Search results
1 – 10 of 17This chapter introduces what a digital ID is, why it is important, how it works, the design choices, as well as how central banks can collaborate with other stakeholders in…
Abstract
This chapter introduces what a digital ID is, why it is important, how it works, the design choices, as well as how central banks can collaborate with other stakeholders in promoting digital ID infrastructures for use in digital financial services.
Details
Keywords
This chapter reviews new technologies, new types of players and new types of financial products that together are fundamentally affecting supply and demand dynamics in the…
Abstract
This chapter reviews new technologies, new types of players and new types of financial products that together are fundamentally affecting supply and demand dynamics in the financial sector and contributing to the emerging digital financial landscape. The aim of this chapter is to set a common understanding on the underlying forces of digital disruption in the financial sector before exploring the challenges to monetary and financial stability that are arising. In later chapters, the book will examine how central banks might deal with the challenges and help shape the emerging digital financial landscape.
Details
Keywords
This study aims to assess the effectiveness of online e-resource marketing tools used by university libraries to market e-resources. The specific objectives of this study were to…
Abstract
Purpose
This study aims to assess the effectiveness of online e-resource marketing tools used by university libraries to market e-resources. The specific objectives of this study were to uncover the e-resources that are showcased by university libraries, find out instructions posted by libraries to facilitate access and utilization of e-resources, examine marketing tools used, examine how current and relevant marketing messages and test the functionality of the marketing tools used.
Design/methodology/approach
An exploratory research design was used to assess the effectiveness of e-resources marketing tools. The study population included all public university libraries in Tanzania. The sample was purposively selected to include all publicly funded libraries as they work under similar management environments. Data collection involved the evaluation of online marketing tools using a matrix checklist.
Findings
It was revealed that most university libraries use websites for showcasing e-resources. The commonly used social media for marketing e-resources is Facebook followed by Instagram while Twitter and Ask a Librarian are the least used. The results further show that only a few universities provide instructions on how to access and use e-resources. The findings indicate that universities had active communication platforms for marketing e-resources. Furthermore, less than 50% of marketing messages are active and current. It is recommended that marketing e-resources should be integrated into the library’s plans and strategies and this should be informed by library policies.
Research limitations/implications
Given that, this study involved Tanzanian public university libraries, it is possible that the findings do not represent the same situation in all academic university libraries in the nation.
Originality/value
This study assesses the effectiveness of online tools used to market e-resources in university libraries in Tanzania. It reveals the e-resources that are showcased online, the instructions provided on how to access the e-resources and the functionality of the marketing tools. Unlike the previous research, which primarily focused on evaluating the Web-based tools in university and college libraries, this study focused on public libraries in the country. The results will not only contribute to the theoretical and practical understanding of the functionality of the marketing tools but also provide actionable insights to decision-makers in libraries in marketing their e-resources.
Details
Keywords
Liuyu Huang, Dion Hoe-Lian Goh and Stella Xin Yin
Public service announcements (PSAs) have been shown to be effective instruments that raise awareness, educate society, and change behaviors and attitudes. Many governments and…
Abstract
Purpose
Public service announcements (PSAs) have been shown to be effective instruments that raise awareness, educate society, and change behaviors and attitudes. Many governments and organizations have utilized PSAs on social media to promote online safety among children and youth. However, we have limited understanding of the range of topics that these PSAs address and how they present their content to audiences. This study provides an inventory of the types of online safety topics that current PSAs address and a catalogue of the types of persuasive features employed by PSAs.
Design/methodology/approach
A content analysis of 220 YouTube PSA videos on online safety was conducted. Various topics under the umbrella of online safety were identified. Guided by the prospect theory and exemplification theory, different persuasive features employed in the PSAs were sought.
Findings
The findings highlight that the primary focus of these PSAs is on online safety behaviors and general instructions on online hygiene. Interestingly, nearly half of the videos employ a neutral frame, while a significant portion provides no evidential support. Additionally, video length was associated with the number of views and likes it gathered but not with the number of comments.
Originality/value
The inventory of PSAs can help researchers, practitioners, and policymakers better understand the type of content being produced and disseminated online as well as identify topics that are either over or under-represented. Further, the catalogue of the types of persuasive features employed by PSAs would be helpful in guiding research, practice, and policymaking in the context of creating effective online safety videos.
Details
Keywords
This chapter reviews some of the technical background relating to the designs of digital infrastructures for financial services. Such technical background could be useful to the…
Abstract
This chapter reviews some of the technical background relating to the designs of digital infrastructures for financial services. Such technical background could be useful to the understanding of the design choices that the central banks and pertinent regulators face when developing or promoting open digital infrastructures for financial services. First, the chapter reviews modularity and interoperability in the design of digital infrastructure. The chapter then examines three broad architectural models of open digital infrastructures: decentralized, centralized and distributed. The chapter ends with some lessons learnt from the different architectural models that have been implemented in practice.
