Search results

1 – 10 of 509
Article
Publication date: 12 April 2013

Mark Frydenberg

The purpose of this paper is to investigate the impact of transforming a traditional university computer lab to create a collaborative learning community known as the CIS Sandbox

Abstract

Purpose

The purpose of this paper is to investigate the impact of transforming a traditional university computer lab to create a collaborative learning community known as the CIS Sandbox, by remodeling a physical space and supporting it with a virtual presence through the use of social media tools. The discussion applies Selander's “designs for learning” to frame learning experiences in the CIS Sandbox.

Design/methodology/approach

To determine attitudes toward learning in such an environment, students who staffed and visited the physical space during its first semester completed a voluntary survey. The study investigated attitudes of visitors toward both classroom and extracurricular technology learning; participants also shared their views on the effect of creating a collaborative physical learning environment, and the extent to which they also made use of its online presence.

Findings

Providing both classroom assistance as well as a space for exploring technology, coupled with a focus on blogs and social media, creates interest in IT among students and contributes to student learning. It also creates an opportunity to foster entrepreneurship among student workers who manage these tools as part of the day‐to‐day operation of the facility.

Research limitations/implications

The study presents one implementation of a collaborative learning community formed in a renovated computer lab after a preliminary start‐up period and considers signs for learning based on its activities.

Practical implications

This study presents an innovative model for administering a computer lab, focused on new technologies and peer learning. This approach fosters a sense of entrepreneurship among student workers.

Originality/value

While many have studied learning space design and features for promoting collaborative learning, this study also describes a virtual presence that extends the lab's services by providing online resources.

Article
Publication date: 26 January 2022

Dylan A. Cooper, Taylan Yalcin, Cristina Nistor, Matthew Macrini and Ekin Pehlivan

Privacy considerations have become a topic with increasing interest from academics, industry leaders and regulators. In response to consumers’ privacy concerns, Google announced…

2644

Abstract

Purpose

Privacy considerations have become a topic with increasing interest from academics, industry leaders and regulators. In response to consumers’ privacy concerns, Google announced in 2020 that Chrome would stop supporting third-party cookies in the near future. At the same time, advertising technology companies are developing alternative solutions for online targeting and consumer privacy controls. This paper aims to explore privacy considerations related to online tracking and targeting methods used for programmatic advertising (i.e. third-party cookies, Privacy Sandbox, Unified ID 2.0) for a variety of stakeholders: consumers, AdTech platforms, advertisers and publishers.

Design/methodology/approach

This study analyzes the topic of internet user privacy concerns, through a multi-pronged approach: industry conversations to collect information, a comprehensive review of trade publications and extensive empirical analysis. This study uses two methods to collect data on consumer preferences for privacy controls: a survey of a representative sample of US consumers and field data from conversations on web-forums created by tech professionals.

Findings

The results suggest that there are four main segments in the US internet user population. The first segment, consisting of 26% of internet users, is driven by a strong preference for relevant ads and includes consumers who accept the premises of both Privacy Sandbox and Unified ID (UID) 2.0. The second segment (26%) includes consumers who are ambivalent about both sets of premises. The third segment (34%) is driven by a need for relevant ads and a strong desire to prevent advertisers from aggressively collecting data, with consumers who accept the premises of Privacy Sandbox but reject the premises of UID 2.0. The fourth segment (15% of consumers) rejected both sets of premises about privacy control. Text analysis results suggest that the conversation around UID 2.0 is still nascent. Google Sandbox associations seem nominally positive, with sarcasm being an important factor in the sentiment analysis results.

Originality/value

The value of this paper lies in its multi-method examination of online privacy concerns in light of the recent regulatory legislation (i.e. General Data Protection Regulation and California Consumer Privacy Act) and changes for third-party cookies in browsers such as Firefox, Safari and Chrome. Two alternatives proposed to replace third-party cookies (Privacy Sandbox and Unified ID 2.0) are in the proposal and prototype stage. The elimination of third-party cookies will affect stakeholders, including different types of players in the AdTech industry and internet users. This paper analyzes how two alternative proposals for privacy control align with the interests of several stakeholders.

Details

Journal of Consumer Marketing, vol. 40 no. 2
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 18 August 2023

Filipe Ferreira, Pedro Briga, Sérgio Ramos Teixeira and Fernando Almeida

This study aims to present an innovative sandbox platform that implements a decision support system (DSS) to assess the sustainable development goals (SDGs) addressed at the

Abstract

Purpose

This study aims to present an innovative sandbox platform that implements a decision support system (DSS) to assess the sustainable development goals (SDGs) addressed at the municipal level. It intends to determine the relative importance of each SDG in municipalities and explore the synergies that can be discovered among them.

