Search results

1 – 10 of 801
Open Access
Article
Publication date: 26 September 2023

Kahuina Miller and Andrea Clayton

This study provides empirical evidence on the impact of the Panama Canal expansion (PCE) on the economies of Latin American and Caribbean (LAC) countries, particularly in light of…

Abstract

Purpose

This study provides empirical evidence on the impact of the Panama Canal expansion (PCE) on the economies of Latin American and Caribbean (LAC) countries, particularly in light of the emergence of larger container ships such as neo-Panamax and post-Panamax vessels.

Design/methodology/approach

This study uses the Bayesian structural time Series (BSTS) model to evaluate the economic effects of the PCE on 21 countries within the LAC region. It utilized the World Bank's gross domestic product (GDP) figures between 2000 and 2019 as the primary variable, alongside the human development index (HDI) (X1), container throughput (TEU) (X2) and unemployment rates (UNEMPL) (X3) covariates. This allowed a precise and robust approach to analyzing time series data while accounting for uncertainties and allowing the inclusion of various components and external factors.

Findings

The findings revealed that the PCE has a positive and statistically significant impact on most countries within the Caribbean Transshipment Triangle, ranging from 9.2% in Belize to 46% in Cuba. This suggests that the causal effect of the PCE on regional economies was not confined to any specific type of economy or geographical location within the LAC region. Where the growth rates were statistically insignificant, primarily in some Latin American countries, it coincided with countries that are primarily driven by exports and service industries, where bulk and oil tanker vessels are likely to be the main carriers for exports rather than container vessels.

Originality/value

The practical implications of this research are crucial for various stakeholders in the maritime industry and economic planning. The factors influencing economic growth resulting from investing in maritime activities are vital for decision-makers to create policies that lead to positive outcomes and sustainable development in regions and countries with flourishing maritime industries. The methodology and findings have significant implications for governments, managers, professionals, policy-makers and investors.

Details

Marine Economics and Management, vol. 6 no. 2
Type: Research Article
ISSN: 2516-158X

Keywords

Open Access
Article
Publication date: 3 July 2023

Howard Chitimira

It is important to note that insider trading is currently outlawed under the Securities Act 17 of 2004 (Chapter 24: 25) as amended (Securities Act) in Zimbabwe. This Act…

Abstract

Purpose

It is important to note that insider trading is currently outlawed under the Securities Act 17 of 2004 (Chapter 24: 25) as amended (Securities Act) in Zimbabwe. This Act enumerates some practices that may give rise to insider trading liability in the Zimbabwean financial markets. Nonetheless, numerous challenges, such as the lack of adequate financial resources, the lack of sufficient persons with the relevant skills and expertise on the part of the enforcement authorities, lack of political will, inadequacy of insider trading provisions, poor cooperation and collaboration between the relevant authorities and the ongoing coronavirus (Covid-19) pandemic have negatively impeded the effective regulation and combating of insider trading in Zimbabwe. To this end, the author explores the stated challenges and recommend measures that could be used by regulatory bodies and other relevant enforcement authorities to enhance the regulation and combating of insider trading in the Zimbabwean financial markets. This study aims to enhance the detection and combating of insider trading in Zimbabwe.

Design/methodology/approach

A qualitative research methodology is used through the analysis of relevant legislation and case law.

Findings

It is hoped that the findings and recommendations made in this study will be considered by the Zimbabwean policymakers.

Research limitations/implications

The study does not use empirical research methodology.

Practical implications

The findings and recommendations made in this study could enhance the combating of insider trading activities in Zimbabwe.

Social implications

The study seeks to curb insider trading in the Zimbabwean financial markets and financial institutions in the wake of the covid-19 pandemic-related regulatory and enforcement challenges.

