Search results

1 – 10 of over 12000
Article
Publication date: 2 January 2020

Qiuhui Xiao, Xiaotong Xu and Panpan Liu

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security…

2791

Abstract

Purpose

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security status of electronic records preservation. Wuhan, the largest city in central China, serves as a case to investigate the preservation security of electronic records. Challenges to security are summarized, and solutions are proposed to support policy-developing and operational guidance. The paper aims to discuss these issues.

Design/methodology/approach

The Delphi method is applied to analyze the advice of nine experts, select survey items and design questionnaires. Data are collected from 34 archives in Wuhan through field surveys, oral interviews and e-mails, which are analyzed and illustrated with three representative cases.

Findings

Main achievements of electronic records preservation are concluded in the electronic records management system, carrier types and storage formats, and data backup. Problems are summarized as a lack of awareness and capability of defending against security risks, disaster recovery capability, and understanding of electronic record characteristics. Solutions are proposed as follows: carrying out regular security risk evaluation, adopting new technologies, implementing application-level backup, strengthening technology-related education and attracting more IT talent to join the archive discipline. In addition, it is critical to promote an understanding of the characteristics of electronic records.

Originality/value

This paper investigates the security status of electronic records in central China by surveys and case studies. Critical problems and corresponding solutions are raised to support policy-developing and operational guidance for the research and practice of all kinds of institutions that implement electronic records preservation.

Details

Library Hi Tech, vol. 39 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 6 January 2022

Ahmad Latifian

Big data has posed problems for businesses, the Information Technology (IT) sector and the science community. The problems posed by big data can be effectively addressed using…

Abstract

Purpose

Big data has posed problems for businesses, the Information Technology (IT) sector and the science community. The problems posed by big data can be effectively addressed using cloud computing and associated distributed computing technology. Cloud computing and big data are two significant past-year problems that allow high-efficiency and competitive computing tools to be delivered as IT services. The paper aims to examine the role of the cloud as a tool for managing big data in various aspects to help businesses.

Design/methodology/approach

This paper delivers solutions in the cloud for storing, compressing, analyzing and processing big data. Hence, articles were divided into four categories: articles on big data storage, articles on big data processing, articles on analyzing and finally, articles on data compression in cloud computing. This article is based on a systematic literature review. Also, it is based on a review of 19 published papers on big data.

Findings

From the results, it can be inferred that cloud computing technology has features that can be useful for big data management. Challenging issues are raised in each section. For example, in storing big data, privacy and security issues are challenging.

Research limitations/implications

There were limitations to this systematic review. The first limitation is that only English articles were reviewed. Also, articles that matched the keywords were used. Finally, in this review, authoritative articles were reviewed, and slides and tutorials were avoided.

Practical implications

The research presents new insight into the business value of cloud computing in interfirm collaborations.

Originality/value

Previous research has often examined other aspects of big data in the cloud. This article takes a new approach to the subject. It allows big data researchers to comprehend the various aspects of big data management in the cloud. In addition, setting an agenda for future research saves time and effort for readers searching for topics within big data.

Details

Kybernetes, vol. 51 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 31 October 2023

Eziaku Onyeizu Rasheed, Maryam Khoshbakht and George Baird

This paper aims to illustrate the extensive benefits of qualitative data analysis as a rarely undertaken process in post-occupancy evaluation surveys. As a result, there is…

Abstract

Purpose

This paper aims to illustrate the extensive benefits of qualitative data analysis as a rarely undertaken process in post-occupancy evaluation surveys. As a result, there is limited evidence of what occupants say about their buildings, especially for operational parameters, as opposed to how they rate them. While quantitative analyses provide useful information on how workers feel about workplace operational factors, qualitative analyses provide richer information on what aspects of the workplace workers identify as influential to their comfort, well-being and productivity.

Design/methodology/approach

The authors analysed 6,938 comments from office buildings worldwide on workers’ perception of workplace operational factors: design, storage, needs, space at desks and storage in their work environments. These factors were analysed based on the buildings’ design intent and use, and the associated comments were coded into positive, negative and balanced comments. The authors used a combination of coding, descriptive analysis, content analysis and word cloud to dissect the comments.

