Search results

1 – 10 of over 93000
Article
Publication date: 8 December 2010

Evan Yacoub

Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure…

Abstract

Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure intellectual disability settings have not been robustly demonstrated. The same applies to staff perceptions of low security. The aims of the study were to ascertain the characteristics of patients referred to a low secure intellectual disability unit which lead to an offer of admission, identify the views of staff working on the unit on the concept of low security, and use both sets of data to discuss low secure provision for people with intellectual disability. A case‐controlled study was carried out for 33 patients referred to the unit over 42 months. The characteristics of 18 patients offered an admission were compared with those of 15 patients not offered an admission, and five of the staff working on the unit were interviewed about the concept of low security. Patients offered an admission were more able than those not offered an admission, posed more risks and were more complex diagnostically. Staff working on the unit agreed that their patients were complex, but felt that they were appropriately placed overall. The challenges of low secure provision were discussed by staff. Patients sampled were complex and heterogeneous, but not necessarily ‘forensic’. Their complexity requires sophisticated care plans and management strategies. This study has implications for referrers, staff, patients and managers, and highlights areas for future research.

Details

Advances in Mental Health and Intellectual Disabilities, vol. 4 no. 4
Type: Research Article
ISSN: 2044-1282

Keywords

Article
Publication date: 25 January 2013

Bingxin Yu and Lingzhi You

The recent high food price and volatility, as well as economic recession, have reversed the last decade's progress in reducing hunger and poverty. This aim of this paper is to…

1687

Abstract

Purpose

The recent high food price and volatility, as well as economic recession, have reversed the last decade's progress in reducing hunger and poverty. This aim of this paper is to conduct a factor and sequential typology analysis to identify groups of countries categorized according to five measures of food security.

Design/methodology/approach

The recent high food price and volatility, as well as economic recession, have reversed the last decade's progress in reducing hunger and poverty. This paper conducts a factor and sequential typology analysis to identify groups of countries categorized according to five measures of food security – consumption, production, imports, distribution, and agricultural potential – by using indicators from 175 countries. The analysis first identifies five distinct food security groups, measured by the levels of nutrient intake, and then further splits these groups based on indicators of food production, trade security, and agricultural potential.

Findings

The results suggest that the terms of “developing country” or “low income country” can be inaccurate in the discussion of food security because they are too general and can actually mask the extreme heterogeneity in different aspects of food security. The results also indicate that different responses are needed by different types of food‐insecure countries to address their unique food and economic challenges.

Originality/value

The typology of food security and linkage between agricultural potential and food security contribute to a better understanding of the effectiveness of different policy interventions under a country's unique conditions.

Details

China Agricultural Economic Review, vol. 5 no. 1
Type: Research Article
ISSN: 1756-137X

Keywords

Article
Publication date: 27 July 2018

Vilde Hoff Bernstrøm, Ida Drange and Svenn-Erik Mamelund

Employability has been suggested as an alternative to job security in response to more flexible work arrangements, arguing that the important question for employees is no longer…

2332

Abstract

Purpose

Employability has been suggested as an alternative to job security in response to more flexible work arrangements, arguing that the important question for employees is no longer the security of their current job, but their employment security in the labour market. The purpose of this paper is to test two core assumptions of this argument: first, is employability associated with a lower preference for job security? And second, are individuals with lower job security in fact compensated with higher employability? Both assumptions have received criticism in recent literature. The focus is on employees’ perceived basic and aspiring employability. The former refers to employees’ expectations of remaining in employment and the latter to expectations of upward mobility.

Design/methodology/approach

The data used in the analysis were nationally representative Norwegian survey data from 12,945 employees (2009–2013).

Findings

Employees with higher aspiring employability and education levels have a significantly lower preference for job security, but this is not the case for employees with higher basic employability. Additionally, while employees with lower job security have higher aspiring employability, they have lower basic employability and receive less employer-supported training.

Originality/value

The current paper is the first to investigate how employability relates to the employees’ own preference for job security. In line with critics of the employability argument, the results support that job security continues to be an important protection mechanism. Moreover, employees with low job security lose out twice as employers also invest less in their training and future employability.

Details

Personnel Review, vol. 48 no. 1
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 26 January 2022

Jung Min Jang and Heejin Kim

Although the use of online authentication systems in banking services is expanding globally, little is known about cultural differences in forming consumers' responses to these…

Abstract

Purpose

Although the use of online authentication systems in banking services is expanding globally, little is known about cultural differences in forming consumers' responses to these services. This paper examines how the usability of an online security service and culture impact consumers' behaviour.

Design/methodology/approach

The authors conduct a 2 (usability: high vs low) × 2 (culture: US vs Korea) between-subjects, full factorial design.

