify potential solutions to the issues raised about IP in graduate school and the workplace. Ideas in the chapter are supported by best practices suggested by academic literature on organizational behavior and Library and Information Studies (LIS) scholarship as well as invaluable personal reflections found on blogs and other gray literature sources.

Findings – The modern MLIS produces graduates who can vary greatly in their knowledge of LIS topics and career preparedness. MLIS programs and employers can mitigate the effects of nervousness, burn out, and isolation for high-achieving individuals through career preparedness and continuing education courses and opportunities for positive onboarding and mentorship.

Originality/Value – To date, there is a gap in the LIS literature about IP, especially the connection between the modern MLIS and IP. This chapter provides an exploratory look and asks questions to further the conversation on this topic.

Details

Re-envisioning the MLS: Perspectives on the Future of Library and Information Science Education
Type: Book
ISBN: 978-1-78754-880-0

Keywords

Article
Publication date: 16 February 2021

Virginia Rosales

The use of organizational ethnography has grown significantly during the past decades. While language is an important component of ethnographic research, the challenges associated…

Abstract

Purpose

The use of organizational ethnography has grown significantly during the past decades. While language is an important component of ethnographic research, the challenges associated with language barriers are rarely discussed in the literature. The purpose of this paper is to open up a discussion on language barriers in organizational ethnography.

Design/methodology/approach

The author draws on her experience as a PhD student doing an organizational ethnography of an emergency department in a country where she initially did not speak the local language.

Findings

The paper examines the author's research process, from access negotiation to presentation of findings, illustrating the language barriers encountered doing an ethnography in parallel to learning the local language in Sweden.

Research limitations/implications

This paper calls for awareness of the influence of the ethnographer's language skills and shows the importance of discussing this in relation to how we teach and learn ethnography, research practice and diversity in academia.

Originality/value

The paper makes three contributions to organizational ethnography. First, it contributes to the insider/outsider debate by nuancing the ethnographer's experience. Second, it answers calls for transparency by presenting a personal ethnographic account. Third, it contributes to developing the methodology by offering tips to deal with language barriers in doing ethnography abroad.

Details

Journal of Organizational Ethnography, vol. 10 no. 2
Type: Research Article
ISSN: 2046-6749

Keywords

Article
Publication date: 1 May 2000

Steven M. Furnell and Paul S. Dowland

The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue within IT systems. Traditional methods of user…

Abstract

The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue within IT systems. Traditional methods of user authentication and access control do not provide comprehensive protection and offer opportunities for compromise by various classes of abuser. A potential solution is provided in the form of intrusion detection systems, which are able to provide proactive monitoring of system activity and apply automatic responses in the event of suspected problems. This paper presents the principles of intrusion monitoring and then proceeds to describe the conceptual architecture of the Intrusion Monitoring System (IMS), an approach that is the focus of current research and development by the authors. The main functional elements of the IMS architecture are described, followed by thoughts regarding the practical implementation and the associated advantages (and potential disadvantages) that this would deliver. It is concluded that whilst an IMS‐type approach would not represent a total replacement for conventional controls, it would represent an effective means to complement the protection already provided.

Details

Information Management & Computer Security, vol. 8 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 24 July 2012

Matthew J. Taylor, Chammie C. Austin, Jacob D. Perkins and Jason L. Edwards

Purpose – For many African American college students, the pursuit of a college education has both rewards and risks. Oftentimes, African American students are faced with the…

Abstract

Purpose – For many African American college students, the pursuit of a college education has both rewards and risks. Oftentimes, African American students are faced with the decision to leave the comforts of their home communities in order to realize the American dream through the mechanism of higher education. The majority attend predominately White institutions (PWIs) where successful negotiation of this process not only has academic consequences, but psychological and cultural consequences as well. This chapter examines the psychological and phenomenological experience of African American students at PWIs of higher education.

Design/methodology/approach – The present day manifestation of historical and sociopolitical foundations of exclusion, racism, and discrimination in higher education are explored. There is a focus on how these latter themes relate to “campus culture” and institutions, with implications for psychological coping and educational success. Conclusions also focus on ways to begin to bring about change in this culture.

