Search results

1 – 10 of 89
Article
Publication date: 6 June 2008

H. Mouratidis, H. Jahankhani and M.Z. Nkhoma

The purpose of this study is to explore the rationale that governs implementation of information systems and network security expenditures through a case study approach.

1592

Abstract

Purpose

The purpose of this study is to explore the rationale that governs implementation of information systems and network security expenditures through a case study approach.

Design/methodology/approach

The research method took the form of a mixed‐method assessment of the perceptions of persons of authority in the management and the network security areas of an organization that has implemented network security protocols. Two stages of the research process were completed in order to gather the necessary data for the study. The first stage of the study was the administration of a Likert‐type questionnaire in which respondents answered 30 unique items on network security. In the second phase of the study, a number of responders were contacted to further expand upon the themes presented in the Likert‐type questionnaire.

Findings

Empirical evidence gathered justifies theoretical claims that personnel from general management have different perspectives towards network security than personnel from the network security management. In particular, the study indicates that such differences are demonstrated on a number of areas such as the effectiveness and the efficiency of the networked system; control of network security; security‐related decision‐making processes; and users of the network. The latter being the most controversial issue with one side indicating that users should be allowed to use the network in an efficient manner, and the other side emphasizing that users pose one of the greatest security risks to the system.

Research limitations/implications

The limitations of the study are found in its focus on a specific company and on its perception‐centred nature of risk and risk analysis. No two persons identify and frame risk in an identical manner. This creates potential conflict of interest when the participants within a risk assessment process approach the issues and present their arguments as to how to best identify and respond to risks.

Practical implications

Through comparing and contrasting the perspectives of the two sample populations, the research assists in demonstrating how, why, and to what extent specific problems are recognized by those within management and those within network security. This allowed the analysis of how these problems are defined and what steps can be taken that would help to reduce or eliminate its impact in the organization used in our case study.

Originality/value

It has been argued in the literature that there is lack of empirically based research to explore and effectively analyze the perceptions held by management and by security specialists within organizations with respect to security. This paper presents the results of the application of a novel two‐stage framework on an empirical case study focused on a large national bank. The work allowed the identification of the various perceptions held by management and by security specialists, and the degree to which these perceptions are similar.

Details

Information Management & Computer Security, vol. 16 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 4 March 2022

Bee Lian Song, Kim Lian Lee, Chee Yoong Liew, Ree Chan Ho and Woon Leong Lin

The aim of this study is to examine the experiences of business students on case method coaching for problem-based learning and its influence on student engagement and learning…

1048

Abstract

Purpose

The aim of this study is to examine the experiences of business students on case method coaching for problem-based learning and its influence on student engagement and learning performance in the context of Malaysian private higher education.

Design/methodology/approach

This study applied quantitative method with a self-administered questionnaire survey was used to collect data from 410 undergraduate business students from five top private universities in Malaysia using convenience sampling. Structural equation modelling (SEM) was used to analyse the data, and five hypotheses were tested.

Findings

The findings reported that learning assessments, analytical skills, interpersonal skills and interdisciplinary learning have significantly influenced student engagement. Student engagement is positively correlated to the learning performance. Overall, the business students have positive perception on the case method coaching approach for problem-based learning as an effective learning tool in classroom. The case method coaching is able to garner students' interest in learning, improve engagement with peers and educators and enhance their learning performance.

Practical implications

Higher education institutions can leverage on effective planning and implementation strategies for case method coaching for problem-based learning through more effective coaching strategies, enhance education curricula, allocation of adequate resources, and qualified and trained business educators as coaches.

Originality/value

The present study provides new insights on coaching in business education. This study developed a new framework integrating features of case method coaching and problem-based learning to the outcomes of student engagement and learning performance within the context of business education.

Details

Education + Training, vol. 64 no. 3
Type: Research Article
ISSN: 0040-0912

Keywords

Article
Publication date: 27 May 2021

James M. Crick and Dave Crick

While there has been a significant amount of work involving marketing education, it is unclear how faculty members can increase the engagement and achievement of non-subject…

Abstract

Purpose

While there has been a significant amount of work involving marketing education, it is unclear how faculty members can increase the engagement and achievement of non-subject specialists. Accordingly, guided by Bloom's Taxonomy, this current study examines the ways that academics can teach marketing to non-marketing undergraduate majors, with a focus on enhancing their engagement and academic performance.

