Search results

1 – 10 of 102
To view the access options for this content please click here
Article
Publication date: 9 May 2016

Patrick Ring

The purpose of this paper is to review the effect of reforms to the UK’s retail advice sector as a result of the Retail Distribution Review (RDR).

Abstract

Purpose

The purpose of this paper is to review the effect of reforms to the UK’s retail advice sector as a result of the Retail Distribution Review (RDR).

Design/methodology/approach

The paper takes the form of a review of the RDR in the context of the Financial Advice Market Review (FAMR).

Findings

There is a lack of clarity, experienced by both consumers and financial advisers, concerning the nature of “advice”. This results from the use of an array of regulatory and non-regulatory terms. Whilst enhancing professionalisation and reducing commission bias, the RDR is failing to address the needs of many financial consumers – identified by many as an “advice gap”. It is argued that the focus of the RDR, and previous reforms, on addressing market failures may be misplaced.

Practical implications

The paper provides an analysis designed to help in the process of developing a retail advice sector that meets the needs of consumers, in the context policy reforms placing more emphasis on the responsibilities of individuals for financial planning.

Social implications

The study has the potential of better outcomes for consumers and reputational returns for the financial services sector.

Originality/value

This paper is a review of the current regulatory issues facing financial advisers and retail consumers in the context of the RDR and FAMR.

Details

Journal of Financial Regulation and Compliance, vol. 24 no. 2
Type: Research Article
ISSN: 1358-1988

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 1999

Lam‐for Kwok and Dennis Longley

Information security management has been placed on a firmer footing with the publication of standards by national bodies. These standards provide an opportunity for…

Abstract

Information security management has been placed on a firmer footing with the publication of standards by national bodies. These standards provide an opportunity for security managers to gain senior management recognition of the importance of procedures and mechanisms to enhance information security. They may also place demands on security managers to provide convincing demonstration of conformance to the standards. The risk data repository (RDR) computer model described in this paper was developed to manage organisational information security data and facilitate risk analysis studies. The RDR provides a form of computer documentation that can assist the security officer to maintain a continuous record of the organisational information security scenario and facilitate system security development, business continuity planning and standards conformance audits.

Details

Information Management & Computer Security, vol. 7 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 1981

M. CAYROL, J.‐L. DURIEUX and H. FARRENY

The notion of Roi de rats corresponds to a functional association between values of variables. The causality relations between the more diversified properties of objects…

Abstract

The notion of Roi de rats corresponds to a functional association between values of variables. The causality relations between the more diversified properties of objects (concrete on abstract objects) can be easily represented and automatically dealt with. It was first introduced in the framework of the production rules system, ARGOS‐II; this notion is also implemented in TLISP. After preliminary remarks about variables, evaluation and assignment, we define direct variables and partitioned/tied variables and we give some examples of Roi de rats. Then the implementation of the Roi de rats by the TLISP interpreter is briefly described. We present three types of applications: Updating process of a data‐basis, checking of a variable and definition of a generator variable. In concluding remarks we observe that the RDR mechanism can be naturally expressed in PLASMA.

Details

Kybernetes, vol. 10 no. 2
Type: Research Article
ISSN: 0368-492X

To view the access options for this content please click here
Article
Publication date: 29 May 2020

Jianyu Zhao, Anzhi Bai, Xi Xi, Yining Huang and Shanshan Wang

Malicious attacks extremely traumatize knowledge networks due to increasing interdependence among knowledge elements. Therefore, exposing the damage of malicious attacks…

Abstract

Purpose

Malicious attacks extremely traumatize knowledge networks due to increasing interdependence among knowledge elements. Therefore, exposing the damage of malicious attacks to knowledge networks has important theoretical and practical significance. Despite the insights being offered by the growing research stream, few studies discuss the diverse responses of knowledge networks’ robustness to different target-attacks, and the authors lack sufficient knowledge of which forms of malicious attacks constitute greater disaster when knowledge networks evolve to different stages. Given the irreversible consequences of malicious attacks on knowledge networks, this paper aims to examine the impacts of different malicious attacks on the robustness of knowledge networks.

