Search results

1 – 10 of over 2000
Article
Publication date: 22 March 2013

Joon‐heon Song and Kyoung‐joo Lee

This paper aims to deepen understanding of the interrelated questions: how Japanese antidumping policies have been formulated and transformed; what the reasons are for such…

Abstract

Purpose

This paper aims to deepen understanding of the interrelated questions: how Japanese antidumping policies have been formulated and transformed; what the reasons are for such caution in adopting antidumping measures; and what patterns can be observed of recent changes in antidumping policy and legal systems.

Design/methodology/approach

To explain the changes in antidumping policy and rules in Japan, this paper examines not only political competition among bureaucratic organizations but also policy learning by bureaucratic organizations and their effects on change in policy preferences and advancements in the legal system.

Findings

The effects of bureaucratic politics and policy learning not only complexly interact but also are highly complicated to initiate policy changes in accordance with the maturity of antidumping legal system. In this case study, the policy learning has led the rival bureaucrats to a consensus to change antidumping policy and legal system, but the agreement could be a temporal truce that may easily collapse by political contingencies.

Originality/value

Along with the influences of large‐scale economic and political dynamisms, this paper focuses on two aspects of the policy subsystem to explain those changes: one is political competition among bureaucratic organizations claiming jurisdiction of antidumping policy; the other is the effect of policy learning among bureaucratic organizations on changes in policy preferences and on advancements in antidumping rules.

Details

Journal of International Trade Law and Policy, vol. 12 no. 1
Type: Research Article
ISSN: 1477-0024

Keywords

Article
Publication date: 11 February 2019

Maria Claudia Solarte Vasquez, Mait Rungi and Katrin Merike Nyman-Metcalf

This paper aims to report on signs of public awareness and empowerment among the general public that are presumed to determine the viability of the smart contracting (SC) approach…

Abstract

Purpose

This paper aims to report on signs of public awareness and empowerment among the general public that are presumed to determine the viability of the smart contracting (SC) approach and identifies prevailing concerns regarding individual transactional experiences.

Design/methodology/approach

A mixed approach was followed to explore perceptions of self-regulation and transaction friendliness by using an interpretative multiple case study method and by presenting a descriptive summative analysis of the data.

Findings

On self-regulation, the study reveals spread awareness, empowerment, contractual competences and responsibility. Regarding transaction friendliness, subject matter influences transaction experiences the most, and trust and engagement are the most problematic factors. The findings support the viability of SC, endorsing the application of proactive perspectives in legal and managerial practice.

Research limitations/implications

The study confirms the foundational assumptions of SC, identifies key transactional issues that should be further addressed to improve the functionality of digital trade environments and contributes to the consolidation of the legal design research field on transaction usability.

Practical implications

The findings point to the viability of SC. Organizations and practitioners are given indications on transaction upgrade priorities and invited to adopt and help disseminate the proposal.

Social implications

The expansion of a collaborative transactional culture can reduce legal disputes, improving the legal environment of business and strengthening private governance regulatory models.

Originality/value

This is the first empirical study on the viability conditions of the SC-approach, identifying transactional usability testing and intervention priorities.

Details

International Journal of Law and Management, vol. 61 no. 1
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 9 March 2015

Phil Brooke and Richard Paige

This paper aims to classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for…

Abstract

Purpose

This paper aims to classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for non-expert IT users.

Design/methodology/approach

The authors review the existing literature, and then identify user stories typical to their users of interest. They analyse the risks, mitigations of risks and the limits of those mitigations in the user stories.

Findings

The scenarios identified suggest that background, opportunistic encryption has value, but more explicit, user-visible cryptographic mechanisms do not provide any further mitigation. Other mechanisms beyond technological mitigations provide the required mitigation for the users.

Research limitations/implications

Further work should be carried out on the trust issues with trusted third parties, as they are intrinsic to global, automated cryptographic mechanisms. The authors suggest that deployed systems should rely on automation rather than explicit user involvement; further work on how best to involve users effectively remains valuable.

Practical implications

Deployed systems should rely on automation rather than explicit user dialogues. This follows from recognised aspects of user behaviour, such as ignoring dialogues and unconsciously making a holistic assessment of risk that is mostly mitigated by social factors.

