Search results
1 – 5 of 5Lars Mjøset, Roel Meijer, Nils Butenschøn and Kristian Berg Harpviken
This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial…
Abstract
This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial, populist and democratic pacts, suitable for analysis of state formation and nation-building through to the present period. The framework relies on historical institutionalism. The methodology, however, is Rokkan's. The initial conceptual analysis also specifies differences between European and the Middle Eastern state formation processes. It is followed by a brief and selective discussion of historical preconditions. Next, the method of plotting singular cases into conceptual-typological maps is applied to 20 cases in the Greater Middle East (including Afghanistan, Iran and Turkey). For reasons of space, the empirical analysis is limited to the colonial period (1870s to the end of World War 1). Three typologies are combined into one conceptual-typological map of this period. The vertical left-hand axis provides a composite typology that clarifies cultural-territorial preconditions. The horizontal axis specifies transformations of the region's agrarian class structures since the mid-19th century reforms. The right-hand vertical axis provides a four-layered typology of processes of external intervention. A final section presents selected comparative case reconstructions. To the authors' knowledge, this is the first time such a Rokkan-style conceptual-typological map has been constructed for a non-European region.
Details
Keywords
Hedaia-t-Allah Nabil Abd Al Ghaffar
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Abstract
Purpose
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Design/methodology/approach
The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.
Findings
The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.
Practical implications
Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.
Originality/value
The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.
Details
Keywords
The purpose of this study is to create an ethical norm that will help guide the human race toward long-term survival.
Abstract
Purpose
The purpose of this study is to create an ethical norm that will help guide the human race toward long-term survival.
Design/methodology/approach
The project posits a new societal ethical norm designed around a fundamental principle: the long-term survival of the human race with individual dignity. This study examines the requirements of the new norm and what is needed to achieve that goal.
Findings
There are three types of organizations that have the organizational and economic capacity to be responsible for future outcomes: governments, religions and corporations. These three types of organizations must act as if they have a moral compass that will compel them to develop and uphold the requirements for the survival of humanity with individual dignity.
Research limitations/implications
The analysis shows that a new, broader ethical norm must be established, and this norm implies that large organizations must act with a future embracing ethical behavior.
Practical implications
This study generates specific pathways for example: governments should adopt the just war principles and prohibitions on governments or other institutions from teaching any form of class superiority. These and other pathways are designed to diffuse threats to the fundamental principle.
Social implications
The fundamental principle includes universal human dignity. This means that the notion of individual dignity must be defined or understood, and the requirements to attain this goal must be identified.
Originality/value
This project takes concepts from long-termism, forward-looking collective responsibility, corporate social responsibility and the global catastrophic risk institute to advocate for a new ethical norm.
Details
Keywords
Narsymbat Salimgereyev, Bulat Mukhamediyev and Aijaz A. Shaikh
This study developed new measures of the routine and non-routine task contents of managerial, professional, technical, and clerical occupations from a workload perspective. Here…
Abstract
Purpose
This study developed new measures of the routine and non-routine task contents of managerial, professional, technical, and clerical occupations from a workload perspective. Here, we present a comparative analysis of the workload structures of state and industrial sector employees.
Design/methodology/approach
Our method involves detailed descriptions of work processes and an element-wise time study. We collected and analysed data to obtain a workload structure that falls within three conceptual task categories: (i) non-routine analytic tasks, (ii) non-routine interactive tasks and (iii) routine cognitive tasks. A total of 2,312 state and industrial sector employees in Kazakhstan participated in the study. The data were collected using a proprietary web application that resembles a timesheet.
Findings
The study results are consistent with the general trend reported by previous studies: the higher the job level, the lower the occupation’s routine task content. In addition, the routine cognitive task contents of managerial, professional, technical, and clerical occupations in the industrial sector are higher than those in local governments. The work of women is also more routinary than that of men. Finally, vthe routine cognitive task contents of occupations in administrative units are higher than those of occupations in substantive units.
Originality/value
Our study sought to address the challenges of using the task-based approach associated with measuring tasks by introducing a new measurement framework. The main advantage of our task measures is a direct approach to assessing workloads consisting of routine tasks, which allows for an accurate estimation of potential staff reductions due to the automation of work processes.
Details
Keywords
Yelena Smirnova and Victoriano Travieso-Morales
The general data protection regulation (GDPR) was designed to address privacy challenges posed by globalisation and rapid technological advancements; however, its implementation…
Abstract
Purpose
The general data protection regulation (GDPR) was designed to address privacy challenges posed by globalisation and rapid technological advancements; however, its implementation has also introduced new hurdles for companies. This study aims to analyse and synthesise the existing literature that focuses on challenges of GDPR implementation in business enterprises, while also outlining the directions for future research.
Design/methodology/approach
The methodology of this review follows the preferred reporting items for systematic reviews and meta-analysis guidelines. It uses an extensive search strategy across Scopus and Web of Science databases, rigorously applying inclusion and exclusion criteria, yielding a detailed analysis of 16 selected studies that concentrate on GDPR implementation challenges in business organisations.
Findings
The findings indicate a predominant use of conceptual study methodologies in prior research, often limited to specific countries and technology-driven sectors. There is also an inclination towards exploring GDPR challenges within small and medium enterprises, while larger enterprises remain comparatively unexplored. Additionally, further investigation is needed to understand the implications of emerging technologies on GDPR compliance.
Research limitations/implications
This study’s limitations include reliance of the search strategy on two databases, potential exclusion of relevant research, limited existing literature on GDPR implementation challenges in business context and possible influence of diverse methodologies and contexts of previous studies on generalisability of the findings.
Originality/value
The originality of this review lies in its exclusive focus on analysing GDPR implementation challenges within the business context, coupled with a fresh categorisation of these challenges into technical, legal, organisational, and regulatory dimensions.
Details