Search results

1 – 10 of 94
Open Access
Article
Publication date: 25 August 2022

Lelia Cristina Díaz-Pérez, Ana Laura Quintanar-Reséndiz, Graciela Vázquez-Álvarez and Rubén Vázquez-Medina

Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American…

1339

Abstract

Purpose

Based on this holistic model, the authors propose and analyze seven key issues related to the admissibility of digital media in cross-border trials considering four Latin American countries.

Design/methodology/approach

The authors apply the modeling process of the soft systems methodology by Checkland in order to develop a holistic model focused on human situation problems involving digital media and information technology devices or systems.

Findings

The authors discuss the status of the identified key issues in each country and offer a perspective on the integration of cross-border work analyzing the contribution of these key issues to the collaboration between countries criminal cases or the use of foreign digital artifacts in domestic trials.

Research limitations/implications

In this study, the authors assumed that the problems of official interaction between agencies of different countries are considered solved. However, for future studies or research, the authors recommend that these issues can be considered as relevant, since they are related to cross-border cooperation topics that will necessarily require unavoidable official arrangements, agreements and formalities.

Practical implications

This work is aimed at defining and analyzing the key issues that can contribute to the application of current techniques and methodologies in digital forensics as a tool to support the legal framework of each country, considering cross-border trials. Finally, the authors highlight the implications of this study lie in the identification and analysis of the key issues that must be considered for digital forensics as a support tool for the admissibility of digital evidence in cross-border trials.

Social implications

The authors consider that digital forensic will have high demand in cross-border trials, and it will depend on the people mobility between the countries considered in this study.

Originality/value

This paper shows that the soft systems methodology allows elaborating a holistic model focused on social problems involving digital media and informatics devices.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 3 June 2022

XiYue Deng, Xiaoming Li, Zhenzhen Chen, Mengli Zhu, Naixue Xiong and Li Shen

Human group behavior is the driving force behind many complex social and economic phenomena. Few studies have integrated multi-dimensional travel patterns and city interest points…

697

Abstract

Purpose

Human group behavior is the driving force behind many complex social and economic phenomena. Few studies have integrated multi-dimensional travel patterns and city interest points to construct urban security risk indicators. This paper combines traffic data and urban alarm data to analyze the safe travel characteristics of the urban population. The research results are helpful to explore the diversity of human group behavior, grasp the temporal and spatial laws and reveal regional security risks. It provides a reference for optimizing resource deployment and group intelligence analysis in emergency management.

Design/methodology/approach

Based on the dynamics index of group behavior, this paper mines the data of large shared bikes and ride-hailing in a big city of China. We integrate the urban interest points and travel dynamic characteristics, construct the urban traffic safety index based on alarm behavior and further calculate the urban safety index.

Findings

This study found significant differences in the travel power index among ride-sharing users. There is a positive correlation between user shared bike trips and the power-law bimodal phenomenon in the logarithmic coordinate system. It is closely related to the urban public security index.

Originality/value

Based on group-shared dynamic index integrated alarm, we innovatively constructed an urban public safety index and analyzed the correlation of travel alarm behavior. The research results fully reveal the internal mechanism of the group behavior safety index and provide a valuable supplement for the police intelligence analysis.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Open Access
Article
Publication date: 8 May 2024

Tapas Kumar Sethy and Naliniprava Tripathy

This study aims to explore the impact of systematic liquidity risk on the averaged cross-sectional equity return of the Indian equity market. It also examines the effects of…

Abstract

Purpose

This study aims to explore the impact of systematic liquidity risk on the averaged cross-sectional equity return of the Indian equity market. It also examines the effects of illiquidity and decomposed illiquidity on the conditional volatility of the equity market.

