Search results

1 – 9 of 9
Article
Publication date: 3 April 2024

Ifeanyi Adindu Anene and Achebe Nancy

This study aims to develop a model for integration of information and communication technologies (ICTs) in resource sharing practices for enhanced service delivery in academic…

Abstract

Purpose

This study aims to develop a model for integration of information and communication technologies (ICTs) in resource sharing practices for enhanced service delivery in academic libraries in Southeast Nigeria. Seven objectives guided the study; ICT-based resource sharing practices in academic libraries in Southeast Nigeria; ICT infrastructure for resource sharing; ICT needs of librarians for resource sharing practices; stages of ICT integration in resource sharing; perception of librarians towards ICT-based resource sharing; challenges to integration of ICT in resource sharing practices; design a model for the integration of ICT into resource sharing; all in academic libraries in Southeast Nigeria.

Design/methodology/approach

The research design adopted for this study is the mixed research design containing the “descriptive survey” research design and the “research and development, R&D.” The population of the study is 164, comprising all of the librarians in federal universities in Southeast Nigeria. All of the librarians of the five federal universities will be involved in the study. Hence, there was no sampling. The instrument for data collection is a structured questionnaire.

Findings

The findings of the study revealed that 88.8% of the librarians use ICT to boost the volume of resources; while 74% of the librarians were positive in all responses pertaining to ICT-based resource sharing practices in the libraries. The study also revealed that ICT infrastructures in the library for resource sharing are highly available and applicable; while computers and internet networks are the most needed gadgets for the operations. Libraries in Southeast Nigeria are in the applying and transforming stages of ICT adoption at a 69.7% response rate; while the librarians have a strong belief and understanding that a lot can be achieved in resource sharing through ICT; and would recommend such. Poor electrification, inadequate funding and unavailability of some ICT technologies were equally identified as challenges. The study conclusively developed a resource sharing model, the Southeast Federal University Library Connect; accessible at https://southeastfeduniconnect.njh.com.ng

Originality/value

The research study is one of the few types of research that has developed a functional model for resource sharing in academic libraries in Southeast Nigeria.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 14 April 2023

Md. Zahurul Haq

This study aims to investigate Bangladesh’s e-commerce regulations in light of the growing criticism that they are insufficient to curb predicate crimes like fraud and money…

Abstract

Purpose

This study aims to investigate Bangladesh’s e-commerce regulations in light of the growing criticism that they are insufficient to curb predicate crimes like fraud and money laundering in the online marketplace.

Design/methodology/approach

This study used the exploratory design to examine the latest ministerial directives and laws governing e-commerce in Bangladesh to determine why they cannot prevent fraudulent activities in this promising sector and identify potential solutions.

Findings

Bangladesh’s regulatory responses to e-commerce fraud prevention and detection are reactive and inadequate. Regulators are unwilling and unable to enforce available legal provisions for various reasons, including a lack of knowledge and coordination among the agencies.

Research limitations/implications

This paper focuses solely on the legal and regulatory framework in place to combat e-commerce fraud. Other critical issues, such as consumer rights, privacy and data protection in e-commerce, are not addressed.

Practical implications

The findings of this study will assist policymakers in revising current regulatory approaches to e-commerce to protect this sector from criminal abuse.

Originality/value

This study looked into the possibility of using a proactive risk-based approach in the e-commerce sector, similar to what the Bangladesh Financial Intelligence Unit does in the financial sector.

Details

Journal of Money Laundering Control, vol. 27 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 16 February 2022

Pragati Agarwal, Sanjeev Swami and Sunita Kumari Malhotra

The purpose of this paper is to give an overview of artificial intelligence (AI) and other AI-enabled technologies and to describe how COVID-19 affects various industries such as…

3545

Abstract

Purpose

The purpose of this paper is to give an overview of artificial intelligence (AI) and other AI-enabled technologies and to describe how COVID-19 affects various industries such as health care, manufacturing, retail, food services, education, media and entertainment, banking and insurance, travel and tourism. Furthermore, the authors discuss the tactics in which information technology is used to implement business strategies to transform businesses and to incentivise the implementation of these technologies in current or future emergency situations.

