Search results
1 – 10 of over 11000Maryke Hunter-Hüsselmann, Dalene Pieterse and Changu Batisani
This chapter discusses the growing importance of research-related information in the face of increased complexities and competitiveness within higher education environments…
Abstract
This chapter discusses the growing importance of research-related information in the face of increased complexities and competitiveness within higher education environments globally. It provides some reflections on the importance of institutional research cultures to effectively address these challenges, focussing on the African context, and the role of effective research support through institutional structures such as a dedicated research office. The increasingly strategic role of research management has led to the need for a more active and visionary role in the positioning of institutions by supporting decision-making and contributing to the development and visibility of institutional research portfolios. The authors provide their insights into the scope of research-related information, the need for research offices to perform this strategic function, how these information sets can be applied in reports, evidence-based decisions, institutional showcasing, and enhanced research support. The chapter includes aspects to consider when establishing a research-related information management function within institutions.
Details
Keywords
Alicia Martín-Navarro, María Paula Lechuga Sancho and Jose Aurelio Medina-Garrido
Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users…
Abstract
Purpose
Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users also use BPMSs to manage the knowledge needed for processes to be completed. This study aims to analyze the factors that cause users to use BPMSs to manage the knowledge required in business processes.
Design/methodology/approach
The paper proposes an original model that integrates two successful information system models applied to BPMSs and knowledge management systems. To test the hypotheses derived from this new model, data were collected from 242 mature BPMS users from 12 Spanish and Latin American companies. Structural equation modeling with AMOS was used to examine the model.
Findings
Users’ perceived usefulness of a BPMS when using it for knowledge management (KM) is the only factor influencing them to use it for KM.
Practical implications
This study has practical implications for managers wishing to successfully implement a BPMS to support processes and for employees to use the knowledge embedded in the tool. The latter will only happen if users perceive the tool’s usefulness for KM.
Originality/value
To the best of the authors’ knowledge, this model is the first empirically validated model to successfully analyze BPMS users’ tendency to use BPMSs as a tool to support necessary KM in processes.
Details
Keywords
Stefan Fenz and Thomas Neubauer
The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and…
Abstract
Purpose
The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and, therefore, the cost efficiency of the information security compliance checking process. The authors advanced the state-of-the-art by developing and applying the method to ISO 27002 information security controls and by developing a semantic decision support system.
Design/methodology/approach
The research has been conducted under design science principles. The formalized information security controls were used in a compliance/risk management decision support system which has been evaluated with experts and end-users in real-world environments.
Findings
There are different ways of obtaining compliance to information security standards. For example, by implementing countermeasures of different quality depending on the protection needs of the organization. The authors developed decision support mechanisms which use the formal control descriptions as input to support the decision-maker at identifying the most appropriate countermeasure strategy based on cost and risk reduction potential.
Originality/value
Formalizing and mapping the ISO 27002 controls to the security ontology enabled the authors to automatically determine the compliance status and organization-wide risk-level based on the formal control descriptions and the modelled environment, including organizational structures, IT infrastructure, available countermeasures, etc. Furthermore, it allowed them to automatically determine which countermeasures are missing to ensure compliance and to decrease the risk to an acceptable level.
Details
Keywords
Garret Murray, Malin Falkeling and Shang Gao
The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.
Abstract
Purpose
The purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.
Design/methodology/approach
A systematic mapping study was carried out to investigate the trends in studies into the human aspects of ransomware, identify challenges encountered by researchers and propose directions for future research. For each of the identified papers from this study, the authors mapped the year of publication, the type of paper, research strategy and data generation method, types of participants included, theories incorporated and lastly, the authors mapped the challenges encountered by the researchers.
Findings
Fifty-nine papers published between 2006 and 2022 are included in the study. The findings indicate that literature on the human aspects of ransomware was scarce prior to 2016. The most-used participant groups in this area are students and cybersecurity professionals, and most studies rely on a survey strategy using the questionnaire to collect data. In addition, many papers did not use theories for their research, but from those that did, game theory was used most often. Furthermore, the most reported challenge is that being hit with ransomware is a sensitive topic, which results in individuals and organisations being reluctant to share their experiences.
