Search results

1 – 10 of over 11000
Open Access
Book part
Publication date: 29 November 2023

Maryke Hunter-Hüsselmann, Dalene Pieterse and Changu Batisani

This chapter discusses the growing importance of research-related information in the face of increased complexities and competitiveness within higher education environments…

Abstract

This chapter discusses the growing importance of research-related information in the face of increased complexities and competitiveness within higher education environments globally. It provides some reflections on the importance of institutional research cultures to effectively address these challenges, focussing on the African context, and the role of effective research support through institutional structures such as a dedicated research office. The increasingly strategic role of research management has led to the need for a more active and visionary role in the positioning of institutions by supporting decision-making and contributing to the development and visibility of institutional research portfolios. The authors provide their insights into the scope of research-related information, the need for research offices to perform this strategic function, how these information sets can be applied in reports, evidence-based decisions, institutional showcasing, and enhanced research support. The chapter includes aspects to consider when establishing a research-related information management function within institutions.

Open Access
Article
Publication date: 7 June 2023

Alicia Martín-Navarro, María Paula Lechuga Sancho and Jose Aurelio Medina-Garrido

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users…

2032

Abstract

Purpose

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users also use BPMSs to manage the knowledge needed for processes to be completed. This study aims to analyze the factors that cause users to use BPMSs to manage the knowledge required in business processes.

Design/methodology/approach

The paper proposes an original model that integrates two successful information system models applied to BPMSs and knowledge management systems. To test the hypotheses derived from this new model, data were collected from 242 mature BPMS users from 12 Spanish and Latin American companies. Structural equation modeling with AMOS was used to examine the model.

Findings

Users’ perceived usefulness of a BPMS when using it for knowledge management (KM) is the only factor influencing them to use it for KM.

Practical implications

This study has practical implications for managers wishing to successfully implement a BPMS to support processes and for employees to use the knowledge embedded in the tool. The latter will only happen if users perceive the tool’s usefulness for KM.

Originality/value

To the best of the authors’ knowledge, this model is the first empirically validated model to successfully analyze BPMS users’ tendency to use BPMSs as a tool to support necessary KM in processes.

Details

Journal of Knowledge Management, vol. 27 no. 11
Type: Research Article
ISSN: 1367-3270

Keywords

Open Access
Article
Publication date: 12 November 2018

Stefan Fenz and Thomas Neubauer

The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and…

3799

Abstract

Purpose

The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and, therefore, the cost efficiency of the information security compliance checking process. The authors advanced the state-of-the-art by developing and applying the method to ISO 27002 information security controls and by developing a semantic decision support system.

Design/methodology/approach

The research has been conducted under design science principles. The formalized information security controls were used in a compliance/risk management decision support system which has been evaluated with experts and end-users in real-world environments.

Findings

There are different ways of obtaining compliance to information security standards. For example, by implementing countermeasures of different quality depending on the protection needs of the organization. The authors developed decision support mechanisms which use the formal control descriptions as input to support the decision-maker at identifying the most appropriate countermeasure strategy based on cost and risk reduction potential.

Originality/value

Formalizing and mapping the ISO 27002 controls to the security ontology enabled the authors to automatically determine the compliance status and organization-wide risk-level based on the formal control descriptions and the modelled environment, including organizational structures, IT infrastructure, available countermeasures, etc. Furthermore, it allowed them to automatically determine which countermeasures are missing to ensure compliance and to decrease the risk to an acceptable level.

Details

Information & Computer Security, vol. 26 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 5 July 2024

Garret Murray, Malin Falkeling and Shang Gao

The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.

Abstract

Purpose

The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.

Design/methodology/approach

A systematic mapping study was carried out to investigate the trends in studies into the human aspects of ransomware, identify challenges encountered by researchers and propose directions for future research. For each of the identified papers from this study, the authors mapped the year of publication, the type of paper, research strategy and data generation method, types of participants included, theories incorporated and lastly, the authors mapped the challenges encountered by the researchers.

Findings

Fifty-nine papers published between 2006 and 2022 are included in the study. The findings indicate that literature on the human aspects of ransomware was scarce prior to 2016. The most-used participant groups in this area are students and cybersecurity professionals, and most studies rely on a survey strategy using the questionnaire to collect data. In addition, many papers did not use theories for their research, but from those that did, game theory was used most often. Furthermore, the most reported challenge is that being hit with ransomware is a sensitive topic, which results in individuals and organisations being reluctant to share their experiences.

Research limitations/implications

This mapping study reveals that the body of literature in the area of human aspects of ransomware has increased over the past couple of years. The findings highlight that being transparent about ransomware attacks, when possible, can help others. Moreover, senior management plays an important role in shaping the information security culture of an organisation, whether to have a culture of transparency or of secrecy.