Details
Keywords
Efthymios Rizopoulos and Markos T. Zachariadis
For over a decade, fintech has challenged traditional business models and processes in the financial services industry. The ongoing disruption has necessitated the digital…
Abstract
For over a decade, fintech has challenged traditional business models and processes in the financial services industry. The ongoing disruption has necessitated the digital transformation of financial institutions (FIs) to remain an integral part of the financial system. This paradigm shift is not merely a technological update. Still, it signifies a cultural and operational rebirth, compelling FIs to embrace innovation, adaptability, and a customer-centric approach in the digital era. Independent of the business model, FIs must become digitally ambidextrous, offer tailored and dynamic customer experiences, support financial inclusion, and promote an environmental, social, and governance (ESG) agenda while leveraging data and remaining compliant. From digitalization to fintegration, the financial services industry's future is deemed to be an exciting and productive one.
Details
Keywords
Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The…
Abstract
Purpose
Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The purpose of this study is to bridge this gap and examine how the non-work use of smartphones in the workplace affects work–life conflict.
Design/methodology/approach
Drawing from three literature streams: technostress, work–life conflict and role boundary theory, the authors theorise on how limiting employees' ability to integrate the personal life domain into work, by means of technology use policy, contributes to stress and work–life conflict. To test this model, the authors employ a natural experiment in a company that changed its policy from fully restricting to open smartphone access for non-work purposes in the workplace. The insights gained from the experiment were explored further through qualitative interviews.
Findings
Work–life conflict declines when a ban on using smartphones for non-work purposes in the workplace is revoked. This study's results show that the relationship between smartphone use in the workplace and work–life conflict is mediated by sensed stress. Additionally, a post-hoc analysis reveals that work performance was unchanged when the smartphone ban was revoked.
Originality/value
First, this study advances the authors' understanding of how smartphone use policies in the workplace spill over to affect non-work life. Second, this work contributes to the technostress literature by revealing how, in specific situations, engagement with ICT can reduce distress and strain.
Details
Keywords
This chapter takes an overview look at open digital infrastructures for financial services: what they are, why they are important for digital financial landscape, and thus why the…
Abstract
This chapter takes an overview look at open digital infrastructures for financial services: what they are, why they are important for digital financial landscape, and thus why the central banks might need to take an active role to promote them. This chapter also reviews some concrete examples of open digital infrastructures in various jurisdictions to give some context.
Details
Keywords
This chapter starts by reviewing four broad regulatory approaches that exemplified state-of-the-art in major jurisdictions: market-driven approach (the United States)…
Abstract
This chapter starts by reviewing four broad regulatory approaches that exemplified state-of-the-art in major jurisdictions: market-driven approach (the United States), state-driven approach (China), rights-driven approach (the European Union) and innovation-driven approach (the United Kingdom, Singapore, Hong Kong SAR). This chapter then examines possible regulatory updates with regards to walled gardens and shadow banking, the first two of the challenges first identified in Chapter 3. The next two chapters will then examine possible regulatory updates to address the remaining challenges identified.
Details
Keywords
Lingling Huang, Chengqiang Zhao, Shijie Chen and Liujing Zeng
Technical advantages embraced by blockchain, such as distributed ledger, P2P networks, consensus mechanisms and smart contracts, are highly compatible with addressing the security…
Abstract
Purpose
Technical advantages embraced by blockchain, such as distributed ledger, P2P networks, consensus mechanisms and smart contracts, are highly compatible with addressing the security issues of transferring and storing judicial documents and obtaining the feedback and evaluation of judicial translation services in cases with foreign elements. Therefore, based on this, a consortium blockchain-based model for supervising the overall process of judicial translation services in cases with foreign elements is proposed.
Design/methodology/approach
Some judicial documents are required to be translated when there are language barriers in cases with foreign elements. The purpose of this paper is expected to address security issues, which is ignored, in the process of translating judicial documents.
Findings
The experimental results show that the model constructed in this paper can effectively guarantee the security and privacy of transferring and storing translated judicial documents in cases with foreign elements, and realize the credibility and traceability of feedbacks and evaluations of judicial translation services. In addition, the underlying network communications is stable and the speed for processing data can meet the requirements of practical application.
Originality/value
The research in this paper provides an innovative scheme for judicial translation services in cases with foreign elements. The model constructed is conducive to protecting the security of the transfer and storage of judicial documents and improving the efficiency and modernization ability of hearing cases with foreign elements.
Details