Search results
1 – 10 of 337During the 17th century, the Dutch Republic sought to project a positive global image centred around the principles of economic endeavour, moral stewardship and military…
Abstract
Purpose
During the 17th century, the Dutch Republic sought to project a positive global image centred around the principles of economic endeavour, moral stewardship and military resilience. By illustrating one way in which the country sought to communicate its international position, the paper aims to provide an early example of political diplomacy and reputation management.
Design/methodology/approach
Pictorial narratives provide an important but often underutilised insight into our cultural, social and economic history. As works of art were considered legitimate and authoritative forms of communication, their importance can lie beyond any aesthetic accomplishment. Using established iconographic techniques, this paper deconstructs and interprets the meaning contained within a specific genre painting, The Young Mother (1658) by Gerrit Dou.
Findings
Rather than being devoid of meaning, The Young Mother represents a narrative purposely constructed to symbolise the cultural, religious and economic character of the United Provinces. It celebrates success through global trade, innovation and enterprise while simultaneously reminding audiences of the country’s moral and spiritual foundations. Like the patriotic allegory of De Hollandse Maag protecting the sacred space of the hortus conclusus, the painting is a secular representation of the new Loca Sancta.
Originality/value
While acknowledging that The Young Mother has been praised for its visual qualities, this paper maintains that any broader political significance has been largely overlooked. The analysis and findings therefore offer original interpretations from which new conclusions are drawn.
Details
Keywords
Kathleen Gunning, Judy E. Myers and Charles W. Bailey
In 1989, the University of Houston Libraries began a two‐year project to build an experimental Intelligent Reference Information System (IRIS). The IRIS project established a…
Abstract
In 1989, the University of Houston Libraries began a two‐year project to build an experimental Intelligent Reference Information System (IRIS). The IRIS project established a ten‐workstation CD‐ROM network that provided access to 19 CD‐ROM databases, developed an expert system to recommend reference sources, and conducted three research studies. In 1992, the Libraries initiated a new project to replace the IRIS network infrastructure, expand the number of network workstations, increase the number of networked CD‐ROM databases, offer remote access to CD‐ROMs, and provide access to new types of network resources, such as electronic serials and OPACs on the Internet. The Libraries also began a related project to develop a new version of the expert system.
Dimitrios Patsos, Sarandis Mitropoulos and Christos Douligeris
The paper proposes looking at the automation of the incident response (IR) process, through formal, systematic and standardized methods for collection, normalization and…
Abstract
Purpose
The paper proposes looking at the automation of the incident response (IR) process, through formal, systematic and standardized methods for collection, normalization and correlation of security data (i.e. vulnerability, exploit and intrusion detection information).
Design/methodology/approach
The paper proposes the incident response intelligence system (IRIS) that models the context of discovered vulnerabilities, calculates their significance, finds and analyzes potential exploit code and defines the necessary intrusion detection signatures that combat possible attacks, using standardized techniques. It presents the IRIS architecture and operations, as well as the implementation issues.
Findings
The paper presents detailed evaluation results obtained from real‐world application scenarios, including a survey of the users' experience, to highlight IRIS contribution in the area of IR.
Originality/value
The paper introduces the IRIS, a system that provides detailed security information during the entire lifecycle of a security incident, facilitates decision support through the provision of possible attack and response paths, while deciding on the significance and magnitude of an attack with a standardized method.
Details
Keywords
DON REVILL, ABRAHAM SILENCE, RONALD D CODLIN and SHEILA RAY
FOLLOWING ON from Roy Tomlinson's article (NLW July), while agreeing with much that he says I would like to enlarge on some points. I had hoped that the educational technology…
Abstract
FOLLOWING ON from Roy Tomlinson's article (NLW July), while agreeing with much that he says I would like to enlarge on some points. I had hoped that the educational technology argument had been laid to rest after the publication in the Times higher educational supplement of correspondence occasioned by the Library Association's statements on resource centres.
Zehorit Dadon-Golan, Iris BenDavid-Hadar and Joseph Klein
The purpose of this paper is twofold. First, it examines the extent of equity in the academic achievement distribution by analyzing Israeli students’ high school matriculation…
Abstract
Purpose
The purpose of this paper is twofold. First, it examines the extent of equity in the academic achievement distribution by analyzing Israeli students’ high school matriculation scores, controlling for background characteristics (e.g. parental education) and for previous achievement. Second, it analyzes the trends in equity during the examined period from 2001 to 2011.
Design/methodology/approach
Nationwide extensive data sets, at the student level, of 11 cohorts are analyzed using logistic regression models.
Findings
Major findings reveal that the odds ratios (ORs) are in favor of students from families with a high level of parental education (an increment of one year of parental education increases the odds of student’s success by 3 percent). In addition, the ORs are less favorable for Arab students (30 percent lower). Furthermore, a high previous achievement level increases the odds of success (an increment of 1 percent in achievement increases the odds by 6 percent). In addition, the extent of inequity remains stable throughout the examined period.
Originality/value
Israel serves as an interesting case study, as its student achievement distribution in international examinations is characterized by the highest gap compared with other OECD countries, although its policy aspires to achieve equity. This puzzle, is the motivation for this study. Moreover, insights from this research might assist policy makers to promote equitable education.
Details
Keywords
The purpose of this paper is to analyze the applicability of biometric systems in travel and explain how they can be used in response to today's increasing security problems.
Abstract
Purpose
The purpose of this paper is to analyze the applicability of biometric systems in travel and explain how they can be used in response to today's increasing security problems.
