Search results

1 – 10 of 447
Article
Publication date: 23 May 2023

Irfan Ali and Nosheen Fatima Warraich

Although, smartphones have facilitated users to keep their personal information, nonetheless, less has been investigated about factors affecting personal information management…

Abstract

Purpose

Although, smartphones have facilitated users to keep their personal information, nonetheless, less has been investigated about factors affecting personal information management (PIM) practices. Therefore, this study aims to investigate how personal innovativeness, perceived ease of use (PEOU) and mobile self-efficacy affect PIM (e.g. finding/re-finding, keeping, organizing and maintaining) practices.

Design/methodology/approach

Quantitative research design was used in this study. The authors collected data from 222 students of information management from public sector universities using a questionnaire. PLS modeling technique was used to analyze data.

Findings

The authors noted that personal innovativeness significantly impacts finding/refinding information, whereas it insignificantly affects keeping, organizing and maintaining information practices. In addition, smartphone PEOU significantly influences information finding and refinding, information keeping and organizing information, whereas insignificantly influences information maintaining. Moreover, mobile self-efficacy was noted to be significantly associated with finding and refinding information, information keeping, information organizing and information maintaining.

Originality/value

This research is an important contribution to the body of existing literature, as it proposed an integrated model based on constructs extracted from Technology Acceptance Model (TAM), Social Cognitive Theory, personal innovativeness and PIM. This study also has practical significance because the findings of this study would be helpful for smartphone application developers and LIS school directors to design programs for information literacy.

Article
Publication date: 4 January 2024

Eun Hye Jo and Jung Wha Lee

This study examines how the presence of labor unions affects a firm’s pay disparity between executives and employees and its financial statement comparability.

Abstract

Purpose

This study examines how the presence of labor unions affects a firm’s pay disparity between executives and employees and its financial statement comparability.

Design/methodology/approach

It uses firm-level labor union data in Korea and applies regression analyses to a sample of 1,776 firm-year observations from 2004 to 2008.

Findings

The authors find that unionized firms have a smaller pay disparity between executives and employees than non-unionized firms, suggesting that labor unions place pressure on the pay structure. Unionization also lowers financial statement comparability, which helps managers of unionized firms maintain information asymmetry. Further, this negative relationship between unionization and financial statement comparability is stronger in non-chaebol firms, implying that they are more motivated than chaebol firms to reduce their financial statement comparability in response to the presence of labor unions. In addition, the negative relationship between unionization and financial statement comparability is pronounced in profit-making firms, firms with less analyst following, firms with fewer foreign investors and firms in more competitive product markets.

Research limitations/implications

The finding that firms adjust comparability in response to labor unions interests regulators and policymakers, who emphasize the role of comparability in providing usefulness to information users.

Originality/value

The findings add to the existing literature on the effect of labor unions on firms' pay structures and accounting choices.

Details

International Journal of Managerial Finance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1743-9132

Keywords

Article
Publication date: 21 July 2022

Bahaa Razia, Bahaa Awwad and Najma Taqi

This paper aims to provide better understanding on this phenomenon, as well as some recommendations to assist in preparing Al technology and its related aspects during crisis like…

1144

Abstract

Purpose

This paper aims to provide better understanding on this phenomenon, as well as some recommendations to assist in preparing Al technology and its related aspects during crisis like Covid period and beyond.

Design/methodology/approach

The study consisted of two phases. Phase one focused on identifying top higher education institutions according to the QS world university ranking. As a result, 180 higher education institutions in the Arab region were found, with the 2022 QS Arab region university ranking. The study selected top 20 performing institutions. Each institution has been assessed according to six metrics including: international student ratio, international research network, international ration, Web impact, citation per page and paper per faculty. Phase two explored the adapted Al applications and their related aspects that are used in each institution using a learning online questionnaire. Pilot tests were used to determine the validity and reliability of the measures.

Findings

Numerous factors that lead to enhancing high education using Artificial Intelligence in higher education institutions have emerged from this study. These factors include; knowledge management, trust, learning, technical resources and complexity. First, effective knowledge management assists in maintaining information in a place where it is easy to share and access. Second, trust is considered a critical factor in dealing with uncertainties like covid-19. It needs to be effectively addressed by students and staff members, especially in higher education. Without trust, decisions cannot be successfully made and actions may be delayed or stalled. Third, continuous learning is a key factor that tends to enhance the capability of dealing with new routines or potential challenges. Fourth, technical resources refer to electronic devices and tools that are used by students and academics to interact and share knowledge.

Originality/value

Students and faculty academics perceive things and use Al technology differently, which can lead to misunderstanding and create tension between them. Many higher education institutions have adapted great Al technology applications, but they are significantly less proficient than previously thought at understanding how to leverage this technology to produce helpful solutions to their business difficulties.

