Search results

1 – 10 of 755
Article
Publication date: 26 March 2021

Adnan Alghail, Mohammed Abbas and Liu Yao

Knowledge protection (KP) is one of the main knowledge management (KM) processes that aim to protect the organization’s knowledge from any inside and outside force leakage. In…

Abstract

Purpose

Knowledge protection (KP) is one of the main knowledge management (KM) processes that aim to protect the organization’s knowledge from any inside and outside force leakage. In higher education institutions (HEIs), KP is rarely being discussed and covered in contrast to knowledge sharing (KS) in terms of its determinants. The purpose of this paper is to provide a deep analysis of previous research articles from 1980 to 2019 and examine the associated institutional factors on KP determinants within HEIs as a research objective.

Design/methodology/approach

The preferred reporting items for systematic reviews and meta-analysis was a well-established approach for analyzing the systematic literature review methodology. Several articles were published over the past decades collected from 5 different databases, but after the screening, 101 articles were reviewed and only 22 articles were relevant to the research objective.

Findings

The findings indicated that KP is under academic research topic in KM and has received minimal attention in HEIs compared to KS, which has been frequently studied in HEIs. The literature categorized KP determinants into four areas: technological, organizational structure, behavioral and ethics and organizational culture. It will open the door for academics to investigate further into the factors, theories and models of KP in general and HEIs from a particular perspective.

Practical implications

As evident from the paper finds, with few pieces of literature covered in this topic, HEIs have to protect the knowledge from any illegal usage or any expert’s knowledge loss after leaving the institutions. This study can help university leaders to understand how the different KP determinants can maximize KP without affecting the KS and develop the KP phenomenon for a strategic fit to enhance their institutions’ safe knowledge usage.

Originality/value

This is the first research of its type which has extensively examined the literature on KP related to HEIs. Also, this paper provides theoretical and practical insights through understanding the determinants that affect KP practices among academic staff.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 53 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 14 November 2022

Iulian Vamanu

This study examined dossiers of informative pursual (DIPs), a particular type of secret police files, before and after the fall of Communism in Romania. These DIPs were often…

Abstract

Purpose

This study examined dossiers of informative pursual (DIPs), a particular type of secret police files, before and after the fall of Communism in Romania. These DIPs were often weaponized against citizens perceived to be anti-government.

Design/methodology/approach

Based on Buckland's (2017) concept of a document as an object with physical, mental and social parts, the study used thematic analysis to examine volumes of DIPs from 1945 to 1989 Communist Romania as well as several recorded reactions to the DIPs by the victims who were targeted by the Communist secret police.

Findings

Four themes were revealed by the study's findings and discussed within the manuscript: DIPs as unreliable epistemic tools, DIPs as tools to construct the identity of the “People's Enemy,” DIPs as weapons to fight the “People's Enemy” and DIPs as tools that could be used in counterattacks during post-Communism, including in political-economic blackmailing.

Research limitations/implications

There are two major limitations to research of DIPs. First, since many DIPs have been stolen, copied illicitly or even destroyed, it is difficult to articulate precisely their actual or potential social and political effects. Researchers may often detect these effects only indirectly, based on information leaks in the news. Second, many victims of surveillance practices during the Communist period have chosen not to leave records of their reactions to reading the DIPs that targeted them.

Social implications

Current and future comprehensive studies of DIPs can reveal possible parallels between surveillance by the Communist regime and the massive data-collection that occurs in democratic societies, particularly given the increased technical capabilities for processing data in these democratic societies.

Originality/value

Within documentation studies, secret police files and document weaponization have been particularly under-researched, therefore this study contributes to a small body of literature.

Article
Publication date: 25 May 2023

Emanuel G. Boussios

The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western…

Abstract

Purpose

The purpose of this study is to explore and theorize on the motivations of a new class of whistleblowers or leakers stemming from the “abusive” cybersecurity practices of Western governments. This research primarily focuses on such practices of the US Government.

Design/methodology/approach

This work is designed as a case study research of cybersecurity whistleblowers or leakers on Western governments, involving data collection from primary and secondary sources. The method is a content analysis to determine the presence of certain themes within this primary and secondary data which this research can then make inferences about the messages within the texts.

