Search results

1 – 10 of over 3000
Article
Publication date: 30 May 2023

Natalia Aversano, Diana Ferullo, Giuseppe Nicolò and Nadia Ardito

The present research aims to understand the performance disclosure levels provided by Italian healthcare organisations (HCOs). The authors conducted this study to assess the…

Abstract

Purpose

The present research aims to understand the performance disclosure levels provided by Italian healthcare organisations (HCOs). The authors conducted this study to assess the transparency of HCOs' performance reporting processes by examining the amount and the type of information disclosed in Annual Performance Reports (APRs).

Design/methodology/approach

The present study uses a qualitative research methodology based on manual content analysis. The APRs of a sample of 171 Italian public HCOs were analysed.

Findings

Results evidence that the APRs provide a sufficient level of disclosure of performance information, putting high attention on the epidemiological conditions; however, the APRs do not present a strong information function for stakeholders' decision-making purposes. The Italian HCOs APRs are not easily understandable because the APRs are not very concise and present information mainly in discursive terms with limited graphic support.

Originality/value

To the best of the authors' knowledge, this is the first research investigating both the extent and type of performance information reported by Italian HCOs in the APRs, considering the particular contextual conditions caused by the most significant challenge the healthcare (HC) sector has faced in recent years: the epidemiological crisis of the coronavirus disease 2019 (COVID-19). The study also explores whether APRs are currently used by HCOs as a merely regulatory requirement or as an information tool for accountability and decision-making purposes.

Details

International Journal of Productivity and Performance Management, vol. 73 no. 4
Type: Research Article
ISSN: 1741-0401

Keywords

Article
Publication date: 13 September 2023

Prasetyo Adi Wibowo Putro, Dana Indra Sensuse and Wahyu Setiawan Setiawan Wibowo

This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks…

Abstract

Purpose

This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks such as NIST Cybersecurity Framework and ISO 27001. Smart government is defined as the government administration sector of CII due to its similarity as a core of smart technology.

Design/methodology/approach

To ensure the validity of the data, the research methodology used in this paper follows the predicting malfunctions in socio-technical systems (PreMiSTS) approach, a variation of the socio-technical system (STS) approach specifically designed to predict potential issues in the STS. In this study, PreMiSTS was enriched with observation and systematic literature review as its main data collection method, thematic analysis and validation by experts using fuzzy Delphi method (FDM).

Findings

The proposed CII protection framework comprises several dimensions: objectives, interdependency, functions, risk management, resources and governance. For all those dimensions, there are 20 elements and 41 variables.

Practical implications

This framework can be an alternative guideline for CII protection in smart government, particularly in government administration services.

Originality/value

The author uses PreMiSTS, a socio-technical approach combined with thematic analysis and FDM, to design a security framework for CII protection. This combination was designed as a mixed-method approach to improve the likelihood of success in an IT project.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 September 2023

Argho Bandyopadhyay, John Hall, Ho Yin Wong, Larry Lockshin, Yunen Zhang and Park Thaichon

This study aims to empirically validate the holistic consumer-based brand equity (CBBE) framework and establishment of the cross-over effect using consumer preferences for wine…

Abstract

Purpose

This study aims to empirically validate the holistic consumer-based brand equity (CBBE) framework and establishment of the cross-over effect using consumer preferences for wine “regions.”

Design/methodology/approach

The authors utilize a sample of 275 regular wine purchasers in Australia, who were aged above 30 years old and had consumed regional wine in the last 3 months through an online consumer panel survey.

Findings

By testing competing CBBE models, the main research model was found to have the greatest predictive ability, due to its inclusion of both the rational and emotional paths and the cross-over effect between consumer brand judgment and brand feeling. This paper indicates that consumers enhance brand equity and develop a strong ongoing relationship with regional wine brands by simultaneously engaging in both mental behavior paths, where, in the meantime, rational processing has a cross-over effect on emotional processing.