Design/methodology/approach
This research is conceptual. Its analysis is based on an extensive review of literature on biometric systems.
Findings
Biometric systems can improve travel security without compromising consumer value, convenience, and privacy. Deployment of various applications of biometric systems (i.e. immigration/visitor management systems, trusted traveler programs) improve specific aspects of travel security. Biometric systems present challenges, associated with consumers' perceptions of system functionality, privacy, trust, and anxiety, which must be examined in the context of consumer adoption. To achieve synergy in travel information technology and provide benefits to all stakeholders, biometric systems must seamlessly integrate with other travel technologies, both intra‐firm and inter‐firm.
Research limitations/implications
This research provides a domain statement for biometric systems in travel and stays at the foundation of a methodical approach for the study of biometric systems in travel. It offers a conceptual framework that asserts that an integrated deployment and adoption of biometric systems in travel can transform the current travel system into an ideal, more secure system. Further, this study formulates a number of propositions for further empirical examination of biometric systems in specific fields within travel.
Practical implications
This research provides specific suggestions to integrate biometric systems with the existing systems to achieve synergies and derive benefits for travel stakeholders.
Social implications
Addressing the security‐privacy relationship, biometric systems have social implications. Travelers' concerns about privacy, fear of harm, trust, and anxiety are found to influence their view of biometric systems, with potential implications for adoption and use.
Originality/value
To date, there is scant academic research examining how biometric systems improve travel security. Thus, the position of this research is unique: it offers insight into a technology that is promising for both research and practitioners investigating the role of biometric systems in improving travel security and paves the way for a multitude of specific research directions.
Details
Keywords
Íris Barbosa and Carlos Cabral‐Cardoso
The purpose of this paper is to look at the way higher‐education institutions are responding to the challenges of an increasingly diverse academic force and the extent to which…
Abstract
Purpose
The purpose of this paper is to look at the way higher‐education institutions are responding to the challenges of an increasingly diverse academic force and the extent to which organizational culture welcomes and values diversity, thus allowing the university to benefit from talented people with diverse backgrounds.
Design/methodology/approach
The study was conducted in a Portuguese university. Data were collected from 45 interviews with faculty members from different backgrounds and affiliations.
Findings
The organization studied is failing to promote equal opportunities policies and to manage the increasingly diverse academic workforce. Behavioural pressures to conform and parochial and inward looking attitudes appear to prevail. Values‐in‐use and artefacts seem to reflect the assimilation ideals. National origin came out as the key diversity issue. The integration of foreign academics is left to the individuals concerned and little effort is made to accommodate and to take advantage of their unique contribution.
Originality/value
The paper provides an in‐depth account of subtle discriminatory mechanisms faced by non‐native academics in a university that does not value diversity.
Details
Keywords
Sajaad Ahmed Lone and Ajaz Hussain Mir
Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy…
Abstract
Purpose
Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based on knowledge and tokens, although widely used, lead to most security breaches. While providing various advantages, biometrics are also subject to security threats. Using multiple factors together for authentication provides more certainty about a user’s identity; thus, leading to a more reliable, effective and more difficult for an adversary to intrude. This study aims to propose a novel, secure and highly stable multi-factor one-time password (OTP) authentication solution for mobile environments, which uses all three authentication factors for user authentication.
Design/methodology/approach
The proposed authentication scheme is implemented as a challenge-response authentication where three factors (username, device number and fingerprint) are used as a secret key between the client and the server. The current scheme adopts application-based authentication and guarantees data confidentiality and improved security because of the integration of biometrics with other factors and each time new challenge value by the server to client for OTP generation.
Findings
The proposed authentication scheme is implemented on real android-based mobile devices, tested on real users; experimental results show that the proposed authentication scheme attains improved performance. Furthermore, usability evaluation proves that proposed authentication is effective, efficient and convenient for users in mobile environments.
Originality/value
The proposed authentication scheme can be adapted as an effective authentication scheme to accessing critical information using android smartphones.
Details
Keywords
Liz Chapman, Elizabeth Baker, Peter H Mann, WA Munford and AGK Leonard
‘WHAT A novel arrangement. Is any reason given?’
Katharina Puchmüller and Iris Fischlmayr
The purpose of this paper is to evaluate experiences of female international business travellers living in dual-career families (DCFs) who also have childcare obligations. In…
Abstract
Purpose
The purpose of this paper is to evaluate experiences of female international business travellers living in dual-career families (DCFs) who also have childcare obligations. In particular, the paper explores in which way different sources of support – specifically organizational support – are perceived as important and are available to the women under research. Because of the women’s regular absences due to business trips and the fulfilment of their family role, challenges regarding childcare or household responsibilities may occur. Consequently and also according to social support theory, different types of support may be necessary to organize family and international career, and effectively perform in both environments.
Design/methodology/approach
This paper examines the experiences and thoughts of these women with special regards on support issues. Data are collected from 51 semi-structured interviews with internationally travelling women in DCF situations originating from seven Western and non-Western countries. The interviews are analysed applying template analysis.
Findings
Results show that, across countries, support is mainly derived from within family. Regarding institutional or organizational support, however, the reported expectations and actually offered activities differ because of local institutional and cultural variations. The examined women value different forms of organizational support, but do not necessarily expect it.
Originality/value
This paper represents the first exploratory examinations of various forms of support for female international business travellers in DCFs suggested by social support theory. It includes a culturally diverse sample and contributes to cross-cultural career research.
Details