Design/methodology/approach

On the basic of dividing malicious attacks into six forms, the authors incorporate two important aspects of robustness of knowledge networks – structure and function – in a research framework, and use maximal connected sub-graphs and network efficiency, respectively, to measure structural and functional robustness. Furthermore, the authors conceptualize knowledge as a multi-dimensional structure to reflect the heterogeneous nature of knowledge elements, and design the fundamental rules of simulation. NetLogo is used to simulate the features of knowledge networks and their changes of robustness as they face different malicious attacks.

Findings

First, knowledge networks gradually form more associative integrated structures with evolutionary progress. Second, various properties of knowledge elements play diverse roles in mitigating damage from malicious attacks. Recalculated-degree-based attacks cause greater damage than degree-based attacks, and structure of knowledge networks has higher resilience against ability than function. Third, structural robustness is mainly affected by the potential combinatorial value of high-degree knowledge elements, and the combinatorial potential of high-out-degree knowledge elements. Forth, the number of high in-degree knowledge elements with heterogeneous contents, and the inverted U-sharp effect contributed by high out-degree knowledge elements are the main influencers of functional robustness.

Research limitations/implications

The authors use the frontier method to expose the detriments of malicious attacks both to structural and functional robustness in each evolutionary stage, and the authors reveal the relationship and effects of knowledge-based connections and knowledge combinatorial opportunities that contribute to maintaining them. Furthermore, the authors identify latent critical factors that may improve the structural and functional robustness of knowledge networks.

Originality/value

First, from the dynamic evolutionary perspective, the authors systematically examine structural and functional robustness to reveal the roles of the properties of knowledge element, and knowledge associations to maintain the robustness of knowledge networks. Second, the authors compare the damage of six forms of malicious attacks to identify the reasons for increased robustness vulnerability. Third, the authors construct the stock, power, expertise knowledge structure to overcome the difficulty of knowledge conceptualization. The results respond to multiple calls from different studies and extend the literature in multiple research domains.

Details

Journal of Knowledge Management, vol. 24 no. 5
Type: Research Article
ISSN: 1367-3270

Keywords

To view the access options for this content please click here
Article
Publication date: 23 May 2019

Jane Cho

RDR has become an essential academic infrastructure in an atmosphere that facilitates the openness of research output granted by public research funds. This study aims to…

Abstract

Purpose

RDR has become an essential academic infrastructure in an atmosphere that facilitates the openness of research output granted by public research funds. This study aims to understand operational status of 152 Asian data repositories on re3data and cluster repositories into four groups according to their operational status. In addition, identify the main subject areas of RDRs in Asian countries and try to understand what topic correlations exist between data archived in Asian countries.

Design/methodology/approach

This study extracts metadata from re3data and analyzes it in various ways to grasp the current status of research data repositories in Asian countries. The author clusters the repositories into four groups using hierarchical cluster analysis according to the level of operation. In addition, for identifying the main subject areas of RDRs in Asian countries, extracted the keywords of the subject field assigned to the each repository, and Pathfinder Network (PFNET) analysis is performed.

Findings

About 70 per cent of the Asian-country repositories are those where licenses or policies are declared but not granted permanent identifiers and international-level certification. As a result of the subject domain analysis, eight clusters are formed centering on life sciences and natural sciences.

Originality/value

The research output in developing countries, especially non-English-speaking countries, tends not to be smoothly circulated in the international community due to the immaturity of the open-access culture, as well as linguistic and technical problems. This study has value, in that it investigates the status of Asian countries’ research data management and global distribution infrastructure in global open-science trends.