Originality/value

This study expands the brand management literature by answering the future research on the CBBE model identified by Hall et al. (2021). Moreover, it establishes the underexplored cross-over effect within the CBBE literature. Furthermore, it adds to the marketing and wine-marketing literature by extending the concept of the brand to other attributes in consumer choice, such as a wine region as outlined by Giacomarra et al. (2020). Thus, this study advances the existing branding knowledge in a practical sense, which enables regional wine marketers and wine retailers to undertake promotional and product development strategies accordingly.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 36 no. 2
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

157

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 January 2024

Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…

Abstract

Purpose

In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.

Design/methodology/approach

The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.

Findings

The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.

Research limitations/implications

This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.

Practical implications

Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.

Originality/value

The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.

Details

The Journal of Risk Finance, vol. 25 no. 2
Type: Research Article
ISSN: 1526-5943

Keywords

Article
Publication date: 18 September 2023

Michael J. Butler

Conventional wisdom tells us that mediation without ripeness is a fool’s errand (Zartman and Touval, 1985). What, then, is Türkiye’s motivation for mediating the war in Ukraine in…

Abstract

Purpose

Conventional wisdom tells us that mediation without ripeness is a fool’s errand (Zartman and Touval, 1985). What, then, is Türkiye’s motivation for mediating the war in Ukraine in lieu of ripeness – and what can its behavior as a mediator tell us about that motivation? In pursuit of this question, this paper inductively analyzes Turkish mediation in the Ukraine war to unpack the relationship between a contextual (ripeness) and actor-level (motivation) variable. Of particular interest is the decision-making and behavior of third parties (like Türkiye in Ukraine) who elect to mediate highly complex conflicts in which ripeness is indiscernible. The purpose of this research is not to propose or test a causal relationship between obscured ripeness and mediation, but rather to examine mediation behavior in situations where ripeness is obscured.

Design/methodology/approach

The impact of weaponized information on ripeness and third-party mediation is evaluated through an original, systematic and inductive case study analysis of Turkish mediation in the Russia–Ukraine war. As an intense theater of operations for information warfare for well over a decade, the war in Ukraine serves as an especially apt choice for an analysis of “obscured ripeness.” Likewise, Türkiye’s anomalous position as the only substantive source of mediation in the conflict lends significance to an empirical examination of its motivation and behavior as a mediator.

Findings

This research reveals that the pervasive use of weaponized information in the Russia–Ukraine war has distorted and disordered the information environment, thereby obscuring the ability of third parties to determine if the conflict is or could be ripe for mediation. However, the condition of obscured ripeness that prevails in the conflict has not proven a deterrent for mediation by Türkiye, which, as the only mediator in the conflict, has used a transactional approach to mediation motivated by self-regarding interests and animated by a manipulative mediation strategy. In sum, this inductive analysis of Turkish mediation in Ukraine reveals that the use of weaponized information in a conflict indirectly selects on transactional mediation (and mediators). The significance of this finding is magnified by the widespread use of weaponized information in contemporary conflicts as well as the declining frequency of third-party mediation.

Originality/value

There have been few, if any, systematic assessments in Turkish mediation of the Russia–Ukraine war, and none specifically concerned with the effects of weaponized information. Additionally, the paper proposes a typology of mediator motivation that is used to structure that assessment, while also introducing a new concept (“obscured ripeness”) and linking that concept both to the existing literature on ripeness and to the use of weaponized information in contemporary armed conflicts. As such, this manuscript represents an important contribution both to the empirical and theoretical landscape with respect to the study of mediation and international conflict management.

Details

International Journal of Conflict Management, vol. 35 no. 1
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 7 September 2023

Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan and Michael O’Sullivan

This paper aims to explore key management actions for implementing security on the cloud, which is a critical issue as many organizations are moving business processes and data on…

Abstract

Purpose

This paper aims to explore key management actions for implementing security on the cloud, which is a critical issue as many organizations are moving business processes and data on it. The cloud is a flexible, low cost and highly available technology, but it comes with increased complexity in maintaining the cloud consumer’s security. In this research, a model was built to assist strategic decision-makers in choosing from a diverse range of actions that can be taken to manage cloud security.

