Search results
1 – 10 of 37Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…
Abstract
Purpose
Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.
Design/methodology/approach
Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.
Findings
Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.
Originality/value
These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.
Details
Keywords
Anna Dębicka, Karolina Olejniczak and Joanna Skąpska
As a new concept for humane entrepreneurship (HumEnt) evolves, many new research questions arise. At the exploratory stage, the authors found it relevant to examine and discuss the…
Abstract
Purpose
As a new concept for humane entrepreneurship (HumEnt) evolves, many new research questions arise. At the exploratory stage, the authors found it relevant to examine and discuss the perception of the fundamental assumptions of the HumEnt concept and activities undertaken in this area by business practice.
Design/methodology/approach
To thoroughly understand the studied phenomenon, a combination of quantitative and qualitative methods was used. An exploratory survey was obtained from 126 purposefully selected enterprises in Poland; then, a single case study was analysed.
Findings
The conducted analysis showed differences between the activities of enterprises and the perception of the HumEnt concept among employees that are especially noticeable at different levels of the management hierarchy.
Research limitations/implications
The multifaceted nature of the results obtained is limited by the inability to infer international differences, to capture trends over time and to generalise to the total population of enterprises.
Practical implications
Although the surveyed companies recognise the importance of the HumEnt concept, it is not tantamount to its execution. The research results may be valuable, especially for smaller enterprises, where the business practice may require support in applying the HumEnt approach.
Originality/value
The research explored both the actual state confirmed by the actions taken and the perception of the importance of individual elements of HumEnt. A knowing–doing gap has been demonstrated between these planes. Moreover, thanks to a two-stage study, practices were selected that can be successfully implemented also in small and medium-sized enterprises.
Details
Keywords
Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's…
Abstract
Violence against women and girls is globally prevalent. Overcoming it is a prerequisite for attaining gender equality and achieving sustainable development. The United Nation's 2030 Agenda for Sustainable Development considers technology as a means to combat violence against women and girls, and there is ample evidence on the positive impact of technology in combating violence. At the same time, however, technology can promote and perpetrate new forms of violence. Research shows that more than 70% of women and girls online are exposed to forms of cyber violence. Most of these cases remain unreported.
This chapter argues that technology contributes to increasing cyber violence against women and girls which in turn leads to severe social and economic implications affecting them. It also argues that legislative and policy reforms can limit this type of violence while enabling women and girls to leverage technology for empowerment. It highlights cases of cyber violence in the Arab region and provides an overview of applicable legislative frameworks. The chapter concludes with recommended policy reforms and measures to strengthen and harmonize efforts to combat cyber violence against women and girls in the Arab region.
Details
Keywords
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details
Keywords
Alina Sawy and Dieter Bögenhold
Social media has been gaining importance in recent years as an integral part of entrepreneurs’ business and marketing strategies. At the same time, the entrepreneurial use of…
Abstract
Purpose
Social media has been gaining importance in recent years as an integral part of entrepreneurs’ business and marketing strategies. At the same time, the entrepreneurial use of social media can lead to dark and negative consequences. This aspect has received less attention in the literature so far. The purpose of this study is to advice entrepreneurial practitioners to balance the sides of pros and cons as being an inherent reality to acknowledge the full scenario of business life and the interplay of diverse influences.
Design/methodology/approach
The qualitative interviews focused on the dark side experiences of micro-entrepreneurs on social media and on strategies to protect their private identities and businesses from those dark side effects. For the theoretical classification of dark side experiences, the framework of Baccarella et al. (2018) was used and adapted based on the experiences reported.
Findings
To the best of the authors’ knowledge, the study is one of the first to provide an understanding of the negative experiences micro-entrepreneurs face on social media. The research showed the relevance of five out of the seven dark-side building blocks and identified time as a further influential aspect. Thereby, the authors learn to comprehend the negative sides of social media for micro-operated businesses. The findings highlight the need to understand entrepreneurial social media use with simultaneously negative hazards and economic and social challenges. Addressing the entanglement of the entrepreneurial and private selves of micro-entrepreneurs, the findings demonstrate entrepreneur’s attempts of distancing or cleaning the negativity from their private identities and their businesses.
