Search results

1 – 10 of 18
Article
Publication date: 30 June 2020

Foster Hong-Cheuk Yim and Ian Philip Lee

The purpose of this paper is to discuss the latest developments of anti-money laundering (AML) laws in terms of case law and to give meaningful response in relation to certain key…

Abstract

Purpose

The purpose of this paper is to discuss the latest developments of anti-money laundering (AML) laws in terms of case law and to give meaningful response in relation to certain key findings (KFs) and recommendations by the financial action task force contained in its mutual evaluation report dated September 2019.

Design/methodology/approach

In terms of AML case law, the authors analyse the latest judgment from the Hong Kong (HK) court of final appeal. In terms of the evaluation report, the authors outline salient points from the KFs and recommendation, commenting on their likelihood of success.

Findings

With the developments in AML case law and the KFs identified, HK is expected to maintain its high standard in AML/counter financing of terrorism (CFT) compliance.

Originality/value

A robust AML/CFT regime is the bedrock of HK’s reputable status as an international financial centre. This study seeks to illicit meaningful interactions amongst all stakeholders.

Article
Publication date: 14 November 2017

Gihani S. Rajapakse and K. Kiran

The purpose of this paper is to explore succession planning in academic libraries, specifically to understand how succession planning is carried out and how the decisions-making…

1390

Abstract

Purpose

The purpose of this paper is to explore succession planning in academic libraries, specifically to understand how succession planning is carried out and how the decisions-making styles of library managers influence each stage of the succession planning.

Design/methodology/approach

A qualitative approach was used to gather data through a document analysis and interviews with library managers at four Sri Lankan university libraries. Data analysis was done applying the framework analysis (FA) tool.

Findings

The study revealed that succession planning has been practiced in Sri Lankan university libraries to develop a bench strength, skilled backup for key positions at all levels, while inculcating leadership competencies in their respective positions. The dominant decision style is the identifiable decision-making style within the succession planning process.

Research limitations/implications

The volume of the data obtained depends largely on the participants’ responses, and the interpretation of the data is subjected to minimum personal biasness of the researcher.

Practical implications

An understanding of how decision-making styles influence practices of succession planning contributes to assist library managers to carry out succession planning within the limitations of their autonomy to do so. The findings of this study benefit library managers in recognizing their own decision-making styles and the level of succession planning they have achieved.

Social implications

Library managers’ decision-making style can have an influence on how succession planning is carried out successfully at an academic library to ensure continuity of the library’s mission and vision.

Originality/value

This is the first known study to investigate how decision-making style of the manager influences each level of the succession planning at an academic library. The use of a systematic FA method for the qualitative data analysis reveals trustworthy results.

Details

Library Management, vol. 38 no. 8/9
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 23 August 2021

Fuad Abujarad, Allissa Desloge, Kristina Carlson and Sarah J. Swierenga

As child abuse and neglect in childcare settings continue to occur, a quality childcare workforce is imperative. This paper aims to describe how an efficient and effective…

Abstract

Purpose

As child abuse and neglect in childcare settings continue to occur, a quality childcare workforce is imperative. This paper aims to describe how an efficient and effective childcare Workforce Background Check system was developed and implemented to protect both children and childcare staff in the state of Michigan.

Design/methodology/approach

The user-centered design (UCD) approach was used in the creation and statewide implementation of a new acceptable and usable system, the Michigan childcare background check (CCBC) system. The authors conducted focus groups to obtain user feedback and performed several usability evaluations. This approach was used as guidance for the development process and to evaluate the concept designs for the web application that was created.

Findings

This paper discusses the overall process of implementing the CCBC program, focusing on successes, barriers and lessons learned in the planning, designing and execution phases. By May 2019, more than 92,069 background checks were conducted on personnel in 8,740 licensed childcare facilities across Michigan. Collaboration across stakeholders in different sectors facilitated the implementation of the new system, while structural barriers and stigma provided barriers to implementation.

Practical implications

Having individuals with various roles, abilities and technical expertise assist with the development and implementation of the system ensured the usability and acceptability of the new system by all types of users.

Social implications

The general public expects childcare providers to ensure that their employees meet the highest professional standards. Developing effective, easy-to-use fingerprint-based criminal history background check systems to identify ineligible applicants and monitor current employees is one component of an overall strategy to promote child safety and minimize child abuse and neglect in the childcare environments.