Findings

The findings showed that whereas workers rated these operational factors favourably, there were significantly more negative comments about each factor. Also, the Chi-square test showed a significant association (p < 0.01) between the satisfaction scale and the type of comments received for all the operational factors. This means that when a factor is rated high in the satisfaction score (5–7), there were fewer negative and more positive comments and vice versa. The word cloud analysis highlighted vital aspects of the office environment the workers mostly commented on, such as open plan design, natural lighting, space and windows, toilets, facilities, kitchens, meeting room booking systems, storage and furniture.

Research limitations/implications

This study highlights the importance of dissecting building occupants’ comments as integral to building performance monitoring and measurement. These emphasise the richness and value of respondents’ comments and the importance of critically analysing them. A limitation is that only 6,938 comments were viable for analysis because most comments were either incomplete with no meaning or were not provided. This underlines the importance of encouraging respondents to comment and express their feelings in questionnaire surveys. Also, the building use studies questionnaire data set presents extensive opportunities for further analyses of interrelationships between demographics, building characteristics and environmental and operational factors.

Practical implications

The findings from this study can be applied to future projects and facility management to maintain and improve office buildings throughout their life cycle. Also, these findings are essential in predicting the requirements of future workplaces for robust workplace designs and management.

Originality/value

The authors identified specific comments on the performance of workplaces across the globe, showing similarities and differences between sustainable, conventional, commercial and institutional buildings. Specifically, the analysis showed that office workers’ comments do not always corroborate the ratings they give their buildings. There was a significantly higher percentage of negative comments than positive comments despite the high satisfaction scores of the operational factors.

Details

Facilities , vol. 42 no. 3/4
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 29 September 2020

Wenyuan Wang and Sira Yongchareon

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups…

Abstract

Purpose

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups. Further, the report will advise commercial applications and advice of SECaaS as an extended context to help firms make decisions.

Design/methodology/approach

This paper compares the SECaaS categories in Cloud Security Alliance (CSA) with the security clauses in ISO/IEC 27002:2013 to give a comprehensive analysis of those SECaaS categories. Reviewed from a number of related literature, this paper analyzes and categorizes SECaaS into three major groups including protective, detective and reactive based on security control perspectives. This study has discussed the three groups and their interplay to identify the key characteristics and problems that they aim to address.

Findings

This paper also adds new evidence to support a better understanding of the current and future challenges and directions for SECaaS. Also, the study reveals both the positive and negative aspects of SECaaS along with business cases. It advises on various sizes and domains of organizations to consider SECaaS as one of their potential security approaches.

Originality/value

SECaaS has been demonstrated to be one of the increasingly popular ways to address security problems in Cloud computing. As a new concept, SECaaS could be treated as integrated security means and delivered as a service module in the Cloud. However, it is still in infancy and not very widely investigated. Recent studies suggest that SECaaS is an efficient solution for Cloud and real industries. However, shortcomings of SECaaS have not been well-studied and documented. Moreover, reviewing the existing research, researchers did not classify the SECaaS-related categories.

Details

International Journal of Web Information Systems, vol. 16 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 17 June 2021

Amos Shibambu and Ngoako Solomon Marutha

The purpose of this paper is to investigate a framework for management of digital records on the cloud in South Africa.

1964

Abstract

Purpose

The purpose of this paper is to investigate a framework for management of digital records on the cloud in South Africa.

Design/methodology/approach

This qualitative case study used semi-structured interviews and document analysis to collect data from regulatory documents, records practitioners and chief information officers in the national government departments in South Africa.

Findings

This study reveals that despite the advent of cloud computing, government is still struggling with manual paper-based records challenges, as they have not developed a government-owned cloud in which to manage and dispose records.

Practical implications

Technological advancements have brought about dramatic changes to the management and disposition of records since cloud computing emerged. The traction gained by cloud computing influences how records are managed and disposed in the cloud storage. Currently, the South African Government manages and disposes records in the government premises as stipulated by the National Archives and Records Service of South Africa Act (1996). This is enforced by the National Archives and Records Service of South Africa, which is the government records regulator because records are on paper-based, microfilms and audio-visual formats. It is hoped that the recommendations and framework proposed in this study may assist the government and related sectors in the adoption and implementation of the cloud computing system for records management and disposal. This may assist in resolving challenges such as missing files, damaged records and archives and long turnaround time for retrieval of records.