Design/methodology/approach

Survey responses (and related archival information) were collected from 181 non-marketing majors in the United Kingdom (studying marketing modules as part of their undergraduate degrees). Such data passed a series of key robustness checks. The hypothesized and control paths were tested via covariance-based structural equation modeling. In addition, 20 semi-structured interviews were used to explore the underlying issues behind the statistical results.

Findings

Two variables were positive drivers of engaging non-marketing students, namely, discussion-oriented interactions and relating marketing to non-marketing subjects. However, integrating theory with practice produced a negative, but non-significant relationship with engaging non-marketing students. In turn, engaging non-marketing students yielded a positive and significant association with academic performance. The follow-up interviews suggested that to best-engage non-marketing majors, educators should consider hosting guest speakers (e.g. owner-managers) to demonstrate how their university-level studies are applicable to “real-world” subject contexts, like sports management and engineering when they graduate.

Originality/value

This current article strengthens the extant literature by identifying some actionable tools that can be employed to enhance the engagement and academic performance of non-subject specialists. This is important, since faculty members are under increased pressure to become effective teachers and facilitate student satisfaction (alongside their other duties, including research and administration). Hence, this paper assists such individuals to cope with the rapidly changing landscape of the higher education sector. In fact, Bloom's Taxonomy was a relevant pedagogical theory for unpacking how educators can teach marketing to non-marketing majors.

Details

Education + Training, vol. 63 no. 6
Type: Research Article
ISSN: 0040-0912

Keywords

Article
Publication date: 12 January 2022

Waqar Ahmad Awan and Akhtar Abbas

The purpose of this study was to map the quantity (frequency), quality (impact) and structural indicators (correlations) of research produced on cloud computing in 48 countries…

Abstract

Purpose

The purpose of this study was to map the quantity (frequency), quality (impact) and structural indicators (correlations) of research produced on cloud computing in 48 countries and 3 territories in the Asia continent.

Design/methodology/approach

To achieve the objectives of the study and scientifically map the indicators, data were extracted from the Scopus database. The extracted bibliographic data was first cleaned properly using Endnote and then analyzed using Biblioshiny and VosViewer application software. In the software, calculations include citations count; h, g and m indexes; Bradford's and Lotka's laws; and other scientific mappings.

Findings

Results of the study indicate that China remained the most productive, impactful and collaborative country in Asia. All the top 20 impactful authors were also from China. The other most researched areas associated with cloud computing were revealed to be mobile cloud computing and data security in clouds. The most prominent journal currently publishing research studies on cloud computing was “Advances in Intelligent Systems and Computing.”

Originality/value

The study is the first of its kind which identified the quantity (frequencies), quality (impact) and structural indicators (correlations) of Asian (48 countries and 3 territories) research productivity on cloud computing. The results are of great importance for researchers and countries interested in further exploring, publishing and increasing cross country collaborations related to the phenomenon of cloud computing.

Open Access
Article
Publication date: 5 July 2022

Ahmed Bounfour, Jean-Michel Etienne, Xiaolin Cheng and Alberto Nonnis

The paper aims to address the organizational transformation of firms for value creation resulting from cloud computing (CC).

1566

Abstract

Purpose

The paper aims to address the organizational transformation of firms for value creation resulting from cloud computing (CC).

Design/methodology/approach

With reference to the theory of organizational fit, we modeled organizational transformation as a function of five aspects of CC practice: functionality, data management, roles and competences of information technology services, control and organizational culture. The output variable was tested against a set of input variables defined with reference to the technology–organization–environment (TOE) and technology acceptance model (TAM). Based on a sample of 487 companies in seven countries in Europe, Asia, and the United States, the authors distinguished two groups of firms: transformational and hyper transformational.

Findings

The results highlight the key factors that determine whether a firm falls into one of these two groups, and include perceived usefulness and perceived ease of use, complexity and compatibility of CC technology, and adequacy of resources. Top management support and government policy are found to only play a role for the transformational group while, surprisingly, vendor support had no impact for either group.

Originality/value

This research contributes to the literature on the role of digital transformation in value creation and on digitization of firms and organizational design, notably by considering the contribution of CC to the organizational dimension. To the best of the authors’ knowledge, this is the first study to make the link between TOE and TAM models and organizational fit theory, thereby going beyond the general approach to adoption found in information system research.