Findings – The successful negotiation of the collegiate environment, ultimately leading to the awarding of one's degree requires more than just passing classes; matriculation and retention in college also involves engaging one's social and cultural environment as well, particularly outside of the classroom.

Originality/value – As discussions of multiculturalism and inclusiveness in higher education find themselves anchored to abstract and theoretical conceptualization, or linked to an approach which focuses on “numbers” and “percentages” among student bodies, both of these approaches provide little indication that we are ultimately talking about the lived experiences of real people.

Details

Health Disparities Among Under-served Populations: Implications for Research, Policy and Praxis
Type: Book
ISBN: 978-1-78190-103-8

Keywords

Article
Publication date: 26 May 2022

Ioannis Stylios, Andreas Skalkos, Spyros Kokolakis and Maria Karyda

This research aims to build a system that will continuously. This paper is an extended version of SECPRE 2021 paper and presents a research on the development and validation of a…

Abstract

Purpose

This research aims to build a system that will continuously. This paper is an extended version of SECPRE 2021 paper and presents a research on the development and validation of a behavioral biometrics continuous authentication (BBCA) system that is based on users keystroke dynamics and touch gestures on mobile devices. This paper aims to build a system that will continuously authenticate the user of a smartphone.

Design/methodology/approach

Session authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the establishment of the authenticated session. Moreover, smartphones themselves are used as authentication means, especially in two-factor authentication schemes, which are often required by several services. Whether the smartphone is in the hands of the legitimate user constitutes a great concern and correspondingly whether the legitimate user is the one who uses the services. In response to these concerns, BBCA technologies have been proposed on a large corpus of literature. This paper presents a research on the development and validation of a BBCA system (named BioPrivacy), which is based on the user’s keystroke dynamics and touch gestures, using a multi-layer perceptron (MLP). Also, this paper introduces a new BB collection tool and proposes a methodology for the selection of an appropriate set of BB.

Findings

The system achieved the best results for keystroke dynamics which are 97.18% accuracy, 0.02% equal error rate, 97.2% true acceptance rate and 0.02% false acceptance rate.

Originality/value

This paper develops a new BB collection tool, named BioPrivacy, by which behavioral data of users on mobile devices can be collected. This paper proposes a methodology for the selection of an appropriate set of BB. This paper presents the development of a BBCA system based on MLP.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 October 2003

N.L. Clarke, S.M. Furnell, B.M. Lines and P.L. Reynolds

The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for…

1530

Abstract

The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. This paper details the feasibility of a non‐intrusive subscriber authentication technique – the use of keystroke dynamics. This feasibility study comprises a number of investigations into the ability of neural networks to authenticate users successfully based on their interactions with a mobile phone keypad. The initial results are promising with network classification performing well, achieving a 9.8 per cent false rejection rate and an 11.0 per cent false acceptance rate.

Details

Information Management & Computer Security, vol. 11 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 12 June 2007

N.L. Clarke and A.R. Mekala

The popularity of mobile devices and the evolving nature of the services and information they can delivery make them increasingly desirable targets for misuse. The ability to…

1744

Abstract

Purpose

The popularity of mobile devices and the evolving nature of the services and information they can delivery make them increasingly desirable targets for misuse. The ability to provide effective authentication of the user becomes imperative if protection against misuse of personally and financially sensitive information is to be provided. This paper discusses the application of biometrics to a mobile device in a transparent and continuous fashion and the subsequent advantages and disadvantages that are in contention with various biometric techniques.

Design/methodology/approach

An investigation was conducted to evaluate the feasibility of utilising signature recognition, to verify users based upon written words and not signatures, thereby enabling transparent handwriting verification. Participants were required to write a number of common words, such as “hello” “sorry” and “thank you”. The ability to correctly verify against their own template and to reject impostors was then established.

Findings

Totally, 20 users participated in the study and an average FAR and FRR of 0 and 1.2 per cent, respectively, were experienced across eight common words.

Research limitations/implications

The initial study has proven very successful, however, further investigations need to be established with a larger population of users and a wider vocabulary of words.