Findings

The findings show a formation of a recent class of power brokers, with its own collective ethos, who will be known by a new term: the “New Knowledge Cyberclass” (NKC). The development of the NKC was revealed through the shocking data revelations by Edward Snowden, Julian Assange and Chelsea Manning. What separates the NKC from government “protectors” (i.e. President Obama, Central Intelligence Agency Director Mike Pompeo), who argue that these leakers stole and leaked classified documents that endangered lives, is their definitions of what it means to be defenders of democracy, which here pertains to the rights to citizens’ online privacy and the degree of secrecy in US Government.

Originality/value

To the best of the author’s knowledge, this is the first study directed toward connecting, Snowden, Assange and Manning, to the birth of a new class of power brokers designed to directly challenge Western government malpractices with citizens’ online privacy and secrecy in foreign operations. This research explores both the birth of this new class and a collective ethos that binds this group together despite the tensions and conflicts within this new class.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 4
Type: Research Article
ISSN: 2398-5038

Keywords

Book part
Publication date: 13 December 2023

Francine Richer and Louis Jacques Filion

Shortly before the Second World War, a woman who had never accepted her orphan status, Gabrielle Bonheur Chanel, nicknamed ‘Little Coco’ by her father and known as ‘Coco’ to her…

Abstract

Shortly before the Second World War, a woman who had never accepted her orphan status, Gabrielle Bonheur Chanel, nicknamed ‘Little Coco’ by her father and known as ‘Coco’ to her relatives, became the first women in history to build a world-class industrial empire. By 1935, Coco, a fashion designer and industry captain, was employing more than 4,000 workers and had sold more than 28,000 dresses, tailored jackets and women's suits. Born into a poor family and raised in an orphanage, she enjoyed an intense social life in Paris in the 1920s, rubbing shoulders with artists, creators and the rising stars of her time.

Thanks to her entrepreneurial skills, she was able to innovate in her methods and in her trendsetting approach to fashion design and promotion. Coco Chanel was committed and creative, had the soul of an entrepreneur and went on to become a world leader in a brand new sector combining fashion, accessories and perfumes that she would help shape. By the end of her life, she had redefined French elegance and revolutionized the way people dressed.

Article
Publication date: 10 July 2023

Jawahitha Sarabdeen

The Regulatory Technology (RegTech) is said to be the use of information technology for regulatory monitoring, reporting and compliance. It is used to solve regulatory and…

Abstract

Purpose

The Regulatory Technology (RegTech) is said to be the use of information technology for regulatory monitoring, reporting and compliance. It is used to solve regulatory and compliance issues more effectively and efficiently. Regulators with the digitization of regulation and datafication of processes would get empowered to manage volumes of data. RegTech would assist them in understanding innovative products, transactions, risks, reporting and any market manipulation activities in real time. For successful use of RegTech, the regulatory framework of a country should be comprehensive to address issues that may arise in the use of RegTech. Thus, the purpose of this article is to analyze the adequacy of the Saudi Arabian legal framework to address RegTech adoption.

Design/methodology/approach

The researcher using logical analysis method analyzed the available laws and interpreted the law to see the applicability and the adequacy of laws to regulate the use of RegTech in Saudi Arabia. The content analysis was also used in this research to analyze the literature. This analysis helped to explain the available literature on the research topic and its relevancy and the gap in literature.

Findings

The analysis using the logical and content methodologies shows that Saudi Arabia has general law to address some of the issues that might arise in the adoption of RegTech. Nonetheless, amending some of the existing laws or introducing guidelines could help better uplift of RegTech and similar technologies in Saudi Arabia.

Originality/value

As businesses and regulatory authorities embrace technology for better and efficient delivery of services and products in Saudi Arabia, the research is timely to analyze the adequacy of the laws in Saudi Arabia for adoption of RegTech. In the use of RegTech, issues related to privacy, due diligence, accountability and transparency could arise, however, there is a dearth of literature in these areas relating to technology adoption.

