Search results
1 – 10 of over 93000Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure…
Abstract
Low security is a poorly understood concept, particularly in relation to people with an intellectual disability. Characteristics of patients offered an admission to low secure intellectual disability settings have not been robustly demonstrated. The same applies to staff perceptions of low security. The aims of the study were to ascertain the characteristics of patients referred to a low secure intellectual disability unit which lead to an offer of admission, identify the views of staff working on the unit on the concept of low security, and use both sets of data to discuss low secure provision for people with intellectual disability. A case‐controlled study was carried out for 33 patients referred to the unit over 42 months. The characteristics of 18 patients offered an admission were compared with those of 15 patients not offered an admission, and five of the staff working on the unit were interviewed about the concept of low security. Patients offered an admission were more able than those not offered an admission, posed more risks and were more complex diagnostically. Staff working on the unit agreed that their patients were complex, but felt that they were appropriately placed overall. The challenges of low secure provision were discussed by staff. Patients sampled were complex and heterogeneous, but not necessarily ‘forensic’. Their complexity requires sophisticated care plans and management strategies. This study has implications for referrers, staff, patients and managers, and highlights areas for future research.
Details
Keywords
The recent high food price and volatility, as well as economic recession, have reversed the last decade's progress in reducing hunger and poverty. This aim of this paper is to…
Abstract
Purpose
The recent high food price and volatility, as well as economic recession, have reversed the last decade's progress in reducing hunger and poverty. This aim of this paper is to conduct a factor and sequential typology analysis to identify groups of countries categorized according to five measures of food security.
Design/methodology/approach
The recent high food price and volatility, as well as economic recession, have reversed the last decade's progress in reducing hunger and poverty. This paper conducts a factor and sequential typology analysis to identify groups of countries categorized according to five measures of food security – consumption, production, imports, distribution, and agricultural potential – by using indicators from 175 countries. The analysis first identifies five distinct food security groups, measured by the levels of nutrient intake, and then further splits these groups based on indicators of food production, trade security, and agricultural potential.
Findings
The results suggest that the terms of “developing country” or “low income country” can be inaccurate in the discussion of food security because they are too general and can actually mask the extreme heterogeneity in different aspects of food security. The results also indicate that different responses are needed by different types of food‐insecure countries to address their unique food and economic challenges.
Originality/value
The typology of food security and linkage between agricultural potential and food security contribute to a better understanding of the effectiveness of different policy interventions under a country's unique conditions.
Details
Keywords
Vilde Hoff Bernstrøm, Ida Drange and Svenn-Erik Mamelund
Employability has been suggested as an alternative to job security in response to more flexible work arrangements, arguing that the important question for employees is no longer…
Abstract
Purpose
Employability has been suggested as an alternative to job security in response to more flexible work arrangements, arguing that the important question for employees is no longer the security of their current job, but their employment security in the labour market. The purpose of this paper is to test two core assumptions of this argument: first, is employability associated with a lower preference for job security? And second, are individuals with lower job security in fact compensated with higher employability? Both assumptions have received criticism in recent literature. The focus is on employees’ perceived basic and aspiring employability. The former refers to employees’ expectations of remaining in employment and the latter to expectations of upward mobility.
Design/methodology/approach
The data used in the analysis were nationally representative Norwegian survey data from 12,945 employees (2009–2013).
Findings
Employees with higher aspiring employability and education levels have a significantly lower preference for job security, but this is not the case for employees with higher basic employability. Additionally, while employees with lower job security have higher aspiring employability, they have lower basic employability and receive less employer-supported training.
Originality/value
The current paper is the first to investigate how employability relates to the employees’ own preference for job security. In line with critics of the employability argument, the results support that job security continues to be an important protection mechanism. Moreover, employees with low job security lose out twice as employers also invest less in their training and future employability.
Details
Keywords
Although the use of online authentication systems in banking services is expanding globally, little is known about cultural differences in forming consumers' responses to these…
Abstract
Purpose
Although the use of online authentication systems in banking services is expanding globally, little is known about cultural differences in forming consumers' responses to these services. This paper examines how the usability of an online security service and culture impact consumers' behaviour.
Design/methodology/approach
The authors conduct a 2 (usability: high vs low) × 2 (culture: US vs Korea) between-subjects, full factorial design.