Originality/value

This paper provides a practical example of how a CCBC system can be developed, implemented and scaled to be used statewide. This approach can be used by other states or other disciplines with a similar context.

Plain language summary

As child abuse and neglect in childcare settings continue to occur, a quality childcare workforce is imperative. This paper shows how this study uses the UCD approach to create an acceptable and usable system and complete statewide implementation of a new Michigan CCBC program. This resulted in an efficient and effective Workforce Background Check system that is essential to protect both children and childcare staff.

Details

Journal of Systems and Information Technology, vol. 23 no. 3/4
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 14 March 2022

Luiz Paulo Carvalho, Claudia Cappelli and Flavia Maria Santoro

This research work aims to expose the detailed construction of a framework for translation between Business Process Modeling and Notation (BPMN) and a citizen process language…

Abstract

Purpose

This research work aims to expose the detailed construction of a framework for translation between Business Process Modeling and Notation (BPMN) and a citizen process language, named GERAL, so that BPMN and modeling non-experts can publicize their procedural information in an understandable and quality manner. The artifact is built in detail through epistemological rigor derived from empirical evidence and best practices related to the topic of understanding business processes, both based on well-established literature on the subject.

Design/methodology/approach

In the case of research involving the construction of an artifact, the design science research (DSR) methodology was used to conduct engineering with an emphasis on the scientific method; for evaluation, the authors used the case study methodology. Data collection is based on documentation analysis, questionnaire, interview and observation. The authors also use references associating DSR with case studies, for greater contextual rigor of the research.

Findings

This work presents findings and contributions, both new and also reinforcing others already present (1) use of the principles of Citizen/Plain Language improve instructional communication related to process modeling; (2) the citizen process language GERAL itself; (3) the BPMN pra GERAL guide for process translation; (4) qualitative findings from the observation of the use of the artifact in a real case, with non-experts and (5) a well-founded instance of building a notation with an emphasis on understanding, which can be replicated in other cases.

Research limitations/implications

Future perspectives for conducting the research are presented. As a qualitative research instantiated involving a subjective construct, such as understanding, generalization is partially limited and should be interpreted as a transferability criterion. The evaluation involved participants with complete higher education and graduates, even though from areas not dedicated to process modeling or BPMN, being non-experts. The main indicator was understood with limitations in other aspects, such as formal semantics and precise executability.

Practical implications

The formative research showed improvements to the base artifact, the framework first version, which will consequently be reflected in the guide. The GERAL and the guide were very well received, and all participants were able to translate the proposed model effectively, despite small slips in second notation. The guide improved the participants' perception of transparency and understanding of business processes, making them aware of the benefits of this topic.

Social implications

The output of the built and researched artifact are understandable models by non-experts in technical languages of business processes. It is an alternative for BPMN models and dubious/long texts. Almost unexpectedly, the guide and its principles awaken an appreciation of understandable procedural communication, that is, it builds an intrinsic motivation in the user of the importance of publicizing his processes and assists in compliance with current data disclosure laws. It also builds informational democratic values of better participation and data absorption, from translators to the target audience.

Originality/value

It presents a qualitative approach to deal with business process modeling and understanding; substantiates in detail, using well-established bases in the literature, the construction of a solution aimed at understanding business processes; offers a translation guide for non-experts and experts interested in disclosing and instructing their procedural information modeled in BPMN.

Details

Business Process Management Journal, vol. 28 no. 2
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 12 August 2020

Bilal Naqvi, Nathan Clarke and Jari Porras

The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been…

Abstract

Purpose

The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been formulated while considering key concerns raised after conducting a series of interviews with practitioners from the industry. The framework is aimed at assisting system designers and developers in making reasonably accurate choices when it comes to the trade-offs between security and usability. The outcomes of using the framework are documented as design patterns, which are disseminated among the community of system designers and developers for use in other but similar contexts.

Design/methodology/approach

A design science research approach was used to develop the integrative framework for usable security. Interviews were conducted for identification of the key concerns; however, the framework was validated during a workshop. Moreover, to validate the patterns’ template and the usable security pattern identified after instantiating the framework, a survey instrument was used.

Findings

It is important to consider the usability aspect in the development of security systems; otherwise, the systems, despite being secure against attacks, would be susceptible to user mistakes leading to compromises. It is worthwhile to handle usable security concerns right from the start of system development life cycle. Design patterns can help the developers in assessing the usability of their security options.

