Search results

1 – 10 of over 15000
Book part
Publication date: 12 January 2016

Andrew Schmitz and P. Lynn Kennedy

We discuss food security within the context of welfare economics. We review models of commodity price stabilization brought about by government storage, and/or the private sector…

Abstract

Purpose

We discuss food security within the context of welfare economics. We review models of commodity price stabilization brought about by government storage, and/or the private sector. We use data on the stocks of major commodities to discuss the implications of storage models on food security.

Methodology/approach

The impact of storage on food security is discussed within the context of welfare economics.

Findings

Storage is not necessarily a solution to solving long-term world food problems. Also, at times in history, countries such as the United States have accumulated large stocks of commodities such as wheat, which turned out to be a costly policy.

Social implications

While food insecurity is a major issue worldwide, the solution does not entirely lie in governments being heavily involved in managing and owning food stocks. The private sector manages stocks as a part of commercial transactions. The government’s role is to provide food from stockholdings in times of emergency situations.

Details

Food Security in a Food Abundant World
Type: Book
ISBN: 978-1-78560-215-3

Keywords

Article
Publication date: 2 January 2020

Qiuhui Xiao, Xiaotong Xu and Panpan Liu

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security…

2866

Abstract

Purpose

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security status of electronic records preservation. Wuhan, the largest city in central China, serves as a case to investigate the preservation security of electronic records. Challenges to security are summarized, and solutions are proposed to support policy-developing and operational guidance. The paper aims to discuss these issues.

Design/methodology/approach

The Delphi method is applied to analyze the advice of nine experts, select survey items and design questionnaires. Data are collected from 34 archives in Wuhan through field surveys, oral interviews and e-mails, which are analyzed and illustrated with three representative cases.

Findings

Main achievements of electronic records preservation are concluded in the electronic records management system, carrier types and storage formats, and data backup. Problems are summarized as a lack of awareness and capability of defending against security risks, disaster recovery capability, and understanding of electronic record characteristics. Solutions are proposed as follows: carrying out regular security risk evaluation, adopting new technologies, implementing application-level backup, strengthening technology-related education and attracting more IT talent to join the archive discipline. In addition, it is critical to promote an understanding of the characteristics of electronic records.

Originality/value

This paper investigates the security status of electronic records in central China by surveys and case studies. Critical problems and corresponding solutions are raised to support policy-developing and operational guidance for the research and practice of all kinds of institutions that implement electronic records preservation.

Details

Library Hi Tech, vol. 39 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Book part
Publication date: 30 January 2023

Anastasija Nikiforova, Artjoms Daskevics and Otmane Azeroual

Nowadays, there are billions interconnected devices forming Cyber-Physical Systems (CPS), Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an…

Abstract

Nowadays, there are billions interconnected devices forming Cyber-Physical Systems (CPS), Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an increasing number of devices and systems in use, amount and the value of data, the risks of security breaches increase. One of these risks is posed by open data sources, which are databases that are not properly protected. These poorly protected databases are accessible to external actors, which poses a serious risk to the data holder and the results of data-related activities such as analysis, forecasting, monitoring, decision-making, policy development, and the whole contemporary society. This chapter aims at examining the state of the security of open data databases representing both relational databases and NoSQL, with a particular focus on a later category.

Details

Big Data and Decision-Making: Applications and Uses in the Public and Private Sector
Type: Book
ISBN: 978-1-80382-552-6

Keywords

Article
Publication date: 6 January 2022

Ahmad Latifian

Big data has posed problems for businesses, the Information Technology (IT) sector and the science community. The problems posed by big data can be effectively addressed using…

Abstract

Purpose

Big data has posed problems for businesses, the Information Technology (IT) sector and the science community. The problems posed by big data can be effectively addressed using cloud computing and associated distributed computing technology. Cloud computing and big data are two significant past-year problems that allow high-efficiency and competitive computing tools to be delivered as IT services. The paper aims to examine the role of the cloud as a tool for managing big data in various aspects to help businesses.