Design/methodology/approach

The present study employs the Liquidity Adjusted Capital Asset Pricing Model (LCAPM) for pricing systematic liquidity risk using the Fama & MacBeth cross-sectional regression model in the Indian stock market from January 1, 2012, to March 31, 2021. Further, the study employed an exponential generalized autoregressive conditional heteroscedastic (1,1) model to observe the impact of decomposed illiquidity on the equity market’s conditional volatility. The study also uses the Ordinary Least Square (OLS) model to illuminate the return-volatility-liquidity relationship.

Findings

The study’s findings indicate that the commonality between individual security liquidity and aggregate liquidity is positive, and the covariance of individual security liquidity and the market return negatively affects the expected return. The study’s outcome specifies that illiquidity time series analysis exhibits the asymmetric effect of directional change in return on illiquidity. Further, the study indicates a significant impact of illiquidity and decomposed illiquidity on conditional volatility. This suggests an asymmetric effect of illiquidity shocks on conditional volatility in the Indian stock market.

Originality/value

This study is one of the few studies that used the World Uncertainty Index (WUI) to measure liquidity and market risks as specified in the LCAPM. Further, the findings of the reverse impact of illiquidity and decomposed higher and lower illiquidity on conditional volatility confirm the presence of price informativeness and its immediate effects on illiquidity in the Indian stock market. The study strengthens earlier studies and offers new insights into stock market liquidity to clarify the association between liquidity and stock return for effective policy and strategy formulation that can benefit investors.

Details

China Accounting and Finance Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1029-807X

Keywords

Open Access
Article
Publication date: 18 December 2023

Can Huang, Cong Cao and Wim Coreynen

Since 2015, China has made efforts to reform its intellectual property rights (IPR) system to better protect and stimulate innovation. These reforms are a result of the demand for…

Abstract

Purpose

Since 2015, China has made efforts to reform its intellectual property rights (IPR) system to better protect and stimulate innovation. These reforms are a result of the demand for more stringent intellectual property (IP) protection from China’s domestic, innovative industries and a measure to ease the pressure exerted by its foreign trading partners, particularly against the background of the US-China trade dispute that started at the beginning of 2018. This paper summarizes these reforms and their implications.

Design/methodology/approach

This paper combines a variety of sources, including academic articles, government websites, news reports, industry surveys and expert opinions, to offer insights in China’s IPR system and its recent reforms.

Findings

This paper summarizes and discusses (1) the state’s law amendments, including the 2015 amendment of the “Law on Promoting the Transformation of Scientific and Technological Achievements”, the second amendment of the “Anti-Unfair Competition Law” with regard to trade secret protection, the fourth amendment of the “Patent Law”, and the legislations and regulations addressing the criticisms of the US administration over China’s so-called “forced” technology transfer policies; (2) the establishment of the specialized IP courts and tribunals since 2014; (3) the restructuring of the State IP Office; and (4) the issuing of an “Outline for Building an IPR Powerhouse (2021–2035)”.

Originality/value

This paper highlights China’s efforts to make its IPR system stronger and more just. It also discusses international observers’ reactions and pinpoints specific areas for further improvement.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2071-1395

Keywords

Open Access
Article
Publication date: 14 November 2023

Markus Kantola, Hannele Seeck, Albert J. Mills and Jean Helms Mills

This paper aims to explore how historical context influences the content and selection of rhetorical legitimation strategies. Using case study method, this paper will focus on how…

Abstract

Purpose

This paper aims to explore how historical context influences the content and selection of rhetorical legitimation strategies. Using case study method, this paper will focus on how insurance companies and labor tried to defend their legitimacy in the context of enactment of Medicare in the USA. What factors influenced the strategic (rhetorical) decisions made by insurance companies and labor unions in their institutional work?

Design/methodology/approach

The study is empirically grounded in archival research, involving an analysis of over 9,000 pages of congressional hearings on Medicare covering the period 1958–1965.

Findings

The authors show that rhetorical legitimation strategies depend significantly on the specific historical circumstances in which those strategies are used. The historical context lent credibility to certain arguments and organizations are forced to decide either to challenge widely held assumptions or take advantage of them. The authors show that organizations face strong incentives to pursue the latter option. Here, both the insurance companies and labor unions tried to show that their positions were consistent with classical liberal ideology, because of high respect of classical liberal principles among different stakeholders (policymakers, voters, etc.).

