Search results

1 – 10 of over 11000
To view the access options for this content please click here
Book part
Publication date: 12 January 2016

Andrew Schmitz and P. Lynn Kennedy

We discuss food security within the context of welfare economics. We review models of commodity price stabilization brought about by government storage, and/or the private…

Abstract

Purpose

We discuss food security within the context of welfare economics. We review models of commodity price stabilization brought about by government storage, and/or the private sector. We use data on the stocks of major commodities to discuss the implications of storage models on food security.

Methodology/approach

The impact of storage on food security is discussed within the context of welfare economics.

Findings

Storage is not necessarily a solution to solving long-term world food problems. Also, at times in history, countries such as the United States have accumulated large stocks of commodities such as wheat, which turned out to be a costly policy.

Social implications

While food insecurity is a major issue worldwide, the solution does not entirely lie in governments being heavily involved in managing and owning food stocks. The private sector manages stocks as a part of commercial transactions. The government’s role is to provide food from stockholdings in times of emergency situations.

Details

Food Security in a Food Abundant World
Type: Book
ISBN: 978-1-78560-215-3

Keywords

To view the access options for this content please click here
Article
Publication date: 2 January 2020

Qiuhui Xiao, Xiaotong Xu and Panpan Liu

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the…

Abstract

Purpose

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security status of electronic records preservation. Wuhan, the largest city in central China, serves as a case to investigate the preservation security of electronic records. Challenges to security are summarized, and solutions are proposed to support policy-developing and operational guidance. The paper aims to discuss these issues.

Design/methodology/approach

The Delphi method is applied to analyze the advice of nine experts, select survey items and design questionnaires. Data are collected from 34 archives in Wuhan through field surveys, oral interviews and e-mails, which are analyzed and illustrated with three representative cases.

Findings

Main achievements of electronic records preservation are concluded in the electronic records management system, carrier types and storage formats, and data backup. Problems are summarized as a lack of awareness and capability of defending against security risks, disaster recovery capability, and understanding of electronic record characteristics. Solutions are proposed as follows: carrying out regular security risk evaluation, adopting new technologies, implementing application-level backup, strengthening technology-related education and attracting more IT talent to join the archive discipline. In addition, it is critical to promote an understanding of the characteristics of electronic records.

Originality/value

This paper investigates the security status of electronic records in central China by surveys and case studies. Critical problems and corresponding solutions are raised to support policy-developing and operational guidance for the research and practice of all kinds of institutions that implement electronic records preservation.

Details

Library Hi Tech, vol. 39 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

To view the access options for this content please click here
Article
Publication date: 29 September 2020

Wenyuan Wang and Sira Yongchareon

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of…

Abstract

Purpose

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups. Further, the report will advise commercial applications and advice of SECaaS as an extended context to help firms make decisions.

Design/methodology/approach

This paper compares the SECaaS categories in Cloud Security Alliance (CSA) with the security clauses in ISO/IEC 27002:2013 to give a comprehensive analysis of those SECaaS categories. Reviewed from a number of related literature, this paper analyzes and categorizes SECaaS into three major groups including protective, detective and reactive based on security control perspectives. This study has discussed the three groups and their interplay to identify the key characteristics and problems that they aim to address.

Findings

This paper also adds new evidence to support a better understanding of the current and future challenges and directions for SECaaS. Also, the study reveals both the positive and negative aspects of SECaaS along with business cases. It advises on various sizes and domains of organizations to consider SECaaS as one of their potential security approaches.

Originality/value

SECaaS has been demonstrated to be one of the increasingly popular ways to address security problems in Cloud computing. As a new concept, SECaaS could be treated as integrated security means and delivered as a service module in the Cloud. However, it is still in infancy and not very widely investigated. Recent studies suggest that SECaaS is an efficient solution for Cloud and real industries. However, shortcomings of SECaaS have not been well-studied and documented. Moreover, reviewing the existing research, researchers did not classify the SECaaS-related categories.

Details

International Journal of Web Information Systems, vol. 16 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

To view the access options for this content please click here
Article
Publication date: 17 June 2021

Amos Shibambu and Ngoako Solomon Marutha

The purpose of this paper is to investigate a framework for management of digital records on the cloud in South Africa.

Abstract

Purpose

The purpose of this paper is to investigate a framework for management of digital records on the cloud in South Africa.

Design/methodology/approach

This qualitative case study used semi-structured interviews and document analysis to collect data from regulatory documents, records practitioners and chief information officers in the national government departments in South Africa.

Findings

This study reveals that despite the advent of cloud computing, government is still struggling with manual paper-based records challenges, as they have not developed a government-owned cloud in which to manage and dispose records.