Details

Development and Learning in Organizations: An International Journal, vol. 37 no. 3
Type: Research Article
ISSN: 1477-7282

Keywords

Article
Publication date: 1 December 2001

Deborah Barreau

There are costs associated with the acquisition, implementation, and operation of information systems beyond the price of hardware and software. As these costs sometimes account…

2309

Abstract

There are costs associated with the acquisition, implementation, and operation of information systems beyond the price of hardware and software. As these costs sometimes account for budget shortfall, it is important to recognize problem areas and minimize their impact on the organization. Potential hidden costs, including costs that may be hidden by managers, as well as costs that may be hidden from them, are identified and recommendations offered for avoiding serious consequences.

Details

The Bottom Line, vol. 14 no. 4
Type: Research Article
ISSN: 0888-045X

Keywords

Article
Publication date: 1 March 1955

Rolf Jacoby

The U.S. Information Service is an agency of the Foreign Service of the U.S. Government maintaining information centres in many parts of the world. An information centre usually…

Abstract

The U.S. Information Service is an agency of the Foreign Service of the U.S. Government maintaining information centres in many parts of the world. An information centre usually contains a reading room, a library, sometimes a cinema, a film loan service for 16 mm. sound films, and clerical offices.

Details

Aslib Proceedings, vol. 7 no. 3
Type: Research Article
ISSN: 0001-253X

Article
Publication date: 20 November 2023

Lilach Alon

The study investigates the information-related challenges as well as the practices adopted by early-career researchers during transitions between roles and institutions. Its…

Abstract

Purpose

The study investigates the information-related challenges as well as the practices adopted by early-career researchers during transitions between roles and institutions. Its primary goal is to delve into how information behaviors serve as scaffolding during significant life shifts. Moreover, the research aims to provide actionable insights based on this scaffolding concept for individuals navigating transitions.

Design/methodology/approach

This preliminary and exploratory study took a phenomenological approach to examine the role of information seeking and personal information management (PIM) behaviors during life transitions. In-depth semi-structured interviews were held with 15 early-career researchers from various disciplines, who were about to finish their PhDs or had recently graduated.

Findings

By employing information seeking and PIM practices, participants were able to address three main information challenges that arose during the transition process: the timing of information behavior, the nature of information and the social components of the transition. The use of networked and independent information seeking/validation practices enabled to establish a sustainable network of transition-related information, reducing uncertainty. PIM practices helped planning the transition, maintaining information over the long-term and gaining control over personal information.

Originality/value

This study underscores the significance of information behaviors, encompassing both information seeking and PIM, as scaffolding mechanisms during crucial life transitions. It offers essential insights that can guide the creation of impactful interventions and resources. Additionally, the research illuminates the pressing demand for more in-depth exploration in this domain.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 1 January 2006

Brendan Fitzgerald

This paper aims to provide a historical overview of VICNET at the State Library of Victoria (www.slv.vic.gov.au)., to introduce VICNET's conceptual development and to explore some…

823

Abstract

Purpose

This paper aims to provide a historical overview of VICNET at the State Library of Victoria (www.slv.vic.gov.au)., to introduce VICNET's conceptual development and to explore some of the impact and achievements of VICNET.

Design/methodology/approach

This paper looks at some of the published papers on VICNET and draws on the experiences of implementing and maintaining information and communications technology projects and services outlined in those papers. It also draws on the experience and opinions of the author as a senior manager within VICNET.

Findings

VICNET recognized that the online‐networked environment required development in parallel of access, content and skills. Its internet service provider and web design and hosting activities underpin VICNET's remarkable growth. This has served to enhance its capacity to deliver government ICT information society projects such as Skills.Net (www.skills.net.au) and My Connected Community (www.mc2.vicnet.net.au). The importance of community web publishing and access to online information is emphasized in the development of the VICNET web site (www.vicnet.net.au) and other key online content initiatives such as Victoria's Virtual Library (www.libraries.vic.gov.au), the Gulliver consortium, the Open Road project (www.openroad.vic.gov.au) and the MyLanguage Portal (www.mylanguage.gov.au).

Originality/value

The paper gives to the wider global library sector an overview of a unique library‐based information technology initiative.

Details

The Electronic Library, vol. 24 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 15 June 2010

Sheila Morrissey

Free and open source software (FOSS) brings many benefits to digital preservation; however it is not “free”. If the context in which free and open source software tools are…

1892

Abstract

Purpose

Free and open source software (FOSS) brings many benefits to digital preservation; however it is not “free”. If the context in which free and open source software tools are created and employed is examined, it becomes clear that: the sustainability of any software (FOSS, custom or commercial) to ensure the preservation of the digital heritage will depend on careful assessment of, and provision for, the costs (implicit and explicit) entailed in the production and continued employment of these tools. The purpose of this paper is to focus on FOSS and archiving of the digital heritage.

Design/methodology/approach

Portico, a not‐for‐profit digital preservation service, explores the costs of FOSS based on its experiences as a working archive with an extremely long time horizon.

