Search results

1 – 6 of 6
Open Access
Article
Publication date: 31 December 2019

Bilge Yigit Ozkan, Marco Spruit, Roland Wondolleck and Verónica Burriel Coll

This paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized…

2612

Abstract

Purpose

This paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized enterprise (SME) cluster. The purpose of this paper is to provide SMEs with a tailored maturity model enabling them to capture and improve their information security capabilities.

Design/methodology/approach

Design Science Research was followed to design and evaluate the method as a design artifact.

Findings

The method has successfully been used to adapt the ISFAM model to a group of SMEs within a regional cluster resulting in a model that is aligned with the OCs of the cluster. Areas for further investigation and improvements were identified.

Research limitations/implications

The study is based on applying the proposed method for the SMEs active in the transport, logistics and packaging sector in the Port of Rotterdam. Future research can focus on different sectors and regions. The method can be used for adapting other focus area maturity models.

Practical implications

The resulting adapted maturity model can facilitate the creation and further development of a base of common or shared knowledge in the cluster. The adapted maturity model can cut the cost of over implementation of information security capabilities for the SMEs with scarce resources.

Originality/value

The resulting adapted maturity model can facilitate the creation and further development of a base of common or shared knowledge in the cluster. The adapted maturity model can cut the cost of over implementation of information security capabilities for the SMEs with scarce resources.

Details

Journal of Intellectual Capital, vol. 21 no. 2
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 20 November 2017

Marco Buijs and Marco Spruit

The purpose of this paper is to present asynchronous social search as a novel and intuitive approach to search for information in which people collaborate to find the information…

Abstract

Purpose

The purpose of this paper is to present asynchronous social search as a novel and intuitive approach to search for information in which people collaborate to find the information they are looking for.

Design/methodology/approach

A prototype was built to test the feasibility in a business environment. A case study was performed at an organisation with over 1,000 employees to evaluate the quality of asynchronous social search as a single point of access to information.

Findings

Based on the results, the authors conclude that asynchronous social search has great potential as a single point of access to organisational information. Key strengths include that the implementation requires no integration with the existing information technology infrastructure of organisations and participants were very satisfied with the results provided by the prototype.

Originality/value

This work demonstrates that asynchronous social search indeed provides a very good starting point for a single point of access to information, as integration with existing software systems is not necessary, and due to the lightweightness of the approach it also performs really well which, in turn, stimulates the technology’s acceptance by its end-users.

Open Access
Article
Publication date: 14 February 2023

Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper and Matthieu Brinkhuis

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected…

Abstract

Purpose

This paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors collected 119.810 publications and over 3 million references to perform a bibliometric domain analysis as a quantitative approach to uncover the structures within the privacy research field.

Design/methodology/approach

The bibliometric domain analysis consists of a combined directed network and topic model of published privacy research. The network contains 83,159 publications and 462,633 internal references. A Latent Dirichlet allocation (LDA) topic model from the same dataset offers an additional lens on structure by classifying each publication on 36 topics with the network data. The combined outcomes of these methods are used to investigate the structural position and topical make-up of the privacy research communities.

Findings

The authors identified the research communities as well as categorised their structural positioning. Four communities form the core of privacy research: individual privacy and law, cloud computing, location data and privacy-preserving data publishing. The latter is a macro-community of data mining, anonymity metrics and differential privacy. Surrounding the core are applied communities. Further removed are communities with little influence, most notably the medical communities that make up 14.4% of the network. The topic model shows system design as a potentially latent community. Noteworthy is the absence of a centralised body of knowledge on organisational privacy management.

Originality/value

This is the first in-depth, quantitative mapping study of all privacy research.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 2
Type: Research Article
ISSN: 2635-0270

Keywords

Book part
Publication date: 4 October 2019

Marco Spruit and Patrick Joosten

The higher education world around us is changing fast. Mobile learning (M-learning) and apps in education are new and exciting. However, this does not mean that the faculty is…

Abstract

The higher education world around us is changing fast. Mobile learning (M-learning) and apps in education are new and exciting. However, this does not mean that the faculty is less relevant. On the contrary, the faculty are an ever-important factor that is needed to increase student engagement. Disengaged students are in fact more problematic than low achieving students. This is because of the disruption disengaged student bring in the classroom. Therefore, increasing student engagement is a key challenge in higher education today. Research suggests that active learning, value and expectations are important factors that determine student engagement. Some of these factors can be indirectly influenced by the faculty and course designers. Against this background, the objective of this chapter is to examine if dwindling student engagement in higher education can be addressed with CURPA, i.e. a CURriculum and course planning (CURP) App. CURPA is the result of our efforts at Utrecht University to help design courses and curricula by using cards to account for different activities, with the strategic aim being to stimulate student engagement in higher education. Our expert interviews resulted in a MoSCoW-prioritised list of requirements that can be implemented over time, structured in line with Becker's student engagement model.

Details

Management and Administration of Higher Education Institutions at Times of Change
Type: Book
ISBN: 978-1-78973-628-1

Keywords

Content available
Book part
Publication date: 4 October 2019

Abstract

Details

Management and Administration of Higher Education Institutions at Times of Change
Type: Book
ISBN: 978-1-78973-628-1

Book part
Publication date: 4 October 2019

Anna Visvizi, Miltiadis D. Lytras and Akila Sarirete

Over the past few decades, the higher education landscape underwent dramatic changes, causing strain on higher education institutions (HEI) worldwide. The academic debate is…

Abstract

Over the past few decades, the higher education landscape underwent dramatic changes, causing strain on higher education institutions (HEI) worldwide. The academic debate is filled with very well-argued accounts of these developments. Advances in information and communication technology (ICT) add an additional layer to this already complex reality. Against this backdrop, it is necessary that the question of managing and administering HEI today be rethought. Emerging technologies such as artificial intelligence (AI) and cognitive computing, augmented, virtual and mixed reality (R+), Internet of Things (IoT), blockchain, bear the promise to effectively assisting HEI administrators in navigating their institutions through the period of profound change. This chapter offers a brief account of that.

Details

Management and Administration of Higher Education Institutions at Times of Change
Type: Book
ISBN: 978-1-78973-628-1

Keywords

1 – 6 of 6