Details

Digital Transformation and Society, vol. 1 no. 1
Type: Research Article
ISSN: 2755-0761

Keywords

Article
Publication date: 26 September 2018

James M. Crick

The purpose of this paper is to explore how marketing can be taught to students originating from non-marketing or non-business backgrounds (non-marketers), so that academics can…

Abstract

Purpose

The purpose of this paper is to explore how marketing can be taught to students originating from non-marketing or non-business backgrounds (non-marketers), so that academics can engage such students in lectures and tutorials.

Design/methodology/approach

The research design involved a qualitative methodology using data from two undergraduate marketing courses (one in New Zealand and one in the UK) that contained a large proportion of non-marketing students. Data were collected from a combination of empirical and archival sources and were analysed using self-reflection techniques, alongside other checks for methodological credibility.

Findings

When teaching marketing to non-marketing students, it is important to integrate theory with practice to help their learning (e.g. through practical case studies). Marketing educators must also maximise their interactivity with their students and have in-class discussions to engage the cohort. Further, lecturers and tutors should relate marketing theories and concepts with non-business subjects to demonstrate the subject’s relevance to students with limited commercial knowledge. These teaching and learning strategies were important for students intending to become entrepreneurs after graduating from university, as well as those planning to enter paid employment.

Originality/value

Prior studies have focussed on teaching marketing to specialist marketing students; however, they have scarcely considered how educators can teach non-specialist marketing to students with non-marketing and non-business backgrounds. This viewpoint solves this research problem, by discussing the best ways that academics can maximise such students’ engagement. It is proposed that the main way that non-marketers can be engaged is through linking marketing with their subjects-of-origin, to demonstrate how marketing activities apply to all organisations and should not be overlooked. A framework is presented, based on the empirical data, to help academics teach marketing to non-marketers. This paper ends with some directions for future research.

Details

Education + Training, vol. 60 no. 9
Type: Research Article
ISSN: 0040-0912

Keywords

Abstract

Details

The Ultimate Guide to Compact Cases: Case Research, Writing, and Teaching
Type: Book
ISBN: 978-1-80382-847-3

Article
Publication date: 18 June 2020

Yiyang Bian, Lele Kang and J. Leon Zhao

The purpose of this paper is to investigate organizational information technology (IT) deployment from a dual decision-making perspective. This study builds on rational choice…

1187

Abstract

Purpose

The purpose of this paper is to investigate organizational information technology (IT) deployment from a dual decision-making perspective. This study builds on rational choice theory to characterize how the costs and values of incumbent IT and those of the corresponding new cloud computing influence a company's dual decision of discontinuance and acceptance.

Design/methodology/approach

This study chooses cloud computing as the research context, since it is one of the most well-accepted ITs in current practice. By using survey methodology, the data were collected from organizations around the world. Our hypotheses were examined via multimethod analyses, including the partial least squares, the multinomial log it regression and the analysis of variance.

Findings

This research reveals that organizations often follow the dual decision-making process in IT deployment regarding a non-cloud, hybrid structure and full-cloud considers incumbent IT discontinuance and new cloud computing acceptance. These results indicate that organizations may embrace cloud computing because of its perceived high system compatibility and low support costs. Meanwhile, security threats remain the primary obstacles to conducting business in the cloud.

Originality/value

Previous studies mainly focus on a single aspect and do not reveal the intricacies of the interactions between the reduction of incumbent IT and the addition of new IT. To address this gap in the body of knowledge, our study proposes a dual decision model based on a dialectical understanding of new and incumbent IT mechanisms instead of a singular IT acceptance model.

Details

Internet Research, vol. 30 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 13 July 2021

Som Sekhar Bhattacharyya and Yash Shah

Emerging technologies have been transforming most industries. A wide range of emerging technologies such as blockchain, internet of things (IoT), artificial intelligence (AI)…

Abstract

Purpose

Emerging technologies have been transforming most industries. A wide range of emerging technologies such as blockchain, internet of things (IoT), artificial intelligence (AI), machine learning (ML), robotics and many others have changed the way in which firm value chain activities or processes were executed traditionally. The mining industry has also witnessed the introduction of these emerging technologies in various processes from the exploration stage to the final processing of ores. The purpose of this paper is to understand the pace of adoption of emerging technologies in the Indian mining industry and identify the challenges that managers confront while adopting emerging technologies.

