Search results

1 – 6 of 6
Open Access
Book part
Publication date: 21 May 2024

Judith de Haan, Paul Boselie, Marieke Adriaanse, Sicco de Knecht and Frank Miedema

Research excellency has long been the dominant paradigm in assessing academic quality and hence a prime determinant of academic careers. Lately, this approach to academic…

Abstract

Research excellency has long been the dominant paradigm in assessing academic quality and hence a prime determinant of academic careers. Lately, this approach to academic performance has come under higher scrutiny for its narrow focus on the individual, promoted an exclusive, performance-oriented talent management and inhibiting collaboration, transparency and societal involvement.

As a response to the limitations of the excellency policy, this chapter examines the emergence of open science as a transformative force in the academic world. Open science represents a paradigm shift, emphasizing the importance of transparency, and increased societal engagement in the academic process. It opens up the possibility to include the context dimension, multiple stakeholders and a more diverse set of development and performance indicators.

This chapter stresses the urgent need to realign our system of recognition and rewards with the premise of open science and with talent management. By highlighting the disconnect between current recognition mechanisms and the values of universities, this chapter emphasizes the necessity of transformative changes at institutional and systemic levels.

To provide concrete insights into the implementation of these changes, this chapter explores a case study of Utrecht University. This specific example showcases how strategic decisions at an institute level allow navigation of the complexities of recognizing and rewarding open science practices. The Utrecht University case study serves as an inspiration for other institutions seeking to embrace open science and adapt their policies and practices accordingly.

Details

Talent Management in Higher Education
Type: Book
ISBN: 978-1-80262-688-9

Keywords

Open Access
Article
Publication date: 20 March 2023

Kudakwashe Chirambwi

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and…

Abstract

Purpose

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and contention on the superiority given to positivist and interpretivist research designs when doing fieldwork in war situations, hence there is a need to use integrated data generation techniques. The combined effect of severe limitations of movement for both the researcher and researched fragmented data because of polarized views about the causes of the war and unpredictable events that make information hard to come by militate against systematic, organised and robust data generation. The purpose of this paper, therefore, is to make fieldwork researchers understand significant research problems unique to war zones.

Design/methodology/approach

This research was guided by the postmodernist mode of thought which challenges standardised research traditions. Fieldwork experiences in Cabo suggest the need to use the composite strategies that rely on the theoretical foundation of integrative and creative collection of data when doing research in violent settings.

Findings

The fieldwork experiences showed that the standardised, conventional and valorised positivist and ethnographic research strategies may not sufficiently facilitate understanding of the dynamics of war. There should not be firm rules, guidelines or regulations governing the actions of the researcher in conflict. As such, doing research in violent settings require reflexivity, flexibility and creativity in research strategies that respond to rapid changes. Research experiences in Mozambique show the need to use blended methods that include even less structured methodologies.

Originality/value

Fieldwork experiences in Cabo challenges researchers who cling to standardised research traditions which often hamper awareness of new postmodernist mode of thought applicable to war settings. It is essential to study the nature of African armed conflicts by combining creativity and flexibility in the selection of research strategies.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1095

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 16 April 2024

Natile Nonhlanhla Cele and Sheila Kwenda

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the…

Abstract

Purpose

The purpose of the study is to identify cybersecurity threats that hinder the adoption of digital banking and provide sustainable strategies to combat cybersecurity risks in the banking industry.

Design/methodology/approach

Systematic literature review guidelines were used to conduct a quantitative synthesis of empirical evidence regarding the impact of cybersecurity threats and risks on the adoption of digital banking.

Findings

A total of 84 studies were initially examined, and after applying the selection and eligibility criteria for this systematic review, 58 studies were included. These selected articles consistently identified identity theft, malware attacks, phishing and vishing as significant cybersecurity threats that hinder the adoption of digital banking.

Originality/value

With the country’s banking sector being new in this area, this study contributes to the scant literature on cyber security, which is mostly in need due to the myriad breaches that the industry has already suffered thus far.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 23 February 2024

Elin K. Funck, Kirsi-Mari Kallio and Tomi J. Kallio

This paper aims to investigate the process by which performative technologies (PTs), in this case accreditation work in a business school, take form and how humans engage in…

Abstract

Purpose

This paper aims to investigate the process by which performative technologies (PTs), in this case accreditation work in a business school, take form and how humans engage in making up such practices. It studies how academics come to accept and even identify with the quantitative representations of themselves in a translation process.

Design/methodology/approach

The research involved a longitudinal, self-ethnographic case study that followed the accreditation process of one Nordic business school from 2015 to 2021.

Findings

The findings show how the PT pushed for different engagements in various phases of the translation process. Early in the translation process, the PT promoted engagement because of self-realization and the ability for academics to proactively influence the prospective competitive milieu. However, as academic qualities became fabricated into numbers, the PT was able to request compliance, but also to induce self-reflection and self-discipline by forcing academics to compare themselves to set qualities and measures.

Originality/value

The paper advances the field by linking five phases of the translation process, problematization, fabrication, materialization, commensuration and stabilization, to a discussion of why academics come to accept and identify with the quantitative representations of themselves. The results highlight that the materialization phase appears to be the critical point at which calculative practices become persuasive and start influencing academics’ thoughts and actions.

Details

Journal of Accounting & Organizational Change, vol. 20 no. 6
Type: Research Article
ISSN: 1832-5912

Keywords

Access

Only content I have access to

Year

Last month (6)

Content type

1 – 6 of 6