Practical implications

Technological advancements have brought about dramatic changes to the management and disposition of records since cloud computing emerged. The traction gained by cloud computing influences how records are managed and disposed in the cloud storage. Currently, the South African Government manages and disposes records in the government premises as stipulated by the National Archives and Records Service of South Africa Act (1996). This is enforced by the National Archives and Records Service of South Africa, which is the government records regulator because records are on paper-based, microfilms and audio-visual formats. It is hoped that the recommendations and framework proposed in this study may assist the government and related sectors in the adoption and implementation of the cloud computing system for records management and disposal. This may assist in resolving challenges such as missing files, damaged records and archives and long turnaround time for retrieval of records.

Social implications

In South Africa, the digital records are securely stored in storage mediums such as hard drives and USBs, to mention but a few. In addition to digital obsolescence faced by the storage mediums, global access to information is hindered because information is limited to those who can visit the archival holdings. The alternative option is to manage and dispose of records in the cloud. The framework and recommendations in this study may also assist in improving information, archives and records management policies and service delivery to the community at large. The framework proposed may be applied as a theory for framing future studies in the same area of cloud computing and used as a resource to guide other future studies and policymakers.

Originality/value

This study provides a framework for management of digital records on the cloud in South Africa. It also proposes the promulgation of the Cloud Act to promote unlimited access to state heritage, regardless of time and location. This study is framed on the Digital Curation Centre Life Cycle Model.

Details

Information Discovery and Delivery, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-6247

Keywords

To view the access options for this content please click here
Article
Publication date: 3 March 2020

Luiz Antonio Joia and Gustavo Marchisotti

This study aims to identify the social representation of cloud computing from the perspective of Information Technology (IT) professionals in emerging countries, comparing…

Abstract

Purpose

This study aims to identify the social representation of cloud computing from the perspective of Information Technology (IT) professionals in emerging countries, comparing it with the extant literature on this subject.

Design/methodology/approach

Data were collected from IT professionals in Brazil, which was used as a proxy for the emerging countries’ context related to cloud computing. Social Representation Theory was then applied to analyze the data.

Findings

Mismatches between theory and practice on cloud computing make it clear that most of the current scientific literature on cloud computing is, to a great extent, based on the context of developed countries rather than on the context of emerging ones.

Research limitations/implications

Errors of inference may have been made during the categorization of the words evoked. Furthermore, Brazil was used as a proxy for the emerging countries’ context related to cloud computing.

Practical implications

IT professionals in emerging countries have quite an operational view of cloud computing. Thus, companies in these countries have to align cloud computing better with new business models and corporate strategies in order to take advantage of the transformational impacts of cloud computing.

Originality/value

IT professionals in emerging countries have failed to notice the strategic value of cloud computing, the new business models enabled by same, the privacy issues related to it and the impact cloud computing adoption can have on the IT costs of an organization. Moreover, mobility can be a paramount issue related to cloud computing in emerging countries – a fact thus far overlooked by academia.

Details

Internet Research, vol. 30 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 31 July 2020

Lurdes D. Patrício and João J. Ferreira

The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms…

Abstract

Purpose

The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the major cause of personal and organizational data losses. Blockchain emerges as a promised technology to ensure higher levels of data encryption and security. Thus, this study aims to develop a systematic literature review analyzing the previous literature and to purpose of a framework to better understand the process of blockchain security.

Design/methodology/approach

The 75 articles reviewed were obtained through the Scopus database and a bibliographic-coupling analysis was developed to identify the main themes of this research area, via VOSviewer software.

Findings

The results enable the categorization of the existing literature revealing four clusters: 1) feasibility, 2) fintech and cryptocurrency, 3) data trust and share and 4) applicability. Blockchain technology is still in its early stage of development and counting on researchers in security and cryptography to take it further to new highs, to allow its applicability to different areas and in long-term scenarios.

Originality/value

This systematic literature creates a base to reduce the blockchain security literature gap. In addition, it provides a framework that enables the scientific community to access the main subjects discussed and the articulation between concepts. Furthermore, it enhances the state-of-the-art literature on blockchain security and proposes a future research agenda.

Details

Journal of Advances in Management Research, vol. 18 no. 1
Type: Research Article
ISSN: 0972-7981

Keywords

To view the access options for this content please click here
Article
Publication date: 8 January 2021

S. Vaithyasubramanian and R. Sundararajan

Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often…

Abstract

Purpose

Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in all authentication process, as the usage of computing facilities and electronic devices have developed hugely to access networks. Over the years with the increase in numerous Web developments and internet applications, each platform needs ID and password validation for individual users.

