Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 20 July 2022

Carla Cleri Ferreira and Frida Lind

The purpose of this paper is to characterize the interfaces between manufacturing companies and the Internet of Things (IoT) suppliers involved in their digital servitization.

1638

Abstract

Purpose

The purpose of this paper is to characterize the interfaces between manufacturing companies and the Internet of Things (IoT) suppliers involved in their digital servitization.

Design/methodology/approach

This paper builds on an explorative case study of a manufacturing firm and its IoT suppliers. This paper relies on the Industrial Network Approach to study interfaces between buying firms and their suppliers.

Findings

This paper identifies three distinct types of supplier interfaces: connected, digital and digital-physical. They all contain technical resource interfaces with additional organizational and/or technical complexities that need to be managed. Connectivity, an Agile approach to software development and strong technical dependence emerged as key factors that impact the interactions between manufacturing firms and IoT suppliers and how their resources are combined.

Practical implications

This paper offers managerial implications regarding the importance of internal organization (such as appropriate cross-functional teams) to manage the dynamics of collaborations required by digital technologies, maintain interactions with IoT suppliers and identify and manage interdependences between IoT suppliers. Building close relationships with suppliers of crucial infrastructure (e.g. IoT cloud platform and data security systems) can also be beneficial for manufacturing firms to reduce risks. Finally, attention should be given to IoT technology strategy, which impacts both digital and digital-physical supplier interfaces.

Originality/value

In digital servitization, manufacturing firms are heavily reliant on external resources for IoT technology. Despite this, few studies have investigated the characteristics of their interfaces with IoT suppliers, how these can be managed and how resources are combined.

Details

Journal of Business & Industrial Marketing, vol. 38 no. 6
Type: Research Article
ISSN: 0885-8624

Keywords

Open Access
Article
Publication date: 15 July 2019

Elina Haapamäki and Jukka Sihvonen

This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides…

22251

Abstract

Purpose

This paper aims to update the cybersecurity-related accounting literature by synthesizing 39 recent theoretical and empirical studies on the topic. Furthermore, the paper provides a set of categories into which the studies fit.

Design/methodology/approach

This is a synthesis paper that summarizes the research literature on cybersecurity, introducing knowledge from the extant research and revealing areas requiring further examination.

Findings

This synthesis identifies a research framework that consists of the following research themes: cybersecurity and information sharing, cybersecurity investments, internal auditing and controls related to cybersecurity, disclosure of cybersecurity activities and security threats and security breaches.

Practical implications

Academics, practitioners and the public would benefit from a research framework that categorizes the research topics related to cybersecurity in the accounting field. This type of analysis is vital to enhance the understanding of the academic research on cybersecurity and can be used to support the identification of new lines for future research.

Originality/value

This is the first literature analysis of cybersecurity in the accounting field, and it has significant implications for research and practice by detailing, for example, the benefits of and obstacles to information sharing. This synthesis also highlights the importance of the model for cybersecurity investments. Further, the review emphasizes the role of internal auditing and controls to improve cybersecurity.

Details

Managerial Auditing Journal, vol. 34 no. 7
Type: Research Article
ISSN: 0268-6902

Keywords

Open Access
Article
Publication date: 9 October 2019

Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra and John Sören Pettersson

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent…

3955

Abstract

Purpose

The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made.

Design/methodology/approach

A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used.

Findings

Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced.

Practical implications

Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Originality/value

The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.

Details

Information & Computer Security, vol. 27 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Article
Publication date: 14 September 2023

Jiyang Yu, Hua Zhong and Marzia Bolpagni

The purpose of this paper is to analyse the current state of research on the integration of blockchain and building information modelling (BIM) in the Architecture, Engineering…

Abstract

Purpose

The purpose of this paper is to analyse the current state of research on the integration of blockchain and building information modelling (BIM) in the Architecture, Engineering, Construction and Operations (AECO) industry as a means of identifying gaps between the existing paradigm and practical applications for determining future research directions and improving the industry. The study aims to provide clear guidance on areas that need attention for further research and funding and to draw academic attention to factors beyond the technical dimension.

Design/methodology/approach

A mixed-method systematic review is used, considering multiple literature types and using a sociotechnical perspective-based framework that covers three dimensions (technic, process and context) and three research elements (why, what and how). Data are retrieved and analysed from the Web of Science and Scopus databases for the 2017–2023 period.

Findings

While blockchain has the potential to address security, traceability and transparency and complement the system by integrating supporting applications, significant gaps still exist between these potentials and widespread industry adoption. Current limitations and further research needs are identified, including designing fully integrated prototypes, empirical research to identify operational processes, testing and analysing operational-level models or applications and developing and applying a technology acceptance model for the integration paradigm. Previous research lacks contextual settings, real-world tests or empirical investigations and is primarily conceptual.

Originality/value

This paper provides a comprehensive, critical systematic review of the integration of blockchain with BIM in the construction industry, using a sociotechnical perspective-based framework which can be applied in future reviews. The study provides insight into the current state and future opportunities for policymakers and practitioners in the AECO industry to prepare for the transition in this disruptive paradigm. It also provides a phased plan along with a clear direction for the transition to more advanced applications.

