Search results
1 – 10 of 116Aryaning Arya Kresna, Pamerdi Giri Wiloso, Wilson Therik and Willi Toisuta
The paper aims is to see why social conflict caused by class segregation did not occur in Gading Serpong? What factors prevent conflict from occurring? This research seeks to find…
Abstract
Purpose
The paper aims is to see why social conflict caused by class segregation did not occur in Gading Serpong? What factors prevent conflict from occurring? This research seeks to find the causes of the nonoccurrence of social conflict due to class segregation in the Gading Serpong cluster area and explore the factors that restrain conflict there.
Design/methodology/approach
This research is qualitative research with data collection techniques through in-depth interviews with several parties identified as brokerages in the research object area. In this context, one of the media and analytical tools is to recognize agents or brokers who connect two groups of people. Brokerage occurs in sectors, patterns or forms of informal, personal relationships; to understand it, one must pay close attention to micro-level relationships and social psychological processes. However, brokerage can have a significant impact on macro-level social relations, as it is generally associated with social integration processes.
Findings
The lack of involvement of developers in overcoming social conflicts that occur between Gading Serpong natives and migrants in Gading Serpong housing has given rise to new actors. These new actors are what we can call brokers, where they have a role as brokers who are able to connect between migrants and natives in the Gading Serpong area. The broker phenomenon is actually familiar in academia, where in practice the broker acts as someone who is able to find solutions to problems. The broker is the reason even social segregation is created between migrant citizens and native citizens in Gading Serpong but never becomes a conflict between them.
Research limitations/implications
Even if the brokerage phenomenon is the reason why there is no conflict over social segregation brokerage is not the only factor in this nonconflict segregation. Therefore, to cover the larger area of these suburban segregation problems, there must be further research on this topic.
Practical implications
The practical implication of this research is to encourage the housing developers that create urban housing, such as clusters or other gated communities, to evaluate the social factors, such as potential segregation and conflict management. Also to encourage the developers to get involved and create some social engineering systems, like brokerage, market and other social agents, to create some nonconflict segregation or even more inclusive communities.
Originality/value
This research is uncovering the main reason why social segregation between migrant and native people in Gading Serpong, which could potentially lead to conflict, is never a conflict. The main reason is social actors like brokerage.
Details
Keywords
Basmah Almekhled and Helen Petrie
This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…
Abstract
Purpose
This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.
Design/methodology/approach
Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.
Findings
This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.
Research limitations/implications
One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.
Originality/value
This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.
Details
Keywords
The purpose of this paper is to scrutinise the effectiveness of four derivative exchanges’ enforcement efforts since 2007. These exchanges include the Commodity Exchange Inc. and…
Abstract
Purpose
The purpose of this paper is to scrutinise the effectiveness of four derivative exchanges’ enforcement efforts since 2007. These exchanges include the Commodity Exchange Inc. and ICE Futures US from the United States and ICE Futures Europe and the London Metal Exchange from the UK.
Design/methodology/approach
The paper examines 799 enforcement notices published by four exchanges through a behavioural science lens: HUMANS conceived by Hunt (2023) in Humanizing Rules: Bringing Behavioural Science to Ethics and Compliance.
Findings
The paper finds the effectiveness of the exchanges’ enforcement efforts to be a mixed picture as financial markets transition from the digital to artificial intelligence era. Humans remain a key cog in the wheel of market participants’ trading operations, albeit their roles have changed. Despite this, some elements of exchanges’ enforcement regimes have not kept pace with the move from floor to remote trading. However, in other respects, their efforts are or should be, effective, at least in behavioural terms.
Research limitations/implications
The paper’s findings are arguably limited to exchanges based in Anglophone jurisdictions. The information published by the exchanges is variable, making “like-for-like” comparisons difficult in some areas.
Practical implications
The paper makes several recommendations that, if adopted, could help exchanges to increase the potency of their enforcement programmes.
Originality/value
A key aim of the paper is to shift the lens through which the debate concerning the efficacy of exchange-level oversight is conducted. Hitherto, a legal lens has been used, whereas this paper uses a behavioural lens.