Details

International Journal of Law and Management, vol. 65 no. 6
Type: Research Article
ISSN: 1754-243X

Keywords

Book part
Publication date: 30 April 2024

Shing-Ling S. Chen, Zhuojun Joyce Chen and Courtney Styron

In August, 2015, Serena Williams, one of the most successful female athletes of all time, was body shamed in a New York Times article. The incident highlights the issue of unequal…

Abstract

In August, 2015, Serena Williams, one of the most successful female athletes of all time, was body shamed in a New York Times article. The incident highlights the issue of unequal treatment of male and female athletes – while a muscular frame enhances masculinity for male athletes, a muscular physique invites body shaming for female athletes. In this study, symbolic interactionist theories regarding the generalized other are called into question. While George Mead's theorizing exhibits a nonproblematic role taking of the generalized other in a cooperative manner, this study reports the presence of paradoxical generalized others, and consequently, the incongruent role taking of a latent generalized other by individuals. This study investigates if the issue of body image exists among college female athletes, if college female athletes experience the dilemma of choosing between outstanding performance with a muscular frame or maintaining traditional female appearance. To provide answers to the question, female athletes in a midwest university were invited to fill out a survey. The survey results confirm the existence of a paradox between performance and appearance among some college female athletes.

Details

Symbolic Interaction and Inequality
Type: Book
ISBN: 978-1-83797-689-8

Keywords

Book part
Publication date: 29 May 2023

Divya Nair and Neeta Mhavan

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…

Abstract

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.

Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.

Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.

Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.

Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-80382-555-7

Keywords

Book part
Publication date: 10 May 2023

Jagjit Singh Dhatterwal and Kuldeep Singh Kaswan

Purpose: Cryptocurrency technology has improved fast in the social economy and growth. Because cryptocurrency has many good qualities, it is initially employed for Bitcoin…

Abstract

Purpose: Cryptocurrency technology has improved fast in the social economy and growth. Because cryptocurrency has many good qualities, it is initially employed for Bitcoin transactions.

Methodology: With the advent of Bitcoin, the link between distributed ledger technology (DLT) and the banking market has become stronger and more integrated. As more banking institutions understood the relevance of DLT, they began experimenting with using it in financial activities, such as R3CEV, Hyperledger, and Qiwi.

Findings: Many commercial organisations are beginning to experiment with DLT to reduce transactional costs and boost operational effectiveness, particularly in financial notes, cross-border payments, and asset-backed financing.

Practical Implications: DLT has many potential applications in banking domains in the upcoming years.

Details

Contemporary Studies of Risks in Emerging Technology, Part A
Type: Book
ISBN: 978-1-80455-563-7

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 12 December 2022

Bianca Gualandi, Luca Pareschi and Silvio Peroni

This article describes the interviews the authors conducted in late 2021 with 19 researchers at the Department of Classical Philology and Italian Studies at the University of…

2275

Abstract

Purpose

This article describes the interviews the authors conducted in late 2021 with 19 researchers at the Department of Classical Philology and Italian Studies at the University of Bologna. The main purpose was to shed light on the definition of the word “data” in the humanities domain, as far as FAIR data management practices are concerned, and on what researchers think of the term.

Design/methodology/approach

The authors invited one researcher for each of the official disciplinary areas represented within the department and all 19 accepted to participate in the study. Participants were then divided into five main research areas: philology and literary criticism, language and linguistics, history of art, computer science and archival studies. The interviews were transcribed and analysed using a grounded theory approach.

Findings

A list of 13 research data types has been compiled thanks to the information collected from participants. The term “data” does not emerge as especially problematic, although a good deal of confusion remains. Looking at current research management practices, methodologies and teamwork appear more central than previously reported.

Originality/value

Our findings confirm that “data” within the FAIR framework should include all types of inputs and outputs humanities research work with, including publications. Also, the participants of this study appear ready for a discussion around making their research data FAIR: they do not find the terminology particularly problematic, while they rely on precise and recognised methodologies, as well as on sharing and collaboration with colleagues.

Details

Journal of Documentation, vol. 79 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

1 – 10 of 755