Originality/value

This study is the first of its kind of systematic mapping studies contributing to the body of knowledge on the human aspects of ransomware.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 20 June 2023

Jinou Xu and Margherita Emma Paola Pero

This paper investigated the organizational adoption of big data analytics (BDA) in the context of supply chain planning (SCP) to conceptualize how resources are orchestrated for…

2645

Abstract

Purpose

This paper investigated the organizational adoption of big data analytics (BDA) in the context of supply chain planning (SCP) to conceptualize how resources are orchestrated for organizational BDA adoption and to elucidate how resources and capabilities intervene with the resource management process during BDA adoption.

Design/methodology/approach

This research elaborated on the resource orchestration theory and technology innovation adoption literature to shed light on BDA adoption with multiple case studies.

Findings

A framework for the resource orchestration process in BDA adoption is presented. The authors associated the development and deployment of relevant individual, technological and organizational resources and capabilities with the phases of organizational BDA adoption and implementation. The authors highlighted that organizational BDA adoption can be initiated before consolidating the full resource portfolio. Resource acquisition, capability development and internalization of competences can take place alongside BDA adoption through structured processes and governance mechanisms.

Practical implications

A relevant discussion identifying the capability gap and provides insight into potential paths of organizational BDA adoption is presented.

Social implications

The authors call for attention from policymakers and academics to reflect on the changes in the expected capabilities of supply chain planners to facilitate industry-wide BDA transition.

Originality/value

This study opens the black box of organizational BDA adoption by emphasizing and scrutinizing the role of resource management actions.

Details

International Journal of Physical Distribution & Logistics Management, vol. 53 no. 11
Type: Research Article
ISSN: 0960-0035

Keywords

Open Access
Article
Publication date: 9 August 2023

Xin (Robert) Luo and Fang-Kai Chang

The purpose of this study is to demonstrate that Strategic Enterprise Management (SEM) and Business Intelligence (BI) have the potential to integrate management decisions…

Abstract

Purpose

The purpose of this study is to demonstrate that Strategic Enterprise Management (SEM) and Business Intelligence (BI) have the potential to integrate management decisions vertically through an organization’s hierarchy. This study also aims to present a design theory framework and build a model dimension using eight principles serving as mid-range theories.

Design/methodology/approach

This study uses a design science perspective to posit how organizations can successfully implement SEMBI (a union of SEM and BI). This study then completes the design theory by building the method dimension using two principles. Finally, the study presents testable hypotheses for the theory and an evaluation using stakeholder attitudes and judgments as proxies for objective measures.

Findings

In the search for a prescription for SEMBI success, this study finds that the notion of the Capability Maturity Model (CMM) is a good artifact with which to organize the principles the authors are seeking. CMM has since been adapted to suit different contexts by incorporating relevant principles from those domains. Hereafter, this study refers to SEMBI–CMM as the adapted solution for SEMBI's success.

Originality/value

This study coins and uses the term SEMBI to represent the union of SEM and BI. This term retains its distinct identities and principles and forms a holistic and integrated view of SEM and BI implementation strategies. In an effort to advance this line of research, this study employs a design science perspective to address the question of how an organization can successfully implement SEMBI.

Details

Journal of Electronic Business & Digital Economics, vol. 2 no. 2
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Article
Publication date: 27 October 2022

Xusen Cheng, Wanxin Liu and Yuanyuan Li

Collaboration is significant but difficult for the development of youth organizations, this research aims to explore whether the online collaboration process is suitable for youth…

596

Abstract

Purpose

Collaboration is significant but difficult for the development of youth organizations, this research aims to explore whether the online collaboration process is suitable for youth organizations' collaboration and improve their effectiveness and efficiency.

Design/methodology/approach

This research has applied a design approach using the collaboration engineering method, to design an online collaboration process for youth organizations to improve their effectiveness and efficiency. Using a self-developed group support systems (GSS) tool, the authors have tested the new collaboration process through an experiment among four youth organizations and conducted a survey afterwards.

Findings

The new process improves the collaboration effectiveness and efficiency. The research also identifies the detailed relationships among influencing factors in the online collaboration process.

Originality/value

There is little research in the context of computer mediated youth organization collaboration. This research designs an online collaboration process for the effective and efficient collaboration of youth organizations and has it tested among representative youth organizations, providing practical instructions for digital youth organization collaboration in the context of global pandemic.