Research limitations/implications

It is uncertain how much the results of the study could be generalized. More information about the organizations whose use of rhetorics the authors studied could have strengthened our conclusions.

Practical implications

The practical relevancy of the revised paper is that the authors should not expect hegemony challenging rhetorics from organizations, which try to influence legislators (and perhaps the larger public). Perhaps (based on the findings), this kind of rhetorics is not even very effective.

Social implications

The paper helps to understand better how organizations try to advance their interests and gain acceptance among the stakeholders.

Originality/value

In this paper, the authors show how historical context in practice influence rhetorical arguments organizations select in public debates when their goal is to influence the decision-making of their audience. In particular, the authors show how dominant ideology (or ideologies) limit the options organizations face when they are choosing their strategies and arguments. In terms of the selection of rhetorical justification strategies, the most pressing question is not the “real” broad based support of certain ideologies. Insurance company and labor union representatives clearly believed that they must emphasize liberal values (or liberal ideology) if they wanted to gain legitimacy for their positions. In existing literature, it is often assumed that historical context influence the selection of rhetorical strategies but how this in fact happens is not usually specified. The paper shows how interpretations of historical contexts (including the ideological context) in practice influence the rhetorical strategies organizations choose.

Details

Journal of Management History, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1751-1348

Keywords

Open Access
Article
Publication date: 6 February 2024

Matthew Quayson, Eric Kofi Avornu and Albert Kweku Bediako

Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is…

Abstract

Purpose

Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is no decision framework to support blockchain implementation for managing information, especially in emerging economies’ healthcare supply chains. This paper develops a hierarchical decision model for implementing blockchain technology for information management in emerging economies’ healthcare supply chains.

Design/methodology/approach

This study uses 20 health supply chain experts in Ghana to rank 17 decision criteria for implementing blockchain for healthcare information management using the best-worst method (BWM) multi-criteria decision technique.

Findings

The results show that “security” and “privacy,” “infrastructural facility” and “presence of training facilities” are the top three critical factors impacting blockchain adoption in the health supply chain for healthcare information management. Other sub-factors are prioritized.

Practical implications

To implement blockchain effectively to enhance information management in the healthcare supply chain, health institutions, blockchain technology providers and state authorities should concentrate on the highly critical factors extracted from the study.

Originality/value

This is the first study that develops a hierarchical decision model for implementing blockchain technology in emerging economies' health supply chains.

Details

Modern Supply Chain Research and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2631-3871

Keywords

Open Access
Article
Publication date: 15 February 2024

Makutla Gibson Mojapelo

The purpose of this study was to investigate a framework for the implementation of freedom of information (FOI) legislation in South Africa, against Article 19’s nine principles…

Abstract

Purpose

The purpose of this study was to investigate a framework for the implementation of freedom of information (FOI) legislation in South Africa, against Article 19’s nine principles of FOI legislation.

Design/methodology/approach

This qualitative study used semi-structured interviews to collect data from six experts selected by means of the snowball sampling technique and content analysis. The study used a modified Delphi design consisting of two rounds of interviews.

Findings

The results showed that little effort is made by government officials to demonstrate commitment to the implementation of FOI legislation.

Practical implications

The passing of FOI is expected to reduce corruption, increase public participation, reduce the level of secrecy and increase transparency and openness. This is not the case as the implementation of this socioeconomic right in South Africa is faced by numerous challenges, such as a lack of political will, secrecy laws providing for the opposite of what the FOI legislation seeks to achieve, poor legislative interpretation and a lack of clear policies. The study proposes a framework aimed at addressing these challenges.

Originality/value

The study provides a framework for the implementation of FOI legislation. The framework was developed under the guidance of Article 19 principles of freedom of information legislation.