Social implications

The user populations concerned rely significantly on the existing legal and social infrastructure to mitigate some risks, such as those associated with e-commerce. Guarantees from third parties and the existence of fallback procedures improve user confidence.

Originality/value

This work uses user stories as a basis for a holistic review of the issues surrounding the use of cryptography. The authors concentrate on a relatively large population (non-expert IT users) carrying out typical tasks (web and email).

Details

Information & Computer Security, vol. 23 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 July 2003

Ali Shiri

This column gives an overview of current trends in digital library research under the following headings: digital library architecture, systems, tools and technologies; digital…

7557

Abstract

This column gives an overview of current trends in digital library research under the following headings: digital library architecture, systems, tools and technologies; digital content and collections; metadata; interoperability; standards; knowledge organisation systems; users and usability; legal, organisational, economic, and social issues in digital libraries.

Details

Library Review, vol. 52 no. 5
Type: Research Article
ISSN: 0024-2535

Keywords

Article
Publication date: 20 April 2022

Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind and Josef Noll

This paper aims to present arguments about how a complex concept of privacy labeling can be a solution to the current state of privacy.

Abstract

Purpose

This paper aims to present arguments about how a complex concept of privacy labeling can be a solution to the current state of privacy.

Design/methodology/approach

The authors give a precise definition of Privacy Labeling (PL), painting a panoptic portrait from seven different perspectives: Business, Legal, Regulatory, Usability and Human Factors, Educative, Technological and Multidisciplinary. They describe a common vision, proposing several important “traits of character” of PL as well as identifying “undeveloped potentialities”, i.e. open problems on which the community can focus.

Findings

This position paper identifies the stakeholders of the PL and their needs with regard to privacy, describing how PL should be and look like to address these needs. Main aspects considered are the PL’s educational power to change people’s knowledge of privacy, tools useful for constructing PL and the possible visual appearances of PL. They also identify how the present landscape of privacy certifications could be improved by PL.

Originality/value

The authors adopt a multidisciplinary approach to defining PL as well as give guidelines in the form of goals, characteristics, open problems, starting points and a roadmap for creating the ideal PL.

Details

Information & Computer Security, vol. 30 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 October 2018

Amy Kazuye Kimura

The purpose of this paper is to review the library and information science literature related to the accessibility of digital resources by individuals with mental, physical or…

2471

Abstract

Purpose

The purpose of this paper is to review the library and information science literature related to the accessibility of digital resources by individuals with mental, physical or other impairments, to assess the state of research in the field and to explore new avenues for investigation.

Design/methodology/approach

There is an increasingly rich body of literature surrounding digital accessibility in libraries, ranging from practical guides for authors of Web content, to principles of universal design, to the ethical considerations of libraries subscribing to packages of digital content, to critical examinations of the accessibility guidelines themselves. This review is intended to be illustrative, not exhaustive; less attention is given to studies of specific tools that will become quickly outdated, and more attention is given to underlying considerations and approaches that will remain relevant even as technologies change.

Findings

Many libraries and vendors have taken steps to provide equal access to websites and electronic resources in recent years. While the literature reflects an increasing level of critical engagement with concepts around disability and diversity, it also demonstrates methodological weaknesses in assessment projects that do not lead to meaningful accessibility.

Originality/value

This review offers theoretical and practical perspectives from recent work that can assist librarians in planning and decision-making, as they deal with an increasingly complex landscape of digital resources.

Details

Reference Services Review, vol. 46 no. 3
Type: Research Article
ISSN: 0090-7324

Keywords

Article
Publication date: 5 January 2010

Helen M. Byamugisha

People have become increasingly dependent on digital information and the internet as a medium for gaining and exchanging information. However, despite promising developments…

3804

Abstract

Purpose

People have become increasingly dependent on digital information and the internet as a medium for gaining and exchanging information. However, despite promising developments, numerous challenges that are related to digital content and collection, interoperability, standards, knowledge organization systems, users and usability, legal, organizational and social issues, staff education, infrastructure, language barrier, and technology remain. This paper aims to address these issues.

Design/methodology/approach

This paper investigates the challenges to digital collection and content in Uganda.

Findings

This paper concludes that digital libraries are a key technology especially for developing countries.