Findings
The results indicate a differential influence of the usability of a security system by culture. In particular, US consumers exhibit greater behavioural intention in a high (vs low) usability condition, whereas Korean consumers showed more favourable responses in a low-usability condition. Moreover, perceived effort is confirmed as a crucial mediator that explains the psychological mechanism of the proposed effect.
Practical implications
This research contributes to the literature on online banking where security is an important determinant of success. Especially for managers involved in international banking services, the findings of cultural differences offer insights about the importance of local understanding and differentiation of bank services for specific target markets which can enhance consumers' response towards an online security service.
Originality/value
The current study is one of a very few attempts to examine the role of usability of an online security system in forming consumers' behavioural intention. More importantly, this study integrates the concept of culture to explain how usability influences positive or negative behavioural intention in an international market.
Details
Keywords
Sees the objective of teaching financial management to be to helpmanagers and potential managers to make sensible investment andfinancing decisions. Acknowledges that financial…
Abstract
Sees the objective of teaching financial management to be to help managers and potential managers to make sensible investment and financing decisions. Acknowledges that financial theory teaches that investment and financing decisions should be based on cash flow and risk. Provides information on payback period; return on capital employed, earnings per share effect, working capital, profit planning, standard costing, financial statement planning and ratio analysis. Seeks to combine the practical rules of thumb of the traditionalists with the ideas of the financial theorists to form a balanced approach to practical financial management for MBA students, financial managers and undergraduates.
Details
Keywords
Yu-Jen Hsiao, Te-Chien Lo and Sheng-Che Lin
The paper investigates whether firms’ exposure to information security risk influences firms’ costs of capital. Most IT firms highly rely on computer systems and network…
Abstract
The paper investigates whether firms’ exposure to information security risk influences firms’ costs of capital. Most IT firms highly rely on computer systems and network appliances; it may cause disasters if firms are involved in great information security risk. In the sample of Taiwan’s semiconductor firms during 2005–2016, we show that ISO 27001-certified firms (a well-known information security certificate) have lower costs of debt, but whether firms are ISO 27001-certified is not associated with firms’ costs of equity. Our findings are consistent with modern financial theories: debt holders, as put writers to firms’ value, benefit from firms’ lower information security risk, and better corporate governance, and thus lower firms’ costs of debt. On the other hand, equity holders should hold efficient portfolio through diversification and thus firms’ costs of equity should not be influenced by firms’ information security risk, which belongs to idiosyncratic risk in the portfolio theory.
Details
Keywords
Uchenna Daniel Ani, Hongmei He and Ashutosh Tiwari
As cyber-attacks continue to grow, organisations adopting the internet-of-things (IoT) have continued to react to security concerns that threaten their businesses within the…
Abstract
Purpose
As cyber-attacks continue to grow, organisations adopting the internet-of-things (IoT) have continued to react to security concerns that threaten their businesses within the current highly competitive environment. Many recorded industrial cyber-attacks have successfully beaten technical security solutions by exploiting human-factor vulnerabilities related to security knowledge and skills and manipulating human elements into inadvertently conveying access to critical industrial assets. Knowledge and skill capabilities contribute to human analytical proficiencies for enhanced cybersecurity readiness. Thus, a human-factored security endeavour is required to investigate the capabilities of the human constituents (workforce) to appropriately recognise and respond to cyber intrusion events within the industrial control system (ICS) environment.
Design/methodology/approach
A quantitative approach (statistical analysis) is adopted to provide an approach to quantify the potential cybersecurity capability aptitudes of industrial human actors, identify the least security-capable workforce in the operational domain with the greatest susceptibility likelihood to cyber-attacks (i.e. weakest link) and guide the enhancement of security assurance. To support these objectives, a Human-factored Cyber Security Capability Evaluation approach is presented using conceptual analysis techniques.
Findings
Using a test scenario, the approach demonstrates the capacity to proffer an efficient evaluation of workforce security knowledge and skills capabilities and the identification of weakest link in the workforce.
Practical implications
The approach can enable organisations to gain better workforce security perspectives like security-consciousness, alertness and response aptitudes, thus guiding organisations into adopting strategic means of appropriating security remediation outlines, scopes and resources without undue wastes or redundancies.