Practical implications

Practical implications

The framework would assist the designers and developers in handling the security and usability conflicts right from the start of the system development life cycle. The patterns documented after using the framework would help not only the designers and developers working in the industry but also freelancers.

Originality/value

The authors present a novel framework to handle the security and usability conflicts during the system development life cycle. The development process of the framework was driven by the concerns raised after a series of interviews with the practitioners from industry. The framework presented in this paper was validated during a workshop in which it was exposed for review and comments by the participants from the industry. To demonstrate the use of patterns in general and the framework in particular, a case study featuring smart grids from the domain of cyber-physical systems is presented, which (to the best of the authors’ knowledge) features the first work relevant to usable security in the domain of cyber-physical systems.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 8 July 2021

Johann Eder and Vladimir A. Shekhovtsov

Medical research requires biological material and data collected through biobanks in reliable processes with quality assurance. Medical studies based on data with unknown or…

1553

Abstract

Purpose

Medical research requires biological material and data collected through biobanks in reliable processes with quality assurance. Medical studies based on data with unknown or questionable quality are useless or even dangerous, as evidenced by recent examples of withdrawn studies. Medical data sets consist of highly sensitive personal data, which has to be protected carefully and is available for research only after the approval of ethics committees. The purpose of this research is to propose an architecture to support researchers to efficiently and effectively identify relevant collections of material and data with documented quality for their research projects while observing strict privacy rules.

Design/methodology/approach

Following a design science approach, this paper develops a conceptual model for capturing and relating metadata of medical data in biobanks to support medical research.

Findings

This study describes the landscape of biobanks as federated medical data lakes such as the collections of samples and their annotations in the European federation of biobanks (Biobanking and Biomolecular Resources Research Infrastructure – European Research Infrastructure Consortium, BBMRI-ERIC) and develops a conceptual model capturing schema information with quality annotation. This paper discusses the quality dimensions for data sets for medical research in-depth and proposes representations of both the metadata and data quality documentation with the aim to support researchers to effectively and efficiently identify suitable data sets for medical studies.

Originality/value

This novel conceptual model for metadata for medical data lakes has a unique focus on the high privacy requirements of the data sets contained in medical data lakes and also stands out in the detailed representation of data quality and metadata quality of medical data sets.

Details

International Journal of Web Information Systems, vol. 17 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 19 June 2009

Maayan Zhitomirsky‐Geffet, Dror G. Feitelson, Eitan Frachtenberg and Yair Wiseman

One of the biggest concerns of modern information retrieval systems is reducing the user effort required for manual traversal and filtering of long matching document lists. Thus…

Abstract

Purpose

One of the biggest concerns of modern information retrieval systems is reducing the user effort required for manual traversal and filtering of long matching document lists. Thus, the first goal of this research is to propose an improved scheme for representation of search results. Further, it aims to explore the impact of various user information needs on the searching process with the aim of finding a unified searching approach well suited for different query types and retrieval tasks.

Design/methodology/approach

The BoW online bibliographical catalogue is based on a hierarchical concept index to which entries are linked. The key idea is that searching in the hierarchical catalogue should take advantage of the catalogue structure and return matching topics from the hierarchy, rather than just a long list of entries. Likewise, when new entries are inserted, a search for relevant topics to which they should be linked is required. Therefore, a similar hierarchical scheme for query‐topic matching can be applied for both tasks.

Findings

The experiments show that different query types used for the above tasks are best treated by different topic ranking functions. To further examine this phenomenon a user study was conducted, where various statistical weighting factors were incorporated and their impact on the performance for different query types was measured. Finally, it is found that the mixed strategy that applies the most suitable ranking function to each query type yielded a significant increase in precision relative to the baseline and to employing any examined strategy in isolation on the entire set of user queries.

Originality/value

The main contributions of this paper are: the alternative approach for compact and concise representation of search results, which were implemented in the BoW online bibliographical catalogue; and the unified or mixed strategy for search and result representation applying the most suitable ranking function to each query type, which produced superior results compared to different single‐strategy‐based approaches.

Details

Online Information Review, vol. 33 no. 3
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 16 January 2019

María Consuelo Sáiz-Manzanares, César Ignacio García Osorio, José Francisco Díez-Pastor and Luis Jorge Martín Antón

Recent research in higher education has pointed out that personalized e-learning through the use of learning management systems, such as Moodle, improves the academic results of

1005

Abstract

Purpose

Recent research in higher education has pointed out that personalized e-learning through the use of learning management systems, such as Moodle, improves the academic results of students and facilitates the detection of at-risk students.