Originality/value
This paper problematizes dark sides as critical elements in entrepreneurial practice, which are too often neglected when discussing entrepreneurial marketing in general and entrepreneurship in social media specifically. The self is always captured between two sides, including the problematic (“dark”) and the bright.
Details
Keywords
Fritjof Capra and Ove Daniel Jakobsen
The purpose of this paper is to refer to ecological economics using two meanings of the term “ecological”. In the strict scientific sense, ecological economics refers to an…
Abstract
Purpose
The purpose of this paper is to refer to ecological economics using two meanings of the term “ecological”. In the strict scientific sense, ecological economics refers to an economic system that is consistent with and honors the basic principles of ecology, which, ultimately, are identical with what the authors call the systemic principles of life. In a broader sense ecological economics refers to economic theory and practice that see the economy as operating within, rather than dominating, the spheres of nature, society, and culture.
Design/methodology/approach
The authors distill four fundamental principles for ecological economics based on systems theory of life and philosophy of organism. The four principles are; nested systems, self-generating networks, open systems, and cognitive interactions. The authors discuss how these principles can be applied to design an ecological economic system that is life-enhancing on individual, social and ecological levels.
Findings
The authors argue that ecological economics should give priority to activities that maximize well-being of human and non-human beings, as well as entire ecosystems, and that its central purpose should be to serve the life processes in social and ecological systems.
Originality/value
In this paper, the authors connect ecological economics to systems theory and come up with principles relevant for developing economic theory and practice within, rather than dominating, the spheres of nature, society, and culture.
Details
Keywords
Nozomi Kawarazuka and Gordon Prain
This paper aims to explore ethnic minority women’s gendered perceptions and processes of agricultural innovation in the Northern uplands of Vietnam. The key research question asks…
Abstract
Purpose
This paper aims to explore ethnic minority women’s gendered perceptions and processes of agricultural innovation in the Northern uplands of Vietnam. The key research question asks how women develop innovations and learn new agricultural practices within patriarchal family structures.
Design/methodology/approach
In-depth interviews including life histories were conducted with 17 female and 10 male farmers from different socio-economic groups; participant observation and key informant interviews were also carried out.
Findings
Women’s innovation processes are deeply embedded in their positions as wives and daughters-in-law. Their innovation tends to be incremental, small-scale and less technological, and they use innovation networks of women rather than those of the formal agricultural institutions, including bringing innovation knowledge from their birth family to the patrilocal household. Unlike men’s perceived innovation, women’s innovation is strongly linked to small-scale entrepreneurship, and it is a powerful approach in the sense that it strengthens the position of women in their families while improving the household economy.
Research limitations/implications
Identifying socially constructed innovation processes helps policymakers to rethink the introduction of ready-made innovation packages, both in terms of content and delivery, and to facilitate innovation for women, as well as men, in marginalized positions.
Social implications
Understanding the gendered processes of innovation instead of measuring gender gaps in innovation outcomes sheds light on women’s interests and preferences, which can inform policies for supporting women’s innovation and thereby lead to social change, including gender equity.
Originality/value
This paper contributes to the understanding of gendered innovation processes and entrepreneurship associated with agriculture in rural areas in non-Western ethnic-minority contexts, which is an area that past and current research on entrepreneurship has relatively ignored.
Details
Keywords
Hartoyo Hartoyo, Haryanto Sindung, Fahmi Teuku and Sunarto Sunarto
The purpose of this paper is to analyse the effects of socio-demographic factors on ethnic tolerance (ET) and religious tolerance (RT) as well as the participation of the local…
Abstract
Purpose
The purpose of this paper is to analyse the effects of socio-demographic factors on ethnic tolerance (ET) and religious tolerance (RT) as well as the participation of the local community in peacebuilding in post-ethnic violent conflicts in a multi-cultural society.