Design/methodology/approach

Participatory action research is used to develop a DSS and an algorithm designated as discrete heavy fuzzy was also developed, which extends the Apriori algorithm to include discrete quantitative assessments of the level of SDG compliance by each project. A scenario consisting of three municipalities in Portugal (i.e. Porto, Loulé and Castelo de Vide) was chosen to demonstrate the implementation of the sandbox platform and to interpret the observed results.

Findings

The results reveal significant differences in the typology of SDGs addressed by each municipality. It was found that municipal sustainable projects are strongly influenced by the contextual factors of each municipality. Porto has projects that address the first five SDGs. Loulé appears projects that promote innovation, the fight against climate change and the development of sustainable cities. Castelo de Vida has initiatives related to innovation and infrastructure and decent work and economic growth.

Research limitations/implications

This study provides knowledge about the relative importance of the SDGs in Portuguese municipalities and explores the synergies among them. The proposed sandbox platform fills the gaps of the ODSlocal Webtool by proposing a dynamic and interactive approach for the exploration of quantitative indicators regarding the implementation status of the SDGs established in the 2030 Agenda.

Originality/value

This study provides knowledge about the relative importance of the SDGs and the various synergies that exist between them considering the Portuguese municipalities. The sandbox platform presented and developed within this study allows filling the gaps of the ODSlocal Webtool that gathers essentially qualitative information about each project and offers a dynamic and interactive exploration with quantitative indicators of the implementation status of the SDGs established in the 2030 Agenda.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 1 April 1993

Michel Robert

The best way to neutralize a competitor's strategic heart‐beat, said the great General George Smith Patton, is to change the rules of play.

Abstract

The best way to neutralize a competitor's strategic heart‐beat, said the great General George Smith Patton, is to change the rules of play.

Details

Journal of Business Strategy, vol. 14 no. 4
Type: Research Article
ISSN: 0275-6668

Article
Publication date: 2 May 2017

Melanie Brody, Ori Lev, Jeffrey P. Taft, Guy Wilkes, Matthew Bisanz, Tori Shinohara and Joy Tsai

To summarize developments by the US Consumer Financial Protection Bureau (“CFPB”), the US Office of the Comptroller of the Currency (“OCC”), and the UK Financial Conduct Authority…

1155

Abstract

Purpose

To summarize developments by the US Consumer Financial Protection Bureau (“CFPB”), the US Office of the Comptroller of the Currency (“OCC”), and the UK Financial Conduct Authority (“FCA”) in their respective efforts to facilitate responsible financial innovation, and to predict what the financial services industry may expect in coming months.

Design/methodology/approach

This article summarizes financial marketplace developments of particular interest to the CFPB based on the CFPB’s report on its initiative to support responsible financial innovation and CFPB Director Richard Cordray’s speech at the Money 20/20 conference. The article also discusses the OCC’s release of a framework for its “Innovation Initiative”, providing insight to how the agency intends to engage with the fintech industry. Finally, this article explains how the FCA has identified the first cohort of firms to participate in its regulatory sandbox to test new financial products and services as part of the FCA’s wider “Project Innovate” initiative.

Findings

Financial technology innovators should closely monitor the agencies’ recent regulatory and policy developments to facilitate responsible financial innovation to be aware of new opportunities and regulatory consequences.

Originality/value

This article provides practical advice for fintech companies and other financial innovators on regulatory and policy updates from experienced financial services lawyers.

Article
Publication date: 23 February 2022

Randy Priem

This study aims to discuss the European Commission’s proposal for a pilot regime for market infrastructures to experiment with the distributed ledger technology (DLT). In this…

Abstract

Purpose

This study aims to discuss the European Commission’s proposal for a pilot regime for market infrastructures to experiment with the distributed ledger technology (DLT). In this respect, the study comments on the purpose, scope, requirements and attention points for market operators, investment firms and central securities depositories (CSDs) that are considering using this technology.

Design/methodology/approach

This paper focuses on the proposed rules surrounding the DLT pilot regime. The study is based on an analysis of the proposal, compares it with existing literature and presents the purpose and scope of the regime, followed by a detailed analysis of the proposed requirements.

Findings

The proposed requirements aim to provide legal certainty, ensure investor protection, support innovation and protect financial stability. The European Commission attempts to reach these goals by establishing uniform requirements for the DLT market infrastructures by means of a European sandbox approach. This study stresses that a level playing field between the various market participants using the technology should be warranted and provides arguments for why the proposal is incomplete in this respect.

Originality/value

To the best of the author’s knowledge, there are no other articles that provide a holistic overview of the proposed regulation and describe the choices that legislators have made so far. This paper will be of interest to all market operators, investment firms and CSDs that have interest in DLT. The study is also of value to their stakeholders, such as their regulators, market participants and their clients, as well as to other linked financial market infrastructures.