Design/methodology/approach

The review provides the rapidly growing literature on the use of smart technology during the current COVID-19 pandemic.

Findings

The 127 empirical articles the authors have identified suggest that 39 forms of smart technologies have been used, ranging from artificial intelligence to computer vision technology. Eight different industries have been identified that are using these technologies, primarily food services and manufacturing. Further, the authors list 40 generalised types of activities that are involved including providing health services, data analysis and communication. To prevent the spread of illness, robots with artificial intelligence are being used to examine patients and give drugs to them. The online execution of teaching practices and simulators have replaced the classroom mode of teaching due to the epidemic. The AI-based Blue-dot algorithm aids in the detection of early warning indications. The AI model detects a patient in respiratory distress based on face detection, face recognition, facial action unit detection, expression recognition, posture, extremity movement analysis, visitation frequency detection, sound pressure detection and light level detection. The above and various other applications are listed throughout the paper.

Research limitations/implications

Research is largely delimited to the area of COVID-19-related studies. Also, bias of selective assessment may be present. In Indian context, advanced technology is yet to be harnessed to its full extent. Also, educational system is yet to be upgraded to add these technologies potential benefits on wider basis.

Practical implications

First, leveraging of insights across various industry sectors to battle the global threat, and smart technology is one of the key takeaways in this field. Second, an integrated framework is recommended for policy making in this area. Lastly, the authors recommend that an internet-based repository should be developed, keeping all the ideas, databases, best practices, dashboard and real-time statistical data.

Originality/value

As the COVID-19 is a relatively recent phenomenon, such a comprehensive review does not exist in the extant literature to the best of the authors’ knowledge. The review is rapidly emerging literature on smart technology use during the current COVID-19 pandemic.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 3
Type: Research Article
ISSN: 2053-4620

Keywords

Article
Publication date: 8 August 2023

Wahyu Fahrul Ridho

The purpose of this study is to critically examine a prevalent online scam mechanism, with the aim of understanding its exploitation of behavioral finance principles and group…

Abstract

Purpose

The purpose of this study is to critically examine a prevalent online scam mechanism, with the aim of understanding its exploitation of behavioral finance principles and group dynamics and propose effective countermeasures.

Design/methodology/approach

This study uses a blend of case study and thematic analysis, drawing from behavioral finance, social psychology and criminology, using primary source testimonies of victims to provide a detailed exploration of the scam’s operations.

Findings

This research uncovers the strategic use of four key principles: loss aversion, overconfidence, scarcity bias and social proof, within the scam operation. These tendencies are manipulated to induce victims to progressively invest into the fraudulent scheme, even amid growing suspicions.

Research limitations/implications

While the research elucidates on the workings of one specific online scam, it is necessary to explore if and how these principles are used in various other online fraudulent schemes, to develop comprehensive countermeasures.

Practical implications

The findings underscore the urgent need for enhanced public awareness, stronger corporate responsibility and robust regulatory oversight. There is a call for concerted efforts encompassing public education campaigns, fortified security protocols and strong legal frameworks for preventing such scams.

Social implications

The research emphasizes the need for collective action in ensuring a safe online space. This involves the individual user’s prudence, businesses’ proactive education initiatives and stringent legal actions against fraudulent activities.

Originality/value

This research offers novel insights into the nuanced manipulation of behavioral finance principles within online scams, based on empirical data from victim testimonials. These findings contribute to the understanding of the psychological mechanisms at play in online scams and are instrumental in formulating effective preventive strategies.

Details

Journal of Financial Crime, vol. 31 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 23 April 2024

Chen Zhong, Hong Liu and Hwee-Joo Kam

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…

Abstract

Purpose

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity competitions among Reddit users. These users constitute a substantial demographic of young individuals, often participating in communities oriented towards college students or cybersecurity enthusiasts. The authors specifically focus on novice learners who showed an interest in cybersecurity but have not participated in competitions. By understanding their views and concerns, the authors aim to devise strategies to encourage their continuous involvement in cybersecurity learning. The Reddit platform provides unique access to this significant demographic, contributing to enhancing and diversifying the cybersecurity workforce.

