Search results

1 – 10 of 121
Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Article
Publication date: 29 March 2024

Jiming Hu, Zexian Yang, Jiamin Wang, Wei Qian, Cunwan Feng and Wei Lu

This study proposes a novel method utilising a speech-word pair bipartite network to examine the correlation structure between members of parliament (MPs) in the context of the…

Abstract

Purpose

This study proposes a novel method utilising a speech-word pair bipartite network to examine the correlation structure between members of parliament (MPs) in the context of the UK- China relationship.

Design/methodology/approach

We construct MP-word pair bipartite networks based on the co-occurrence relationship between MPs and words in their speech content. These networks are then mapped into monopartite MPs correlation networks. Additionally, the study calculates correlation network indicators and identifies MP communities and factions to determine the characteristics of MPs and their interrelation in the UK-China relationship. This includes insights into the distribution of key MPs, their correlation structure and the evolution and development trends of MP factions.

Findings

Analysis of the parliamentary speeches on China-related affairs in the British Parliament from 2011 to 2020 reveals that the distribution and interrelationship of MPs engaged in UK-China affairs are centralised and discrete, with a few core MPs playing an integral role in the UK-China relationship. Among them, MPs such as Lord Ahmad of Wimbledon, David Cameron, Lord Hunt of Chesterton and Lord Howell of Guildford formed factions with significant differences; however, the continuity of their evolution exhibits unstableness. The core MP factions, such as those led by Lord Ahmad of Wimbledon and David Cameron, have achieved a level of maturity and exert significant influence.

Research limitations/implications

The research has several limitations that warrant acknowledgement. First, we mapped the MP-word pair bipartite network into the MP correlation network for analysis without directly analysing the structure of MPs based on the bipartite network. In future studies, we aim to explore various types of analysis based on the proposed bipartite networks to provide more comprehensive and accurate references for studying UK-China relations. In addition, we seek to incorporate semantic-level analyses, such as sentiment analysis of MPs, into the MP-word -pair bipartite networks for in-depth analysis. Second, the interpretations of MP structures in the UK-China relationship in this study are limited. Consequently, expertise in UK-China relations should be incorporated to enhance the study and provide more practical recommendations.

Practical implications

Firstly, the findings can contribute to an objective understanding of the characteristics and connotations of UK-China relations, thereby informing adjustments of focus accordingly. The identification of the main factions in the UK-China relationship emphasises the imperative for governments to pay greater attention to these MPs’ speeches and social relationships. Secondly, examining the evolution and development of MP factions aids in identifying a country’s diplomatic focus during different periods. This can assist governments in responding promptly to relevant issues and contribute to the formulation of effective foreign policies.

Social implications

First, this study expands the research methodology of parliamentary debates analysis in previous studies. To the best of our knowledge, we are the first to study the UK-China relationship through the MP-word-pair bipartite network. This outcome inspires future researchers to apply various knowledge networks in the LIS field to elucidate deeper characteristics and connotations of UK-China relations. Second, this study provides a novel perspective for UK-China relationship analysis, which deepens the research object from keywords to MPs. This finding may offer important implications for researchers to further study the role of MPs in the UK-China relationship.

Originality/value

This study proposes a novel scheme for analysing the correlation structure between MPs based on bipartite networks. This approach offers insights into the development and evolving dynamics of MPs.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 19 May 2023

Natalia Yannopoulou, Danae Manika, Koblarp Chandrasapth, Mina Tajvidi and Victoria Wells

Given the increased significance and rapid growth of an ageing population, this review paper aims to define the mature consumer segment chronologically to resolve definitional…

1157

Abstract

Purpose

Given the increased significance and rapid growth of an ageing population, this review paper aims to define the mature consumer segment chronologically to resolve definitional inconsistencies found in prior marketing communications literature, identify the current state of the marketing communications field in terms of mature consumer research and highlight future research directions on mature consumers for marketing communications academics and practitioners.

Design/methodology/approach

A synthesis of existing marketing communication research on mature consumers (those aged 50+), published in top-tier journals since 1972, is provided. In total, 106 papers were identified in 21 marketing journals.