Findings

The results indicate a differential influence of the usability of a security system by culture. In particular, US consumers exhibit greater behavioural intention in a high (vs low) usability condition, whereas Korean consumers showed more favourable responses in a low-usability condition. Moreover, perceived effort is confirmed as a crucial mediator that explains the psychological mechanism of the proposed effect.

Practical implications

This research contributes to the literature on online banking where security is an important determinant of success. Especially for managers involved in international banking services, the findings of cultural differences offer insights about the importance of local understanding and differentiation of bank services for specific target markets which can enhance consumers' response towards an online security service.

Originality/value

The current study is one of a very few attempts to examine the role of usability of an online security system in forming consumers' behavioural intention. More importantly, this study integrates the concept of culture to explain how usability influences positive or negative behavioural intention in an international market.

Details

International Journal of Bank Marketing, vol. 40 no. 2
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 1 February 1993

Richard Dobbins

Sees the objective of teaching financial management to be to helpmanagers and potential managers to make sensible investment andfinancing decisions. Acknowledges that financial…

6397

Abstract

Sees the objective of teaching financial management to be to help managers and potential managers to make sensible investment and financing decisions. Acknowledges that financial theory teaches that investment and financing decisions should be based on cash flow and risk. Provides information on payback period; return on capital employed, earnings per share effect, working capital, profit planning, standard costing, financial statement planning and ratio analysis. Seeks to combine the practical rules of thumb of the traditionalists with the ideas of the financial theorists to form a balanced approach to practical financial management for MBA students, financial managers and undergraduates.

Details

Management Decision, vol. 31 no. 2
Type: Research Article
ISSN: 0025-1747

Keywords

Book part
Publication date: 6 September 2018

Yu-Jen Hsiao, Te-Chien Lo and Sheng-Che Lin

The paper investigates whether firms’ exposure to information security risk influences firms’ costs of capital. Most IT firms highly rely on computer systems and network…

Abstract

The paper investigates whether firms’ exposure to information security risk influences firms’ costs of capital. Most IT firms highly rely on computer systems and network appliances; it may cause disasters if firms are involved in great information security risk. In the sample of Taiwan’s semiconductor firms during 2005–2016, we show that ISO 27001-certified firms (a well-known information security certificate) have lower costs of debt, but whether firms are ISO 27001-certified is not associated with firms’ costs of equity. Our findings are consistent with modern financial theories: debt holders, as put writers to firms’ value, benefit from firms’ lower information security risk, and better corporate governance, and thus lower firms’ costs of debt. On the other hand, equity holders should hold efficient portfolio through diversification and thus firms’ costs of equity should not be influenced by firms’ information security risk, which belongs to idiosyncratic risk in the portfolio theory.

Details

Advances in Pacific Basin Business, Economics and Finance
Type: Book
ISBN: 978-1-78756-446-6

Keywords

Article
Publication date: 11 March 2019

Uchenna Daniel Ani, Hongmei He and Ashutosh Tiwari

As cyber-attacks continue to grow, organisations adopting the internet-of-things (IoT) have continued to react to security concerns that threaten their businesses within the…

2243

Abstract

Purpose

As cyber-attacks continue to grow, organisations adopting the internet-of-things (IoT) have continued to react to security concerns that threaten their businesses within the current highly competitive environment. Many recorded industrial cyber-attacks have successfully beaten technical security solutions by exploiting human-factor vulnerabilities related to security knowledge and skills and manipulating human elements into inadvertently conveying access to critical industrial assets. Knowledge and skill capabilities contribute to human analytical proficiencies for enhanced cybersecurity readiness. Thus, a human-factored security endeavour is required to investigate the capabilities of the human constituents (workforce) to appropriately recognise and respond to cyber intrusion events within the industrial control system (ICS) environment.

Design/methodology/approach

A quantitative approach (statistical analysis) is adopted to provide an approach to quantify the potential cybersecurity capability aptitudes of industrial human actors, identify the least security-capable workforce in the operational domain with the greatest susceptibility likelihood to cyber-attacks (i.e. weakest link) and guide the enhancement of security assurance. To support these objectives, a Human-factored Cyber Security Capability Evaluation approach is presented using conceptual analysis techniques.

Findings

Using a test scenario, the approach demonstrates the capacity to proffer an efficient evaluation of workforce security knowledge and skills capabilities and the identification of weakest link in the workforce.

Practical implications

The approach can enable organisations to gain better workforce security perspectives like security-consciousness, alertness and response aptitudes, thus guiding organisations into adopting strategic means of appropriating security remediation outlines, scopes and resources without undue wastes or redundancies.