Originality/value

This study has verified the feasibility of applying an existing signature recognition technique to transparent handwriting verification.

Details

Information Management & Computer Security, vol. 15 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 22 March 2022

Matthew Harrison

During the rapid transition online, university educators had to reconsider how they supported students with disabilities and neurological differences in accessing a high-quality…

Abstract

During the rapid transition online, university educators had to reconsider how they supported students with disabilities and neurological differences in accessing a high-quality remote learning experience. This chapter explores my personal experiences as an Early Career Academic (ECA) tasked with supporting our faculty during the transition to remote learning. By collating my personal experiences leading up to and throughout this period, I reflect on my own coping strategies required to fulfill this role. I also explore the forms of resilience that I utilised to support my colleagues who had a spectrum of perspectives and knowledge of inclusive digital pedagogies.

Article
Publication date: 14 September 2023

Saltanat Akhmadi and Mariza Tsakalerou

This study aims to investigate the gender diversity within innovation and entrepreneurship teams and the perceptions of gender imbalance in digital skills among team members in…

Abstract

Purpose

This study aims to investigate the gender diversity within innovation and entrepreneurship teams and the perceptions of gender imbalance in digital skills among team members in Kazakhstan, a Central Asian country belonging to the Global South.

Design/methodology/approach

Primary data were collected from ten leading firms in Kazakhstan's manufacturing, construction and oil and gas sectors, which have international connections or perspectives. The members of the research and development (R&D) departments of these firms completed an online, structured closed-question questionnaire anonymously. A total of 169 completed responses were analyzed using regression analysis, controlling for company size and sector, with gender as the independent variable.

Findings

The gender diversity within innovation teams is not as high as anticipated, even though there is a substantial representation of women in the scientific workforce across many firms. Similarly, there is a gender gap in entrepreneurship teams involved in business innovation, although it is slightly less pronounced. Female employees report a greater disparity compared to their male counterparts. Surprisingly, over 60% of both male and female respondents agree that women lack the same level of digital expertise and knowledge as men.

Research limitations/implications

The findings of this research should be interpreted in light of the fact that they are based on a perception-based survey. Local firms exhibit skepticism toward external researchers due to privacy concerns, making their participation challenging. However, it is noteworthy that the survey targeted front-line workers in the innovation and entrepreneurship field, providing informed perspectives that strengthen the study's outcomes.

Originality/value

This study reveals that while women form a considerable proportion the scientific workforce, gender diversity in innovation and entrepreneurship teams is lacking in a Global South country. Gender imbalance in innovation and entrepreneurship is thus present in both developing and developed countries, highlighting the need for interventions to promote gender diversity at the firm level.

Details

International Journal of Gender and Entrepreneurship, vol. 15 no. 3
Type: Research Article
ISSN: 1756-6266

Keywords

Article
Publication date: 10 May 2011

Susan Vinnicombe and Val Singh

The purpose of this paper is to report an interview study with 12 directors in a major international telecommunications company, to identify the career paths which they took to…

1640

Abstract

Purpose

The purpose of this paper is to report an interview study with 12 directors in a major international telecommunications company, to identify the career paths which they took to reach board level in their organisation.

Design/methodology/approach

The aim was to ascertain whether there were gender differences in the career facilitators and barriers met en route to the top. The six male and six female directors were asked about the further obstacles which they perceived would have to be faced.

Findings

Visibility through mentoring and challenge was the facilitator which led to success in their earlier careers. Using Kirchmeyer's classification, evidence was found to support her four categories of barriers in this UK sample: human capital (lack of qualifications and languages in a globalised world); individual (being aggressive, being female, and impostor syndrome); interpersonal (gaining entry to organisational politics); and family determinants. For both men and women, family roles impacted their energy levels at work. It was found that the career hurdles and facilitators were very similar for both men and women directors.

Originality/value

The study described in this paper does not show strong support for previous research, indicating significantly different barriers for men and women, as in this study, the female directors' career paths were remarkably similar to those of the men.

Details

Gender in Management: An International Journal, vol. 26 no. 3
Type: Research Article
ISSN: 1754-2413

Keywords

11 – 20 of 293