Search results
1 – 10 of 452Elham Rostami and Fredrik Karlsson
This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for…
Abstract
Purpose
This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs.
Design/methodology/approach
A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. The authors extracted 890 sentences from these ISPs that included one or more of the analyzed keywords. These sentences were analyzed using the new metric – keyword loss of specificity – to assess to what extent the selected keywords were used for pinpointing and guiding actionable advice. Thus, the authors classified the extracted sentences as either actionable advice or other information, depending on the type of information conveyed.
Findings
The results show a significant keyword loss of specificity in relation to pieces of actionable advice in ISPs provided by Swedish public agencies. About two-thirds of the sentences in which the analyzed keywords were used focused on information other than actionable advice. Such dual use of keywords reduces the possibility of pinpointing and communicating clear, actionable advice.
Research limitations/implications
The suggested metric provides a means to assess the quality of how keywords are used in ISPs for different purposes. The results show that more research is needed on how keywords are used in ISPs.
Practical implications
The authors recommended that ISP designers exercise caution when using keywords in ISPs and maintain coherency in their use of keywords. ISP designers can use the suggested metrics to assess the quality of actionable advice in their ISPs.
Originality/value
The keyword loss of specificity metric adds to the few quantitative metrics available to assess ISP quality. To the best of the authors’ knowledge, applying this metric is a first attempt to measure the quality of actionable advice in ISPs.
Details
Keywords
Viktor Elliot, Jonas Floden, Conny Overland, Zeeshan Raza, Miroslaw Staron, Johan Woxenius, Abhinayan Basu, Trisha Rajput, Gerardo Schneider and Gunnar Stefansson
The purpose of this paper is to study current practices in adopting blockchain technology amongst export companies in West Sweden and to capture their CEOs’ knowledge of and…
Abstract
Purpose
The purpose of this paper is to study current practices in adopting blockchain technology amongst export companies in West Sweden and to capture their CEOs’ knowledge of and attitudes towards blockchains.
Design/methodology/approach
Factors enabling or hindering the adoption of blockchains were identified from a comprehensive literature review and a survey of 72 chief executive officers (CEOs) of export-oriented firms in West Sweden, all with turnovers exceeding €2m, regarding their knowledge of and attitudes towards blockchains.
Findings
Blockchain technology is not currently perceived to provide benefits that would outweigh the costs of introducing it into West Sweden’s export firms. Nevertheless, the findings suggest that such technology, though currently too immature to meet today’s industrial requirements, could experience more widespread use if certain key factors (i.e. lower cost, traceability, improved security or trustworthiness and new blockchain-enabled business models) are prioritised.
Research limitations/implications
Answered by 72 CEOs, the survey achieved a response rate of 6%, meaning that the findings are only exploratory. Even so, they offer new insights into CEOs’ attitudes towards blockchain technology.
Practical implications
The CEOs reported comparatively limited knowledge of and experience with implementing blockchains, the lack of which has hampered their large-scale implementation in multi-actor supply chains.
Social implications
Negative sentiment amongst CEOs towards blockchain technology may lower on-the-job satisfaction amongst tech personnel aspiring to develop and implement blockchain applications in their firms.
Originality/value
Knowledge of and attitudes towards blockchain technology amongst top-level managers, as well as about factors enabling or hindering its adoption, guide managers in crafting strategies for implementing blockchains in their organisations and maximising the benefits therein. Unlike past studies focussing on technological aspects or views of experts and middle-management, the study was designed to capture the views of CEOs.
Details
Keywords
Lelia Cristina Díaz-Pérez, Ana Laura Quintanar-Reséndiz, Graciela Vázquez-Álvarez and Rubén Vázquez-Medina
Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American…
Abstract
Purpose
Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American countries.
Design/methodology/approach
The authors apply the modeling process of the soft systems methodology by Checkland in order to develop a holistic model focused on human situation problems involving digital media and information technology devices or systems.
Findings
The authors discuss the status of the identified key issues in each country and offer a perspective on the integration of cross-border work analyzing the contribution of these key issues to the collaboration between countries criminal cases or the use of foreign digital artifacts in domestic trials.
Research limitations/implications
In this study, the authors assumed that the problems of official interaction between agencies of different countries are considered solved. However, for future studies or research, the authors recommend that these issues can be considered as relevant, since they are related to cross-border cooperation topics that will necessarily require unavoidable official arrangements, agreements and formalities.