Design/methodology/approach

This paper delivers solutions in the cloud for storing, compressing, analyzing and processing big data. Hence, articles were divided into four categories: articles on big data storage, articles on big data processing, articles on analyzing and finally, articles on data compression in cloud computing. This article is based on a systematic literature review. Also, it is based on a review of 19 published papers on big data.

Findings

From the results, it can be inferred that cloud computing technology has features that can be useful for big data management. Challenging issues are raised in each section. For example, in storing big data, privacy and security issues are challenging.

Research limitations/implications

There were limitations to this systematic review. The first limitation is that only English articles were reviewed. Also, articles that matched the keywords were used. Finally, in this review, authoritative articles were reviewed, and slides and tutorials were avoided.

Practical implications

The research presents new insight into the business value of cloud computing in interfirm collaborations.

Originality/value

Previous research has often examined other aspects of big data in the cloud. This article takes a new approach to the subject. It allows big data researchers to comprehend the various aspects of big data management in the cloud. In addition, setting an agenda for future research saves time and effort for readers searching for topics within big data.

Details

Kybernetes, vol. 51 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 31 October 2023

Eziaku Onyeizu Rasheed, Maryam Khoshbakht and George Baird

This paper aims to illustrate the extensive benefits of qualitative data analysis as a rarely undertaken process in post-occupancy evaluation surveys. As a result, there is…

Abstract

Purpose

This paper aims to illustrate the extensive benefits of qualitative data analysis as a rarely undertaken process in post-occupancy evaluation surveys. As a result, there is limited evidence of what occupants say about their buildings, especially for operational parameters, as opposed to how they rate them. While quantitative analyses provide useful information on how workers feel about workplace operational factors, qualitative analyses provide richer information on what aspects of the workplace workers identify as influential to their comfort, well-being and productivity.

Design/methodology/approach

The authors analysed 6,938 comments from office buildings worldwide on workers’ perception of workplace operational factors: design, storage, needs, space at desks and storage in their work environments. These factors were analysed based on the buildings’ design intent and use, and the associated comments were coded into positive, negative and balanced comments. The authors used a combination of coding, descriptive analysis, content analysis and word cloud to dissect the comments.

Findings

The findings showed that whereas workers rated these operational factors favourably, there were significantly more negative comments about each factor. Also, the Chi-square test showed a significant association (p < 0.01) between the satisfaction scale and the type of comments received for all the operational factors. This means that when a factor is rated high in the satisfaction score (5–7), there were fewer negative and more positive comments and vice versa. The word cloud analysis highlighted vital aspects of the office environment the workers mostly commented on, such as open plan design, natural lighting, space and windows, toilets, facilities, kitchens, meeting room booking systems, storage and furniture.

Research limitations/implications

This study highlights the importance of dissecting building occupants’ comments as integral to building performance monitoring and measurement. These emphasise the richness and value of respondents’ comments and the importance of critically analysing them. A limitation is that only 6,938 comments were viable for analysis because most comments were either incomplete with no meaning or were not provided. This underlines the importance of encouraging respondents to comment and express their feelings in questionnaire surveys. Also, the building use studies questionnaire data set presents extensive opportunities for further analyses of interrelationships between demographics, building characteristics and environmental and operational factors.

Practical implications

The findings from this study can be applied to future projects and facility management to maintain and improve office buildings throughout their life cycle. Also, these findings are essential in predicting the requirements of future workplaces for robust workplace designs and management.

Originality/value

The authors identified specific comments on the performance of workplaces across the globe, showing similarities and differences between sustainable, conventional, commercial and institutional buildings. Specifically, the analysis showed that office workers’ comments do not always corroborate the ratings they give their buildings. There was a significantly higher percentage of negative comments than positive comments despite the high satisfaction scores of the operational factors.

Details

Facilities , vol. 42 no. 3/4
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 29 September 2020

Wenyuan Wang and Sira Yongchareon

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups…

Abstract

Purpose

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups. Further, the report will advise commercial applications and advice of SECaaS as an extended context to help firms make decisions.