Details

The Electronic Library , vol. 37 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

To view the access options for this content please click here
Article
Publication date: 1 October 1997

Lam‐for Kwok

States that traditional information security models address only the micro view of how to maintain a secure environment by controlling the flows of information within…

Abstract

States that traditional information security models address only the micro view of how to maintain a secure environment by controlling the flows of information within protection systems and the access to controlled data items. Argues that these models do not aim to, and cannot, reflect the information security level of an organization. Describes an information security model using a hypertext approach. The model aims to prepare a macro view of the current information security situation in order to provide an overview of the information security risk to a wider audience in an organization. An administrative information system has been analysed to demonstrate the hypertext information security model.

Details

Information Management & Computer Security, vol. 5 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

To view the access options for this content please click here
Article
Publication date: 1 October 2004

Richard Vidgen, Diane Francis, Philip Powell and Maria Woerndl

Web‐based technologies are becoming an important way for small and medium‐sized enterprises (SMEs) to acquire information systems capabilities to support business…

Abstract

Web‐based technologies are becoming an important way for small and medium‐sized enterprises (SMEs) to acquire information systems capabilities to support business transformation. This paper investigates the business, technology, and IS drivers for component‐based applications. Web service technology is identified as a key driver for SMEs to gain operational and strategic benefit from net‐sourced information systems. The role of Web services in SMEs is explored through application of Venkatraman's business transformation model. The Web‐service transformation model is applied to a case study of a SME that is adopting Web service technology. The case identifies the potential benefits for SMEs of Web service technology and considers the factors that enable successful Web service adoption.

Details

Journal of Enterprise Information Management, vol. 17 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Book part
Publication date: 14 August 2015

Debora Halbert

This paper is designed to seek out the everyday narratives of copyright. To find these narratives, I analyze the comments section of websites where users can post their…

Abstract

This paper is designed to seek out the everyday narratives of copyright. To find these narratives, I analyze the comments section of websites where users can post their reactions to copyright-related stories. I argue that understanding how people who are not legal scholars frame the use of copyright as they discuss sharing, owning, and controlling the copy is a good place to begin to develop a sense for the everyday life of copyright law.

Details

Special Issue: Thinking and Rethinking Intellectual Property
Type: Book
ISBN: 978-1-78441-881-6

Keywords

To view the access options for this content please click here
Article
Publication date: 17 September 2020

Marco Pichierri, Alessandro M. Peluso, Giovanni Pino and Gianluigi Guido

This research investigates the effectiveness of the four health claims that the European Union (EU) authorized for extra-virgin olive oil (EVOO) in terms of perceived text…

Abstract

Purpose

This research investigates the effectiveness of the four health claims that the European Union (EU) authorized for extra-virgin olive oil (EVOO) in terms of perceived text clarity, text interestingness, message credibility and information diagnosticity, along with the claims' effect on product attractiveness and consumers' purchase intention.

Design/methodology/approach

An experimental study with 185 participants investigated consumer response to the four claims. A one-way MANOVA analyzed differences in the aforementioned variables, while a sequential mediation model assessed the relationship among perceived text clarity of the EVOO health claims, information diagnosticity, product attractiveness and purchase intention.

Findings

The four EU-authorized health claims differ in terms of perceived text clarity, message credibility, information diagnosticity and product attractiveness. Specifically, the health claim on EVOO polyphenols scored lower than the other three health claims on the aforementioned dependent variables. Importantly, clearer health claims are perceived as more useful and may increase product attractiveness and consumers' purchase intention.

Originality/value

The research sheds light on the effectiveness of EVOO health claims. Since the use of such health claims is not a common practice in the EVOO market, a deeper understanding of consumers' perception and attitude toward them could inspire better guidelines and suggestions for claim usage and improvement.

Details

British Food Journal, vol. 123 no. 2
Type: Research Article
ISSN: 0007-070X

Keywords

To view the access options for this content please click here
Expert briefing
Publication date: 29 December 2017

Ruling coalition divisions.

1 – 10 of 102