Design/methodology/approach

A sample of 124 students following the Degree in Health Sciences at the University of Burgos participated in this study. The objectives were as follows: to verify whether the use of a Moodle-based personalized e-learning system will predict the learning outcomes of students and the use of effective learning behaviour patterns and to study whether it will increase student satisfaction with teaching practice.

Findings

The use of a Moodle-based personalized e-learning system that included problem-based learning (PBL) methodology predicted the learning outcomes by 42.3 per cent, especially with regard to the results of the quizzes. In addition, it predicted effective behavioural patterns by 74.2 per cent. Increased student satisfaction levels were also identified through the conceptual feedback provided by the teacher, arguably because it facilitated a deeper understanding of the subject matter.

Research limitations/implications

The results of this work should be treated with caution, because of the sample size and the specificity of the branch of knowledge of the students, as well as the design type. Future studies will be directed at increasing the size of the sample and the diversity of the qualifications.

Originality/value

Learning methodology in the twenty-first century has to be guided towards carefully structured work from the pedagogic point of view in the learning management systems allowing for process-oriented feedback and PBL both included in personalized e-learning systems.

Details

Information Discovery and Delivery, vol. 47 no. 1
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 13 November 2017

Christos Kalloniatis

The purpose of this paper is to extend PriS (privacy safeguard), a privacy requirements engineering method for eliciting and modelling privacy requirements during system design…

Abstract

Purpose

The purpose of this paper is to extend PriS (privacy safeguard), a privacy requirements engineering method for eliciting and modelling privacy requirements during system design, with the addition of privacy-aware cloud-based concepts to assist analysts to reason and model about privacy in cloud environments.

Design/methodology/approach

An analysis of previous findings on the file of cloud privacy based on previous work has been conducted and a set of privacy-related concepts that need to be considered during privacy analysis for cloud-based systems have been revealed. These concepts were used for extending the conceptual model of PriS.

Findings

The main finding of the paper is the design of a new, novel conceptual model that assists analysts and designers in reasoning about privacy in cloud environments. A new template using the JSON (Javascript notation object) format has been introduced for better expressing the privacy requirements along with the related concepts presented through the conceptual model, thus letting the developers to better understand the findings during the design stage and better guide them to the implementation of the respective solution.

Research limitations/implications

The design of a cloud-based process that will guide analysts in detail for eliciting and modelling the identified privacy-related requirements is the limitation and in parallel the next step of the specific work presented here.

Practical implications

The conceptual model has been applied on a real case scenario regarding its efficiency on capturing and mapping all necessary concepts for assisting analysts proceed with the design of the privacy-aware system. The results were positive, all concepts were easy to use and totally understandable from the design team and the stakeholders and the use of the JSON template received very positive comments, especially from the developer’s team.

Originality/value

The paper presents a novel conceptual model for reasoning about privacy requirements in the cloud. The applicability of the proposed model has also been tested on a real case study.

Details

Information & Computer Security, vol. 25 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 November 2021

Rosy Boardman and Helen Mccormick

The purpose of this paper is to identify attention, cognitive and affective responses towards a fashion retailer's website and the behavioural outcomes when shopping online.

1938

Abstract

Purpose

The purpose of this paper is to identify attention, cognitive and affective responses towards a fashion retailer's website and the behavioural outcomes when shopping online.

Design/methodology/approach

52 eye-tracking tests and 52 qualitative semi-structured interviews were conducted.

Findings

Consumer attention and behaviour differ across web pages throughout the shopping journey depending on its content, function and consumers' goal. Top-down attention is more dominant than bottom-up attention when consumers are shopping online for fashion items. The product listings page was the most frequented and had the most time spent on it. Consumers enjoy browsing for products and adding them to their basket to evaluate them together later. Customisation and personalisation features are the most valued due to their ability to make the experience more convenient and enjoyable.

Originality/value

This article contributes novel findings that the content and design of the website affects attention in different ways. It demonstrates that research cannot simplify viewing patterns for fashion shopping online. The study extends the SOR framework, showing that top-down attention, when provided with personalisation and customisation features, results in approach behaviour. A lack of personalisation or customisation features results in avoidance behaviour. The complex nature of consumer attention and behaviour during their holistic shopping journey advocates the need for eye-tracking research to be conducted on a live website for ecological validity, providing a methodological contribution which can be used for future research.

Details

Information Technology & People, vol. 35 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of 18