Design/methodology/approach

This paper compares the SECaaS categories in Cloud Security Alliance (CSA) with the security clauses in ISO/IEC 27002:2013 to give a comprehensive analysis of those SECaaS categories. Reviewed from a number of related literature, this paper analyzes and categorizes SECaaS into three major groups including protective, detective and reactive based on security control perspectives. This study has discussed the three groups and their interplay to identify the key characteristics and problems that they aim to address.

Findings

This paper also adds new evidence to support a better understanding of the current and future challenges and directions for SECaaS. Also, the study reveals both the positive and negative aspects of SECaaS along with business cases. It advises on various sizes and domains of organizations to consider SECaaS as one of their potential security approaches.

Originality/value

SECaaS has been demonstrated to be one of the increasingly popular ways to address security problems in Cloud computing. As a new concept, SECaaS could be treated as integrated security means and delivered as a service module in the Cloud. However, it is still in infancy and not very widely investigated. Recent studies suggest that SECaaS is an efficient solution for Cloud and real industries. However, shortcomings of SECaaS have not been well-studied and documented. Moreover, reviewing the existing research, researchers did not classify the SECaaS-related categories.

Details

International Journal of Web Information Systems, vol. 16 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 5 December 2023

Rafiq Ahmad and Muhammad Rafiq

The digital contents (d-contents) are vulnerable to various threats either natural or manmade. Digital preservation is the plethora of a wide array of strategies necessary for the…

Abstract

Purpose

The digital contents (d-contents) are vulnerable to various threats either natural or manmade. Digital preservation is the plethora of a wide array of strategies necessary for the long-term preservation of digital objects. This study was carried out to assess the digital preservation practices for information resources in university libraries of Pakistan.

Design/methodology/approach

A quantitative survey based on a structured questionnaire was carried out to conduct the study. The questionnaire containing two sets of strategies (general and technical) was distributed amongst the whole population and received 90% response rate.

Findings

Overall, progressive implementation of general digital preservation practices was noted in these libraries like checking the digital collections for viruses, keeping the digital media in fire/water/theft proof locations, restricting unauthorized access, maintaining ideal humidity and temperature, and checking the digital media for functionality. Amongst the technical practices, only replication was in practice at a progressive rate, followed by metadata recording and media refreshing that was sometimes practiced in these libraries. The other technical practices were rarely or never practiced in these libraries. Significant variances in general and technical digital preservation practices were noted based on their physical locations (regional distribution).

Research limitations/implications

The study contributes a comprehensive set of digital preservation practices divided into general and technical types to conduct similar studies in other parts of the world.

Practical implications

The findings stress the need for national and institutional policies, funding streams and skill enhancement of library staff.

Originality/value

The study fills the literature gap and contributes a comprehensive set of digital preservation practices divided into general and technical types to conduct similar studies in other parts of the world.

Peer review

The peer-review history for this article is available at: https://publons.com/publon/10.1108/OIR-02-2023-0074

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 17 June 2021

Amos Shibambu and Ngoako Solomon Marutha

The purpose of this paper is to investigate a framework for management of digital records on the cloud in South Africa.

2021

Abstract

Purpose

The purpose of this paper is to investigate a framework for management of digital records on the cloud in South Africa.

Design/methodology/approach

This qualitative case study used semi-structured interviews and document analysis to collect data from regulatory documents, records practitioners and chief information officers in the national government departments in South Africa.

Findings

This study reveals that despite the advent of cloud computing, government is still struggling with manual paper-based records challenges, as they have not developed a government-owned cloud in which to manage and dispose records.

Practical implications

Technological advancements have brought about dramatic changes to the management and disposition of records since cloud computing emerged. The traction gained by cloud computing influences how records are managed and disposed in the cloud storage. Currently, the South African Government manages and disposes records in the government premises as stipulated by the National Archives and Records Service of South Africa Act (1996). This is enforced by the National Archives and Records Service of South Africa, which is the government records regulator because records are on paper-based, microfilms and audio-visual formats. It is hoped that the recommendations and framework proposed in this study may assist the government and related sectors in the adoption and implementation of the cloud computing system for records management and disposal. This may assist in resolving challenges such as missing files, damaged records and archives and long turnaround time for retrieval of records.

