Search results
1 – 10 of 907Durga Prasad Dube and Rajendra Prasad Mohanty
As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for…
Abstract
Purpose
As evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful for evaluating the efficiency of cyber security organization but what matters is how the factors of internal efficiency affect the business performance, i.e. the external effectiveness. The purpose of this research paper is to derive the factors of internal efficiency and external effectiveness of cyber security and develop impact model to identify the most and least preferred parameters of internal efficiency with respect to all the parameters of external effectiveness.
Design/methodology/approach
There are two objectives for this research: Deriving the factors of internal efficiency and external effectiveness of cyber security; Developing a model to identify the impact of internal efficiency factors on the external effectiveness of cyber security since there is not much evidence of research in defining the factors of internal efficiency and external effectiveness of cyber security, the authors have chosen grounded theory methodology (GTM) to derive the parameters. In this study emic approach of GTM is followed and an algorithm is developed for administering the grounded theory research process. For the second research objective survey methodology and rank order was used to formulate the impact model. Two different samples and questionnaires were designed for each of the objectives.
Findings
For the objective 1, 11 factors of efficiency and 10 factors of effectiveness were derived. These are used as independent and dependent variable respectively in the later part of the research for the second objective. For the objective 2 the impact models among independent and dependent variables were formulated to find out the following. Most and least preferred parameters lead to internal efficiency of cyber security organization to identify the most and least preferred parameters of internal efficiency with respect to all the parameters external effectiveness.
Research limitations/implications
The factors of internal efficiency and external effectiveness constructed by using grounded theory cannot remain constant in the long run, because of dynamism of the domain itself. Over and above this, there are inherent limitations of the tools like grounded theory, used in the research. Few important limitations of GTM are as below in grounded theory, it is comparatively difficult to maintain and demonstrate the rigors of research discipline. The sheer volume of data makes the analysis and interpretation complex, and lengthy time consuming. The researchers’ presence during data gathering, which is often unavoidable and desirable too in qualitative research, may affect the subjects’ responses. The subjectivity of the data leads to difficulties in establishing reliability and validity of approaches and information. It is difficult to detect or to prevent researcher-induced bias.
Practical implications
The internal efficiency and external effectiveness factors of cyber security can be further correlated by the future researchers to understand the correlations among all the factors and predict cyber security performance. The grounded theory algorithm developed by us can be further used for qualitative research for deriving theory through abstractions in the areas where there is no sufficient availability of data. Practitioners of cyber security can use this research to focus on relevant areas depending on their respective business objective/requirements. The models developed by us can be used by the future researchers to for various sectoral validations and correlations.
Social implications
Though the financial costs of a cyber-attack are steep, the social impact of cyber security failures is less readily apparent but can cause lasting damage to customers, employees and the company. Therefore, it is always important to be mindful of how the impact of cyber security affects society as well as the bottom line when they are calculating the potential impact of a breach. Underestimating either impact can destroy a brand. The factor of internal efficiency and external effectiveness derived by us will help stakeholder in focusing on relevant area depending on their business. The impact model developed in this research is very useful for focusing a particular business requirement and accordingly tune the efficiency factor.
Originality/value
During literature study the authors did not find any evidence of application of grounded theory approach in cyber security research. While the authors were exploring research literature to find out some insight into the factor of internal efficiency and external effectiveness of cyber security, the authors did not find concrete and objective research on this. This motivated us to use grounded theory to derive these factors. This, in the authors’ opinion is one of the pioneering and unique contribution to the research as to the authors’ knowledge no researchers have ever tried to use this methodology for the stated purpose and cyber security domain in general. In this process the authors have also developed an algorithm for administering GTM. Further developing impact models using factors of internal efficiency and external effectiveness has lots of managerial and practical implication.
Details
Keywords
Charlotta Kronblad, Johanna E. Pregmark and Rita Berggren
This paper aims to understand what prevents established law firms from embracing digitalization and discusses barriers to solving the emerging ambidexterity problem. Law firms…
Abstract
Purpose
This paper aims to understand what prevents established law firms from embracing digitalization and discusses barriers to solving the emerging ambidexterity problem. Law firms have been organized in the same way for decades. However, digital opportunities are emerging and new competitors are challenging established firms. This presents established law firms with an ambidexterity problem: How can law firms simultaneously uphold their successful way of working while entering a new world of digitalization, artificial intelligence (AI) and machine learning?