Details

Journal of Electronic Business & Digital Economics, vol. 1 no. 1/2
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Article
Publication date: 30 August 2021

Patiswa Zibani, Mogiveny Rajkoomar and Nalindren Naicker

This study aims to evaluate faculty research repositories used in higher education institutions, their different levels and functions with regard to research information management

3140

Abstract

Purpose

This study aims to evaluate faculty research repositories used in higher education institutions, their different levels and functions with regard to research information management. This is revealed through the selected studies reviewed.

Design/methodology/approach

A systematic literature search of journal article studies on research repositories in higher education institutions was carried out on several databases, namely, Ebscohost, Emerald Insight, Science Direct, Sage, Google Scholar, SA e-Publications and citation databases such as Scopus and Web of Science. The systematic review was conducted in accordance with the preferred reporting items for systematic reviews and meta-analyses guidelines. The time frame for the analysis was 2015 to 2021.

Findings

The findings are presented on the motives for developing faculty research repositories the services provided and benefits derived from faculty research repositories and what is the utilization of faculty research repositories.

Originality/value

The results show that the development of research repositories at the faculty level enhances sharing, analysis, evaluation and preservation of scholarly research produced.

Details

Digital Library Perspectives, vol. 38 no. 2
Type: Research Article
ISSN: 2059-5816

Keywords

Open Access
Article
Publication date: 1 June 2021

Jinou Xu, Margherita Emma Paola Pero, Federica Ciccullo and Andrea Sianesi

This paper aims to examine how the extant publication has related big data analytics (BDA) to supply chain planning (SCP). The paper presents a conceptual model based on the…

5710

Abstract

Purpose

This paper aims to examine how the extant publication has related big data analytics (BDA) to supply chain planning (SCP). The paper presents a conceptual model based on the reviewed articles and the dominant research gaps and outlines the research directions for future advancement.

Design/methodology/approach

Based on a systematic literature review, this study analysed 72 journal articles and reported the descriptive and thematic analysis in assessing the established body of knowledge.

Findings

This study reveals the fact that literature on relating BDA to SCP has an ambiguous use of BDA-related terminologies and a siloed view on SCP processes that primarily focuses on the short-term. Looking at the big data sources, the objective of adopting BDA and changes to SCP, we identified three roles of big data and BDA for SCP: supportive facilitator, source of empowerment and game-changer. It bridges the conversation between BDA technology for SCP and its management issues in organisations and supply chains according to the technology-organisation-environmental framework.

Research limitations/implications

This paper presents a comprehensive examination of existing literature on relating BDA to SCP. The resulted themes and research opportunities will help to advance the understanding of how BDA will reshape the future of SCP and how to manage BDA adoption towards a big data-driven SCP.

Originality/value

This study is unique in its discussion on how BDA will reshape SCP integrating the technical and managerial perspectives, which have not been discussed to date.

Details

International Journal of Physical Distribution & Logistics Management, vol. 51 no. 6
Type: Research Article
ISSN: 0960-0035

Keywords

Open Access
Article
Publication date: 16 May 2023

Felipe Porphirio Orioli and José Manuel Cristóvão Veríssimo

The purpose of the study is to perform a scientific mapping and detect the evolution pattern of two emerging fields, organizational capabilities and sustainable supply chain…

40122

Abstract

Purpose

The purpose of the study is to perform a scientific mapping and detect the evolution pattern of two emerging fields, organizational capabilities and sustainable supply chain management (SSCM), to detect and visualize the existing conceptual domains and identify less-explored areas.

Design/methodology/approach

This study uses a methodological combination involving systematic literature review and bibliometric analysis. The methodology was implemented in the following order: definition and selection of the material using an electronic database, descriptive analysis of the material, category selection using bibliographic coupling analysis by VOSviewer (clusterization), material evaluation and content analysis.

Findings

The research results clarify the intellectual structure within the academic field. The authors’ identified three main clusters: (1) sustainable capabilities and practices in supply chain management (SCM), (2) green SCM and performance and (3) information technology and innovation. The findings reveal that there is a rich field to be explored, especially regarding issues involving sustainable technological capabilities, sustainable initiatives and key resource development.

Practical implications

This study facilitates researchers’ and practitioners’ understanding and their ability to map the different paths and evolution of SSCM and organizational capabilities. It can encourage managers and policymakers alike to conceive new approaches to engage in the adoption of SSCM.

Originality/value

This work employs a singular approach to identify the intellectual knowledge and topics related to the implementation of SSCM by adopting the theoretical approach of sustainable organizational capacity. It contributes to the debate on distinguishing specific sustainable organizational capabilities from traditional capabilities.

Details

Benchmarking: An International Journal, vol. 31 no. 6
Type: Research Article
ISSN: 1463-5771

Keywords

1 – 10 of over 11000