Practical implications
This work is aimed at defining and analyzing the key issues that can contribute to the application of current techniques and methodologies in digital forensics as a tool to support the legal framework of each country, considering cross-border trials. Finally, the authors highlight the implications of this study lie in the identification and analysis of the key issues that must be considered for digital forensics as a support tool for the admissibility of digital evidence in cross-border trials.
Social implications
The authors consider that digital forensic will have high demand in cross-border trials, and it will depend on the people mobility between the countries considered in this study.
Originality/value
This paper shows that the soft systems methodology allows elaborating a holistic model focused on social problems involving digital media and informatics devices.
Details
Keywords
James Crotty and Elizabeth Daniel
Consumers increasingly rely on organisations for online services and data storage while these same institutions seek to digitise the information assets they hold to create…
Abstract
Purpose
Consumers increasingly rely on organisations for online services and data storage while these same institutions seek to digitise the information assets they hold to create economic value. Cybersecurity failures arising from malicious or accidental actions can lead to significant reputational and financial loss which organisations must guard against. Despite having some critical weaknesses, qualitative cybersecurity risk analysis is widely used in developing cybersecurity plans. This research explores these weaknesses, considers how quantitative methods might address the constraints and seeks the insights and recommendations of leading cybersecurity practitioners on the use of qualitative and quantitative cyber risk assessment methods.
Design/methodology/approach
The study is based upon a literature review and thematic analysis of in-depth qualitative interviews with 16 senior cybersecurity practitioners representing financial services and advisory companies from across the world.
Findings
While most organisations continue to rely on qualitative methods for cybersecurity risk assessment, some are also actively using quantitative approaches to enhance their cybersecurity planning efforts. The primary recommendation of this paper is that organisations should adopt both a qualitative and quantitative cyber risk assessment approach.
Originality/value
This work provides the first insight into how senior practitioners are using and combining qualitative and quantitative cybersecurity risk assessment, and highlights the need for in-depth comparisons of these two different approaches.
Details
Keywords
Zuzana Bednarik and Maria I. Marshall
As many businesses faced economic disruption due to the Covid-19 pandemic and sought financial relief, existing bank relationships became critical to getting a loan. This study…
Abstract
Purpose
As many businesses faced economic disruption due to the Covid-19 pandemic and sought financial relief, existing bank relationships became critical to getting a loan. This study examines factors associated with the development of personal relationships of rural small businesses with community bank representatives.
Design/methodology/approach
We applied a mixed-method approach. We employed descriptive statistics, principal factor analysis and logistic regression for data analysis. We distributed an online survey to rural small businesses in five states in the United States. Key informant interviews with community bank representatives supplemented the survey results.
Findings
A business owner’s trust in a banker was positively associated with the establishment of a business–bank relationship. However, an analysis of individual trust’s components revealed that the nature of trust is complex, and a failure of one or more components may lead to decreased trustworthiness in a banker. Small businesses that preferred personal communication with a bank were more inclined to relationship banking.
Research limitations/implications
Due to the relatively small sample size and cross-sectional data, our results may not be conclusive but should be viewed as preliminary and as suggestions for future research. Bankers should be aware of the importance of trust for small business owners and of the actions that lead to increased trustworthiness.
Originality/value
The study extends the existing knowledge on the business–bank relationship by focusing mainly on social (instead of economic) factors associated with the establishment of the business–bank relationship in times of crisis and high uncertainty.
Details
Keywords
Matthew Quayson, Eric Kofi Avornu and Albert Kweku Bediako
Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is…
Abstract
Purpose
Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is no decision framework to support blockchain implementation for managing information, especially in emerging economies’ healthcare supply chains. This paper develops a hierarchical decision model for implementing blockchain technology for information management in emerging economies’ healthcare supply chains.
Design/methodology/approach
This study uses 20 health supply chain experts in Ghana to rank 17 decision criteria for implementing blockchain for healthcare information management using the best-worst method (BWM) multi-criteria decision technique.
Findings
The results show that “security” and “privacy,” “infrastructural facility” and “presence of training facilities” are the top three critical factors impacting blockchain adoption in the health supply chain for healthcare information management. Other sub-factors are prioritized.
Practical implications
To implement blockchain effectively to enhance information management in the healthcare supply chain, health institutions, blockchain technology providers and state authorities should concentrate on the highly critical factors extracted from the study.
Originality/value
This is the first study that develops a hierarchical decision model for implementing blockchain technology in emerging economies' health supply chains.
