Search results

1 – 10 of 452
Open Access
Article
Publication date: 17 April 2024

Elham Rostami and Fredrik Karlsson

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for…

Abstract

Purpose

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs.

Design/methodology/approach

A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. The authors extracted 890 sentences from these ISPs that included one or more of the analyzed keywords. These sentences were analyzed using the new metric – keyword loss of specificity – to assess to what extent the selected keywords were used for pinpointing and guiding actionable advice. Thus, the authors classified the extracted sentences as either actionable advice or other information, depending on the type of information conveyed.

Findings

The results show a significant keyword loss of specificity in relation to pieces of actionable advice in ISPs provided by Swedish public agencies. About two-thirds of the sentences in which the analyzed keywords were used focused on information other than actionable advice. Such dual use of keywords reduces the possibility of pinpointing and communicating clear, actionable advice.

Research limitations/implications

The suggested metric provides a means to assess the quality of how keywords are used in ISPs for different purposes. The results show that more research is needed on how keywords are used in ISPs.

Practical implications

The authors recommended that ISP designers exercise caution when using keywords in ISPs and maintain coherency in their use of keywords. ISP designers can use the suggested metrics to assess the quality of actionable advice in their ISPs.

Originality/value

The keyword loss of specificity metric adds to the few quantitative metrics available to assess ISP quality. To the best of the authors’ knowledge, applying this metric is a first attempt to measure the quality of actionable advice in ISPs.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 26 February 2021

Viktor Elliot, Jonas Floden, Conny Overland, Zeeshan Raza, Miroslaw Staron, Johan Woxenius, Abhinayan Basu, Trisha Rajput, Gerardo Schneider and Gunnar Stefansson

The purpose of this paper is to study current practices in adopting blockchain technology amongst export companies in West Sweden and to capture their CEOs’ knowledge of and…

1909

Abstract

Purpose

The purpose of this paper is to study current practices in adopting blockchain technology amongst export companies in West Sweden and to capture their CEOs’ knowledge of and attitudes towards blockchains.

Design/methodology/approach

Factors enabling or hindering the adoption of blockchains were identified from a comprehensive literature review and a survey of 72 chief executive officers (CEOs) of export-oriented firms in West Sweden, all with turnovers exceeding €2m, regarding their knowledge of and attitudes towards blockchains.

Findings

Blockchain technology is not currently perceived to provide benefits that would outweigh the costs of introducing it into West Sweden’s export firms. Nevertheless, the findings suggest that such technology, though currently too immature to meet today’s industrial requirements, could experience more widespread use if certain key factors (i.e. lower cost, traceability, improved security or trustworthiness and new blockchain-enabled business models) are prioritised.

Research limitations/implications

Answered by 72 CEOs, the survey achieved a response rate of 6%, meaning that the findings are only exploratory. Even so, they offer new insights into CEOs’ attitudes towards blockchain technology.

Practical implications

The CEOs reported comparatively limited knowledge of and experience with implementing blockchains, the lack of which has hampered their large-scale implementation in multi-actor supply chains.

Social implications

Negative sentiment amongst CEOs towards blockchain technology may lower on-the-job satisfaction amongst tech personnel aspiring to develop and implement blockchain applications in their firms.

Originality/value

Knowledge of and attitudes towards blockchain technology amongst top-level managers, as well as about factors enabling or hindering its adoption, guide managers in crafting strategies for implementing blockchains in their organisations and maximising the benefits therein. Unlike past studies focussing on technological aspects or views of experts and middle-management, the study was designed to capture the views of CEOs.

Details

Journal of Global Operations and Strategic Sourcing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5364

Keywords

Open Access
Article
Publication date: 25 August 2022

Lelia Cristina Díaz-Pérez, Ana Laura Quintanar-Reséndiz, Graciela Vázquez-Álvarez and Rubén Vázquez-Medina

Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American…

1323

Abstract

Purpose

Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American countries.

Design/methodology/approach

The authors apply the modeling process of the soft systems methodology by Checkland in order to develop a holistic model focused on human situation problems involving digital media and information technology devices or systems.

Findings

The authors discuss the status of the identified key issues in each country and offer a perspective on the integration of cross-border work analyzing the contribution of these key issues to the collaboration between countries criminal cases or the use of foreign digital artifacts in domestic trials.

