Search results

1 – 10 of over 2000
Open Access
Article
Publication date: 5 January 2023

Tadele Shimels and Lemma Lessa

Information systems' security is more critical than ever before since security threats are rapidly growing. Before putting in place information systems' security measures…

2070

Abstract

Purpose

Information systems' security is more critical than ever before since security threats are rapidly growing. Before putting in place information systems' security measures, organizations are required to determine the maturity level of their information security governance. Literature review reveals that there is no recent study on information systems' security maturity level of banks in Ethiopia. This study thus seeks to measure the existing maturity level and examine the security gaps in order to propose possible changes in Ethiopian private banking industry's information system security maturity indicators.

Design/methodology/approach

Four private banks are selected as a representative sample. The system security engineering capability maturity model (SSE-CMM) is used as the maturity measurement criteria, and the measurement was based on ISO/IEC 27001 information security control areas. The data for the study were gathered using a questionnaire.

Findings

A total of 93 valid questionnaires were gathered from 110 participants in the study. Based on the SSE-CMM maturity model assessment criteria the private banking industry's current maturity level is level 2 (repeatable but intuitive). Institutions have a pattern that is repeated when completing information security operations but its existence was not thoroughly proven and institutional inconsistency still exists.

Originality/value

This study seeks to measure the existing maturity level and examine the security gaps in order to propose possible changes in Ethiopian private banking industry's information system security maturity indicators. This topic has not been attempted previously in the context of Ethiopian financial sector.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Book part
Publication date: 9 December 2021

Hartmut Aden

Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU…

Abstract

Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU. This chapter discusses the relevance of data protection in the context of security. It shows that data protection has been of particular relevance in the German context – not only against the backdrop of rapidly evolving information technology, but also of the historical experiences with political regimes collecting information in order to oppress citizens.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Article
Publication date: 22 July 2022

Cecilia Hansen Löfstrand and Christel Backman

The authors set out to show how key private security industry actors in Sweden establish body-worn cameras (BWCs) as a tool to protect private security officers from the public…

Abstract

Purpose

The authors set out to show how key private security industry actors in Sweden establish body-worn cameras (BWCs) as a tool to protect private security officers from the public the officers police and to improve the work environment of the officers.

Design/methodology/approach

The authors conducted qualitative semi-structured interviews with key personnel involved in the implementation of BWCs. The authors' analysis focused on delineating recurrent moral stories and affirmative environments to show how BWC use was made legitimate as a work environment tool.

Findings

The authors show how BWC use by private security officers patrolling public spaces in Sweden is legitimized by four organizational narratives: (1) the vulnerable security officer and the caring employer, (2) defenders of protective regulation, (3) moral selves and morally dubious others and (4) function creep and moral guardians. The authors explain how such organizational narratives are key to establishing and legitimizing the use of BWCs as a tool to improve the work environment of private security guards, and how certain narrative environments promote such organizational narratives in Sweden to improve the work environment of private security guards.

Originality/value

The authors' findings in this article add to a small but growing literature on BWC use in policing outside of the USA and the UK as well as to the hitherto very limited research from the work environment and managerial perspectives. The authors illustrate the importance of organizational narratives and narrative environments for understanding organizational change involving legitimation of new technologies.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 17 no. 5
Type: Research Article
ISSN: 1746-5648

Keywords

Open Access
Article
Publication date: 2 December 2022

Brighton Shoniwa

This paper examines the relevance of Public-Private-Community Partnerships (PPCPs) as an alternative mechanism in enhancing food security during the COVID-19 pandemic and beyond…

1132

Abstract

Purpose

This paper examines the relevance of Public-Private-Community Partnerships (PPCPs) as an alternative mechanism in enhancing food security during the COVID-19 pandemic and beyond in Zimbabwe. It also draws attention to the complexities of adopting PPCPs, and proposes possible options to improve their effectiveness.

Design/methodology/approach

The study applied concurrent mixed research methods. The sample population comprised multiple stakeholders in the area of food security and agricultural financing in Zimbabwe. The research adopted purposive and snowball sampling techniques. Data were collected through questionnaire, in-depth interviews, focus group discussions (FGDs) and documentary analysis. Descriptive statistics were used to analyse quantitative data, while qualitative data analysis was conducted thematically.

Findings

Prior to the outbreak of the COVID-19 pandemic, food insecurity was a consistent challenge in Zimbabwe. The pandemic has worsened the situation by further disruption of food systems and limiting people's access to food. PPCPs could be feasible alternative as they enhance value chain collaboration, improve access to inputs, reduce information asymmetry, ensure trust and facilitate risk sharing. PPCPs require proper design, control of transaction costs, clear definition of partners' roles, fair risk sharing, trust, and flexibility.