Details
Keywords
Sunil D. Santha, Devisha Sasidevan, Atul Raman, Khadeeja Naja Ali, Soofiya Yoosuf, Deepankar Panda and Gauri Shenoy
This paper showcases how the PAR embedded in posthumanist perspectives enabled us to navigate several complexities in the field through methodological situatedness and pluralism…
Abstract
Purpose
This paper showcases how the PAR embedded in posthumanist perspectives enabled us to navigate several complexities in the field through methodological situatedness and pluralism. It also attempts to critically outline the drivers and barriers that shaped our capacities to engage with the PAR.
Design/methodology/approach
The Tamil Nadu state in the Bay of Bengal along the southeast coast of India is one of the six regions in the world where severe tropical cyclones originate throughout the year. Storm surges in this region are well known for their destructive potential due to strong winds and heavy rainfall. This paper describes our participatory action research (PAR) journey towards strengthening grassroots action by providing access to safe and affordable housing for cyclone-impacted households (CIHs) in the Villupuram district of Tamil Nadu, India. The PAR was guided by an adaptive innovation model (AIM) that draws inspiration from posthumanism, action research and reflective practice traditions.
Findings
The insights from the PAR insist that we must recognise and work with diverse knowledge systems and situated practices to develop meaningful disaster risk reduction (DRR) and climate adaptation strategies. Our approach has to be rooted in the lived experiences of various vulnerable groups, their entanglements with nature and their everyday struggles of interacting with a complex social-ecological system.
Originality/value
This paper is an outcome of a PAR in a cyclone-impacted village in Tamil Nadu, India. The discussions and findings of the paper are original in nature and have not been published elsewhere.
Details
Keywords
Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.
Abstract
Purpose
Groups of students were enrolled in a course that sought to produce a three-phase theoretical model over three semesters.
Design/methodology/approach
A design project to comprehensively address school violence was launched at a university in eastern Pennsylvania.
Findings
This article updates the recent and most critical finding of the project by illuminating specific implications of the importance of teacher training and the development toward competence in recognition of children who are emotionally and psychologically injured through proactive measures such as screening for emotional and psychological well-being.
Research limitations/implications
Although the model has not been tested, screening to identify those in need of emotional support and training to support teachers is clear. Screening and training offer important opportunities to help learners build skills toward resilience to soften the effects of trauma.
Practical implications
A view of the “whole child” with regard to academic success could further foster social and emotional development.
Social implications
Early intervention can prevent the onset of symptoms associated with posttraumatic stress and related disorders. This effort alone may significantly reduce the uncomfortable incidences and perhaps ultimate prevention of the violence that is perpetuated among children.
Originality/value
Preliminary research supports a continued conversation regarding effective tools to find children emotionally and psychologically at-risk, which allows teachers an opportunity for timely emotional and psychological interventions.
Details
Keywords
Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…
Abstract
Purpose
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.
Design/methodology/approach
Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.
Findings
Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.
Originality/value
Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.
Details
Keywords
Jane Andrew and Max Baker
This study explores a hegemonic alliance and the role of relational forms of accounting and accountablity in the making of contemporary capitalism.
Abstract
Purpose
This study explores a hegemonic alliance and the role of relational forms of accounting and accountablity in the making of contemporary capitalism.
Design/methodology/approach
We use the WikiLeaks “Cablegate” documents to provide an account of the detailed machinations between interest groups (corporations and the state) that are constitutive of hegemonic activity.
Findings
Our analysis of the “Cablegate” documents shows that the US and Chevron were crafting a central role for Turkmenistan and its president on the global political stage as early as 2007, despite offical reporting beginning only in 2009. The documents exemplify how “accountability gaps” occlude the understanding of interdependence between capital and the state.
Research limitations/implications
The study contributes to a growing idea that official accounts offer a fictionalized narrative of corporations as existing independently, and thus expands the boundaries associated with studying multinational corporate activities to include their interdependencies with the modern state.
Social implications
The study traces how global capitalism extends into new territories through diplomatic channels, as a strategic initiative between powerful state and capital interests, arguing that the outcome is the empowerment of authoritarian states at the cost of democracy.
Originality/value
The study argues that previous accounting and accountability research has overlooked the larger picture of how capital and the state work together to secure a mutual hegemonic interest. We advocate for a more complete account of these activities that circumvents official, often restricted, views of global capitalism.