Details

Information Discovery and Delivery, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-6247

Keywords

Open Access
Article
Publication date: 28 September 2023

Ahmad Alrazni Alshammari, Othman Altwijry and Andul-Hamid Abdul-Wahab

From 1979 to 2023, the takaful structure has been adopted in many jurisdictions, making the documenting of its early days of establishment relatively difficult and somewhat…

1956

Abstract

Purpose

From 1979 to 2023, the takaful structure has been adopted in many jurisdictions, making the documenting of its early days of establishment relatively difficult and somewhat unreliable. This is unlike conventional insurance, where the history and legislation are well documented and archived in various research (Hellwege, 2016; Marano and Siri, 2017). The purpose of this paper is to provide a chronology for the establishment and development of takaful via the takaful establishment in each jurisdiction, documenting its first takaful operator and first takaful regulation.

Design/methodology/approach

This paper has used a qualitative method in the form of reviewing literature and available data such as journals, books and official resources. The data is thoroughly analysed in order to build the chronology for takaful. It adopted an exploratory research design, which is deemed suitable in situations where few works of literature have examined the subject (Neuman, 2014). The paper explores the establishment and non-establishment of takaful in 57 countries. The paper categorises the countries into seven regions starting with the GCC, Levant, Asia, Central Asia, Africa, Europe and Others.

Findings

The takaful chronology presented in this paper shows that takaful operations exist in 47 jurisdictions, starting from Sudan and the UAE in 1979, with the most recent adopters being Morocco and Iran in December 2021. It is found that 22 jurisdictions do not have takaful regulations, and the Takaful Act 1984, issued in Malaysia, is considered the first takaful regulation that sets the basis for other regulations that follow.

Originality/value

The paper contributes to the literature by providing a comprehensive chronology of takaful, especially as the few existing timelines have been found to be incomplete and consist of contradictory information.

Details

PSU Research Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2399-1747

Keywords

Open Access
Article
Publication date: 14 March 2023

Ouma Malatji and Ngoako Solomon Marutha

This study aims to investigate a framework for implementation of legislative framework governing records management throughout the life cycle in the Limpopo provincial government…

3592

Abstract

Purpose

This study aims to investigate a framework for implementation of legislative framework governing records management throughout the life cycle in the Limpopo provincial government of South Africa.

Design/methodology/approach

This quantitative multi-method study used a semi-structured questionnaire, document analysis and interviews to collect data. The dominant approach was quantitative, with some support from limited qualitative data, which served to clarify the statistical data. No sampling method was applied, as the study targeted the entire population of 135 records management participants from the provincial departments with the questionnaire, while nine participants from provincial archives participated in interviews.

Findings

The study revealed that the role of the provincial archives in enforcing compliance with legislative frameworks for the proper management of records was always disrupted by a lack of key resources such as staffing, for inspecting and training records-creating departments and working resources at the departmental levels.

Research limitations/implications

The findings will contribute to the field in respect of future studies into compliance with records management legislation, and the proposed framework may be applied as a theoretical basis for, or part of, a conceptual framework.

Practical implications

The study will serve as a resource or benchmark for archivists and records management professionals in the industry, as they count amongst the policymakers who find ways of monitoring, evaluating and enforcing compliance with the legislation governing proper records management.

Social implications

The proper implementation of recommendations from this study will lead to significant improvements in the management of records with enduring value, allowing them to finally be transferred to an archival repository to serve the public interest as heritage, national memory, or resources for researchers and authors, amongst others.

Originality/value

The study proposes a framework for implementation of legislation governing records management with greater ease in the Limpopo provincial government of South Africa.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 1 April 2024

Basmah Almekhled and Helen Petrie

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…

Abstract

Purpose

This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.

Design/methodology/approach

Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.

Findings

This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.

Research limitations/implications

One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.

Originality/value

This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.

Access

Only content I have access to

Year

Content type

Earlycite article (94)
1 – 10 of 94