Search results

1 – 10 of 43
Open Access
Article
Publication date: 11 August 2020

Pantelis Chasapis, Sarandis Mitropoulos and Christos Douligeris

The continuous development of mobile platforms provides the opportunity to integrate and improve existing applications or to introduce new features to make life better. The…

2071

Abstract

The continuous development of mobile platforms provides the opportunity to integrate and improve existing applications or to introduce new features to make life better. The purpose of this paper is to investigate the use of mobile platforms in civilization (museums) and present the design and the implementation of a mobile application that satisfies various design criteria. Through this application the visitor can navigate and tour virtually in the museum through a smartphone. In addition, features have been included in the application that make it easier for a user to visit the museum. First, we present the operating parameters and the aesthetic presentation of the application, which delimits usability and ease of access through the interfaces of a smartphone. Then we highlight the cloud features that were exploited in the application. Then, an extended evaluation of the mobile application is presented, that proves its high applicability and user acceptability.

Details

Applied Computing and Informatics, vol. 19 no. 1/2
Type: Research Article
ISSN: 2210-8327

Keywords

Open Access
Article
Publication date: 16 July 2021

Karen Renaud and Jacques Ophoff

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller…

5883

Abstract

Purpose

There is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller businesses lack sufficient situational awareness to make informed decisions in this space, or because they lack the resources to implement security controls and precautions.

Design/methodology/approach

In this paper, Endsley’s theory of situation awareness was extended to propose a model of SMEs’ cyber situational awareness, and the extent to which this awareness triggers the implementation of cyber security measures. Empirical data were collected through an online survey of 361 UK-based SMEs; subsequently, the authors used partial least squares modeling to validate the model.

Findings

The results show that heightened situational awareness, as well as resource availability, significantly affects SMEs’ implementation of cyber precautions and controls.

Research limitations/implications

While resource limitations are undoubtedly a problem for SMEs, their lack of cyber situational awareness seems to be the area requiring most attention.

Practical implications

The findings of this study are reported and recommendations were made that can help to improve situational awareness, which will have the effect of encouraging the implementation of cyber security measures.

Originality/value

This is the first study to apply the situational awareness theory to understand why SMEs do not implement cyber security best practice measures.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 1 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access

Abstract

Details

Young Children’s Play Practices with Digital Tablets
Type: Book
ISBN: 978-1-78756-705-4

Open Access
Article
Publication date: 16 August 2019

Tianyu Feng, Xiao Yu, Yueting Chai and Yi Liu

The application of smart contract can greatly reduce transaction costs and improve transaction efficiency. The existing smart contract are expensive, single application scenario…

5276

Abstract

Purpose

The application of smart contract can greatly reduce transaction costs and improve transaction efficiency. The existing smart contract are expensive, single application scenario and inefficient. This paper aims to propose a new smart contract model to solve these problems.

Design/methodology/approach

By investigating the research history, models and platforms, this paper summarizes the shortcomings of existing smart contracts. Based on the content and architecture of traditional contract, a smart contract model with wider application scope is designed.

Findings

In this paper, several models are used to describe the operation mechanism of smart contracts. To facilitate computer execution, a decomposition method is proposed, which divides smart contracts into several sub-contracts. Then, the advantages and deployment methods of smart contract are discussed. On this basis, a specific example is given to illustrate how the application of smart contract will change our life.

Originality/value

Smart contract is gradually applied to more fields. In this paper, the structure and operation mechanism of smart contract system in reality are given, which will be beneficial to the application of smart contract to more complex systems.

Details

International Journal of Crowd Science, vol. 3 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of…

Abstract

Executive Summary

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of conflict. A good theory of the ethics of rights and duties, obligations, and responsibilities will empower us to understand the impact of our actions on various stakeholders. Additionally, a deep understanding of rights and duties could help us to analyze better the impact of our executive actions on various stakeholders and, in particular, to fathom the damaging effects of rights and duties violated by the man-made current financial crisis when seen from an ethical and moral point of view. Our coverage on the ethics of corporate rights and duties will comprise of two parts: Part 1: The Nature of Corporate Business Rights and Duties, and Part 2: Respecting Corporate Rights and Duties. The chapter will feature Newcomb Wellesley Hohfeld’s framework of legal interests such as claims, privileges, power, and immunity and its various applications to contemporary market and corporate executive situations. We illustrate the theory of rights and duties using several cases from the current turbulent markets.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Open Access
Article
Publication date: 12 February 2020

Matthew Hanchard, Peter Merrington, Bridgette Wessels, Kathy Rogers, Michael Pidd, Simeon Yates, David Forrest, Andrew Higson, Nathan Townsend and Roderik Smits

In this article, we discuss an innovative audience research methodology developed for the AHRC-funded “Beyond the Multiplex: Audiences for Specialised Film in English Regions”…