Design/methodology/approach

The authors undertook qualitative research. Data collection was done in two stages. Secondary research was conducted to arrive at a repository of use cases of the adoption of emerging technologies in the global mining industry. Primary data collection was also done. The insights on emerging technology adoption and challenges faced in the Indian mining industry were captured by in-depth interviewing of subject matter experts. The authors interviewed 21 mining subject matter experts with a semi-structured open-ended questionnaire. The responses were content analyzed by thematic content analysis. Technological-organizational-environmental (TOE) and diffusion of innovation (DOI) frameworks were applied to segregate different factors affecting the adoption of emerging technologies in the Indian mining industry.

Findings

Emerging technologies such as blockchain, IoT, AI, ML, robotics has been applied across various mining engineering value chain activities such as in drilling, blasting, excavation and ore hauling. However, emerging technologies adoption was hindered because of a lack of managerial awareness, cultural inertia, substantive upfront investments and the nature of intangible benefits in the short run.

Research limitations/implications

The research applied technology adoption frameworks in the mining industry. The authors used TOE and DOI frameworks to understand the challenges faced by Indian mining firms. The research findings, thus added to the conversation of TOE and DOI frameworks in the context of the Indian mining industry.

Practical implications

The research finding would help mining firm managers to anticipate the challenges with respect to technology adoption. This would allow mining executives to create a proper technology adoption plan and intervene proactively. The research would also provide information about the steps taken by competing firms with respect to emerging technologies adoption. The research would help managers to decide technology implementation steps in drilling, blasting, excavation and ore hauling to be undertaken for successful adoption of emerging technologies. Technology firms could gain insights into the issues faced by mining firms in adopting emerging technologies. This research would help managers to influence organizational technology policy and endorse the addition of pro-technology policies in mining activities. Policymakers involved in the mining sector could also incorporate industry-level policy decisions so as to facilitate the adoption of emerging technologies among mining firms and remove the barriers to the adoption of emerging technologies. This would create an opportunity for technology providers to redesign product offerings, which could be a good fit for Indian mining firms.

Originality/value

Indian mining industry contributed significantly to the Indian economy. Despite this, limited focus has been put regarding the adoption of emerging technologies in the mining industry. Mining managers did not have any framework to understand the challenges faced in the adoption of technologies across the mining value chain that is in drilling, blasting, excavation and ore hauling. This study focused on identifying those challenges through the use of technology adoption frameworks. This research was one of the first studies to gain insights on emerging technologies adoption in the context of the mining industry through the theoretical lens of TOE and DOI frameworks.

Article
Publication date: 22 November 2022

Che Ku Hisam Che Ku Kassim and Nur Raihana Mohd Sallem

Issues on fraudulent excuses have become a common phenomenon at higher educational institutions. Although these misbehaviours can unfavourably impact the quality of graduates…

Abstract

Purpose

Issues on fraudulent excuses have become a common phenomenon at higher educational institutions. Although these misbehaviours can unfavourably impact the quality of graduates, nonetheless, these issues have been largely ignored as the focus of academic debates is placed more on other academic dishonest behaviours such as cheating in exams and plagiarisms. Therefore, the aim of this paper is to examine undergraduates' perception of fraudulent excuse-making and to offer a fruitful academic discussion on this deceitful behaviour that has been a somewhat undesirable culture in tertiary educational settings.

Design/methodology/approach

An online self-administered questionnaire survey was conducted to 346 undergraduates at a Malaysian public university.

Findings

The results suggest that, while the number is low, fraudulent excuses are indeed being mobilised by undergraduate students in their attempt to avoid academic responsibility. The influence of demographic profiles on fraudulent excuse-making is also evident.

Originality/value

A scarcity of studies on fraudulent excuses has contributed to a lack of understanding of the pertinent reasons and causes leading to the engagement of these misbehaviours. The paper hopes to shed some light that can be beneficial to the relevant managerial authorities within the university in any policy changes in an attempt to curb this problematic behaviour from continuously affecting the inner quality of graduates.

Details

International Journal of Educational Management, vol. 37 no. 1
Type: Research Article
ISSN: 0951-354X

Keywords

1 – 10 of 89