Originality/value

The study provides original research on the regulation and combating of insider trading activities in Zimbabwe.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 6 February 2024

Daniel Cookman

This paper aims to discuss the adequacy of restrictive measures. Providing a synopsis of a global movement toward the imposition of target restrictive measures. Questioning the…

Abstract

Purpose

This paper aims to discuss the adequacy of restrictive measures. Providing a synopsis of a global movement toward the imposition of target restrictive measures. Questioning the success of targeted restrictive measures in obtaining behavioural change. Identifying a reversion to the implementation of wide ranging sectoral restrictive measures in an attempt to encourage immediate behavioural change. Accessing the success of using restrictive measures to encourage democratic regimes in Africa.

Design/methodology/approach

This study is a desktop research that examines European Parliament and Council issued Regulations for the jurisdictions of Iran, Russia and Belarus. Academic research is also used in identifying a pendulum swing by global legislatures with respect to the imposition of targeted measures to requiring the imposition of additional wide ranging sectoral measures.

Findings

Targeted measures can be circumvented using non-hostile third countries. Academic research identifies that wide reaching sectoral sanctions encourage regime change. Therefore, where targeted measures fail to give rise to their desired persuasive objectives. The legislator moves to introduce additional measures, also comprising of sectoral sanctions. Sectoral sanctions have been applied by the European Union in Iran, Russia and Belarus. The USA has taken measures to limit Russia ability to use Turkey as a transshipment hub. The African continent case study identifies the importance of creating an architecture founded on upholding positive governance and human rights standards. Failure to do so leads to a revolving system of authoritarian regimes, sanctioned by restrictive measures.

Originality/value

This paper is a desktop review composed by the author.

Details

Journal of Money Laundering Control, vol. 27 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Article
Publication date: 10 August 2023

Adrienne Heritier

This paper aims to conceptualize and empirically illustrate the challenges that financial market regulation presents to politicians and the organization tasked with specifying…

Abstract

Purpose

This paper aims to conceptualize and empirically illustrate the challenges that financial market regulation presents to politicians and the organization tasked with specifying regulations and supervising their implementation in the interest of users and consumers of financial instruments. It analyses the problem from the viewpoint of the governor's dilemma and the control/competence conflict, the linked problem of the rent-seeking of agents/intermediators and consumers of financial instruments. Political accountability problems are enhanced by the materiality of the technologies used, i.e. algo trading.

Design/methodology/approach

The paper theoretically conceptualizes and empirically illustrates the argument.

Findings

The paper finds that regulators of digitalized financial markets are faced with considerable problems and depend on private agents when regulating financial transactions. However, the new technological instruments also offer new possibilities for securing compliance.

Research limitations/implications

Further research should focus more in-depth on the cooperation between public and private actors in the specification and implementation of regulatory details. It should further investigate the conditions which allow regulators to use RegTech in the surveillance of financial firms.

Practical implications

Since financial market transactions are opaque for most users, the creation of more transparency is crucial to hold regulators accountable in their activity of surveillance of financial firms. New algorithm-based technologies may lend important support in doing so.

Originality/value

By linking the different analytical perspectives, i.e. the governor's dilemma vis-à-vis the intermediator or agent and the possible rent-seeking of intermediators, under the condition of a highly developed technology of financial transactions as well as the market structure, the paper offers new insights into the limits as well as new opportunities of regulating financial markets allowing for political accountability of regulators and financial firms.

Details

International Trade, Politics and Development, vol. 7 no. 3
Type: Research Article
ISSN: 2586-3932

Keywords

Open Access
Article
Publication date: 1 August 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1862

Abstract

Purpose

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective Security Education,Training and Awareness (SETA) programmes within organisations. Therefore, the purpose of this study is the questionable effectiveness of SETA programmes at changing employee behaviour and an absence of empirical studies on the critical success factors (CSFs) for SETA programme effectiveness.

Design/methodology/approach

This exploratory study follows a three-stage research design to give voice to practitioners with SETA programme expertise. Data is gathered in Stage 1 using semi-structured interviews with 20 key informants (the emergence of the CSFs), in Stage 2 from 65 respondents to a short online survey (the ranking of the CSFs) and in Stage 3 using semi-structured interviews with nine IS/cyber security practitioners (the emergence of the guiding principles). Using a multi-stage research design allows the authors to propose and evaluate the 11 CSFs for SETA programme effectiveness.