Findings

Three existing research themes were identified: market segmentation of mature consumers (we ground this theme in three inter-related facets: chronological age, health [physical and neurological] and self-perception of age [also referred to as cognitive age]); attitudes and behaviours of mature consumers; and marketing to mature consumers. This paper also proposes several future research themes: further definition of mature consumers and widening the scope of examination; segmenting mature consumers to account for heterogeneity; information processing of mature consumers cannot use a one-size-fits-all approach; the influence of marketing mix elements on mature consumers; and alternative methodologies to better understand mature consumers.

Research limitations/implications

Recognising the heterogeneity within the chronologically based mature consumer segment, this paper proposes an extended mature consumer definition which includes biological, psychological and social dimensions, as well as life events and life circumstances, rather than biological age alone.

Practical implications

In practical terms, understanding information processing of mature consumers cannot use a one-size-fits-all approach and marketing mix elements may affect behaviour differently within this segment. This will require alternative methodologies to understand these processes fully.

Originality/value

This synthesis of mature consumers research within the marketing communications field provides key research questions for future research to better understand this market segment and its implications for marketing communications, theory development and practice.

Details

European Journal of Marketing, vol. 57 no. 8
Type: Research Article
ISSN: 0309-0566

Keywords

Article
Publication date: 15 September 2023

Richard G. Mathieu and Alan E. Turovlin

Cyber risk has significantly increased over the past twenty years. In many organizations, data and operations are managed through a complex technology stack underpinned by an…

Abstract

Purpose

Cyber risk has significantly increased over the past twenty years. In many organizations, data and operations are managed through a complex technology stack underpinned by an Enterprise Resource Planning (ERP) system such as systemanalyse programmentwicklung (SAP). The ERP environment by itself can be overwhelming for a typical ERP Manager, coupled with increasing cybersecurity issues that arise creating periods of intense time pressure, stress and workload, increasing risk to the organization. This paper aims to identify a pragmatic approach to prioritize vulnerabilities for the ERP Manager.

Design/methodology/approach

Applying attention-based theory, a pragmatic approach is developed to prioritize an organization’s response to the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) vulnerabilities using a Classification and Regression Tree (CART).

Findings

The application of classification and regression tree (CART) to the National Institute of Standards and Technology’s National Vulnerability Database identifies prioritization unavailable within the NIST’s categorization.

Practical implications

The ERP Manager is a role between technology, functionality, centralized control and organization data. Without CART, vulnerabilities are left to a reactive approach, subject to overwhelming situations due to intense time pressure, stress and workload.

Originality/value

To the best of the authors’ knowledge, this work is original and has not been published elsewhere, nor is it currently under consideration for publication elsewhere. CART has previously not been applied to the prioritizing cybersecurity vulnerabilities.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 10 November 2023

Catherine Olphin, Joanne Larty and David Tyfield

Despite widespread recognition of the importance of place in entrepreneurship research, much less attention has been paid to the methodological challenges that inquiries into…

Abstract

Despite widespread recognition of the importance of place in entrepreneurship research, much less attention has been paid to the methodological challenges that inquiries into place presents. Understanding the relationship between place and entrepreneurship is becoming increasingly important as focus turns to sustainable entrepreneurship and as policy makers turn to ‘place-based’ approaches to regional sustainability challenges. This chapter provides insight one researcher’s experiences engaging stakeholders in discussions about the relationship between a place-based university programme for sustainability and local sustainability agendas. The chapter reveals the struggles experienced by both researcher and participants in articulating what places and the local region means to both individuals and to the programme. The findings provide an important insight into how researchers studying place need to be cognisant of the limitations and flexibility of language when engaging research participants in discussing the relationship between place, sustainability, and entrepreneurship.