Research limitations/implications

In this study, the authors assumed that the problems of official interaction between agencies of different countries are considered solved. However, for future studies or research, the authors recommend that these issues can be considered as relevant, since they are related to cross-border cooperation topics that will necessarily require unavoidable official arrangements, agreements and formalities.

Practical implications

This work is aimed at defining and analyzing the key issues that can contribute to the application of current techniques and methodologies in digital forensics as a tool to support the legal framework of each country, considering cross-border trials. Finally, the authors highlight the implications of this study lie in the identification and analysis of the key issues that must be considered for digital forensics as a support tool for the admissibility of digital evidence in cross-border trials.

Social implications

The authors consider that digital forensic will have high demand in cross-border trials, and it will depend on the people mobility between the countries considered in this study.

Originality/value

This paper shows that the soft systems methodology allows elaborating a holistic model focused on social problems involving digital media and informatics devices.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 26 December 2022

James Crotty and Elizabeth Daniel

Consumers increasingly rely on organisations for online services and data storage while these same institutions seek to digitise the information assets they hold to create…

3038

Abstract

Purpose

Consumers increasingly rely on organisations for online services and data storage while these same institutions seek to digitise the information assets they hold to create economic value. Cybersecurity failures arising from malicious or accidental actions can lead to significant reputational and financial loss which organisations must guard against. Despite having some critical weaknesses, qualitative cybersecurity risk analysis is widely used in developing cybersecurity plans. This research explores these weaknesses, considers how quantitative methods might address the constraints and seeks the insights and recommendations of leading cybersecurity practitioners on the use of qualitative and quantitative cyber risk assessment methods.

Design/methodology/approach

The study is based upon a literature review and thematic analysis of in-depth qualitative interviews with 16 senior cybersecurity practitioners representing financial services and advisory companies from across the world.

Findings

While most organisations continue to rely on qualitative methods for cybersecurity risk assessment, some are also actively using quantitative approaches to enhance their cybersecurity planning efforts. The primary recommendation of this paper is that organisations should adopt both a qualitative and quantitative cyber risk assessment approach.

Originality/value

This work provides the first insight into how senior practitioners are using and combining qualitative and quantitative cybersecurity risk assessment, and highlights the need for in-depth comparisons of these two different approaches.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 22 March 2024

Zuzana Bednarik and Maria I. Marshall

As many businesses faced economic disruption due to the Covid-19 pandemic and sought financial relief, existing bank relationships became critical to getting a loan. This study…

Abstract

Purpose

As many businesses faced economic disruption due to the Covid-19 pandemic and sought financial relief, existing bank relationships became critical to getting a loan. This study examines factors associated with the development of personal relationships of rural small businesses with community bank representatives.

Design/methodology/approach

We applied a mixed-method approach. We employed descriptive statistics, principal factor analysis and logistic regression for data analysis. We distributed an online survey to rural small businesses in five states in the United States. Key informant interviews with community bank representatives supplemented the survey results.

Findings

A business owner’s trust in a banker was positively associated with the establishment of a business–bank relationship. However, an analysis of individual trust’s components revealed that the nature of trust is complex, and a failure of one or more components may lead to decreased trustworthiness in a banker. Small businesses that preferred personal communication with a bank were more inclined to relationship banking.

Research limitations/implications

Due to the relatively small sample size and cross-sectional data, our results may not be conclusive but should be viewed as preliminary and as suggestions for future research. Bankers should be aware of the importance of trust for small business owners and of the actions that lead to increased trustworthiness.

Originality/value

The study extends the existing knowledge on the business–bank relationship by focusing mainly on social (instead of economic) factors associated with the establishment of the business–bank relationship in times of crisis and high uncertainty.

Details

Journal of Small Business and Enterprise Development, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1462-6004

Keywords

Open Access
Article
Publication date: 6 February 2024

Matthew Quayson, Eric Kofi Avornu and Albert Kweku Bediako

Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is…

Abstract

Purpose

Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is no decision framework to support blockchain implementation for managing information, especially in emerging economies’ healthcare supply chains. This paper develops a hierarchical decision model for implementing blockchain technology for information management in emerging economies’ healthcare supply chains.