Details

Construction Innovation , vol. 24 no. 1
Type: Research Article
ISSN: 1471-4175

Keywords

Content available
Book part
Publication date: 25 October 2023

Sumesh Singh Dadwal

As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support…

Abstract

As the size of the population is growing and the capacity of the planet Earth is limited, human beings are searching for sustainable and technology-enabled solutions to support society, ecology and economy. One of the solutions has been developing smart sustainable cities. Smart sustainable cities are cities as systems, where their infrastructure, different subsystems and different functional domains are virtually connected to the information and communication technologies (ICT) and internet via sensors and devices and the Internet of Things (IoT), to collect and process real-time Big Data and make efficient, effective and sustainable solutions for a democratic and liveable city for its various stakeholders. This chapter explores the concepts and practices of sustainable smart cities across the globe and explores the use of technologies such as IoT, Blockchain technology and Cloud computing, etc. their challenges and then presents a view on business models for sustainable smart cities.

Open Access
Article
Publication date: 25 August 2021

Ana Faizi, Ali Padyab and Andreas Naess

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

1825

Abstract

Purpose

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

Design/methodology/approach

Four large organizations and five municipalities that use cloud services and conduct ISRA to adhere to their information security risk management practices were studied. Data were gathered qualitatively to answer the study’s research question: How is ISRA practiced on the cloud? The Coat Hanger model was used as a theoretical lens to study and theorize the practices.

Findings

The results showed that the organizations aimed to follow the guidelines, in the form of frameworks or their own experience, to conduct ISRA; furthermore, the frameworks were altered to fit the organizations’ needs. The results further indicated that one of the main concerns with the cloud ISRA was the absence of a culture that integrates risk management. Finally, the findings also stressed the importance of a good understanding and a well-written legal contract between the cloud providers and the organizations using the cloud services.

Originality/value

As opposed to the previous research, which was more inclined to try out and evaluate various cloud ISRA, the study provides insights into the practice of cloud ISRA experienced by the organizations. This study represents the first attempt to investigate cloud ISRA that organizations practice in managing their information security.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Book part
Publication date: 14 December 2023

Filippo Marchesani

Abstract

Details

The Global Smart City
Type: Book
ISBN: 978-1-83797-576-1

Open Access
Article
Publication date: 12 April 2022

Dijana Peras and Renata Mekovec

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The…

1491

Abstract

Purpose

The purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market growth. The researchers have explored privacy concerns from dimensions that were identified as relevant in the cloud context.

Design/methodology/approach

Content analysis was used to identify privacy problems that were most often raised in previous cloud research. Multidimensional developmental theory (MDT) was used to build a conceptual model of cloud privacy concerns. Literature review was made to identify the privacy-related constructs used to measure privacy concerns in previous cloud research.

Findings

The paper provides systematization of recent cloud privacy research, proposal of a conceptual model of cloud privacy concerns, identification of measuring instruments that were used to measure privacy concerns in previous cloud research and identification of categories of problems that need to be addressed in future cloud research.

Originality/value

This paper has identified the categories of privacy problems and dimensions that have not yet been measured in the cloud context, to the best of the authors’ knowledge. Their simultaneous examination could clarify the effects of different dimensions on the privacy concerns of cloud users. The conceptual model of cloud privacy concerns will allow cloud service providers to focus on key cloud problems affecting users’ privacy concerns and use the most appropriate privacy protection communication and preservation approaches.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 14 February 2023

Lemma Lessa and Daniel Gebrehawariat

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an…

1150

Abstract

Purpose

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.

Design/methodology/approach

Two financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.

Findings

The result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.

Originality/value

This study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Content available
Article
Publication date: 26 November 2020

Murtaza Ashiq, Muhammad Haroon Usmani and Muhammad Naeem

Research data management (RDM) has been called a “ground-breaking” area for research libraries and it is among the top future trends for academic libraries. Hence, this study aims…

3114

Abstract

Purpose

Research data management (RDM) has been called a “ground-breaking” area for research libraries and it is among the top future trends for academic libraries. Hence, this study aims to systematically review RDM practices and services primarily focusing on the challenges, services and skills along with motivational factors associated with it.

Design/methodology/approach

A systematic literature review method was used focusing on literature produced between 2016–2020 to understand the latest trends. An extensive research strategy was framed and 15,206 results appeared. Finally, 19 studies have fulfilled the criteria to be included in the study following preferred reporting items for systematic reviews and meta-analysis.

Findings

RDM is gradually gaining importance among researchers and academic libraries; however, it is still poorly practiced by researchers and academic libraries. Albeit, it is better observed in developed countries over developing countries, however, there are lots of challenges associated with RDM practices by researchers and services by libraries. These challenges demand certain sets of skills to be developed for better practices and services. An active collaboration is required among stakeholders and university services departments to figure out the challenges and issues.

Research limitations/implications

The implications of policy and practical point-of-view present how research data can be better managed in the future by researchers and library professionals. The expected/desired role of key stockholders in this regard is also highlighted.

Originality/value

RDM is an important and emerging area. Researchers and Library and Information Science professionals are not comprehensively managing research data as it involves complex cooperation among various stakeholders. A combination of measures is required to better manage research data that would ultimately move forward for open access publishing.

Details

Global Knowledge, Memory and Communication, vol. 71 no. 8/9
Type: Research Article
ISSN: 2514-9342

Keywords

1 – 10 of over 1000