Details

Nurturing Modalities of Inquiry in Entrepreneurship Research: Seeing the World Through the Eyes of Those Who Research
Type: Book
ISBN: 978-1-80262-186-0

Keywords

Book part
Publication date: 31 October 2023

Paul Oslington

I suggest that the search for Adam Smith’s theodicy is likely to be in vain. The paper begins with a brief history of approaches to evil, emphasizing the context in which they…

Abstract

I suggest that the search for Adam Smith’s theodicy is likely to be in vain. The paper begins with a brief history of approaches to evil, emphasizing the context in which they arose, and the questions authors were addressing. Approaches most relevant to Adam Smith include those of Augustine and Calvin, and the early modern theodicies of Leibniz, Samuel Clarke and William King, as well as the attacks on them by Bayle and Voltaire. Scottish Enlightenment writers were not terribly interested in theodicy, though Hutcheson and Kames did devote space to their versions of problems of evil. David Hume’s Dialogues on Natural Religion are often taken to be classic statement of the problem of theodicy and argument against religious belief, but his concern was to demolish rationalistic theodicies rather than religious belief or practice. The paper then turns to Smith’s writings, considering similarities and differences to these approaches to evil. Smith emphasizes the wisdom and beneficence of God, and that evils we observe are part of a larger providential plan. He makes no attempt to justify the God in the face of evil, and in this respect Smith shares more with Augustine and Calvin than he does with the early modern theodicists. Smith’s approach to evil is simple and ameliorative. Smith’s approach contrasts with early nineteenth century English political economists, from Malthus onwards, for whom theodicy was important. Whatever view we take of the theodicists project of justifying an all-powerful and good God in the face of evil may, we still struggle to make sense of economic suffering and evil.

Details

Research in the History of Economic Thought and Methodology: Including a Symposium on Religion, the Scottish Enlightenment, and the Rise of Liberalism
Type: Book
ISBN: 978-1-83549-517-9

Keywords

Book part
Publication date: 22 August 2023

Richard Hayes

Project Ireland 2040, announced as ‘one vision for one country’, is the spatial plan for Ireland's development for the coming decades. The plan assigns a particular role to…

Abstract

Project Ireland 2040, announced as ‘one vision for one country’, is the spatial plan for Ireland's development for the coming decades. The plan assigns a particular role to Ireland's cities outside Dublin, including Waterford. This chapter considers the place of Waterford in that national strategy and examines that role as an expression of a neoliberal ‘turn’ in Irish planning. Waterford is, in many senses, as will be shown, unexceptional in modern, Western cities; the chapter therefore in considering Waterford also will illuminate some aspects of the planning of other European cities.

Details

Urban Planning for the City of the Future
Type: Book
ISBN: 978-1-80455-216-2

Keywords

Article
Publication date: 14 September 2023

Richard Noel Canevez, Jenifer Sunrise Winter and Joseph G. Bock

This paper aims to explore the technologization of peace work through “remote support monitors” that use social and digital media technologies like social media to alert local…

Abstract

Purpose

This paper aims to explore the technologization of peace work through “remote support monitors” that use social and digital media technologies like social media to alert local violence prevention actors to potentially violent situations during demonstrations.

Design/methodology/approach

Using a distributed cognition lens, the authors explore the information processing of monitors within peace organizations. The authors adopt a qualitative thematic analysis methodology composed of interviews with monitors and documents from their shared communication and discussion channels. The authors’ analysis seeks to highlight how information is transformed between social and technical actors through the process of monitoring.

Findings

The authors’ analysis identifies that the technologization of monitoring for violence prevention to assist nonviolent activists produces two principal and related forms of transformation: appropriation and hidden attributes. Monitors “appropriate” information from sources to fit new ends and modes of representation throughout the process of detection, verification and dissemination. The verification and dissemination processes likewise render latent supporting informational elements, hiding the aggregative nature of information flow in monitoring. The authors connect the ideas of appropriation and hidden attributes to broader discourses in surveillance and trust that challenge monitoring and its place in peace work going forward.

Originality/value

To the best of the authors’ knowledge, this study is the first to focus on the communicative and information processes of remote support monitors. The authors demonstrate that adoption of social and digital media information of incipient violence and response processes for its mitigation suggests both a social and technical precarity for the role of monitoring.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Content available
Book part
Publication date: 23 August 2023

Julian Molina

Abstract

Details

The First British Crime Survey
Type: Book
ISBN: 978-1-80382-275-4

1 – 10 of 121