Search results
1 – 10 of over 3000Natalia Aversano, Diana Ferullo, Giuseppe Nicolò and Nadia Ardito
The present research aims to understand the performance disclosure levels provided by Italian healthcare organisations (HCOs). The authors conducted this study to assess the…
Abstract
Purpose
The present research aims to understand the performance disclosure levels provided by Italian healthcare organisations (HCOs). The authors conducted this study to assess the transparency of HCOs' performance reporting processes by examining the amount and the type of information disclosed in Annual Performance Reports (APRs).
Design/methodology/approach
The present study uses a qualitative research methodology based on manual content analysis. The APRs of a sample of 171 Italian public HCOs were analysed.
Findings
Results evidence that the APRs provide a sufficient level of disclosure of performance information, putting high attention on the epidemiological conditions; however, the APRs do not present a strong information function for stakeholders' decision-making purposes. The Italian HCOs APRs are not easily understandable because the APRs are not very concise and present information mainly in discursive terms with limited graphic support.
Originality/value
To the best of the authors' knowledge, this is the first research investigating both the extent and type of performance information reported by Italian HCOs in the APRs, considering the particular contextual conditions caused by the most significant challenge the healthcare (HC) sector has faced in recent years: the epidemiological crisis of the coronavirus disease 2019 (COVID-19). The study also explores whether APRs are currently used by HCOs as a merely regulatory requirement or as an information tool for accountability and decision-making purposes.
Details
Keywords
Prasetyo Adi Wibowo Putro, Dana Indra Sensuse and Wahyu Setiawan Setiawan Wibowo
This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks…
Abstract
Purpose
This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks such as NIST Cybersecurity Framework and ISO 27001. Smart government is defined as the government administration sector of CII due to its similarity as a core of smart technology.
Design/methodology/approach
To ensure the validity of the data, the research methodology used in this paper follows the predicting malfunctions in socio-technical systems (PreMiSTS) approach, a variation of the socio-technical system (STS) approach specifically designed to predict potential issues in the STS. In this study, PreMiSTS was enriched with observation and systematic literature review as its main data collection method, thematic analysis and validation by experts using fuzzy Delphi method (FDM).
Findings
The proposed CII protection framework comprises several dimensions: objectives, interdependency, functions, risk management, resources and governance. For all those dimensions, there are 20 elements and 41 variables.
Practical implications
This framework can be an alternative guideline for CII protection in smart government, particularly in government administration services.
Originality/value
The author uses PreMiSTS, a socio-technical approach combined with thematic analysis and FDM, to design a security framework for CII protection. This combination was designed as a mixed-method approach to improve the likelihood of success in an IT project.
Details
Keywords
Argho Bandyopadhyay, John Hall, Ho Yin Wong, Larry Lockshin, Yunen Zhang and Park Thaichon
This study aims to empirically validate the holistic consumer-based brand equity (CBBE) framework and establishment of the cross-over effect using consumer preferences for wine…
Abstract
Purpose
This study aims to empirically validate the holistic consumer-based brand equity (CBBE) framework and establishment of the cross-over effect using consumer preferences for wine “regions.”
Design/methodology/approach
The authors utilize a sample of 275 regular wine purchasers in Australia, who were aged above 30 years old and had consumed regional wine in the last 3 months through an online consumer panel survey.
Findings
By testing competing CBBE models, the main research model was found to have the greatest predictive ability, due to its inclusion of both the rational and emotional paths and the cross-over effect between consumer brand judgment and brand feeling. This paper indicates that consumers enhance brand equity and develop a strong ongoing relationship with regional wine brands by simultaneously engaging in both mental behavior paths, where, in the meantime, rational processing has a cross-over effect on emotional processing.
Originality/value
This study expands the brand management literature by answering the future research on the CBBE model identified by Hall et al. (2021). Moreover, it establishes the underexplored cross-over effect within the CBBE literature. Furthermore, it adds to the marketing and wine-marketing literature by extending the concept of the brand to other attributes in consumer choice, such as a wine region as outlined by Giacomarra et al. (2020). Thus, this study advances the existing branding knowledge in a practical sense, which enables regional wine marketers and wine retailers to undertake promotional and product development strategies accordingly.
Details
Keywords
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…
Abstract
Purpose
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.
Design/methodology/approach
This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.
Findings
The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.
Social implications
The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.
Originality/value
This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.
Details
Keywords
Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…
Abstract
Purpose
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.
Design/methodology/approach
The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.
Findings
The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.
Research limitations/implications
This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.
Practical implications
Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.
Originality/value
The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.
Details
Keywords
Conventional wisdom tells us that mediation without ripeness is a fool’s errand (Zartman and Touval, 1985). What, then, is Türkiye’s motivation for mediating the war in Ukraine in…
Abstract
Purpose
Conventional wisdom tells us that mediation without ripeness is a fool’s errand (Zartman and Touval, 1985). What, then, is Türkiye’s motivation for mediating the war in Ukraine in lieu of ripeness – and what can its behavior as a mediator tell us about that motivation? In pursuit of this question, this paper inductively analyzes Turkish mediation in the Ukraine war to unpack the relationship between a contextual (ripeness) and actor-level (motivation) variable. Of particular interest is the decision-making and behavior of third parties (like Türkiye in Ukraine) who elect to mediate highly complex conflicts in which ripeness is indiscernible. The purpose of this research is not to propose or test a causal relationship between obscured ripeness and mediation, but rather to examine mediation behavior in situations where ripeness is obscured.