Originality/value

This paper demonstrates originality by providing a framework and computational approach for characterising and quantify human-factor security capabilities based on security knowledge and security skills. It also supports the identification of potential security weakest links amongst an evaluated industrial workforce (human agents), some key security susceptibility areas and relevant control interventions. The model and validation results demonstrate the application of action research. This paper demonstrates originality by illustrating how action research can be applied within socio-technical dimensions to solve recurrent and dynamic problems related to industrial environment cyber security improvement. It provides value by demonstrating how theoretical security knowledge (awareness) and practical security skills can help resolve cyber security response and control uncertainties within industrial organisations.

Details

Journal of Systems and Information Technology, vol. 21 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 27 January 2021

Zuopeng (Justin) Zhang, Wu He, Wenzhuo Li and M'Hammed Abdous

Employees must receive proper cybersecurity training so that they can recognize the threats to their organizations and take the appropriate actions to reduce cyber risks. However…

4842

Abstract

Purpose

Employees must receive proper cybersecurity training so that they can recognize the threats to their organizations and take the appropriate actions to reduce cyber risks. However, many cybersecurity awareness training (CSAT) programs fall short due to their misaligned training focuses.

Design/methodology/approach

To help organizations develop effective CSAT programs, we have developed a theoretical framework for conducting a cost–benefit analysis of those CSAT programs. We differentiate them into three types of CSAT programs (constant, complementary and compensatory) by their costs and into four types of CSAT programs (negligible, consistent, increasing and diminishing) by their benefits. Also, we investigate the impact of CSAT programs with different costs and the benefits on a company's optimal degree of security.

Findings

Our findings indicate that the benefit of a CSAT program with different types of cost plays a disparate role in keeping, upgrading or lowering a company's existing security level. Ideally, a CSAT program should spend more of its expenses on training employees to deal with the security threats at a lower security level and to reduce more losses at a higher security level.

Originality/value

Our model serves as a benchmark that will help organizations allocate resources toward the development of successful CSAT programs.

Details

Industrial Management & Data Systems, vol. 121 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 13 March 2019

Petra Habets, Inge Jeandarme and Harry G. Kennedy

Criteria to determine in which level of security forensic patients should receive treatment are currently non-existent in Belgium. Research regarding the assessment of security

Abstract

Purpose

Criteria to determine in which level of security forensic patients should receive treatment are currently non-existent in Belgium. Research regarding the assessment of security level is minimal and few instruments are available. The DUNDRUM toolkit is a structured clinical judgement instrument that can be used to provide support when determining security level. The purpose of this paper is to investigate the applicability and validity of the DUNDRUM-1 in Flanders.

Design/methodology/approach

The DUNDRUM-1 was scored for 50 male patients admitted at the forensic units in the public psychiatric hospital Rekem. Some files were rated by three researchers who were blind to participants’ security status, resulting in 33 double measurements.

Findings

Almost all files (96 per cent) contained enough information to score the DUNDRUM-1. Average DUNDRUM-1 final judgement scores were concordant with a medium security profile. No difference was found between the current security levels and the DUNDRUM-1 final judgement scores. Inter-rater reliability was excellent for the DUNDRUM-1 final judgement scores. On item level, all items had excellent to good inter-rater reliability with the exception of one item institutional behaviour which had an average inter-rater reliability.

Practical implications

The DUNDRUM-1 can be a useful tool in Flemish forensic settings. It has good psychometric properties. More research is needed to investigate the relationship between DUNDRUM-1 scores and security level decisions by the courts.

Originality/value

This is the first study that investigated the applicability of the DUNDRUM-1 in a Belgian setting, also a relative large number of repeated measurements were available to investigate the inter-rater reliability of the DUNDRUM-1.

Details

Journal of Forensic Practice, vol. 21 no. 1
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 1 September 2006

Patrice Gélinas

The purpose of this paper is to present an approach to quantify the monetary value of job security.

1294

Abstract

Purpose

The purpose of this paper is to present an approach to quantify the monetary value of job security.

Design/methodology/approach

The paper is theoretical and based on a financial economics human capital model. Empirical estimates of the annualized value of job security at three large corporations and at the government of the USA are also developed for an illustrative employee profile.

Findings

A financial economics human capital model can be used to derive a lower‐bound estimate for the monetary value of job security and empirical estimates can be calculated straightforwardly to help managers who allocate economic resources to fulfill organizational labor requirements or negotiate labor agreements.

Research limitations/implications

The model presented provides a lower‐bound estimate only. Future research could suggest approaches to calculate more precise estimates.

Practical implications

This paper provides a tool for managers and workers who wish to include the monetary value of relative job security in the definition of total compensation during the negotiation of employment conditions or while benchmarking total compensation.

Originality/value

This paper is a pioneer contribution in the field of quantifying the monetary value of job security.

Details

Journal of Human Resource Costing & Accounting, vol. 10 no. 3
Type: Research Article
ISSN: 1401-338X

Keywords

1 – 10 of over 93000