Design/methodology/approach

This study uses 20 health supply chain experts in Ghana to rank 17 decision criteria for implementing blockchain for healthcare information management using the best-worst method (BWM) multi-criteria decision technique.

Findings

The results show that “security” and “privacy,” “infrastructural facility” and “presence of training facilities” are the top three critical factors impacting blockchain adoption in the health supply chain for healthcare information management. Other sub-factors are prioritized.

Practical implications

To implement blockchain effectively to enhance information management in the healthcare supply chain, health institutions, blockchain technology providers and state authorities should concentrate on the highly critical factors extracted from the study.

Originality/value

This is the first study that develops a hierarchical decision model for implementing blockchain technology in emerging economies' health supply chains.

Details

Modern Supply Chain Research and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2631-3871

Keywords

Open Access
Article
Publication date: 20 October 2023

Usman Musa, Mastura Jaafar and Faraziera Mohd Raslim

This study attempts to examine the factors that influence user intention to adopt e-procurement in the Nigerian public sector.

1582

Abstract

Purpose

This study attempts to examine the factors that influence user intention to adopt e-procurement in the Nigerian public sector.

Design/methodology/approach

A well-structured questionnaire was used to collect primary data from 278 procurement and information technology (IT) departments’ officials of key federal government ministries and agencies. The technology acceptance model (TAM) model was adopted and extended with security-related factors, namely perceived trust and perceived security. A partial least squares-structural equation modelling (PLS-SEM) approach was used to test and validate the model.

Findings

The results indicated that perceived usefulness is the best predictor of users’ intention to adopt e-procurement, followed by perceived security and perceived trust. In contrast, however, perceived ease of use was found to have a significant negative effect on the intention to adopt e-procurement.

Originality/value

This study is among the first in the Nigerian public sector context to evaluate users’ perceptions on e-procurement adoption with the use of a distinctive research model (TAM). The study's findings contribute to a better understanding of the factors influencing the adoption of e-procurement in the Nigerian public sector.

Details

Arab Gulf Journal of Scientific Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-9899

Keywords

Open Access
Article
Publication date: 24 November 2023

Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…

Abstract

Purpose

Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).

Design/methodology/approach

This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.

Findings

The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.

Research limitations/implications

The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.

Practical implications

The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.

Originality/value

This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 4 December 2023

Ignat Kulkov, Julia Kulkova, Daniele Leone, René Rohrbeck and Loick Menvielle

The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and…

1138

Abstract

Purpose

The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and value creation. This study also aims to explore the potential of combining AI with other technologies, such as cloud computing, blockchain, IoMT, additive manufacturing and 5G, in the healthcare industry.

Design/methodology/approach

Exploratory qualitative methodology was chosen to analyze 22 case studies from the USA, EU, Asia and South America. The data source was public and specialized podcast platforms.

Findings

The findings show that combining technologies can create a competitive advantage for technology entrepreneurs and bring about transitions from simple consumer devices to actionable healthcare applications. The results of this research identified three main entrepreneurship areas: 1. Analytics, including staff reduction, patient prediction and decision support; 2. Security, including protection against cyberattacks and detection of atypical cases; 3. Performance optimization, which, in addition to reducing the time and costs of medical procedures, includes staff training, reducing capital costs and working with new markets.

Originality/value

This study demonstrates how AI can be used with other technologies to cocreate value in the healthcare industry. This study provides a conceptual framework, “AI facilitators – AI achievers,” based on the findings and offer several theoretical contributions to academic literature in technology entrepreneurship and technology management and industry recommendations for practical implication.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Open Access
Article
Publication date: 30 March 2021

Christophe Gaie, Bertrand Florat and Steven Morvan

In the present article, the authors tackle the problem of IT documentation, which plays an important role in information technology (IT) project management.

2162

Abstract

Purpose

In the present article, the authors tackle the problem of IT documentation, which plays an important role in information technology (IT) project management.

Design/methodology/approach

They provide a simple tool based on five complementary views, which should be detailed by the project team using a classic source code management platform.

Findings

The proposed tool is open source and may be reused by any IT team in various project contexts and heterogeneous development methods.

Originality/value

This research provides an operational framework, which facilitates IT project management and documentation. The framework is open source and may be easily downloaded by any other IT team.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Access

Only content I have access to

Year

Content type

Earlycite article (452)
1 – 10 of 452