Social implications

In South Africa, the digital records are securely stored in storage mediums such as hard drives and USBs, to mention but a few. In addition to digital obsolescence faced by the storage mediums, global access to information is hindered because information is limited to those who can visit the archival holdings. The alternative option is to manage and dispose of records in the cloud. The framework and recommendations in this study may also assist in improving information, archives and records management policies and service delivery to the community at large. The framework proposed may be applied as a theory for framing future studies in the same area of cloud computing and used as a resource to guide other future studies and policymakers.

Originality/value

This study provides a framework for management of digital records on the cloud in South Africa. It also proposes the promulgation of the Cloud Act to promote unlimited access to state heritage, regardless of time and location. This study is framed on the Digital Curation Centre Life Cycle Model.

Details

Information Discovery and Delivery, vol. 50 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 3 March 2020

Luiz Antonio Joia and Gustavo Marchisotti

This study aims to identify the social representation of cloud computing from the perspective of Information Technology (IT) professionals in emerging countries, comparing it with…

Abstract

Purpose

This study aims to identify the social representation of cloud computing from the perspective of Information Technology (IT) professionals in emerging countries, comparing it with the extant literature on this subject.

Design/methodology/approach

Data were collected from IT professionals in Brazil, which was used as a proxy for the emerging countries’ context related to cloud computing. Social Representation Theory was then applied to analyze the data.

Findings

Mismatches between theory and practice on cloud computing make it clear that most of the current scientific literature on cloud computing is, to a great extent, based on the context of developed countries rather than on the context of emerging ones.

Research limitations/implications

Errors of inference may have been made during the categorization of the words evoked. Furthermore, Brazil was used as a proxy for the emerging countries’ context related to cloud computing.

Practical implications

IT professionals in emerging countries have quite an operational view of cloud computing. Thus, companies in these countries have to align cloud computing better with new business models and corporate strategies in order to take advantage of the transformational impacts of cloud computing.

Originality/value

IT professionals in emerging countries have failed to notice the strategic value of cloud computing, the new business models enabled by same, the privacy issues related to it and the impact cloud computing adoption can have on the IT costs of an organization. Moreover, mobility can be a paramount issue related to cloud computing in emerging countries – a fact thus far overlooked by academia.

Details

Internet Research, vol. 30 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 31 July 2020

Lurdes D. Patrício and João J. Ferreira

The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the…

Abstract

Purpose

The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the major cause of personal and organizational data losses. Blockchain emerges as a promised technology to ensure higher levels of data encryption and security. Thus, this study aims to develop a systematic literature review analyzing the previous literature and to purpose of a framework to better understand the process of blockchain security.

Design/methodology/approach

The 75 articles reviewed were obtained through the Scopus database and a bibliographic-coupling analysis was developed to identify the main themes of this research area, via VOSviewer software.

Findings

The results enable the categorization of the existing literature revealing four clusters: 1) feasibility, 2) fintech and cryptocurrency, 3) data trust and share and 4) applicability. Blockchain technology is still in its early stage of development and counting on researchers in security and cryptography to take it further to new highs, to allow its applicability to different areas and in long-term scenarios.

Originality/value

This systematic literature creates a base to reduce the blockchain security literature gap. In addition, it provides a framework that enables the scientific community to access the main subjects discussed and the articulation between concepts. Furthermore, it enhances the state-of-the-art literature on blockchain security and proposes a future research agenda.

Details

Journal of Advances in Management Research, vol. 18 no. 1
Type: Research Article
ISSN: 0972-7981

Keywords

Article
Publication date: 8 January 2021

S. Vaithyasubramanian and R. Sundararajan

Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in…

Abstract

Purpose

Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in all authentication process, as the usage of computing facilities and electronic devices have developed hugely to access networks. Over the years with the increase in numerous Web developments and internet applications, each platform needs ID and password validation for individual users.