Findings

There are considerable benefits to FOSS, including its openness and the broad‐based testing of it in real‐world situations. FOSS tools can provide considerable cost savings over proprietary tools. However, FOSS is neither free to use, nor to create, nor to maintain. Digital preservation organizations must inventory not only the FOSS tools in the preservation arsenal, but the network of sustaining tools (FOSS and otherwise), documentation, and “tribal knowledge” that make these tools effectively usable. The risks to sustainability of this network of resources must be assessed, and determine what it will cost to keep them viable. Strategies will have to be considered and implemented for providing the means to sustain these resources. An engaged community of use is the best guarantor of the vitality of any FOSS tool. As that community wanes, it becomes even more essential to capture the significant properties and domain knowledge about that tool. Creators of new software in the digital preservation space have a particular obligation to provide and maintain information about the significant properties of that software.

Originality/value

The paper shows how Portico brings its practical experiences integrating multiple FOSS tools to bear on an analysis of the costs to creating and maintaining these tools over the long‐term.

Details

Library Hi Tech, vol. 28 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 4 June 2020

Moufida Sadok, Steven Alter and Peter Bednar

This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs). It uses guidelines based on work…

1896

Abstract

Purpose

This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs). It uses guidelines based on work system theory (WST) to frame the results, thereby illustrating why the mere existence of corporate security policies or general security training often is insufficient for establishing and maintaining information security.

Design/methodology/approach

This research was designed to produce a better appreciation and understanding of potential issues or gaps in security practices in SMEs. The research team interviewed 187 employees of 39 SMEs in the UK. All of those employees had access to sensitive information. Gathering information through interviews (instead of formal security documentation) made it possible to assess security practices from employees’ point of view.

Findings

Corporate policies that highlight information security are often disconnected from actual work practices and routines and often do not receive high priority in everyday work practices. A vast majority of the interviewed employees are not involved in risk assessment or in the development of security practices. Security practices remain an illusory activity in their real-world contexts.

Research limitations/implications

This paper focuses only on closed-ended questions related to the following topics: awareness of existing security policy; information security practices and management and information security involvement.

Practical implications

The empirical findings show that corporate information security policies in SMEs often are insufficient for maintaining security unless those policies are integrated with visible and recognized work practices in work systems that use or produce sensitive information. The interpretation based on WST provides guidelines for enhancing information system security.

Originality/value

Beyond merely reporting empirical results, this research uses WST to interpret the results in a way that has direct implications for practitioners and for researchers.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 21 November 2023

Anandika Sharma, Tarunpreet Bhatia, Rohit Kumar Singh and Anupam Sharma

The food supply chain has faced many challenges due to its complex and complicated nature. Blockchain technology is one of the mechanisms used to improve agri-food supply chain…

Abstract

Purpose

The food supply chain has faced many challenges due to its complex and complicated nature. Blockchain technology is one of the mechanisms used to improve agri-food supply chain processes by evolving organization capabilities. A study is being conducted to scrutinize the adoption of blockchain technology in the agri-food supply chain through the lens of the operational capability approach. It further makes an attempt to identify the capabilities of blockchain to improve supply chain processes.

Design/methodology/approach

The qualitative research method with semi-structured interviews was used to gather information from experts and professionals in the food supply chain and blockchain technology. The authors have adopted a systematic approach of coding using open, axial and selective methods to depict and identify the themes that represent the blockchain-enabled agri-food supply chain. The data were collected from 32 interviews of selected participants.

Findings

The result shows five critical areas where blockchain can come up to enhance the agri-food supply chain performance by providing traceability, transparency, information security, transactions, and trust and quality. Further, the study reveals that blockchain will provide safety, lower the cost of transactions and can create trust among users to communicate within the whole supply chain without the intervention of a third party. This study demonstrated that the capabilities need to be considered when introducing technology into the practice.

Research limitations/implications

The study implies thought-provoking implications for bridging the theory-practice gap by examining the empirical data to demonstrate how the operational capabilities of blockchain technology further strengthen the agri-food supply chain. Additionally, this study provides some suggestions for utilizing the results and proposes a framework to understand more about blockchain use cases in the agri-food supply chain as well as extend the application of blockchain using an operational capability approach for future academic researchers in this area.

Practical implications

This study presented some more important managerial implications which reveal that the majority of organisations were in the initial stages of adoption process of blockchain technology. Further, the positive influence of managers and IT experts can help the information technology companies (IT) and stakeholders for developing and promoting blockchain solutions in the agri-food supply chain. The important implication of blockchain enabled agri-food supply chain is to maintain information security and incresae supply chain performance.

Originality/value

The study shows the operational capabilities of agri-food supply chain using blockchain technology. Blockchain can contribute in enhancing the agri-food supply chain to increase traceability and transparency and helps to reduce the risk of disruptions.

Details

Business Process Management Journal, vol. 30 no. 1
Type: Research Article
ISSN: 1463-7154

Keywords

1 – 10 of 447