Design/methodology/approach

Published research from 2010 to 2022 was reviewed to identify alternatives to management actions pertaining to cloud security. Analytical hierarchical process (AHP) was applied to rate the most important action(s). For this, the alternatives, along with selection criteria, were summarized through thematic analysis. To gauge the relative importance of the alternatives, a questionnaire was distributed among cloud security practitioners to poll their opinion. AHP was then applied to the aggregated survey responses.

Findings

It was found that the respondents gave the highest importance to aligning information security with business needs. Building a cloud-specific risk management framework was rated second, while the actions: enforce and monitor contractual obligations, and update organizational structure, were rated third and fourth, respectively.

Research limitations/implications

The research takes a general view without catering to specialized industry-based scenarios.

Originality/value

This paper highlights the role of management actions when implementing cloud security. It presents an AHP-based multi-criteria decision-making model that can be used by strategic decision-makers in selecting the optimum mode of action. Finally, the criteria used in the AHP model highlight how each alternative contributes to cloud security.

Article
Publication date: 13 November 2023

Teresa Helena Moreno

The purpose of this paper is to make visible the field's propensity to center whiteness even in engaging inclusive practices in information literacy classrooms. This paper offers…

Abstract

Purpose

The purpose of this paper is to make visible the field's propensity to center whiteness even in engaging inclusive practices in information literacy classrooms. This paper offers abolitionist pedagogy as a means to understand and address these concerns.

Design/methodology/approach

This paper uses interdisciplinary research methods in the fields of education, library science, feminist studies, Black studies and abolition studies to examine and provide an analysis of current information literacy practices by using abolitionist pedagogy to articulate how it is possible to expand information literacy instruction practices.

Findings

Current information literacy practices and methods that seek to create inclusive learning environments for racialized and minoritized learners rely on a set of institutionalized practices such as critical information literacy and culturally sustaining pedagogies. An examination of these practices through an abolitionist pedagogical lens reveals how the field has engaged in reductive and uncritical engagement with these methods despite employing them to create inclusive spaces. Using abolitionist pedagogy as a lens, this critical essay examines the field's foundations in whiteness and illustrates pathways for transformative educational justice.

Originality/value

There has been much work on inclusive teaching practices that discusses challenging information literacy structures' reliance on dominant culture.? To date, there has been little to no scholarship on how information literacy practices could engage in abolitionist pedagogical praxis.

Details

Reference Services Review, vol. 52 no. 1
Type: Research Article
ISSN: 0090-7324

Keywords

Article
Publication date: 20 February 2023

Zakaria Sakyoud, Abdessadek Aaroud and Khalid Akodadi

The main goal of this research work is the optimization of the purchasing business process in the Moroccan public sector in terms of transparency and budgetary optimization. The…

Abstract

Purpose

The main goal of this research work is the optimization of the purchasing business process in the Moroccan public sector in terms of transparency and budgetary optimization. The authors have worked on the public university as an implementation field.

Design/methodology/approach

The design of the research work followed the design science research (DSR) methodology for information systems. DSR is a research paradigm wherein a designer answers questions relevant to human problems through the creation of innovative artifacts, thereby contributing new knowledge to the body of scientific evidence. The authors have adopted a techno-functional approach. The technical part consists of the development of an intelligent recommendation system that supports the choice of optimal information technology (IT) equipment for decision-makers. This intelligent recommendation system relies on a set of functional and business concepts, namely the Moroccan normative laws and Control Objectives for Information and Related Technology's (COBIT) guidelines in information system governance.

Findings

The modeling of business processes in public universities is established using business process model and notation (BPMN) in accordance with official regulations. The set of BPMN models constitute a powerful repository not only for business process execution but also for further optimization. Governance generally aims to reduce budgetary wastes, and the authors' recommendation system demonstrates a technical and methodological approach enabling this feature. Implementation of artificial intelligence techniques can bring great value in terms of transparency and fluidity in purchasing business process execution.

