Search results

1 – 10 of 907
Open Access
Article
Publication date: 30 December 2022

Durga Prasad Dube and Rajendra Prasad Mohanty

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for…

1586

Abstract

Purpose

As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for evaluating the efficiency of cyber security organization but what matters is how the factors of internal efficiency affect the business performance, i.e. the external effectiveness. The purpose of this research paper is to derive the factors of internal efficiency and external effectiveness of cyber security and develop impact model to identify the most and least preferred parameters of internal efficiency with respect to all the parameters of external effectiveness.

Design/methodology/approach

There are two objectives for this research: Deriving the factors of internal efficiency and external effectiveness of cyber security; Developing a model to identify the impact of internal efficiency factors on the external effectiveness of cyber security since there is not much evidence of research in defining the factors of internal efficiency and external effectiveness of cyber security, the authors have chosen grounded theory methodology (GTM) to derive the parameters. In this study emic approach of GTM is followed and an algorithm is developed for administering the grounded theory research process. For the second research objective survey methodology and rank order was used to formulate the impact model. Two different samples and questionnaires were designed for each of the objectives.

Findings

For the objective 1, 11 factors of efficiency and 10 factors of effectiveness were derived. These are used as independent and dependent variable respectively in the later part of the research for the second objective. For the objective 2 the impact models among independent and dependent variables were formulated to find out the following. Most and least preferred parameters lead to internal efficiency of cyber security organization to identify the most and least preferred parameters of internal efficiency with respect to all the parameters external effectiveness.

Research limitations/implications

The factors of internal efficiency and external effectiveness constructed by using grounded theory cannot remain constant in the long run, because of dynamism of the domain itself. Over and above this, there are inherent limitations of the tools like grounded theory, used in the research. Few important limitations of GTM are as below in grounded theory, it is comparatively difficult to maintain and demonstrate the rigors of research discipline. The sheer volume of data makes the analysis and interpretation complex, and lengthy time consuming. The researchers’ presence during data gathering, which is often unavoidable and desirable too in qualitative research, may affect the subjects’ responses. The subjectivity of the data leads to difficulties in establishing reliability and validity of approaches and information. It is difficult to detect or to prevent researcher-induced bias.

Practical implications

The internal efficiency and external effectiveness factors of cyber security can be further correlated by the future researchers to understand the correlations among all the factors and predict cyber security performance. The grounded theory algorithm developed by us can be further used for qualitative research for deriving theory through abstractions in the areas where there is no sufficient availability of data. Practitioners of cyber security can use this research to focus on relevant areas depending on their respective business objective/requirements. The models developed by us can be used by the future researchers to for various sectoral validations and correlations.

Social implications

Though the financial costs of a cyber-attack are steep, the social impact of cyber security failures is less readily apparent but can cause lasting damage to customers, employees and the company. Therefore, it is always important to be mindful of how the impact of cyber security affects society as well as the bottom line when they are calculating the potential impact of a breach. Underestimating either impact can destroy a brand. The factor of internal efficiency and external effectiveness derived by us will help stakeholder in focusing on relevant area depending on their business. The impact model developed in this research is very useful for focusing a particular business requirement and accordingly tune the efficiency factor.

Originality/value

During literature study the authors did not find any evidence of application of grounded theory approach in cyber security research. While the authors were exploring research literature to find out some insight into the factor of internal efficiency and external effectiveness of cyber security, the authors did not find concrete and objective research on this. This motivated us to use grounded theory to derive these factors. This, in the authors’ opinion is one of the pioneering and unique contribution to the research as to the authors’ knowledge no researchers have ever tried to use this methodology for the stated purpose and cyber security domain in general. In this process the authors have also developed an algorithm for administering GTM. Further developing impact models using factors of internal efficiency and external effectiveness has lots of managerial and practical implication.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Abstract

Details

Journal of Service Theory and Practice, vol. 33 no. 2
Type: Research Article
ISSN: 2055-6225

Open Access
Article
Publication date: 15 March 2023

Charlotta Kronblad, Johanna E. Pregmark and Rita Berggren

This paper aims to understand what prevents established law firms from embracing digitalization and discusses barriers to solving the emerging ambidexterity problem. Law firms…

1490

Abstract

Purpose

This paper aims to understand what prevents established law firms from embracing digitalization and discusses barriers to solving the emerging ambidexterity problem. Law firms have been organized in the same way for decades. However, digital opportunities are emerging and new competitors are challenging established firms. This presents established law firms with an ambidexterity problem: How can law firms simultaneously uphold their successful way of working while entering a new world of digitalization, artificial intelligence (AI) and machine learning?