Design/methodology/approach
The impact of weaponized information on ripeness and third-party mediation is evaluated through an original, systematic and inductive case study analysis of Turkish mediation in the Russia–Ukraine war. As an intense theater of operations for information warfare for well over a decade, the war in Ukraine serves as an especially apt choice for an analysis of “obscured ripeness.” Likewise, Türkiye’s anomalous position as the only substantive source of mediation in the conflict lends significance to an empirical examination of its motivation and behavior as a mediator.
Findings
This research reveals that the pervasive use of weaponized information in the Russia–Ukraine war has distorted and disordered the information environment, thereby obscuring the ability of third parties to determine if the conflict is or could be ripe for mediation. However, the condition of obscured ripeness that prevails in the conflict has not proven a deterrent for mediation by Türkiye, which, as the only mediator in the conflict, has used a transactional approach to mediation motivated by self-regarding interests and animated by a manipulative mediation strategy. In sum, this inductive analysis of Turkish mediation in Ukraine reveals that the use of weaponized information in a conflict indirectly selects on transactional mediation (and mediators). The significance of this finding is magnified by the widespread use of weaponized information in contemporary conflicts as well as the declining frequency of third-party mediation.
Originality/value
There have been few, if any, systematic assessments in Turkish mediation of the Russia–Ukraine war, and none specifically concerned with the effects of weaponized information. Additionally, the paper proposes a typology of mediator motivation that is used to structure that assessment, while also introducing a new concept (“obscured ripeness”) and linking that concept both to the existing literature on ripeness and to the use of weaponized information in contemporary armed conflicts. As such, this manuscript represents an important contribution both to the empirical and theoretical landscape with respect to the study of mediation and international conflict management.
Details
Keywords
Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan and Michael O’Sullivan
This paper aims to explore key management actions for implementing security on the cloud, which is a critical issue as many organizations are moving business processes and data on…
Abstract
Purpose
This paper aims to explore key management actions for implementing security on the cloud, which is a critical issue as many organizations are moving business processes and data on it. The cloud is a flexible, low cost and highly available technology, but it comes with increased complexity in maintaining the cloud consumer’s security. In this research, a model was built to assist strategic decision-makers in choosing from a diverse range of actions that can be taken to manage cloud security.
Design/methodology/approach
Published research from 2010 to 2022 was reviewed to identify alternatives to management actions pertaining to cloud security. Analytical hierarchical process (AHP) was applied to rate the most important action(s). For this, the alternatives, along with selection criteria, were summarized through thematic analysis. To gauge the relative importance of the alternatives, a questionnaire was distributed among cloud security practitioners to poll their opinion. AHP was then applied to the aggregated survey responses.
Findings
It was found that the respondents gave the highest importance to aligning information security with business needs. Building a cloud-specific risk management framework was rated second, while the actions: enforce and monitor contractual obligations, and update organizational structure, were rated third and fourth, respectively.
Research limitations/implications
The research takes a general view without catering to specialized industry-based scenarios.
Originality/value
This paper highlights the role of management actions when implementing cloud security. It presents an AHP-based multi-criteria decision-making model that can be used by strategic decision-makers in selecting the optimum mode of action. Finally, the criteria used in the AHP model highlight how each alternative contributes to cloud security.
Details
Keywords
The purpose of this paper is to make visible the field's propensity to center whiteness even in engaging inclusive practices in information literacy classrooms. This paper offers…
Abstract
Purpose
The purpose of this paper is to make visible the field's propensity to center whiteness even in engaging inclusive practices in information literacy classrooms. This paper offers abolitionist pedagogy as a means to understand and address these concerns.
Design/methodology/approach
This paper uses interdisciplinary research methods in the fields of education, library science, feminist studies, Black studies and abolition studies to examine and provide an analysis of current information literacy practices by using abolitionist pedagogy to articulate how it is possible to expand information literacy instruction practices.
Findings
Current information literacy practices and methods that seek to create inclusive learning environments for racialized and minoritized learners rely on a set of institutionalized practices such as critical information literacy and culturally sustaining pedagogies. An examination of these practices through an abolitionist pedagogical lens reveals how the field has engaged in reductive and uncritical engagement with these methods despite employing them to create inclusive spaces. Using abolitionist pedagogy as a lens, this critical essay examines the field's foundations in whiteness and illustrates pathways for transformative educational justice.
Originality/value
There has been much work on inclusive teaching practices that discusses challenging information literacy structures' reliance on dominant culture.? To date, there has been little to no scholarship on how information literacy practices could engage in abolitionist pedagogical praxis.