Originality/value

PPCPs are yet to be adopted in the Zimbabwean agricultural sector. The research informs policymakers on the need to implement multi-stakeholder collaborations in food production.

Details

Public Administration and Policy, vol. 26 no. 2
Type: Research Article
ISSN: 1727-2645

Keywords

Open Access
Article
Publication date: 12 December 2023

Meine Pieter Van Dijk

Higher productivity in the potato value chain in Rwanda requires good quality seed potatoes. The article analyzes how innovations were introduced in the framework of a development…

Abstract

Purpose

Higher productivity in the potato value chain in Rwanda requires good quality seed potatoes. The article analyzes how innovations were introduced in the framework of a development project resulting in a partnership between a firm and two educational institutions to produce better seed potatoes, using the Triple Helix approach.

Design/methodology/approach

In the Triple Helix model government, academia and the private sector work together to develop and introduce innovations. This led to producing and introducing improved seed potatoes at an affordable price through a public private partnership (PPP). Interviews with experts and a survey of local producers were carried out to identify factors influencing the success of the partnership.

Findings

A Service, Training and Innovation Center (STIC) has been created to produce the first clean potato seeds in Africa on a commercial scale, based on cultivation of in vitro potato plantlets and aeroponics to produce mini-tubers. It is called Seed Potato Advancement Centre, an education–enterprise partnership, using these plantlets to produce mini-tubers through aeroponics. Seed multipliers are responsible for the next three stages of seed multiplication. The final product is the certified potato, sold to ware potato farmers. The availability of disease-free seed potatoes in Rwanda gives a boost to the potato value chains and contributes to food security. The partnership was successful because of the support from the government and donors, with the private sector and the extension services helping to implement the innovations effectively.

Research limitations/implications

The limitation is that the number of experts interviewed is limited and the survey did not only deal with potato-related activities. The focus is on one region only, but the most important potato growing area in Rwanda.

Social implications

STICs function as a tool for cooperation between government, private sector and the knowledge sector to achieve commercial and development goals. They function as a channel for technology transfer. They allow applied research, including agronomic research; information collection; and dissemination, networking, training, organization of outreach activities. The model can be repeated in other sectors and countries.

Originality/value

The paper looks at a PPP in agriculture with educational institutions. Second, the Triple Helix and value chain literature is used to study the introduction and implementation of appropriate innovations, while factors determining the success of the partnership were identified. This concerns the first production of clean seed potatoes in Africa on a commercial scale.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-0839

Keywords

Open Access
Article
Publication date: 6 December 2022

Pieter Lagerwaard

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core…

1987

Abstract

Purpose

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core practices of collecting, analysing and disseminating financial intelligence.

Design/methodology/approach

Because FIU practices are often secret and its transaction data classified as state secrets, the FIU’s daily operational activities remain obscure. Drawing on interviews, public reports and an online training course, this study encircles secrecy and offers a fine-grained analysis of the FIU's core activities.

Findings

The article finds that the FIU plays a pivotal role in financial surveillance because it can operate at various intersections. An FIU operates at the intersection of finance and security, in between the public and private sector and at the national and international domain. This pivotal role makes the FIU indispensable in the surveillance of payment systems and spending behavior.

Social implications

The article poses that the desirability and effectiveness of financial surveillance has to date not received sufficient consideration, while it affects (the privacy of) anyone with a bank account. The article asks: is it ethically justifiable that transaction information is declared suspect, investigated, and shared nationally and internationally, without the individual or entity concerned officially being notified and legally named a suspect?

Originality/value

This case-study is not only relevant for the study of finance/security, AML/CFT and financial surveillance, but also to policy makers and the broader public who merit an understanding of how their financial behaviour is being surveilled.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 8 July 2019

Sandro Cabral and Claude Ménard

Building on the literature of hybrids in the context of public organizations, this paper aims to discuss under which conditions hybrids can adequately provide “critical services”…

1106

Abstract

Purpose

Building on the literature of hybrids in the context of public organizations, this paper aims to discuss under which conditions hybrids can adequately provide “critical services”, a subset of public services characterized by their simultaneous exposure to externalities, socio-economic cohesion and legitimacy concerns.

Design/methodology/approach

The authors collect indications from two stylized examples, prisons and defense, to develop propositions as a step toward assessing the potential role of hybrids as alternatives to direct public provision or full privatization in the delivery of critical services.