Details
Keywords
Letícia Oestreich, Álvaro Neuenfeldt Júnior and Alejandro Ruiz-Padillo
Unplanned urban mobility causes negative effects on the population and the environment. This study aims to understand how higher education institutions (HEIs) are managing the…
Abstract
Purpose
Unplanned urban mobility causes negative effects on the population and the environment. This study aims to understand how higher education institutions (HEIs) are managing the transportation issues related to their activities and how they are implementing actions towards more sustainable practices in this regard.
Design/methodology/approach
A systematic review and bibliometric analysis were performed using the Proknow-C method, and the bibliographic portfolio was evaluated to answer guiding questions about distribution of articles over the years and around the world, the most relevant and frequent topics, the travel behavior of university life and the main methodologies used. The meta-analysis was modeled using a programming language in R to execute Bibliometrix package.
Findings
Sharing systems, active transport, public transport, urban planning, car parking management and travel behavior are the most relevant topics related to sustainable mobility in HEIs. Different strategies to reduce car use are adopted, and the geographic location of the university and the availability of housing and shopping services in close proximity directly influence travel patterns. As a result, seven guidelines and strategic actions associated were proposed to promote the engagement of institutions in the development of sustainable transport and guide future studies about new solutions to promote sustainable university commutes.
Originality/value
This paper presents a new perspective by performing a critical literature review based on the experiences reported by several isolated studies on the subject. Initiatives of sustainable transport guidelines can be used by academics, urban planners, higher education administrators and other stakeholders to make universities more environmentally friendly, inclusive and accessible.
Details
Keywords
Tulsi Pawan Fowdur and Ashven Sanghan
The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical…
Abstract
Purpose
The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical appliance and transfer it securely to a local server for energy analytics such as forecasting.
Design/methodology/approach
The data capture system is composed of two current transformer (CT) sensors connected to two different electrical appliances. The CT sensors send the power readings to two Arduino microcontrollers which in turn connect to a Raspberry-Pi for aggregating the data. Blockchain is then enabled onto the Raspberry-Pi through a Java API so that the data are transmitted securely to a server. The server provides real-time visualization of the data as well as prediction using the multi-layer perceptron (MLP) and long short term memory (LSTM) algorithms.
Findings
The results for the blockchain analysis demonstrate that when the data readings are transmitted in smaller blocks, the security is much greater as compared with blocks of larger size. To assess the accuracy of the prediction algorithms data were collected for a 20 min interval to train the model and the algorithms were evaluated using the sliding window approach. The mean average percentage error (MAPE) was used to assess the accuracy of the algorithms and a MAPE of 1.62% and 1.99% was obtained for the LSTM and MLP algorithms, respectively.
Originality/value
A detailed performance analysis of the blockchain-based transmission model using time complexity, throughput and latency as well as energy forecasting has been performed.
Details
Keywords
Jawahitha Sarabdeen and Mohamed Mazahir Mohamed Ishak
General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the…
Abstract
Purpose
General Data Protection Regulation (GDPR) of the European Union (EU) was passed to protect data privacy. Though the GDPR intended to address issues related to data privacy in the EU, it created an extra-territorial effect through Articles 3, 45 and 46. Extra-territorial effect refers to the application or the effect of local laws and regulations in another country. Lawmakers around the globe passed or intensified their efforts to pass laws to have personal data privacy covered so that they meet the adequacy requirement under Articles 45–46 of GDPR while providing comprehensive legislation locally. This study aims to analyze the Malaysian and Saudi Arabian legislation on health data privacy and their adequacy in meeting GDPR data privacy protection requirements.
Design/methodology/approach
The research used a systematic literature review, legal content analysis and comparative analysis to critically analyze the health data protection in Malaysia and Saudi Arabia in comparison with GDPR and to see the adequacy of health data protection that could meet the requirement of EU data transfer requirement.
Findings
The finding suggested that the private sector is better regulated in Malaysia than the public sector. Saudi Arabia has some general laws to cover health data privacy in both public and private sector organizations until the newly passed data protection law is implemented in 2024. The finding also suggested that the Personal Data Protection Act 2010 of Malaysia and the Personal Data Protection Law 2022 of Saudi Arabia could be considered “adequate” under GDPR.
Originality/value
The research would be able to identify the key principles that could identify the adequacy of the laws about health data in Malaysia and Saudi Arabia as there is a dearth of literature in this area. This will help to propose suggestions to improve the laws concerning health data protection so that various stakeholders can benefit from it.
Details