Design/methodology/approach

Previous research suggests that law firms are slow in digital transformation, compared to other Professional Service Firms (PSFs). In this paper, the authors explore why this happens. Interview data from representatives in law firms are complemented with data from architects as well as legal industry data and field notes. The data have been analyzed to spot patterns and emerging themes.

Findings

The authors find that established law firms face structural and cultural barriers to applying ambidextrous solutions. When comparing law firms with architecture firms, the authors see that while established architecture firms have combined digital exploration with ongoing exploitation, established law firms have focused on exploitation, leaving digital exploration to new legal tech firms. This difference can be attributed to industry context and professional culture.

Originality/value

This paper shows that both structural and contextual ambidexterity is a challenge for established law firms. This paper contributes to the understanding of barriers to embrace digital technology, and supports practitioners in efforts to remove these barriers.

Details

Journal of Service Theory and Practice, vol. 33 no. 2
Type: Research Article
ISSN: 2055-6225

Keywords

Content available

Abstract

Details

Management of Environmental Quality: An International Journal, vol. 24 no. 3
Type: Research Article
ISSN: 1477-7835

Content available
Book part
Publication date: 25 October 2023

Sumesh Singh Dadwal

As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support…

Abstract

As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support society, ecology and economy. One of the solutions has been developing smart sustainable cities. Smart sustainable cities are cities as systems, where their infrastructure, different subsystems and different functional domains are virtually connected to the information and communication technologies (ICT) and internet via sensors and devices and the Internet of Things (IoT), to collect and process real-time Big Data and make efficient, effective and sustainable solutions for a democratic and liveable city for its various stakeholders. This chapter explores the concepts and practices of sustainable smart cities across the globe and explores the use of technologies such as IoT, Blockchain technology and Cloud computing, etc. their challenges and then presents a view on business models for sustainable smart cities.

Open Access
Article
Publication date: 4 March 2022

Caroline B. Ncube

This paper aims to explore the contours of the future intellectual property (IP) protocol of the African Continental Free Trade Area (AfCFTA) Agreement.

3739

Abstract

Purpose

This paper aims to explore the contours of the future intellectual property (IP) protocol of the African Continental Free Trade Area (AfCFTA) Agreement.

Design/methodology/approach

This paper frames the IP protocol within the architecture of the AfCFTA Agreement, meaning that it will follow the structure of other protocols and will be guided by the Agreement’s foundational principles and objectives. With the place, shape and form of the protocol so established, the paper considers the substantive aspects that ought to be addressed. It also considers provisions on technical assistance, capacity building and cooperation.

Findings

The paper finds that the Tripartite Free Trade Phase 2 IP agenda is a credible starting place, which must be broadened to better meet gendered challenges and the continent’s developmental priorities. This will entail including provisions on specific aspects enumerated in the paper, which must be aligned with provisions on technical assistance, capacity building and cooperation to enhance implementation. The best outcomes in the negotiation, adoption and implementation of the IP protocol will be achieved by an inclusive approach incorporating all national, sub-regional and regional institutions guided by coherent policy and coordinated to ensure efficiency in resources and capacity mobilisation.

Originality/value

To the best of the author’s knowledge, this is the first paper to formally consider both the architecture and substantive provisions of the future AfCFTA IP protocol with specific focus on gendered dimensions.

Details

Journal of International Trade Law and Policy, vol. 21 no. 2
Type: Research Article
ISSN: 1477-0024

Keywords

Open Access
Article
Publication date: 14 September 2023

Javier Mula-Falcón and Katia Caballero

Improving and assuring the quality of higher education has become a key element of policy agendas worldwide. To this end, a complete accountability system has been developed…

Abstract

Purpose

Improving and assuring the quality of higher education has become a key element of policy agendas worldwide. To this end, a complete accountability system has been developed through various evaluation procedures. Specifically, this study analyzes the perceptions of university teaching staff on the impact of performance appraisal systems on their professional activity, health and personal lives.

Design/methodology/approach

The study adopted a nonexperimental descriptive and causal-comparative design using a questionnaire that was completed by a sample of 2,183 Spanish teachers. The data obtained were analyzed using descriptive statistics and comparisons of differences.

Findings

The results show that, according to teachers, the evaluation criteria undermine the quality of their work by encouraging them to neglect teaching, increase scientific production and engage in unethical research practices. Their views also emphasize the social and health-related consequences of an increasingly competitive work climate, including increased stress levels. Finally, significant differences are observed regarding gender, professional category and academic discipline, with women, junior faculty and social sciences teachers expressing particularly strong views.

Originality/value

The originality of this study lies in the application of a method that contributes to the international debate through a national perspective (Spain) that has so far received little attention.