Design/methodology/approach
Previous research suggests that law firms are slow in digital transformation, compared to other Professional Service Firms (PSFs). In this paper, the authors explore why this happens. Interview data from representatives in law firms are complemented with data from architects as well as legal industry data and field notes. The data have been analyzed to spot patterns and emerging themes.
Findings
The authors find that established law firms face structural and cultural barriers to applying ambidextrous solutions. When comparing law firms with architecture firms, the authors see that while established architecture firms have combined digital exploration with ongoing exploitation, established law firms have focused on exploitation, leaving digital exploration to new legal tech firms. This difference can be attributed to industry context and professional culture.
Originality/value
This paper shows that both structural and contextual ambidexterity is a challenge for established law firms. This paper contributes to the understanding of barriers to embrace digital technology, and supports practitioners in efforts to remove these barriers.
Details
Keywords
As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support…
Abstract
As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support society, ecology and economy. One of the solutions has been developing smart sustainable cities. Smart sustainable cities are cities as systems, where their infrastructure, different subsystems and different functional domains are virtually connected to the information and communication technologies (ICT) and internet via sensors and devices and the Internet of Things (IoT), to collect and process real-time Big Data and make efficient, effective and sustainable solutions for a democratic and liveable city for its various stakeholders. This chapter explores the concepts and practices of sustainable smart cities across the globe and explores the use of technologies such as IoT, Blockchain technology and Cloud computing, etc. their challenges and then presents a view on business models for sustainable smart cities.
Details
Keywords
This paper aims to explore the contours of the future intellectual property (IP) protocol of the African Continental Free Trade Area (AfCFTA) Agreement.
Abstract
Purpose
This paper aims to explore the contours of the future intellectual property (IP) protocol of the African Continental Free Trade Area (AfCFTA) Agreement.
Design/methodology/approach
This paper frames the IP protocol within the architecture of the AfCFTA Agreement, meaning that it will follow the structure of other protocols and will be guided by the Agreement’s foundational principles and objectives. With the place, shape and form of the protocol so established, the paper considers the substantive aspects that ought to be addressed. It also considers provisions on technical assistance, capacity building and cooperation.
Findings
The paper finds that the Tripartite Free Trade Phase 2 IP agenda is a credible starting place, which must be broadened to better meet gendered challenges and the continent’s developmental priorities. This will entail including provisions on specific aspects enumerated in the paper, which must be aligned with provisions on technical assistance, capacity building and cooperation to enhance implementation. The best outcomes in the negotiation, adoption and implementation of the IP protocol will be achieved by an inclusive approach incorporating all national, sub-regional and regional institutions guided by coherent policy and coordinated to ensure efficiency in resources and capacity mobilisation.
Originality/value
To the best of the author’s knowledge, this is the first paper to formally consider both the architecture and substantive provisions of the future AfCFTA IP protocol with specific focus on gendered dimensions.
Details
Keywords
Javier Mula-Falcón and Katia Caballero
Improving and assuring the quality of higher education has become a key element of policy agendas worldwide. To this end, a complete accountability system has been developed…
Abstract
Purpose
Improving and assuring the quality of higher education has become a key element of policy agendas worldwide. To this end, a complete accountability system has been developed through various evaluation procedures. Specifically, this study analyzes the perceptions of university teaching staff on the impact of performance appraisal systems on their professional activity, health and personal lives.
Design/methodology/approach
The study adopted a nonexperimental descriptive and causal-comparative design using a questionnaire that was completed by a sample of 2,183 Spanish teachers. The data obtained were analyzed using descriptive statistics and comparisons of differences.
Findings
The results show that, according to teachers, the evaluation criteria undermine the quality of their work by encouraging them to neglect teaching, increase scientific production and engage in unethical research practices. Their views also emphasize the social and health-related consequences of an increasingly competitive work climate, including increased stress levels. Finally, significant differences are observed regarding gender, professional category and academic discipline, with women, junior faculty and social sciences teachers expressing particularly strong views.
Originality/value
The originality of this study lies in the application of a method that contributes to the international debate through a national perspective (Spain) that has so far received little attention.