Design/methodology/approach

In the technological development of cloud computing, in recent times, it is facing security issues. Data theft, data security, denial of service, patch management, encryption management, key management, storage security and authentication are some of the issues and challenges in cloud computing. Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password. Markov passwords – a rule-based password formation are created or generated by using Markov chain. Representation of Markov password formation can be done by state space diagram or transition probability matrix. State space classification of Markov chain is one of the basic and significant properties. The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper. Analysis on strength of obvious password of length eight has shown range of 7%–9% although the converted Markov password has shown more than 82%. As an effective methodology, this password authentication can be implemented in cloud portal and password login validation process.

Findings

The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper.

Originality/value

Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password.

Details

International Journal of Pervasive Computing and Communications, vol. 17 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 9 January 2020

Opeoluwa Ore Akinsanya, Maria Papadaki and Lingfen Sun

The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care…

Abstract

Purpose

The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics. This study aims to expand the domain of health-care cyber security maturity model by including cloud-specific aspects than is usually seen in the literature.

Design/methodology/approach

The intended use of the proposed model was demonstrated using the evaluation method – “construct validity test” as the paper’s aim was to assess the final model and the output of the valuation. The study involved a literature-based case study of a national health-care foundation trust with an overall view because the model is assessed for the entire organisation. The data were complemented by examination of hospitals’ cyber security internal processes through web-accessible documents, and identified relevant literature.

Findings

The paper provides awareness about how organisational-related challenges have been identified as a main inhibiting factor for the adoption of cloud computing in health care. Regardless of the remunerations of cloud computing, its security maturity and levels of adoption varies, especially in health care. Maturity models provide a structure towards improving an organisation’s capabilities. It suggests that although several cyber security maturity models and standards resolving specific threats exist, there is a lack of maturity models for cloud-based health-care security.

Research limitations/implications

Due to the selected research method, the research results may lack generalizability. Therefore, future research studies can investigate the propositions further. Another is that the current thresholds were determined empirically, although it worked for the case study assessment. However, to establish more realistic threshold levels, there is a need for more validation of the model using more case studies.

Practical implications

The paper includes maturity model for the assessment management and improvement of the security posture of a health-care organisation actively using cloud. For executives, it provides a detailed security assessment of the eHealth cloud to aid in decision making. For security experts, its quantitative metrics support proactive and reactive processes.

Originality/value

The paper fulfils a recognised requirement for security maturity model focussed on health-care cloud. It could be extended to resolve evolving cyber settings.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article
Publication date: 2 October 2017

Stacy Brody

The purpose of this paper is to profile various types of Web-based tools to facilitate research collaboration within and across institutions.

Abstract

Purpose

The purpose of this paper is to profile various types of Web-based tools to facilitate research collaboration within and across institutions.

Design/methodology/approach

Various Web-based tools were tested by the author. Additionally, tutorial videos and guides were reviewed.

Findings

There are various free and low-cost tools available to assist in the collaborative research process, and librarians are well-positioned to facilitate their usage.

Practical implications

Librarians and researchers will learn about various types of tools available at free or at low cost to fulfill needs of the collaborative research process.

Social implications

As the tools highlighted are either free or of low cost, they are also valuable to start-ups and can be recommended for entrepreneurs.

Originality/value

As the realm of Web-based collaborative tools continues to evolve, the options must be continually revisited and reviewed for currency.

Details

Library Hi Tech News, vol. 34 no. 8
Type: Research Article
ISSN: 0741-9058

Keywords

To view the access options for this content please click here
Article
Publication date: 11 September 2018

Harini Alladi

The purpose of this paper is to outline the marketing history of the Godrej Storwel steel cupboard before India’s economic liberalisation in 1991 to find possible reasons…

Abstract

Purpose

The purpose of this paper is to outline the marketing history of the Godrej Storwel steel cupboard before India’s economic liberalisation in 1991 to find possible reasons for the brand’s iconic status and strong presence in the Indian public memory.

Design/methodology/approach

The paper uses archival material, secondary sources and the idea of cultural branding to analyse the marketing strategies used at various points in the history of Godrej Storwel.

Findings

Godrej Storwel found cultural context in the two decades following India’s independence (1947) as a product that addressed the social and economic anxieties of the country, as well as embodied its aspirations at the time. In the following decades up to 1991, the product did not find similar cultural resonance with its consumers.

Research limitations/implications

The unavailability of sales records of the Godrej steel cupboards meant that certain conclusions could not be made concrete.

Social implications

Because Godrej Storwel has had such a long lifespan, it serves as a useful medium through which changing trends in marketing in India can be viewed. The paper is a good point of reference for those researching the steel industry, storage product histories and marketing in India and could encourage corporates to archive their histories.

Originality/value

While a lot of nostalgia surrounds the Godrej Storwel in India, this is the first work that attempts to place the product and its marketing strategies in the context of Indian industry, culture and consumption.

Details

Journal of Historical Research in Marketing, vol. 10 no. 3
Type: Research Article
ISSN: 1755-750X

Keywords

1 – 10 of over 11000