Social implications

In South Africa, the digital records are securely stored in storage mediums such as hard drives and USBs, to mention but a few. In addition to digital obsolescence faced by the storage mediums, global access to information is hindered because information is limited to those who can visit the archival holdings. The alternative option is to manage and dispose of records in the cloud. The framework and recommendations in this study may also assist in improving information, archives and records management policies and service delivery to the community at large. The framework proposed may be applied as a theory for framing future studies in the same area of cloud computing and used as a resource to guide other future studies and policymakers.

Originality/value

This study provides a framework for management of digital records on the cloud in South Africa. It also proposes the promulgation of the Cloud Act to promote unlimited access to state heritage, regardless of time and location. This study is framed on the Digital Curation Centre Life Cycle Model.

Details

Information Discovery and Delivery, vol. 50 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 3 March 2020

Luiz Antonio Joia and Gustavo Marchisotti

This study aims to identify the social representation of cloud computing from the perspective of Information Technology (IT) professionals in emerging countries, comparing it with…

Abstract

Purpose

This study aims to identify the social representation of cloud computing from the perspective of Information Technology (IT) professionals in emerging countries, comparing it with the extant literature on this subject.

Design/methodology/approach

Data were collected from IT professionals in Brazil, which was used as a proxy for the emerging countries’ context related to cloud computing. Social Representation Theory was then applied to analyze the data.

Findings

Mismatches between theory and practice on cloud computing make it clear that most of the current scientific literature on cloud computing is, to a great extent, based on the context of developed countries rather than on the context of emerging ones.

Research limitations/implications

Errors of inference may have been made during the categorization of the words evoked. Furthermore, Brazil was used as a proxy for the emerging countries’ context related to cloud computing.

Practical implications

IT professionals in emerging countries have quite an operational view of cloud computing. Thus, companies in these countries have to align cloud computing better with new business models and corporate strategies in order to take advantage of the transformational impacts of cloud computing.

Originality/value

IT professionals in emerging countries have failed to notice the strategic value of cloud computing, the new business models enabled by same, the privacy issues related to it and the impact cloud computing adoption can have on the IT costs of an organization. Moreover, mobility can be a paramount issue related to cloud computing in emerging countries – a fact thus far overlooked by academia.

Details

Internet Research, vol. 30 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 31 July 2020

Lurdes D. Patrício and João J. Ferreira

The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the…

Abstract

Purpose

The continuous presence and intensity of the Internet of things (IoT) in our lives and the risk of security breaches in traditional transactional and financial platforms are the major cause of personal and organizational data losses. Blockchain emerges as a promised technology to ensure higher levels of data encryption and security. Thus, this study aims to develop a systematic literature review analyzing the previous literature and to purpose of a framework to better understand the process of blockchain security.

Design/methodology/approach

The 75 articles reviewed were obtained through the Scopus database and a bibliographic-coupling analysis was developed to identify the main themes of this research area, via VOSviewer software.

Findings

The results enable the categorization of the existing literature revealing four clusters: 1) feasibility, 2) fintech and cryptocurrency, 3) data trust and share and 4) applicability. Blockchain technology is still in its early stage of development and counting on researchers in security and cryptography to take it further to new highs, to allow its applicability to different areas and in long-term scenarios.

Originality/value

This systematic literature creates a base to reduce the blockchain security literature gap. In addition, it provides a framework that enables the scientific community to access the main subjects discussed and the articulation between concepts. Furthermore, it enhances the state-of-the-art literature on blockchain security and proposes a future research agenda.

Details

Journal of Advances in Management Research, vol. 18 no. 1
Type: Research Article
ISSN: 0972-7981

Keywords

1 – 10 of over 15000