Search results

1 – 10 of over 4000
Open Access
Article
Publication date: 9 December 2020

Paula M. Di Nota, Bryce E. Stoliker, Adam D. Vaughan, Judith P. Andersen and Gregory S. Anderson

The purpose of this study isto synthesize recent empirical research investigating memory of stressful critical incidents (both simulated and occurring in the field) among law…

5384

Abstract

Purpose

The purpose of this study isto synthesize recent empirical research investigating memory of stressful critical incidents (both simulated and occurring in the field) among law enforcement officers.

Design/methodology/approach

The study used the approach of systematic state-of-the-art review.

Findings

In total, 20 studies of police and military officers show reduced detail and accuracy of high- versus low-stress incidents, especially for peripheral versus target information. Decrements in memory performance were mediated by the extent of physiological stress responses. Delayed recall accuracy was improved among officers that engaged in immediate post-incident rehearsal, including independent debriefing or reviewing body-worn camera footage.

Research limitations/implications

Most studies were not found through systematic database searches, highlighting a need for broader indexing and/or open access publishing to make research more accessible.

Practical implications

By understanding how stress physiology enhances or interferes with memory encoding, consolidation and recall, evidence-based practices surrounding post-incident evidence gathering are recommended.

Social implications

The current review addresses common public misconceptions of enhanced cognitive performance among police relative to the average citizen.

Originality/value

The current work draws from scientific knowledge about the pervasive influence of stress physiology on memory to inform existing practices surrounding post-incident evidence gathering among police.

Details

Policing: An International Journal, vol. 44 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Open Access
Article
Publication date: 6 July 2023

Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of…

1178

Abstract

Purpose

The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of such a warrant in South African criminal cases.

Design/methodology/approach

This paper provides a brief overview of international and local impediments, followed by a detailed discussion of the implications of these impediments and how it is approached in various jurisdictions. The methodology of this paper consists of a literature review.

Findings

Addressing the impediments in the compilation of the application and the warrant will be beneficial for forensic investigators, the South African Police Service (SAPS) and the administration of justice in South Africa.

Research limitations/implications

Search and seizures for digital evidence form part of civil, regulatory and criminal search and seizures. This study focuses on the search and seizure of digital evidence in criminal matters pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.

Originality/value

The originality of this paper lies in the approach to the drafting of applications for search and seizure warrants for digital information in South Africa. The contribution of the study is that, by using this approach, the SAPS can address the impediments during the application and compilation of the warrants, which would enhance the quality of investigations and contribute to the successful investigation and prosecution of crime in South Africa.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 5 April 2019

Kwadwo Owusu, Ayisi Kofi Emmanuel, Issah Justice Musah-Surugu and Paul William Kojo Yankson

This paper aims to provide empirical evidence on the El Nino and its effects on maize production in three municipalities: Ejura, Techiman and Wenchi in the transitional zone of…

3257

Abstract

Purpose

This paper aims to provide empirical evidence on the El Nino and its effects on maize production in three municipalities: Ejura, Techiman and Wenchi in the transitional zone of Ghana. Using a mixed approach, the study details the effects of the El Nino on rainy season characteristics, particularly, rainfall amounts and distribution, onset and cessation of rains, duration of the rainy season and total seasonal rainfall and how it impacted smallholder maize production.

Design/methodology/approach

The study used a mixed method approach in collecting and analyzing data. For stronger evidence building, (Creswell, 2013) the authors combined interviews and focus group discussions (FGD) to collect the qualitative data. Semi-structured questionnaires were administered to extension officers, management information system officers and other relevant personnel of the Ministry of Agriculture in the three municipalities. Six FGD’s were held for maize farmers in six communities in all three municipalities.

Findings

The study shows that the 2015 El Nino had dire consequences on farm yields, subsequently affecting farmer’s incomes and livelihoods. The study further finds that complex socio-cultural factors, some unrelated to the El Nino, aggravated the effects on maize farmers. These include the lack of adequate climatic information, predominance of rain-fed farming, a lack of capacity to adapt and existing levels of poverty.

Originality/value

The study recommends inter alia, appropriate use of seasonal rainfall forecasting to enhance better farming decision-making and the development of elaborate climate variability interventions by national and local agencies.

Details

International Journal of Climate Change Strategies and Management, vol. 11 no. 5
Type: Research Article
ISSN: 1756-8692

Keywords

Open Access
Article
Publication date: 28 July 2023

Makutla Mojapelo

Democratic countries all over the world are embarking on initiatives to empower citizens through public participation. One of the tools used by countries to promote public…

1163

Abstract

Purpose

Democratic countries all over the world are embarking on initiatives to empower citizens through public participation. One of the tools used by countries to promote public participation is the enactment and implementation of freedom of information (FOI) legislation, as it is the case with South Africa and Zimbabwe. Despite having legislation reaffirming the need for people’s right to know, practices in South Africa and Zimbabwe indicate the opposite. The purpose of this study is to explore FOI models in South Africa and Zimbabwe, with a view to recommend ways in which people’s right to know can be promoted.

Design/methodology/approach

This qualitative study used interviews to collect the data from 12 FOI experts in South Africa and Zimbabwe, who were selected through the snowball sampling technique. Data collected through interviews were supplemented by the data collected through document analysis.

Findings

The study concluded that the key role players need to make efforts to ensure that the right to know, which is associated with FOI, is being realised in both countries. FOI legislation, in both countries, is imprecise and needs to be revised to ensure effective implementation.

Originality/value

The study demonstrates that FOI is a necessary tool for people to be involved in decision-making in government. People’s rights to know can be achieved by successfully implementing FOI legislation.