Research limitations/implications
This mapping study reveals that the body of literature in the area of human aspects of ransomware has increased over the past couple of years. The findings highlight that being transparent about ransomware attacks, when possible, can help others. Moreover, senior management plays an important role in shaping the information security culture of an organisation, whether to have a culture of transparency or of secrecy.
Originality/value
This study is the first of its kind of systematic mapping studies contributing to the body of knowledge on the human aspects of ransomware.
Details
Keywords
Jinou Xu and Margherita Emma Paola Pero
This paper investigated the organizational adoption of big data analytics (BDA) in the context of supply chain planning (SCP) to conceptualize how resources are orchestrated for…
Abstract
Purpose
This paper investigated the organizational adoption of big data analytics (BDA) in the context of supply chain planning (SCP) to conceptualize how resources are orchestrated for organizational BDA adoption and to elucidate how resources and capabilities intervene with the resource management process during BDA adoption.
Design/methodology/approach
This research elaborated on the resource orchestration theory and technology innovation adoption literature to shed light on BDA adoption with multiple case studies.
Findings
A framework for the resource orchestration process in BDA adoption is presented. The authors associated the development and deployment of relevant individual, technological and organizational resources and capabilities with the phases of organizational BDA adoption and implementation. The authors highlighted that organizational BDA adoption can be initiated before consolidating the full resource portfolio. Resource acquisition, capability development and internalization of competences can take place alongside BDA adoption through structured processes and governance mechanisms.
Practical implications
A relevant discussion identifying the capability gap and provides insight into potential paths of organizational BDA adoption is presented.
Social implications
The authors call for attention from policymakers and academics to reflect on the changes in the expected capabilities of supply chain planners to facilitate industry-wide BDA transition.
Originality/value
This study opens the black box of organizational BDA adoption by emphasizing and scrutinizing the role of resource management actions.
Details
Keywords
Xin (Robert) Luo and Fang-Kai Chang
The purpose of this study is to demonstrate that Strategic Enterprise Management (SEM) and Business Intelligence (BI) have the potential to integrate management decisions…
Abstract
Purpose
The purpose of this study is to demonstrate that Strategic Enterprise Management (SEM) and Business Intelligence (BI) have the potential to integrate management decisions vertically through an organization’s hierarchy. This study also aims to present a design theory framework and build a model dimension using eight principles serving as mid-range theories.
Design/methodology/approach
This study uses a design science perspective to posit how organizations can successfully implement SEMBI (a union of SEM and BI). This study then completes the design theory by building the method dimension using two principles. Finally, the study presents testable hypotheses for the theory and an evaluation using stakeholder attitudes and judgments as proxies for objective measures.
Findings
In the search for a prescription for SEMBI success, this study finds that the notion of the Capability Maturity Model (CMM) is a good artifact with which to organize the principles the authors are seeking. CMM has since been adapted to suit different contexts by incorporating relevant principles from those domains. Hereafter, this study refers to SEMBI–CMM as the adapted solution for SEMBI's success.
Originality/value
This study coins and uses the term SEMBI to represent the union of SEM and BI. This term retains its distinct identities and principles and forms a holistic and integrated view of SEM and BI implementation strategies. In an effort to advance this line of research, this study employs a design science perspective to address the question of how an organization can successfully implement SEMBI.
Details
Keywords
Xusen Cheng, Wanxin Liu and Yuanyuan Li
Collaboration is significant but difficult for the development of youth organizations, this research aims to explore whether the online collaboration process is suitable for youth…
Abstract
Purpose
Collaboration is significant but difficult for the development of youth organizations, this research aims to explore whether the online collaboration process is suitable for youth organizations' collaboration and improve their effectiveness and efficiency.
Design/methodology/approach
This research has applied a design approach using the collaboration engineering method, to design an online collaboration process for youth organizations to improve their effectiveness and efficiency. Using a self-developed group support systems (GSS) tool, the authors have tested the new collaboration process through an experiment among four youth organizations and conducted a survey afterwards.
Findings
The new process improves the collaboration effectiveness and efficiency. The research also identifies the detailed relationships among influencing factors in the online collaboration process.
Originality/value
There is little research in the context of computer mediated youth organization collaboration. This research designs an online collaboration process for the effective and efficient collaboration of youth organizations and has it tested among representative youth organizations, providing practical instructions for digital youth organization collaboration in the context of global pandemic.