Details
Keywords
Zakaria Sakyoud, Abdessadek Aaroud and Khalid Akodadi
The main goal of this research work is the optimization of the purchasing business process in the Moroccan public sector in terms of transparency and budgetary optimization. The…
Abstract
Purpose
The main goal of this research work is the optimization of the purchasing business process in the Moroccan public sector in terms of transparency and budgetary optimization. The authors have worked on the public university as an implementation field.
Design/methodology/approach
The design of the research work followed the design science research (DSR) methodology for information systems. DSR is a research paradigm wherein a designer answers questions relevant to human problems through the creation of innovative artifacts, thereby contributing new knowledge to the body of scientific evidence. The authors have adopted a techno-functional approach. The technical part consists of the development of an intelligent recommendation system that supports the choice of optimal information technology (IT) equipment for decision-makers. This intelligent recommendation system relies on a set of functional and business concepts, namely the Moroccan normative laws and Control Objectives for Information and Related Technology's (COBIT) guidelines in information system governance.
Findings
The modeling of business processes in public universities is established using business process model and notation (BPMN) in accordance with official regulations. The set of BPMN models constitute a powerful repository not only for business process execution but also for further optimization. Governance generally aims to reduce budgetary wastes, and the authors' recommendation system demonstrates a technical and methodological approach enabling this feature. Implementation of artificial intelligence techniques can bring great value in terms of transparency and fluidity in purchasing business process execution.
Research limitations/implications
Business limitations: First, the proposed system was modeled to handle one type products, which are computer-related equipment. Hence, the authors intend to extend the model to other types of products in future works. Conversely, the system proposes optimal purchasing order and assumes that decision makers will rely on this optimal purchasing order to choose between offers. In fact, as a perspective, the authors plan to work on a complete automation of the workflow to also include vendor selection and offer validation. Technical limitations: Natural language processing (NLP) is a widely used sentiment analysis (SA) technique that enabled the authors to validate the proposed system. Even working on samples of datasets, the authors noticed NLP dependency on huge computing power. The authors intend to experiment with learning and knowledge-based SA and assess the' computing power consumption and accuracy of the analysis compared to NLP. Another technical limitation is related to the web scraping technique; in fact, the users' reviews are crucial for the authors' system. To guarantee timeliness and reliable reviews, the system has to look automatically in websites, which confront the authors with the limitations of the web scraping like the permanent changing of website structure and scraping restrictions.
Practical implications
The modeling of business processes in public universities is established using BPMN in accordance with official regulations. The set of BPMN models constitute a powerful repository not only for business process execution but also for further optimization. Governance generally aims to reduce budgetary wastes, and the authors' recommendation system demonstrates a technical and methodological approach enabling this feature.
Originality/value
The adopted techno-functional approach enabled the authors to bring information system governance from a highly abstract level to a practical implementation where the theoretical best practices and guidelines are transformed to a tangible application.
Details
Keywords
Kuldeep Singh and Shailesh Rastogi
Public listing of small and medium enterprises (SMEs) stimulates unremitting transformations into their corporate governance (CG) practices. These transformations in CG are likely…
Abstract
Purpose
Public listing of small and medium enterprises (SMEs) stimulates unremitting transformations into their corporate governance (CG) practices. These transformations in CG are likely to impact the financial performance (FP). The current study examines how individual corporate CG mechanisms and their mutual interactions (configurational approach) stimulate the FP of listed SMEs. The study selects promoters’ ownership (PO), the board (B-INX) and information disclosures (DISC) as individual CG mechanisms. In addition, market competition (COMP) is considered a form of external governance/regulation.
Design/methodology/approach
The study uses five years of panel data (2018–2022) of 80 SMEs listed on the Bombay Stock Exchange’s (BSE) SME listing platform in India. Panel data fixed effects and cluster robust standard errors estimated. In addition to the impact of individual CG mechanisms, their mutual interactions (configurational approach) are tested using moderated hierarchical regression and confirmed by slope tests.
Findings
The results signify the ineffectiveness of individual CG mechanisms when acting in silos. However, their mutual interactions drive the FP. A hierarchy of results is obtained. PO is the dominant form of internal CG, negatively influencing the relevance of B-INX and DISC. B-INX tends to adhere to good governance by positively moderating the impact of DISC on FP. Lastly, COMP acts as external governance that dominates the ownership effects. Findings reveal that the interactions among individual CG mechanisms are essential to the FP of listed SMEs. Such interactions adjust the agency theory dynamics of CG in these firms.
Research limitations/implications
The study takes a holistic approach to investigate the agency theory dynamics via the mutual interactions among multiple CG forms. It highlights how the presence of a dominant form of CG can adjust the financial effect of others, thereby adjusting agency theory dynamics.
Practical implications
These results hold practical significance for SMEs in multiple ways. SMEs should embrace configurational approach to comprehend their agency dynamics. The configurational approach of CG mechanisms is the way forward for SMEs, which are known to be financially constrained. In other words, the fact that the resiliency of SMEs is very often questioned calls for the configurational approach, where different CG mechanisms coexist to drive FP.
Originality/value
The study is by far the first of its kind to investigate the CG of listed SMEs against the backdrop of the configurational approach. The findings will benefit industry practitioners, academics and regulatory bodies to visualize the governance practices through the lenses of configurational approach.
Details