Search results
1 – 7 of 7Ifeanyi Adindu Anene and Achebe Nancy
This study aims to develop a model for integration of information and communication technologies (ICTs) in resource sharing practices for enhanced service delivery in academic…
Abstract
Purpose
This study aims to develop a model for integration of information and communication technologies (ICTs) in resource sharing practices for enhanced service delivery in academic libraries in Southeast Nigeria. Seven objectives guided the study; ICT-based resource sharing practices in academic libraries in Southeast Nigeria; ICT infrastructure for resource sharing; ICT needs of librarians for resource sharing practices; stages of ICT integration in resource sharing; perception of librarians towards ICT-based resource sharing; challenges to integration of ICT in resource sharing practices; design a model for the integration of ICT into resource sharing; all in academic libraries in Southeast Nigeria.
Design/methodology/approach
The research design adopted for this study is the mixed research design containing the “descriptive survey” research design and the “research and development, R&D.” The population of the study is 164, comprising all of the librarians in federal universities in Southeast Nigeria. All of the librarians of the five federal universities will be involved in the study. Hence, there was no sampling. The instrument for data collection is a structured questionnaire.
Findings
The findings of the study revealed that 88.8% of the librarians use ICT to boost the volume of resources; while 74% of the librarians were positive in all responses pertaining to ICT-based resource sharing practices in the libraries. The study also revealed that ICT infrastructures in the library for resource sharing are highly available and applicable; while computers and internet networks are the most needed gadgets for the operations. Libraries in Southeast Nigeria are in the applying and transforming stages of ICT adoption at a 69.7% response rate; while the librarians have a strong belief and understanding that a lot can be achieved in resource sharing through ICT; and would recommend such. Poor electrification, inadequate funding and unavailability of some ICT technologies were equally identified as challenges. The study conclusively developed a resource sharing model, the Southeast Federal University Library Connect; accessible at https://southeastfeduniconnect.njh.com.ng
Originality/value
The research study is one of the few types of research that has developed a functional model for resource sharing in academic libraries in Southeast Nigeria.
Details
Keywords
Tze Yin Khaw, Azlan Amran and Ai Ping Teoh
This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity…
Abstract
Purpose
This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.
Design/methodology/approach
This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study’s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.
Findings
This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.
Originality/value
This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.
Details
Keywords
Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…
Abstract
Purpose
Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.
Design/methodology/approach
The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.
Findings
The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.
Originality/value
This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.
Details
Keywords
Although the challenges associated with big data are increasing, the question of the most suitable big data analytics (BDA) platform in libraries is always significant. The…
Abstract
Purpose
Although the challenges associated with big data are increasing, the question of the most suitable big data analytics (BDA) platform in libraries is always significant. The purpose of this study is to propose a solution to this problem.
Design/methodology/approach
The current study identifies relevant literature and provides a review of big data adoption in libraries. It also presents a step-by-step guide for the development of a BDA platform using the Apache Hadoop Ecosystem. To test the system, an analysis of library big data using Apache Pig, which is a tool from the Apache Hadoop Ecosystem, was performed. It establishes the effectiveness of Apache Hadoop Ecosystem as a powerful BDA solution in libraries.
Findings
It can be inferred from the literature that libraries and librarians have not taken the possibility of big data services in libraries very seriously. Also, the literature suggests that there is no significant effort made to establish any BDA architecture in libraries. This study establishes the Apache Hadoop Ecosystem as a possible solution for delivering BDA services in libraries.
Research limitations/implications
The present work suggests adapting the idea of providing various big data services in a library by developing a BDA platform, for instance, providing assistance to the researchers in understanding the big data, cleaning and curation of big data by skilled and experienced data managers and providing the infrastructural support to store, process, manage, analyze and visualize the big data.
Practical implications
The study concludes that Apache Hadoops’ Hadoop Distributed File System and MapReduce components significantly reduce the complexities of big data storage and processing, respectively, and Apache Pig, using Pig Latin scripting language, is very efficient in processing big data and responding to queries with a quick response time.