Design/methodology/approach

In the technological development of cloud computing, in recent times, it is facing security issues. Data theft, data security, denial of service, patch management, encryption management, key management, storage security and authentication are some of the issues and challenges in cloud computing. Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password. Markov passwords – a rule-based password formation are created or generated by using Markov chain. Representation of Markov password formation can be done by state space diagram or transition probability matrix. State space classification of Markov chain is one of the basic and significant properties. The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper. Analysis on strength of obvious password of length eight has shown range of 7%–9% although the converted Markov password has shown more than 82%. As an effective methodology, this password authentication can be implemented in cloud portal and password login validation process.

Findings

The objective of this paper is to classify the states of Markov chain to support the practice of this type of password in the direction of effective authentication for secure communication in cloud computing. Conversion of some sample obvious password into Markov password and comparative analysis on their strength is also presented in this paper.

Originality/value

Validation in user login authentications is generally processed and executed by password. To authenticate universally, alphanumeric passwords are used. One of the promising proposed methodologies in this type of password authentication is Markov password.

Details

International Journal of Pervasive Computing and Communications, vol. 17 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 January 2020

Opeoluwa Ore Akinsanya, Maria Papadaki and Lingfen Sun

The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care…

Abstract

Purpose

The purpose of this paper is to propose a novel maturity model for health-care cloud security (M2HCS), which focuses on assessing cyber security in cloud-based health-care environments by incorporating the sub-domains of health-care cyber security practices and introducing health-care-specific cyber security metrics. This study aims to expand the domain of health-care cyber security maturity model by including cloud-specific aspects than is usually seen in the literature.

Design/methodology/approach

The intended use of the proposed model was demonstrated using the evaluation method – “construct validity test” as the paper’s aim was to assess the final model and the output of the valuation. The study involved a literature-based case study of a national health-care foundation trust with an overall view because the model is assessed for the entire organisation. The data were complemented by examination of hospitals’ cyber security internal processes through web-accessible documents, and identified relevant literature.

Findings

The paper provides awareness about how organisational-related challenges have been identified as a main inhibiting factor for the adoption of cloud computing in health care. Regardless of the remunerations of cloud computing, its security maturity and levels of adoption varies, especially in health care. Maturity models provide a structure towards improving an organisation’s capabilities. It suggests that although several cyber security maturity models and standards resolving specific threats exist, there is a lack of maturity models for cloud-based health-care security.

Research limitations/implications

Due to the selected research method, the research results may lack generalizability. Therefore, future research studies can investigate the propositions further. Another is that the current thresholds were determined empirically, although it worked for the case study assessment. However, to establish more realistic threshold levels, there is a need for more validation of the model using more case studies.

Practical implications

The paper includes maturity model for the assessment management and improvement of the security posture of a health-care organisation actively using cloud. For executives, it provides a detailed security assessment of the eHealth cloud to aid in decision making. For security experts, its quantitative metrics support proactive and reactive processes.

Originality/value

The paper fulfils a recognised requirement for security maturity model focussed on health-care cloud. It could be extended to resolve evolving cyber settings.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 January 2022

Waqar Ahmad Awan and Akhtar Abbas

The purpose of this study was to map the quantity (frequency), quality (impact) and structural indicators (correlations) of research produced on cloud computing in 48 countries…

Abstract

Purpose

The purpose of this study was to map the quantity (frequency), quality (impact) and structural indicators (correlations) of research produced on cloud computing in 48 countries and 3 territories in the Asia continent.

Design/methodology/approach

To achieve the objectives of the study and scientifically map the indicators, data were extracted from the Scopus database. The extracted bibliographic data was first cleaned properly using Endnote and then analyzed using Biblioshiny and VosViewer application software. In the software, calculations include citations count; h, g and m indexes; Bradford's and Lotka's laws; and other scientific mappings.

Findings

Results of the study indicate that China remained the most productive, impactful and collaborative country in Asia. All the top 20 impactful authors were also from China. The other most researched areas associated with cloud computing were revealed to be mobile cloud computing and data security in clouds. The most prominent journal currently publishing research studies on cloud computing was “Advances in Intelligent Systems and Computing.”

Originality/value

The study is the first of its kind which identified the quantity (frequencies), quality (impact) and structural indicators (correlations) of Asian (48 countries and 3 territories) research productivity on cloud computing. The results are of great importance for researchers and countries interested in further exploring, publishing and increasing cross country collaborations related to the phenomenon of cloud computing.

1 – 10 of over 12000