Findings

This study conducted a mean score analysis to evaluate the level of importance of each CSF within two independent groups of IS/cyber security professionals. This multi-stage analysis produces a ranked list of 11 CSFs for SETA programme effectiveness, while the difference in the rankings leads to the emergence of five CSF-specific guiding principles (to increase the likelihood of delivering an effective SETA programme within an organisational context). This analysis also reveals that most of the contradictions/differences in CSF rankings between IS/cyber security practitioners are linked to the design phase of the SETA programme life cycle. While two CSFs, “maintain quarterly evaluation of employee performance” (CSF-DS6) and “build security awareness campaigns” (CSF-EV1), represent the most significant contradiction in this study.

Originality/value

The 11 CSFs for SETA programme effectiveness, along with the five CSF-specific guiding principles, provide a greater depth of knowledge contributing to both theory and practice and lays the foundation for future studies. Therefore, the outputs of this study provide valuable insights on the areas that practice needs to get right to deliver effective SETA programmes.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 13 February 2023

Elham Rostami, Fredrik Karlsson and Shang Gao

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

1216

Abstract

Purpose

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

Design/methodology/approach

This study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden.

Findings

This study’s demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs.

Research limitations/implications

The proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process.

Practical implications

Practitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs.

Originality/value

The proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 11 October 2023

Murali Chari

The purpose of this paper is to make the case that ethical guardrails in emerging technology businesses are inadequate and to develop solutions to strengthen these guardrails.

Abstract

Purpose

The purpose of this paper is to make the case that ethical guardrails in emerging technology businesses are inadequate and to develop solutions to strengthen these guardrails.

Design/methodology/approach

Based on literature and first principles reasoning, the paper develops theoretical arguments about the fundamental purpose of ethical guardrails and how they evolve and then uses this along with the characteristics that distinguish emerging technology businesses to identify inadequacies in the ethical guardrails for emerging technology businesses and develop solutions to strengthen the guardrails.

Findings

The paper shows that the ethical guardrails for emerging technology businesses are inadequate and that the reasons for this are systematic. The paper also develops actionable recommendations to strengthen these guardrails.

Originality/value

The paper develops the novel argument that reasons for the inadequate ethical guardrails in emerging technology businesses are systematic and stem from the inadequacy of laws and regulations, inadequacy of boards and the focus of business executives.

Details

Journal of Ethics in Entrepreneurship and Technology, vol. 3 no. 2
Type: Research Article
ISSN: 2633-7436

Keywords

Open Access
Article
Publication date: 5 January 2023

Tadele Shimels and Lemma Lessa

Information systems' security is more critical than ever before since security threats are rapidly growing. Before putting in place information systems' security measures…

2089

Abstract

Purpose

Information systems' security is more critical than ever before since security threats are rapidly growing. Before putting in place information systems' security measures, organizations are required to determine the maturity level of their information security governance. Literature review reveals that there is no recent study on information systems' security maturity level of banks in Ethiopia. This study thus seeks to measure the existing maturity level and examine the security gaps in order to propose possible changes in Ethiopian private banking industry's information system security maturity indicators.

Design/methodology/approach

Four private banks are selected as a representative sample. The system security engineering capability maturity model (SSE-CMM) is used as the maturity measurement criteria, and the measurement was based on ISO/IEC 27001 information security control areas. The data for the study were gathered using a questionnaire.

Findings

A total of 93 valid questionnaires were gathered from 110 participants in the study. Based on the SSE-CMM maturity model assessment criteria the private banking industry's current maturity level is level 2 (repeatable but intuitive). Institutions have a pattern that is repeated when completing information security operations but its existence was not thoroughly proven and institutional inconsistency still exists.

Originality/value

This study seeks to measure the existing maturity level and examine the security gaps in order to propose possible changes in Ethiopian private banking industry's information system security maturity indicators. This topic has not been attempted previously in the context of Ethiopian financial sector.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 3 November 2023

Nermeen Bahnasy

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites…

Abstract

Purpose

The purpose of this study is to examine how the tourism economy affects local food availability, access, utilization and stability in dessert-prone agricultural heritage sites. Specifically, the study aims to explore the relationship between the tourism industry and local agricultural practices and how this connection influences food security in the Siwa Oasis, located in the Western Desert of Egypt.