Originality/value

Digital libraries can assist human development by providing a non‐commercial mechanism for distributing humanitarian information on topics such as health, agriculture, nutrition, hygiene, sanitation, water supply, and many other areas ranging from disaster relief to medical education. The paper recommends that adapting quickly to new digital technology is vital for success.

Details

Library Management, vol. 31 no. 1/2
Type: Research Article
ISSN: 0143-5124

Keywords

Book part
Publication date: 25 October 2023

Ali Katouzian Bolourforoush and Hamid Jahankhani

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman…

Abstract

Banking traces back to 2000 BC in Assyria, India and Sumeria. Merchants used to give grain loans to farmers and traders to carry goods between cities. In ancient Greece and Roman Empire, lenders in temples, provided loans, and accepted deposits while performed change of money. The archaeological evidence uncovered in India and China corroborates this. The major development in banking came predominantly in the mediaeval, Renaissance Italy, with the major cities Florence, Venice and Genoa being the financial centres. Technology has become an inherent and integral part of our lives. We are generating a huge amount of data in transfer, storage and usage, with greater demands of ubiquitous accessibility, inducing an enormous impact on industry and society. With the emergence of smarter cities and societies, the security challenges pertinent to data become greater, impending impact on the consumer protection and security. The aim of this chapter is to highlight if SSI and passwordless authentication using FIDO-2 protocol assuage security concerns such as authentication and authorisation while preserving the individual's privacy.

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Keywords

Article
Publication date: 29 November 2018

Adina Mulliken and Kerry Falloon

The purpose of this paper is to explore a topic where blind participants expressed significant concern: obtaining full text and accessible full text.

3957

Abstract

Purpose

The purpose of this paper is to explore a topic where blind participants expressed significant concern: obtaining full text and accessible full text.

Design/methodology/approach

This qualitative study includes 18 open-ended telephone interviews with blind academic library users in the USA. The study uses the viewpoint that understanding blind peoples’ perspectives is essential for equal accessibility.

Findings

Locating full text via link resolvers seemed problematic. Inaccessible articles and complications and delays creating accessible versions of print books limited participants’ use of materials. Enabling technologies and services were highlighted.

Research limitations/implications

Caution should be used when generalizing from this study due to its sample size and methodology. The study is not a web accessibility test, which would analyze coding, nor a usability test, which would observe users. Additional research would be ideal; however, libraries should not wait to attend to accessibility.

Practical implications

In addition to improving digital accessibility, to address difficulty obtaining full text, libraries could offer to locate full text for blind users and implement SmartLinking and single sign on authentication. To deal with inaccessible full text, libraries could work with disability offices to obtain accessible materials and to convert materials to accessible format. DRM free HTML or EPUB e-books can have accessibility advantages. Outsourcing conversion to accessible format can also help. Libraries could offer reader service to assist blind users locating relevant sections of books to convert.

Originality/value

Compared to previous studies, this study includes a larger number of blind screen reader users; describes some unique issues; and includes blind users’ own interpretations.

Details

Library Hi Tech, vol. 37 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 11 November 2014

Joachim Schöpfel

– This paper aims to provide an overview and update of what one actually knows about the impact of open access on inter-lending and document supply.

1284

Abstract

Purpose

This paper aims to provide an overview and update of what one actually knows about the impact of open access on inter-lending and document supply.

Design/methodology/approach

A review of recent papers, published after the Berlin Declaration on Open Access in 2003.

Findings

Everything seems to oppose document supply and open access. Open access has contributed to the recent decline of interlibrary loan (ILL) and document supply requests but is not the only reason and probably not the most important. Open repositories and open-access journals have the potential to substitute ILL and document supply; yet for different reasons, including legal compliance, this substitution remains of limited interest. ILL and document supply institutions have started to integrate open access into their workflow and service provision in different ways, and the paper provides a conceptual framework with some perspectives for further service development.

Originality/value

Paradoxically, relatively few papers make the link between open access and document supply, with empirical and/or conceptual elements. This paper proposes a synthesis and opens perspectives for future development and research.

Details

Interlending & Document Supply, vol. 42 no. 4
Type: Research Article
ISSN: 0264-1615

Keywords

1 – 10 of over 2000