Details
Keywords
Usman Musa, Mastura Jaafar and Faraziera Mohd Raslim
This study attempts to examine the factors that influence user intention to adopt e-procurement in the Nigerian public sector.
Abstract
Purpose
This study attempts to examine the factors that influence user intention to adopt e-procurement in the Nigerian public sector.
Design/methodology/approach
A well-structured questionnaire was used to collect primary data from 278 procurement and information technology (IT) departments’ officials of key federal government ministries and agencies. The technology acceptance model (TAM) model was adopted and extended with security-related factors, namely perceived trust and perceived security. A partial least squares-structural equation modelling (PLS-SEM) approach was used to test and validate the model.
Findings
The results indicated that perceived usefulness is the best predictor of users’ intention to adopt e-procurement, followed by perceived security and perceived trust. In contrast, however, perceived ease of use was found to have a significant negative effect on the intention to adopt e-procurement.
Originality/value
This study is among the first in the Nigerian public sector context to evaluate users’ perceptions on e-procurement adoption with the use of a distinctive research model (TAM). The study's findings contribute to a better understanding of the factors influencing the adoption of e-procurement in the Nigerian public sector.
Details
Keywords
Ornella Tanga Tambwe, Clinton Ohis Aigbavboa and Opeoluwa Akinradewo
Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of…
Abstract
Purpose
Data represents a critical resource that enables construction companies’ success; thus, its management is very important. The purpose of this study is to assess the benefits of construction data risks management (DRM) in the construction industry (CI).
Design/methodology/approach
This study adopted a quantitative method and collected data from various South African construction professionals with the aid of an e-questionnaire. These professionals involve electrical engineers, quantity surveyors, architects and mechanical, as well as civil engineers involved under a firm, or organisation within the province of Gauteng, South Africa. Standard deviation, mean item score, non-parametric Kruskal–Wallis H test and exploratory factor analysis were used to analyse the retrieved data.
Findings
The findings revealed that DRM enhances project and company data availability, promotes confidentiality and enhances integrity, which are the primary benefits of DRM that enable the success of project delivery.
Research limitations/implications
The research was carried out only in the province of Gauteng due to COVID-19 travel limitations.
Practical implications
The construction companies will have their data permanently in their possession and no interruption will be seen due to data unavailability, which, in turn, will allow long-term and overall pleasant project outcomes.
Originality/value
This study seeks to address the benefits of DRM in the CI to give additional knowledge on risk management within the built environment to promote success in every project.
Details
Keywords
Ignat Kulkov, Julia Kulkova, Daniele Leone, René Rohrbeck and Loick Menvielle
The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and…
Abstract
Purpose
The purpose of this study is to examine the role of artificial intelligence (AI) in transforming the healthcare sector, with a focus on how AI contributes to entrepreneurship and value creation. This study also aims to explore the potential of combining AI with other technologies, such as cloud computing, blockchain, IoMT, additive manufacturing and 5G, in the healthcare industry.
Design/methodology/approach
Exploratory qualitative methodology was chosen to analyze 22 case studies from the USA, EU, Asia and South America. The data source was public and specialized podcast platforms.
Findings
The findings show that combining technologies can create a competitive advantage for technology entrepreneurs and bring about transitions from simple consumer devices to actionable healthcare applications. The results of this research identified three main entrepreneurship areas: 1. Analytics, including staff reduction, patient prediction and decision support; 2. Security, including protection against cyberattacks and detection of atypical cases; 3. Performance optimization, which, in addition to reducing the time and costs of medical procedures, includes staff training, reducing capital costs and working with new markets.
Originality/value
This study demonstrates how AI can be used with other technologies to cocreate value in the healthcare industry. This study provides a conceptual framework, “AI facilitators – AI achievers,” based on the findings and offer several theoretical contributions to academic literature in technology entrepreneurship and technology management and industry recommendations for practical implication.
Details
Keywords
Christophe Gaie, Bertrand Florat and Steven Morvan
In the present article, the authors tackle the problem of IT documentation, which plays an important role in information technology (IT) project management.
Abstract
Purpose
In the present article, the authors tackle the problem of IT documentation, which plays an important role in information technology (IT) project management.
Design/methodology/approach
They provide a simple tool based on five complementary views, which should be detailed by the project team using a classic source code management platform.
Findings
The proposed tool is open source and may be reused by any IT team in various project contexts and heterogeneous development methods.
Originality/value
This research provides an operational framework, which facilitates IT project management and documentation. The framework is open source and may be easily downloaded by any other IT team.
Details