Design/methodology/approach

The study employs a qualitative exploratory research design using in-depth interviews and focus groups to investigate the impact of the tourism economy on food security and identify potential benefits and limitations for food security in the region.

Findings

The research reveals that the tourism economy in Siwa Oasis has only a marginal contribution to food security. The study highlights a lack of a strong connection between the tourism industry and local agricultural practices within the heritage site. As a result, the potential benefits and synergies that could be achieved between tourism and agriculture have not been fully realized, leading to a limited impact on food stability.

Research limitations/implications

This study primarily relies on qualitative data from Siwa Oasis, Egypt, which may limit the generalizability of findings beyond this specific context. Additionally, while the study provides valuable insights into the complex relationship between tourism and food security, it does not quantitatively measure the magnitude of tourism's impact. Future research could incorporate quantitative methods for a more comprehensive understanding of this relationship in diverse desert-prone regions. Finally, the study highlights the need for more integrated approaches to enhance food security through tourism, but the specific strategies and policy recommendations require further investigation and adaptation to local contexts.

Practical implications

This study underscores the need for tourism development strategies that prioritize food security in desert-prone areas like Siwa Oasis. Policymakers and stakeholders should promote sustainable tourism practices that enhance local agriculture, create diversified income sources and foster equitable benefits for communities. Moreover, recognizing the seasonal nature of tourism, interventions to address food shortages during off-peak periods are crucial. Efforts should also focus on skill development and gender-inclusive opportunities within the tourism sector to ensure broader community participation. Additionally, collaborations between tourism and agriculture should be encouraged to optimize food availability and stability while preserving cultural food traditions.

Originality/value

This study adds original insights by examining the specific impact of the tourism economy on food security in dessert-prone agricultural heritage sites. The study's originality lies in its exploration of the untapped potential for synergy between the tourism and agricultural sectors and the implications for local food security. This research contributes to understanding how tourism can improve food security in specific contexts and provides valuable insights into sustainable development in heritage sites.

Details

Journal of Humanities and Applied Social Sciences, vol. 6 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Open Access
Article
Publication date: 19 January 2023

Helén Anderson, Tomas Müllern and Mike Danilovic

The purpose is to identify and explore barriers to overcome for developing collaborative innovation between a global service supplier and two of its industrial customers in Sweden.

2184

Abstract

Purpose

The purpose is to identify and explore barriers to overcome for developing collaborative innovation between a global service supplier and two of its industrial customers in Sweden.

Design/methodology/approach

The research had an action-based research approach in which the researchers were interacting and collaborating with the practitioners in the companies. The empirical part includes primary data from multiple interviews, and two workshops with dialogues with participants from the involved companies. The use of complementary data collection methods gave rich input to understanding the context for collaborative innovation, and to uncovering barriers, to develop solutions for collaborative innovation. The empirical barriers were analysed using theoretically derived barriers from a literature review. The analysis generated four broad themes of barriers which were discussed and led to conclusions and theoretical and practical implications on: the customer's safety culture, the business model, the parties' understanding of innovation and the management of collaborative innovation in supply chains.

Findings

The thematic analysis generated four broad themes: the customer's safety culture, the business model, the parties' understanding of innovation and the management of collaborative innovation. These themes where analysed using theoretically derived barriers from a literature review. The industrial context, the understanding of innovation and its management created barriers.

Originality/value

The unique access to the service supplier and its two independent industrial customers adds a rich contextual framing to the process of identifying and exploring the barriers to collaborative innovation. The conclusion emphasizes the importance of an industrial business context, the business logic in terms of business models and for the understanding and management of collaborative innovation.

Details

Business Process Management Journal, vol. 29 no. 8
Type: Research Article
ISSN: 1463-7154

Keywords

Access

Only Open Access

Year

Last 12 months (801)

Content type

1 – 10 of 801