Details

Journal of Financial Regulation and Compliance, vol. 30 no. 3
Type: Research Article
ISSN: 1358-1988

Keywords

Article
Publication date: 1 May 2003

Victoria Skoularidou and Diomidis Spinellis

Enumerates and compares a number of security‐enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software…

2310

Abstract

Enumerates and compares a number of security‐enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software and/or hardware, are capable of protecting the client’s software integrity and its environment. The most important methodologies include the reference monitor model, firewalls, and virtual machines. Software implementations are the Java Sandbox, and the code signing concept. Hardware that can be used includes smart cards, and the TCPA/Palladium security initiative. Describes their most important features and provide a review and comparative study based on a number of criteria. Believes that ongoing research can empower these mechanisms for protecting network clients in a more effective way.

Details

Information Management & Computer Security, vol. 11 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Book part
Publication date: 19 September 2012

Charlotte Cobb-Moore

Purpose – This chapter examines an episode of pretend play amongst a group of young girls in an elementary school in Australia, highlighting how they interact within the

Abstract

Purpose – This chapter examines an episode of pretend play amongst a group of young girls in an elementary school in Australia, highlighting how they interact within the membership categorization device ‘family’ to manage their social and power relationships.

Approach – Using conversation analysis and membership categorization analysis, an episode of video-recorded interaction that occurs amongst a group of four young girls is analyzed.

Findings – As disputes arise amongst the girls, the mother category is produced as authoritative through authoritative actions by the girl in the category of mother, and displays of subordination on the part of the other children, in the categories of sister, dog and cat.

Value of paper – Examining play as a social practice provides insight into the social worlds of children. The analysis shows how the children draw upon and co-construct family-style relationships in a pretend play context, in ways that enable them to build and organize peer interaction. Authority is highlighted as a joint accomplishment that is part of the social and moral order continuously being negotiated by the children. The authority of the mother category is produced and oriented to as a means of managing the disputes within the pretend frame of play.

Details

Disputes in Everyday Life: Social and Moral Orders of Children and Young People
Type: Book
ISBN: 978-1-78052-877-9

Keywords

Book part
Publication date: 22 December 2016

Jennifer E. Rivera and William F. Heinrich

This study aimed to match high-impact, experiential learning with equally powerful assessment practices.

Abstract

Purpose

This study aimed to match high-impact, experiential learning with equally powerful assessment practices.

Methodology/approach

We observed three examples of programs, analyzing individual student artifacts to identify multiple learning outcomes across domains through a novel approach to assessment.

Findings

Important outcomes from this effort were boundary-crossing qualities made visible through a multi perspective assessment process.

Research limitations/implications

Future research should focus on the nature of experiential learning and measurement thereof.

Practical implications

Learning design should consider experiences as a means to reflection, which complement content delivery. Instructors may restructure course credit loads to better reflect additional learning outcomes.

Social implications

Learners with this feedback may be able to better articulate sociocultural learning.

Originality/value

Describes learning in experiential and high-impact education; novel assessment of experiential learning in university setting.

Details

Integrating Curricular and Co-Curricular Endeavors to Enhance Student Outcomes
Type: Book
ISBN: 978-1-78635-063-3

Keywords

Open Access
Article
Publication date: 28 April 2023

Prudence Kadebu, Robert T.R. Shoniwa, Kudakwashe Zvarevashe, Addlight Mukwazvure, Innocent Mapanga, Nyasha Fadzai Thusabantu and Tatenda Trust Gotora

Given how smart today’s malware authors have become through employing highly sophisticated techniques, it is only logical that methods be developed to combat the most potent…

1894

Abstract

Purpose

Given how smart today’s malware authors have become through employing highly sophisticated techniques, it is only logical that methods be developed to combat the most potent threats, particularly where the malware is stealthy and makes indicators of compromise (IOC) difficult to detect. After the analysis is completed, the output can be employed to detect and then counteract the attack. The goal of this work is to propose a machine learning approach to improve malware detection by combining the strengths of both supervised and unsupervised machine learning techniques. This study is essential as malware has certainly become ubiquitous as cyber-criminals use it to attack systems in cyberspace. Malware analysis is required to reveal hidden IOC, to comprehend the attacker’s goal and the severity of the damage and to find vulnerabilities within the system.

Design/methodology/approach

This research proposes a hybrid approach for dynamic and static malware analysis that combines unsupervised and supervised machine learning algorithms and goes on to show how Malware exploiting steganography can be exposed.

Findings

The tactics used by malware developers to circumvent detection are becoming more advanced with steganography becoming a popular technique applied in obfuscation to evade mechanisms for detection. Malware analysis continues to call for continuous improvement of existing techniques. State-of-the-art approaches applying machine learning have become increasingly popular with highly promising results.

Originality/value

Cyber security researchers globally are grappling with devising innovative strategies to identify and defend against the threat of extremely sophisticated malware attacks on key infrastructure containing sensitive data. The process of detecting the presence of malware requires expertise in malware analysis. Applying intelligent methods to this process can aid practitioners in identifying malware’s behaviour and features. This is especially expedient where the malware is stealthy, hiding IOC.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

1 – 10 of 509