Design/methodology/approach
This research was conducted in the rural areas of Indonesia, on the basis of an empirical study that was performed in Lampung, a province at the southern tip of Sumatra. Data were collected through a survey of 500 respondents from five districts susceptible to ethnic conflicts. From each district, two villages that experienced ethnic conflicts were chosen and from each village, 50 respondents were randomly selected. To strengthen the explanation of quantitative data, in-depth interviews were also conducted with another 50 residents, five informants from each of ten villages. Informants comprised community leaders or traditional leaders, local police officers, local military officers and district government officials.
Findings
First, the degree of tolerance is not specifically concentrated in the socio-demographic characteristics. Second, ET affects RT. Third, local community participation in peacebuilding in post-ethnic violent conflicts is not influenced by the socio-demographic characteristics but is influenced by ET and RT. The socio-cultural approach is the main strategy for peacebuilding in post-ethnic (and religious) conflicts in multi-cultural societies. The weakness of inter-ethnic relations soon improves in the post-peace period through the reconstruction of social and cultural factors to strengthen social cohesion and social capital at the local community level by involving various stakeholders
Originality/value
This paper is a valuable source of information regarding current research on the role of local communities in strengthening and building peace in post-ethnic violent conflicts in multi-cultural societies.
Details
Keywords
Ines Testoni, Salvatore Russotto, Adriano Zamperini and Diego De Leo
This qualitative research explores the relationship between religiosity, suicide thoughts and drug abuse among 55 homeless people, interviewed with interpretative phenomenological…
Abstract
This qualitative research explores the relationship between religiosity, suicide thoughts and drug abuse among 55 homeless people, interviewed with interpretative phenomenological analysis. Analyzing the thematic structure of the participants' narrations, important main themes appeared in order to avoid suicide, among which family, the certainty of finding a solution and the will to live. However, the suicide ideation inheres in about 30% of participants, almost all believers, addicted and/or alcoholics. Results suggest that religiosity and meaning of death neither prevent from substances abuse and alcoholism, nor is a protective factor against suicide ideation. Meanings of life are the most important reasons for living, and when they are definitively considered unworkable, alcohol and drug help to endure life in the street. A specific model is discussed.
Details
Keywords
Ahmed H. Al-Dmour, Masam Abood and Hani H. Al-Dmour
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting…
Abstract
Purpose
This study aims at investigating the extent of SysTrust’s framework (principles and criteria) as an internal control approach for assuring the reliability of accounting information system (AIS) were being implemented in Jordanian business organizations.
Design/methodology/approach
The study is based on primary data collected through a structured questionnaire from 239 out of 328 shareholdings companies. The survey units were the shareholding companies in Jordan, and the single key respondents approach was adopted. The extents of SysTrust principles were also measured. Previously validated instruments were used where required. The data were analysed using t-test and ANOVA.
Findings
The results indicated that the extent of SysTrust being implemented could be considered to be moderate at this stage. This implies that there are some variations among business organizations in terms of their level of implementing of SysTrust principles and criteria. The results also showed that the extent of SysTrust principles being implemented was varied among business organizations based on their business sector. However, there were not found varied due to their size of business and a length of time in business (experience).
Research limitations/implications
This study is only conducted in Jordan as a developing country. Although Jordan is a valid indicator of prevalent factors in the wider MENA region and developing countries, the lack of external validity of this research means that any generalization of the research findings should be made with caution. Future research can be orientated to other national and cultural settings and compared with the results of this study.
Practical implications
The study provides evidence of the need for management to recognize the importance of the implementation of SysTrust principles and criteria as an internal control for assuring the reliability of AIS within their organizations and be aware which of these principles are appropriate to their size and industry sector.
Originality/value
The findings would be valuable for academic researchers, managers and professional accounting to acquire a better undemanding of the current status of the implementation of the SysTrust principles (i.e., availability, security, integrity processing, confidentiality, and privacy) as an internal control method for assuring the reliability of AIS by testing the phenomenon in Jordan as a developing country.
Details