Originality/value
This paper demonstrates originality by providing a framework and computational approach for characterising and quantify human-factor security capabilities based on security knowledge and security skills. It also supports the identification of potential security weakest links amongst an evaluated industrial workforce (human agents), some key security susceptibility areas and relevant control interventions. The model and validation results demonstrate the application of action research. This paper demonstrates originality by illustrating how action research can be applied within socio-technical dimensions to solve recurrent and dynamic problems related to industrial environment cyber security improvement. It provides value by demonstrating how theoretical security knowledge (awareness) and practical security skills can help resolve cyber security response and control uncertainties within industrial organisations.
Details
Keywords
Zuopeng (Justin) Zhang, Wu He, Wenzhuo Li and M'Hammed Abdous
Employees must receive proper cybersecurity training so that they can recognize the threats to their organizations and take the appropriate actions to reduce cyber risks. However…
Abstract
Purpose
Employees must receive proper cybersecurity training so that they can recognize the threats to their organizations and take the appropriate actions to reduce cyber risks. However, many cybersecurity awareness training (CSAT) programs fall short due to their misaligned training focuses.
Design/methodology/approach
To help organizations develop effective CSAT programs, we have developed a theoretical framework for conducting a cost–benefit analysis of those CSAT programs. We differentiate them into three types of CSAT programs (constant, complementary and compensatory) by their costs and into four types of CSAT programs (negligible, consistent, increasing and diminishing) by their benefits. Also, we investigate the impact of CSAT programs with different costs and the benefits on a company's optimal degree of security.
Findings
Our findings indicate that the benefit of a CSAT program with different types of cost plays a disparate role in keeping, upgrading or lowering a company's existing security level. Ideally, a CSAT program should spend more of its expenses on training employees to deal with the security threats at a lower security level and to reduce more losses at a higher security level.
Originality/value
Our model serves as a benchmark that will help organizations allocate resources toward the development of successful CSAT programs.
Details
Keywords
Petra Habets, Inge Jeandarme and Harry G. Kennedy
Criteria to determine in which level of security forensic patients should receive treatment are currently non-existent in Belgium. Research regarding the assessment of security…
Abstract
Purpose
Criteria to determine in which level of security forensic patients should receive treatment are currently non-existent in Belgium. Research regarding the assessment of security level is minimal and few instruments are available. The DUNDRUM toolkit is a structured clinical judgement instrument that can be used to provide support when determining security level. The purpose of this paper is to investigate the applicability and validity of the DUNDRUM-1 in Flanders.
Design/methodology/approach
The DUNDRUM-1 was scored for 50 male patients admitted at the forensic units in the public psychiatric hospital Rekem. Some files were rated by three researchers who were blind to participants’ security status, resulting in 33 double measurements.
Findings
Almost all files (96 per cent) contained enough information to score the DUNDRUM-1. Average DUNDRUM-1 final judgement scores were concordant with a medium security profile. No difference was found between the current security levels and the DUNDRUM-1 final judgement scores. Inter-rater reliability was excellent for the DUNDRUM-1 final judgement scores. On item level, all items had excellent to good inter-rater reliability with the exception of one item institutional behaviour which had an average inter-rater reliability.
Practical implications
The DUNDRUM-1 can be a useful tool in Flemish forensic settings. It has good psychometric properties. More research is needed to investigate the relationship between DUNDRUM-1 scores and security level decisions by the courts.
Originality/value
This is the first study that investigated the applicability of the DUNDRUM-1 in a Belgian setting, also a relative large number of repeated measurements were available to investigate the inter-rater reliability of the DUNDRUM-1.
Details
Keywords
The purpose of this paper is to present an approach to quantify the monetary value of job security.
Abstract
Purpose
The purpose of this paper is to present an approach to quantify the monetary value of job security.
Design/methodology/approach
The paper is theoretical and based on a financial economics human capital model. Empirical estimates of the annualized value of job security at three large corporations and at the government of the USA are also developed for an illustrative employee profile.
Findings
A financial economics human capital model can be used to derive a lower‐bound estimate for the monetary value of job security and empirical estimates can be calculated straightforwardly to help managers who allocate economic resources to fulfill organizational labor requirements or negotiate labor agreements.
Research limitations/implications
The model presented provides a lower‐bound estimate only. Future research could suggest approaches to calculate more precise estimates.
Practical implications
This paper provides a tool for managers and workers who wish to include the monetary value of relative job security in the definition of total compensation during the negotiation of employment conditions or while benchmarking total compensation.
Originality/value
This paper is a pioneer contribution in the field of quantifying the monetary value of job security.
Details