Findings

This paper examines the conditions under which hybrid arrangements outperform the polar cases of public bureaus and full privatization in the delivery of a specific subset of public goods that the authors identify as “critical services”.

Originality/value

The authors suggest that there might be comparative advantages in relying on hybrid arrangements rather than the usual solutions of fully private or fully governmental provision. However, they also submit that these advantages are conditional to the capacity of hybrids to reconcile competing interests to achieve socio-economic cohesion, to combine capabilities dispersed among partners to benefit from positive externalities and to satisfy legitimacy concerns with respect to the role of government.

Details

RAUSP Management Journal, vol. 54 no. 3
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 31 July 2020

Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…

6262

Abstract

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 13 October 2023

Roland Hellberg

A deteriorating security situation and an increased need for defence equipment calls for new forms of collaboration between Armed Forces and the defence industry. This paper aims…

1109

Abstract

Purpose

A deteriorating security situation and an increased need for defence equipment calls for new forms of collaboration between Armed Forces and the defence industry. This paper aims to investigate the ways in which the accelerating demand for increased security of supply of equipment and supplies to the Armed Forces requires adaptability in the procurement process that is governed by laws on public procurement (PP).

Design/methodology/approach

This paper is based on a review of current literature as well as empirical data obtained through interviews with representatives from the Swedish Defence Materiel Administration and the Swedish defence industry.

Findings

Collaboration with the globalized defence industry requires new approaches, where the PP rules make procurement of a safe supply of defence equipment difficult.

Research limitations/implications

The study's empirical data and findings are based on the Swedish context. In order to draw more general conclusions in a defence context, the study should be expanded to cover more nations.

Practical implications

The findings will enable the defence industry and the procurement authorizations to better understand the requirements of Armed Forces, and how to cooperate under applicable legal and regulatory requirements.

Originality/value

The paper extends the extant body of academic knowledge of the security of supply into the defence sector. It serves as a first step towards articulating a call for new approaches to collaboration in defence supply chains.

Details

Journal of Defense Analytics and Logistics, vol. 7 no. 2
Type: Research Article
ISSN: 2399-6439

Keywords

Open Access
Article
Publication date: 13 April 2017

Jean J. Boddewyn

This paper aims to determine the essential “collective goods” which a foreign multinational enterprise (MNE) must have before production can start in a remote area of an emerging…

1396

Abstract

Purpose

This paper aims to determine the essential “collective goods” which a foreign multinational enterprise (MNE) must have before production can start in a remote area of an emerging economy, and to consider the alternative governance modes available to procure or create these goods.

Design/methodology/approach

This purpose is examined conceptually and theoretically. First, the concept of “collective goods” is presented, followed by a consideration of the traditional “buy, ally or make” contractual approaches available to obtain goods and services. These approaches are repositioned in the context of an “emerging economy” so that alternative “ordering systems” as well as “non-contractual” means of obtaining things have to be considered in the context of internalization and reciprocity theories.

Findings

It is difficult to obtain collective goods in remote areas of emerging economies where private ordering prevails and even succeeds but at high transaction costs and with substantial government intervention. However, the use of non-contractual modes of exchange such as reciprocity is available to facilitate exchanges between market MNEs and nonmarket state offices and civil-society associations such as non-governmental organizations with which collaboration is necessary but which cannot be acquired or controlled by MNEs. However, market firms can use philanthropy and lobbying to obtain the help of these nonmarket actors who know how to operate under private and state-ordering systems.

Research limitations/implications

Theoretical implications: Internalization theory explains why MNEs are able to obtain collective goods by providing them “in-house”, while reciprocity theory exemplifies how non-contractual modes of exchange can substitute for the traditional but contractual “buy, ally and/or make”.

Practical implications

Managerial implications: In terms of the organizational structure of the subsidiary of an MNE operating in an emerging economy, it appears that the line functions of procurement, engineering and production may rely more on contractual exchanges with foreign suppliers, while the staff functions of public affairs, government relations and human resources may be more adept at using reciprocal exchange with local suppliers.

Originality/value

The provisioning of the collective goods when a firm builds its facilities in a remote and underdeveloped part of an emerging economy has hardly received any research attention nor have the non-contractual ways – such as reciprocity – available in the context of private ordering to obtain these goods.

Details

PSU Research Review, vol. 1 no. 1
Type: Research Article
ISSN: 2399-1747

Keywords

1 – 10 of over 2000