Research limitations/implications

Business limitations: First, the proposed system was modeled to handle one type products, which are computer-related equipment. Hence, the authors intend to extend the model to other types of products in future works. Conversely, the system proposes optimal purchasing order and assumes that decision makers will rely on this optimal purchasing order to choose between offers. In fact, as a perspective, the authors plan to work on a complete automation of the workflow to also include vendor selection and offer validation. Technical limitations: Natural language processing (NLP) is a widely used sentiment analysis (SA) technique that enabled the authors to validate the proposed system. Even working on samples of datasets, the authors noticed NLP dependency on huge computing power. The authors intend to experiment with learning and knowledge-based SA and assess the' computing power consumption and accuracy of the analysis compared to NLP. Another technical limitation is related to the web scraping technique; in fact, the users' reviews are crucial for the authors' system. To guarantee timeliness and reliable reviews, the system has to look automatically in websites, which confront the authors with the limitations of the web scraping like the permanent changing of website structure and scraping restrictions.

Practical implications

The modeling of business processes in public universities is established using BPMN in accordance with official regulations. The set of BPMN models constitute a powerful repository not only for business process execution but also for further optimization. Governance generally aims to reduce budgetary wastes, and the authors' recommendation system demonstrates a technical and methodological approach enabling this feature.

Originality/value

The adopted techno-functional approach enabled the authors to bring information system governance from a highly abstract level to a practical implementation where the theoretical best practices and guidelines are transformed to a tangible application.

Details

Kybernetes, vol. 53 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 25 April 2023

Kuldeep Singh and Shailesh Rastogi

Public listing of small and medium enterprises (SMEs) stimulates unremitting transformations into their corporate governance (CG) practices. These transformations in CG are likely…

Abstract

Purpose

Public listing of small and medium enterprises (SMEs) stimulates unremitting transformations into their corporate governance (CG) practices. These transformations in CG are likely to impact the financial performance (FP). The current study examines how individual corporate CG mechanisms and their mutual interactions (configurational approach) stimulate the FP of listed SMEs. The study selects promoters’ ownership (PO), the board (B-INX) and information disclosures (DISC) as individual CG mechanisms. In addition, market competition (COMP) is considered a form of external governance/regulation.

Design/methodology/approach

The study uses five years of panel data (2018–2022) of 80 SMEs listed on the Bombay Stock Exchange’s (BSE) SME listing platform in India. Panel data fixed effects and cluster robust standard errors estimated. In addition to the impact of individual CG mechanisms, their mutual interactions (configurational approach) are tested using moderated hierarchical regression and confirmed by slope tests.

Findings

The results signify the ineffectiveness of individual CG mechanisms when acting in silos. However, their mutual interactions drive the FP. A hierarchy of results is obtained. PO is the dominant form of internal CG, negatively influencing the relevance of B-INX and DISC. B-INX tends to adhere to good governance by positively moderating the impact of DISC on FP. Lastly, COMP acts as external governance that dominates the ownership effects. Findings reveal that the interactions among individual CG mechanisms are essential to the FP of listed SMEs. Such interactions adjust the agency theory dynamics of CG in these firms.

Research limitations/implications

The study takes a holistic approach to investigate the agency theory dynamics via the mutual interactions among multiple CG forms. It highlights how the presence of a dominant form of CG can adjust the financial effect of others, thereby adjusting agency theory dynamics.

Practical implications

These results hold practical significance for SMEs in multiple ways. SMEs should embrace configurational approach to comprehend their agency dynamics. The configurational approach of CG mechanisms is the way forward for SMEs, which are known to be financially constrained. In other words, the fact that the resiliency of SMEs is very often questioned calls for the configurational approach, where different CG mechanisms coexist to drive FP.

Originality/value

The study is by far the first of its kind to investigate the CG of listed SMEs against the backdrop of the configurational approach. The findings will benefit industry practitioners, academics and regulatory bodies to visualize the governance practices through the lenses of configurational approach.

Details

Benchmarking: An International Journal, vol. 31 no. 4
Type: Research Article
ISSN: 1463-5771

Keywords

Access

Year

Last 3 months (3070)

Content type

Article (3070)
1 – 10 of over 3000