Details
Keywords
Patiswa Zibani, Mogiveny Rajkoomar and Nalindren Naicker
This study aims to evaluate faculty research repositories used in higher education institutions, their different levels and functions with regard to research information management…
Abstract
Purpose
This study aims to evaluate faculty research repositories used in higher education institutions, their different levels and functions with regard to research information management. This is revealed through the selected studies reviewed.
Design/methodology/approach
A systematic literature search of journal article studies on research repositories in higher education institutions was carried out on several databases, namely, Ebscohost, Emerald Insight, Science Direct, Sage, Google Scholar, SA e-Publications and citation databases such as Scopus and Web of Science. The systematic review was conducted in accordance with the preferred reporting items for systematic reviews and meta-analyses guidelines. The time frame for the analysis was 2015 to 2021.
Findings
The findings are presented on the motives for developing faculty research repositories the services provided and benefits derived from faculty research repositories and what is the utilization of faculty research repositories.
Originality/value
The results show that the development of research repositories at the faculty level enhances sharing, analysis, evaluation and preservation of scholarly research produced.
Details
Keywords
Jinou Xu, Margherita Emma Paola Pero, Federica Ciccullo and Andrea Sianesi
This paper aims to examine how the extant publication has related big data analytics (BDA) to supply chain planning (SCP). The paper presents a conceptual model based on the…
Abstract
Purpose
This paper aims to examine how the extant publication has related big data analytics (BDA) to supply chain planning (SCP). The paper presents a conceptual model based on the reviewed articles and the dominant research gaps and outlines the research directions for future advancement.
Design/methodology/approach
Based on a systematic literature review, this study analysed 72 journal articles and reported the descriptive and thematic analysis in assessing the established body of knowledge.
Findings
This study reveals the fact that literature on relating BDA to SCP has an ambiguous use of BDA-related terminologies and a siloed view on SCP processes that primarily focuses on the short-term. Looking at the big data sources, the objective of adopting BDA and changes to SCP, we identified three roles of big data and BDA for SCP: supportive facilitator, source of empowerment and game-changer. It bridges the conversation between BDA technology for SCP and its management issues in organisations and supply chains according to the technology-organisation-environmental framework.
Research limitations/implications
This paper presents a comprehensive examination of existing literature on relating BDA to SCP. The resulted themes and research opportunities will help to advance the understanding of how BDA will reshape the future of SCP and how to manage BDA adoption towards a big data-driven SCP.
Originality/value
This study is unique in its discussion on how BDA will reshape SCP integrating the technical and managerial perspectives, which have not been discussed to date.
Details
Keywords
Felipe Porphirio Orioli and José Manuel Cristóvão Veríssimo
The purpose of the study is to perform a scientific mapping and detect the evolution pattern of two emerging fields, organizational capabilities and sustainable supply chain…
Abstract
Purpose
The purpose of the study is to perform a scientific mapping and detect the evolution pattern of two emerging fields, organizational capabilities and sustainable supply chain management (SSCM), to detect and visualize the existing conceptual domains and identify less-explored areas.
Design/methodology/approach
This study uses a methodological combination involving systematic literature review and bibliometric analysis. The methodology was implemented in the following order: definition and selection of the material using an electronic database, descriptive analysis of the material, category selection using bibliographic coupling analysis by VOSviewer (clusterization), material evaluation and content analysis.
Findings
The research results clarify the intellectual structure within the academic field. The authors’ identified three main clusters: (1) sustainable capabilities and practices in supply chain management (SCM), (2) green SCM and performance and (3) information technology and innovation. The findings reveal that there is a rich field to be explored, especially regarding issues involving sustainable technological capabilities, sustainable initiatives and key resource development.
Practical implications
This study facilitates researchers’ and practitioners’ understanding and their ability to map the different paths and evolution of SSCM and organizational capabilities. It can encourage managers and policymakers alike to conceive new approaches to engage in the adoption of SSCM.
Originality/value
This work employs a singular approach to identify the intellectual knowledge and topics related to the implementation of SSCM by adopting the theoretical approach of sustainable organizational capacity. It contributes to the debate on distinguishing specific sustainable organizational capabilities from traditional capabilities.
Details