Abstract

In this article, we discuss an innovative audience research methodology developed for the AHRC-funded “Beyond the Multiplex: Audiences for Specialised Film in English Regions” project (BtM). The project combines a computational ontology with a mixed-methods approach drawn from both the social sciences and the humanities, enabling research to be conducted both at scale and in depth, producing complex relational analyses of audiences. BtM aims to understand how we might enable a wide range of audiences to participate in a more diverse film culture, and embrace the wealth of films beyond the mainstream in order to optimise the cultural value of engaging with less familiar films. BtM collects data through a three-wave survey of film audience members’ practices, semi-structured interviews and film-elicitation groups with audience members alongside interviews with policy and industry experts, and analyses of key policy and industry documents. Bringing each of these datasets together within our ontology enables us to map relationships between them across a variety of different concerns. For instance, how cultural engagement in general relates to engagement with specialised films; how different audiences access and/or share films across different platforms and venues; how their engagement with those films enables them to make meaning and generate value; and how all of this is shaped by national and regional policy, film industry practices, and the decisions of cultural intermediaries across the fields of film production, distribution and exhibition. Alongside our analyses, the ontology enables us to produce data visualisations and a suite of analytical tools for audience development studies that stakeholders can use, ensuring the research has impact beyond the academy. This paper sets out our methodology for developing the BtM ontology, so that others may adapt it and develop their own ontologies from mixed-methods empirical data in their studies of other knowledge domains.

Details

Emerald Open Research, vol. 1 no. 1
Type: Research Article
ISSN: 2631-3952

Keywords

Open Access
Article
Publication date: 17 October 2019

Sherali Zeadally, Farhan Siddiqui, Zubair Baig and Ahmed Ibrahim

The aim of this paper is to identify some of the challenges that need to be addressed to accelerate the deployment and adoption of smart health technologies for ubiquitous…

28122

Abstract

Purpose

The aim of this paper is to identify some of the challenges that need to be addressed to accelerate the deployment and adoption of smart health technologies for ubiquitous healthcare access. The paper also explores how internet of things (IoT) and big data technologies can be combined with smart health to provide better healthcare solutions.

Design/methodology/approach

The authors reviewed the literature to identify the challenges which have slowed down the deployment and adoption of smart health.

Findings

The authors discussed how IoT and big data technologies can be integrated with smart health to address some of the challenges to improve health-care availability, access and costs.

Originality/value

The results of this paper will help health-care designers, professionals and researchers design better health-care information systems.

Details

PSU Research Review, vol. 4 no. 2
Type: Research Article
ISSN: 2399-1747

Keywords

Open Access
Article
Publication date: 3 July 2017

Nina Steinhauer, Michael Gros, Martin Ebner, Markus Ebner, Anneliese Huppertz, Mike Cormann, Susanne Biermeier, Lena Burk, Konstanze Edtstadler, Sonja Gabriel, Martina Wintschnig, Christian Aspalter and Susanne Martich

Due to the important role of orthography in society, the project called IDeRBlog presented in this paper created a web-based tool to motivate pupils to write text as well as to…

1690

Abstract

Purpose

Due to the important role of orthography in society, the project called IDeRBlog presented in this paper created a web-based tool to motivate pupils to write text as well as to read and to comment on texts written by fellow students. In addition, IDeRBlog aims to improve student’s German orthography skills and supports teachers and parents with training materials for their students. The paper aims to discuss these issues.

Design/methodology/approach

With the aid of learning analytics, the submitted text is analyzed and special feedback is given to the students so that they can try to correct the misspelled words themselves. The teachers as well as the parents are benefiting from the analysis and exercises suggested by the system.

Findings

A recent study showed the efficiency of the system in form of an improvement of the students’ orthographic skills. Over a period of four months 70 percent of the students achieved a significant reduction of their spelling mistakes.

Originality/value

IDeRBlog is an innovative approach to improving orthography skills combining blogging and new media with writing and practice.

Details

Journal of Research in Innovative Teaching & Learning, vol. 10 no. 2
Type: Research Article
ISSN: 2397-7604

Keywords

Open Access
Article
Publication date: 2 February 2021

Wellington Williams

Disruptive students in the classroom can affect classroom dynamics and individual teacher-student interactions. The purpose of this qualitative research study was to discover…

Abstract

Disruptive students in the classroom can affect classroom dynamics and individual teacher-student interactions. The purpose of this qualitative research study was to discover perceptions female teachers harbor toward misbehaving African-American elementary school males. The study incorporated a narrative inquiry to investigate perceptions female teachers have toward African-American male elementary school students. The research project involved a purposeful sample of eight female elementary teachers, four African-American teachers and four Caucasian teachers from one public school district in the southeastern United States. The female teachers reflected on their lived experiences and perceptions derived from experiences and encounters they have with African-American elementary school males. Data collection from the study occurred through individual responses from a survey and follow-up telephone interviews. From teacher's descriptions of perceived successes and failures, coded commonalities in reports, labeled themes, conclusions, and recommendations resulted from data collection and analysis. The findings revealed some African-American male elementary school students misbehave in the classroom and others do not. The term “misbehave” is based upon the experiences and type of interactions and exchanges teachers had with African-American male students in the classroom and African-American males outside the school environment. Gender, culture, and language may factor in creating effective teacherstudent interactions to enable better relationships and student outcomes.

Details

Emerald Open Research, vol. 1 no. 14
Type: Research Article
ISSN: 2631-3952

Keywords

Open Access
Article
Publication date: 30 March 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA…

3411

Abstract

Purpose

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.

Design/methodology/approach

This exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.

Findings

In this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.

Originality/value

This research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of 43