Details

Records Management Journal, vol. 34 no. 1
Type: Research Article
ISSN: 0956-5698

Keywords

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Content available

Abstract

Details

The Electronic Library, vol. 24 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Open Access
Article
Publication date: 15 April 2021

Chitra Sabapathy

Interest in leadership research began in early 20th century; yet the definition of leadership has been blurred, and contested. This is evident in countless leadership theoretical…

Abstract

Interest in leadership research began in early 20th century; yet the definition of leadership has been blurred, and contested. This is evident in countless leadership theoretical perspectives, models and frameworks that have been emerging and which make it challenging for aspiring leaders to learn and develop especially in this volatile age. Higher institutions, to future proof their undergraduates, have responded to this critical need, by offering either specialized leadership content or leadership communication courses, or focusing more on one discipline than the other. However, a more holistic approach, underpinned by behaviorist and constructivist theories of teaching and learning, that prepares leaders for these turbulent times is urgently needed. This teaching experience discusses the evolution, process and impact of a collaborative effort between two disciplines, Information Systems (IS) leadership content and IS leadership communication skills. University administered anonymous qualitative and quantitative post module evaluation reports show that while some students see the relevance and transference of leadership knowledge and skills to other domains, other do not see the need to learn about these skills before they begin their professional career. These findings offer valuable potholes to avoid and insights for future leadership training efforts.

Details

Journal of Leadership Education, vol. 20 no. 2
Type: Research Article
ISSN: 1552-9045

Content available
Book part
Publication date: 4 December 2020

Abdelkebir Sahid, Yassine Maleh and Mustapha Belaissaoui

Abstract

Details

Strategic Information System Agility: From Theory to Practices
Type: Book
ISBN: 978-1-80043-811-8

Content available
Article
Publication date: 1 January 2004

David Tan

969

Abstract

Details

Library Management, vol. 25 no. 1/2
Type: Research Article
ISSN: 0143-5124

Keywords

Open Access
Article
Publication date: 30 December 2022

Durga Prasad Dube and Rajendra Prasad Mohanty

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for…

2010

Abstract

Purpose

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for evaluating the efficiency of cyber security organization but what matters is how the factors of internal efficiency affect the business performance, i.e. the external effectiveness. The purpose of this research paper is to derive the factors of internal efficiency and external effectiveness of cyber security and develop impact model to identify the most and least preferred parameters of internal efficiency with respect to all the parameters of external effectiveness.

Design/methodology/approach

There are two objectives for this research: Deriving the factors of internal efficiency and external effectiveness of cyber security; Developing a model to identify the impact of internal efficiency factors on the external effectiveness of cyber security since there is not much evidence of research in defining the factors of internal efficiency and external effectiveness of cyber security, the authors have chosen grounded theory methodology (GTM) to derive the parameters. In this study emic approach of GTM is followed and an algorithm is developed for administering the grounded theory research process. For the second research objective survey methodology and rank order was used to formulate the impact model. Two different samples and questionnaires were designed for each of the objectives.

Findings

For the objective 1, 11 factors of efficiency and 10 factors of effectiveness were derived. These are used as independent and dependent variable respectively in the later part of the research for the second objective. For the objective 2 the impact models among independent and dependent variables were formulated to find out the following. Most and least preferred parameters lead to internal efficiency of cyber security organization to identify the most and least preferred parameters of internal efficiency with respect to all the parameters external effectiveness.

Research limitations/implications

The factors of internal efficiency and external effectiveness constructed by using grounded theory cannot remain constant in the long run, because of dynamism of the domain itself. Over and above this, there are inherent limitations of the tools like grounded theory, used in the research. Few important limitations of GTM are as below in grounded theory, it is comparatively difficult to maintain and demonstrate the rigors of research discipline. The sheer volume of data makes the analysis and interpretation complex, and lengthy time consuming. The researchers’ presence during data gathering, which is often unavoidable and desirable too in qualitative research, may affect the subjects’ responses. The subjectivity of the data leads to difficulties in establishing reliability and validity of approaches and information. It is difficult to detect or to prevent researcher-induced bias.

Practical implications

The internal efficiency and external effectiveness factors of cyber security can be further correlated by the future researchers to understand the correlations among all the factors and predict cyber security performance. The grounded theory algorithm developed by us can be further used for qualitative research for deriving theory through abstractions in the areas where there is no sufficient availability of data. Practitioners of cyber security can use this research to focus on relevant areas depending on their respective business objective/requirements. The models developed by us can be used by the future researchers to for various sectoral validations and correlations.

Social implications

Though the financial costs of a cyber-attack are steep, the social impact of cyber security failures is less readily apparent but can cause lasting damage to customers, employees and the company. Therefore, it is always important to be mindful of how the impact of cyber security affects society as well as the bottom line when they are calculating the potential impact of a breach. Underestimating either impact can destroy a brand. The factor of internal efficiency and external effectiveness derived by us will help stakeholder in focusing on relevant area depending on their business. The impact model developed in this research is very useful for focusing a particular business requirement and accordingly tune the efficiency factor.

Originality/value

During literature study the authors did not find any evidence of application of grounded theory approach in cyber security research. While the authors were exploring research literature to find out some insight into the factor of internal efficiency and external effectiveness of cyber security, the authors did not find concrete and objective research on this. This motivated us to use grounded theory to derive these factors. This, in the authors’ opinion is one of the pioneering and unique contribution to the research as to the authors’ knowledge no researchers have ever tried to use this methodology for the stated purpose and cyber security domain in general. In this process the authors have also developed an algorithm for administering GTM. Further developing impact models using factors of internal efficiency and external effectiveness has lots of managerial and practical implication.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

1 – 10 of over 4000