Details

Journal of Applied Research in Higher Education, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-7003

Keywords

Open Access
Article
Publication date: 27 May 2021

Olusola Joshua Olujobi

The aim of this study is to investigate how Nigeria can seek legal assistance on recovery of its stolen assets to reduce corruption and to ensure no sheltered havens for incomes…

2005

Abstract

Purpose

The aim of this study is to investigate how Nigeria can seek legal assistance on recovery of its stolen assets to reduce corruption and to ensure no sheltered havens for incomes from corruption.

Design/methodology/approach

The research adopts a conceptual method by using existing literature with the application of doctrinal legal research technique. The research likewise uses primary and secondary sources of legislations such as legislative provisions, case laws and the provisions of Chapter V of the United Nations Convention against Corruption and the process of asset recovery. The study compares the United Kingdom, USA, Hong Kong in China, South Africa and Nigeria proceeds of corruption recovery laws to gain basic legal features that would be beneficial to Nigeria in reforming its anti-corruption laws.

Findings

The principle of territorial sovereignty under the international law makes the offence of corruption not punishable outside the jurisdiction of the state where the offence was committed. As a result, some developed states boost their economy with these proceeds and the developing states are impoverished. There is also an allegation of discrepancies in the figures of funds recovered by the anti-corruption agencies. Thus, there is the need for transparency; law on civil forfeiture of proceeds of corruption; bilateral treaties; and mutual legal assistance on investigation, confiscation among countries for tracing and returning of proceeds of corruption.

Research limitations/implications

The estimates of the volume of assets looted from Nigeria vary widely because of the complexity of collecting data on proceeds of corruption as official statistics on proceeds of corruption recovered do not exist as each anti-corruption agency occasionally makes pronouncements on the volume of assets recovered without any breakdown in terms of assets seized, nature of assets and their locations and its values. Such data would aid policymakers to measure the effectiveness of the present assets legislations and to enhance its effectiveness.

Practical implications

Considering the clandestine manners corruption is being committed, it is tasking to correctly evaluate the amount of money stolen so, their economic impacts on the nation’s economy.

Social implications

Absence of accurate data would aid policymakers to measure the effectiveness of the present assets legislations and to enhance its effectiveness.

Originality/value

The study offers modules on management of proceeds of corruption by establishing “Assets Management Commission” and “Proceeds of Corruption Forfeiture Funds” for reparation of victims’ of corruption. The study suggests the necessity for civil forfeiture of proceeds of corruption, which is presently lacking, and creation of Proceeds of Corruption Recovery and Management Commission to manage such proceeds and advocate establishment of “Proceeds of Corruption Forfeiture Funds” for reparation of victims of corruption.

Details

Journal of Money Laundering Control, vol. 24 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 10 May 2021

Olusola Joshua Olujobi

This study aims to investigate why anti-corruption statutes are not efficient in Nigeria’s upstream petroleum industry.

6082

Abstract

Purpose

This study aims to investigate why anti-corruption statutes are not efficient in Nigeria’s upstream petroleum industry.

Design/methodology/approach

This study is a doctrinal legal research that embraces a point-by-point comparative methodology with a library research technique.

Findings

This study reveals that corruption strives on feeble implementation of anti-corruption legal regime and the absence of political will in offering efficient regulatory intervention. Finally, this study finds that anti-corruption organisations in Nigeria are not efficient due to non-existence of the Federal Government’s political will to fight corruption, insufficient funds and absence of stringent implementation of the anti-corruption legal regime in the country.

Research limitations/implications

Investigations reveal during this study that Nigerian National Petroleum Corporation (NNPC) operations are characterised with poor record-keeping, lack of accountability as well as secrecy in the award of oil contracts, oil licence, leases and other financial transactions due to non-disclosure or confidentiality clauses contained in most of these contracts. Also, an arbitration proceeding limit access to their records and some of these agreements under contentions. This has also limited the success of this research work and generalising its findings.

Practical implications

This study recommends, among other reforms, soft law technique and stringent execution of anti-corruption statutes. This study also recommends increment in financial appropriation to Nigeria’s anti-corruption institutions, taking into consideration the finding that a meagre budget is a drawback.

Social implications

This study reveals that corruption strives on feeble implementation of anti-corruption legal regime and the absence of political will in offering efficient regulatory intervention. Corruption flourishes due to poor enforcement of anti-corruption laws and the absence of political will in offering efficient regulatory intervention by the government.

Originality/value

The study advocates the need for enhancement of anti-corruption agencies' budgets taking into consideration the finding that meagres budgets are challenge of the agencies.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Content available
Article
Publication date: 16 March 2015

James Hartigan and Joseph McMahon

619

Abstract

Details

Journal of International Trade Law and Policy, vol. 14 no. 1
Type: Research Article
ISSN: 1477-0024

1 – 10 of 907