Details
Keywords
The aim of this study is to investigate how Nigeria can seek legal assistance on recovery of its stolen assets to reduce corruption and to ensure no sheltered havens for incomes…
Abstract
Purpose
The aim of this study is to investigate how Nigeria can seek legal assistance on recovery of its stolen assets to reduce corruption and to ensure no sheltered havens for incomes from corruption.
Design/methodology/approach
The research adopts a conceptual method by using existing literature with the application of doctrinal legal research technique. The research likewise uses primary and secondary sources of legislations such as legislative provisions, case laws and the provisions of Chapter V of the United Nations Convention against Corruption and the process of asset recovery. The study compares the United Kingdom, USA, Hong Kong in China, South Africa and Nigeria proceeds of corruption recovery laws to gain basic legal features that would be beneficial to Nigeria in reforming its anti-corruption laws.
Findings
The principle of territorial sovereignty under the international law makes the offence of corruption not punishable outside the jurisdiction of the state where the offence was committed. As a result, some developed states boost their economy with these proceeds and the developing states are impoverished. There is also an allegation of discrepancies in the figures of funds recovered by the anti-corruption agencies. Thus, there is the need for transparency; law on civil forfeiture of proceeds of corruption; bilateral treaties; and mutual legal assistance on investigation, confiscation among countries for tracing and returning of proceeds of corruption.
Research limitations/implications
The estimates of the volume of assets looted from Nigeria vary widely because of the complexity of collecting data on proceeds of corruption as official statistics on proceeds of corruption recovered do not exist as each anti-corruption agency occasionally makes pronouncements on the volume of assets recovered without any breakdown in terms of assets seized, nature of assets and their locations and its values. Such data would aid policymakers to measure the effectiveness of the present assets legislations and to enhance its effectiveness.
Practical implications
Considering the clandestine manners corruption is being committed, it is tasking to correctly evaluate the amount of money stolen so, their economic impacts on the nation’s economy.
Social implications
Absence of accurate data would aid policymakers to measure the effectiveness of the present assets legislations and to enhance its effectiveness.
Originality/value
The study offers modules on management of proceeds of corruption by establishing “Assets Management Commission” and “Proceeds of Corruption Forfeiture Funds” for reparation of victims’ of corruption. The study suggests the necessity for civil forfeiture of proceeds of corruption, which is presently lacking, and creation of Proceeds of Corruption Recovery and Management Commission to manage such proceeds and advocate establishment of “Proceeds of Corruption Forfeiture Funds” for reparation of victims of corruption.
Details
Keywords
This study aims to investigate why anti-corruption statutes are not efficient in Nigeria’s upstream petroleum industry.
Abstract
Purpose
This study aims to investigate why anti-corruption statutes are not efficient in Nigeria’s upstream petroleum industry.
Design/methodology/approach
This study is a doctrinal legal research that embraces a point-by-point comparative methodology with a library research technique.
Findings
This study reveals that corruption strives on feeble implementation of anti-corruption legal regime and the absence of political will in offering efficient regulatory intervention. Finally, this study finds that anti-corruption organisations in Nigeria are not efficient due to non-existence of the Federal Government’s political will to fight corruption, insufficient funds and absence of stringent implementation of the anti-corruption legal regime in the country.
Research limitations/implications
Investigations reveal during this study that Nigerian National Petroleum Corporation (NNPC) operations are characterised with poor record-keeping, lack of accountability as well as secrecy in the award of oil contracts, oil licence, leases and other financial transactions due to non-disclosure or confidentiality clauses contained in most of these contracts. Also, an arbitration proceeding limit access to their records and some of these agreements under contentions. This has also limited the success of this research work and generalising its findings.
Practical implications
This study recommends, among other reforms, soft law technique and stringent execution of anti-corruption statutes. This study also recommends increment in financial appropriation to Nigeria’s anti-corruption institutions, taking into consideration the finding that a meagre budget is a drawback.
Social implications
This study reveals that corruption strives on feeble implementation of anti-corruption legal regime and the absence of political will in offering efficient regulatory intervention. Corruption flourishes due to poor enforcement of anti-corruption laws and the absence of political will in offering efficient regulatory intervention by the government.
Originality/value
The study advocates the need for enhancement of anti-corruption agencies' budgets taking into consideration the finding that meagres budgets are challenge of the agencies.
Details