Originality/value
According to the study, there are significantly fewer efforts made to analyze big data from libraries. Furthermore, it has been discovered that acceptance of the Apache Hadoop Ecosystem as a solution to big data problems in libraries are not widely discussed in the literature, although Apache Hadoop is regarded as one of the best frameworks for big data handling.
Details
Keywords
Sri Rahayu Hijrah Hati and Hamrila Abdul Latip
This paper aims to explore the consumer insights and ethical concerns surrounding the online payday loan services available in the Google Play Store. This research was conducted…
Abstract
Purpose
This paper aims to explore the consumer insights and ethical concerns surrounding the online payday loan services available in the Google Play Store. This research was conducted to compare whether the presence or absence of debt collection protection acts in a country creates differences in consumer experiences regarding the ethics of payday loan collection. Specifically, the study compares customers’ experiences in both the Indonesian and US markets.
Design/methodology/approach
Indonesia and the USA were chosen because they have very different regulatory structures for the payday loan industry. The data was scraped using Python from 27 payday loan apps on the Indonesian Play Store, resulting in a total of 244,697 reviews extracted from the Indonesian market. For the US market, 446,010 reviews were extracted from 14 payday loan apps. The data was further analyzed using NVIVO.
Findings
The results suggest that consumers of payday loans in Indonesia and the USA hold positive views about the benefits of payday loan apps, as revealed by the word frequency and word cloud analysis. Notably, customers in both countries did not express any negative sentiments regarding the unethical interest rate charged by the payday loan, contradicting what is commonly reported in academic literature. However, a distinct pattern of unethical conduct was observed in both countries concerning marketing communication and debt collection practices. In the Indonesian market, payday loan companies were found to engage in unethical debt collection activities. In the US market, payday lenders exhibited unethical behavior in their marketing communication, particularly through deceptive advertising that makes promises to consumers that are not delivered.
Originality/value
The study aims to provide evidence on the various experiences of customers in the presence and absence of debt collection regulations using a novel methodology and a large sample, which strengthens the results and conclusions of the study. The study also intends to inform policymakers, particularly the Indonesian government, about the need for specific laws to regulate the debt collection process and prevent unethical practices. Ultimately, the study is expected to protect the rights of consumers from a deceptive marketing communication or unethical debt collection practices in both the Indonesian and US markets.
Details
Keywords
James Guthrie, Francesca Manes-Rossi, Rebecca Levy Orelli and Vincenzo Sforza
This paper undertakes a structured literature review to analyse the literature on performance management and measurement (PMM) in universities over the last four decades. Over…
Abstract
Purpose
This paper undertakes a structured literature review to analyse the literature on performance management and measurement (PMM) in universities over the last four decades. Over that time, PMM has emerged as an influential force in universities that impacts their operations and redefines their identity.
Design/methodology/approach
A structured literature review approach was used to analyse a sample of articles on PMM research from a broad range of disciplines over four decades. This was undertaken to understand the impacts of PMM practices on universities, highlight changes over time and point to avenues for future research.
Findings
The analysis highlights the fact that research on PMM in universities has grown significantly over the 40 years studied. We provide an overview of published articles over four decades regarding content, themes, theories, methods and impacts. We provide an empirical basis for discussing past, present and future university PMM research. The future research avenues offer multiple provocations for scholars and policymakers, for instance, PMM implementation strategies and relationships with various government programs and external evaluation and the role of different actors, particularly academics, in shaping PMM systems.
Originality/value
Unlike a traditional literature review, the structured literature review method can develop insights into how the field has changed over time and highlight possible future research. The sample for this literature review differs from previous reviews in covering a broad range of disciplines, including accounting.
Details
Keywords
Miguel Calvo and Marta Beltrán
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Abstract
Purpose
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.
Design/methodology/approach
The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.
Findings
The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.
Originality/value
The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.
Details