Design/methodology/approach

The authors propose to mine Reddit posts for information about learners’ attitudes, interests and experiences with cybersecurity competitions. To mine Reddit posts, the authors developed a text mining approach that integrates computational text mining and qualitative content analysis techniques, and the authors discussed the advantages of the integrated approach.

Findings

The authors' text mining approach was successful in extracting the major themes from the collected posts. The authors found that motivated learners would want to form a strategic way to facilitate their learning. In addition, hope and fear collide, which exposes the learners’ interests and challenges.

Originality/value

The authors discussed the findings to provide education and training experts with a thorough understanding of novice learners, allowing them to engage them in the cybersecurity industry.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 June 2023

Sri Rahayu Hijrah Hati and Hamrila Abdul Latip

This paper aims to explore the consumer insights and ethical concerns surrounding the online payday loan services available in the Google Play Store. This research was conducted…

Abstract

Purpose

This paper aims to explore the consumer insights and ethical concerns surrounding the online payday loan services available in the Google Play Store. This research was conducted to compare whether the presence or absence of debt collection protection acts in a country creates differences in consumer experiences regarding the ethics of payday loan collection. Specifically, the study compares customers’ experiences in both the Indonesian and US markets.

Design/methodology/approach

Indonesia and the USA were chosen because they have very different regulatory structures for the payday loan industry. The data was scraped using Python from 27 payday loan apps on the Indonesian Play Store, resulting in a total of 244,697 reviews extracted from the Indonesian market. For the US market, 446,010 reviews were extracted from 14 payday loan apps. The data was further analyzed using NVIVO.

Findings

The results suggest that consumers of payday loans in Indonesia and the USA hold positive views about the benefits of payday loan apps, as revealed by the word frequency and word cloud analysis. Notably, customers in both countries did not express any negative sentiments regarding the unethical interest rate charged by the payday loan, contradicting what is commonly reported in academic literature. However, a distinct pattern of unethical conduct was observed in both countries concerning marketing communication and debt collection practices. In the Indonesian market, payday loan companies were found to engage in unethical debt collection activities. In the US market, payday lenders exhibited unethical behavior in their marketing communication, particularly through deceptive advertising that makes promises to consumers that are not delivered.

Originality/value

The study aims to provide evidence on the various experiences of customers in the presence and absence of debt collection regulations using a novel methodology and a large sample, which strengthens the results and conclusions of the study. The study also intends to inform policymakers, particularly the Indonesian government, about the need for specific laws to regulate the debt collection process and prevent unethical practices. Ultimately, the study is expected to protect the rights of consumers from a deceptive marketing communication or unethical debt collection practices in both the Indonesian and US markets.

Details

International Journal of Ethics and Systems, vol. 40 no. 2
Type: Research Article
ISSN: 2514-9369

Keywords

Open Access
Article
Publication date: 7 February 2024

James Guthrie, Francesca Manes-Rossi, Rebecca Levy Orelli and Vincenzo Sforza

This paper undertakes a structured literature review to analyse the literature on performance management and measurement (PMM) in universities over the last four decades. Over…

Abstract

Purpose

This paper undertakes a structured literature review to analyse the literature on performance management and measurement (PMM) in universities over the last four decades. Over that time, PMM has emerged as an influential force in universities that impacts their operations and redefines their identity.

Design/methodology/approach

A structured literature review approach was used to analyse a sample of articles on PMM research from a broad range of disciplines over four decades. This was undertaken to understand the impacts of PMM practices on universities, highlight changes over time and point to avenues for future research.

Findings

The analysis highlights the fact that research on PMM in universities has grown significantly over the 40 years studied. We provide an overview of published articles over four decades regarding content, themes, theories, methods and impacts. We provide an empirical basis for discussing past, present and future university PMM research. The future research avenues offer multiple provocations for scholars and policymakers, for instance, PMM implementation strategies and relationships with various government programs and external evaluation and the role of different actors, particularly academics, in shaping PMM systems.

Originality/value

Unlike a traditional literature review, the structured literature review method can develop insights into how the field has changed over time and highlight possible future research. The sample for this literature review differs from previous reviews in covering a broad range of disciplines, including accounting.

Details

Journal of Public Budgeting, Accounting & Financial Management, vol. 36 no. 6
Type: Research Article
ISSN: 1096-3367

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 9 of 9