Search results
1 – 10 of over 191000Zeyneb Hafsa Orhan, Sajjad Zaheer and Fatih Kazancı
This paper aims to achieve two goals: first, to evaluate the existing interest-free monetary policy tools in the major Islamic financial hubs of Malaysia, Pakistan and Bahrain…
Abstract
Purpose
This paper aims to achieve two goals: first, to evaluate the existing interest-free monetary policy tools in the major Islamic financial hubs of Malaysia, Pakistan and Bahrain and; second, to suggest how monetary policy tools in Turkey can be used in other countries.
Design/methodology/approach
This study follows a qualitative research method based on literature review, comparison, evaluation and design.
Findings
The policy rate cannot be used due to Shariah concerns. The reserve requirement depends on qard, and the reserves should be kept separately in the central bank. In terms of ijarah sukuk, Shariah concerns should be taken into account and a new structure, as displayed in Figure 3, should be followed. Government investment certificates can be used as an interest-free monetary policy tool. A genuine mudarabah interbank investments can also be used. Wadiah acceptance with no habitual gift can be used as well, and Tawarruq and central bank notes are not preferable due to Shariah concerns as well. Having said that, a Turkey-based tawarruq platform can be structured for others to use instead of applying to London.
Originality/value
This paper’s unique suggestion is to develop an interbank taqaruz market and a taqaruz method with the central bank. It is also unique for Turkey in the subject.
Details
Keywords
Lin Jia, Lijuan Huang, Zhijun Yan, Dianne Hall, Jiahe Song and David Paradice
Although the use of instant messaging (IM) at work has been studied in the IS field, its effective use and impact on performance have not been adequately addressed. The purpose of…
Abstract
Purpose
Although the use of instant messaging (IM) at work has been studied in the IS field, its effective use and impact on performance have not been adequately addressed. The purpose of this paper is to explore the antecedents and consequences of the effective use of IM at work by adapting Burton-Jones and Grange’s theory of effective use.
Design/methodology/approach
The authors introduce “Comprehensive IM policy” as a facilitator of adaptation and learning actions to improve the effective use of IM, which will improve communication quality and productivity. The impact of IM competence on effective use is also discussed. Based on a survey of 215 managers, this study applies the partial least square technique to test the research model.
Findings
The results indicate that comprehensive IM policy encourages adaptation and learning actions, which improve the effective use of IM and thereafter improve communication quality and productivity. Meanwhile, IM competence has a substitutive interaction effect with IM reconfiguration and self-learning on effective use.
Originality/value
The results refine the general theory of effective use and provide managers with an approach to leverage IM use at work for performance gains.
Details
Keywords
Alexis Rain Rockwell, Stephen A. Bishopp and Erin A. Orrick
The current study examines the effect of changing a specific use-of-force policy coupled with de-escalation training implementation on patterns of police use of force.
Abstract
Purpose
The current study examines the effect of changing a specific use-of-force policy coupled with de-escalation training implementation on patterns of police use of force.
Design/methodology/approach
An interrupted time-series analysis was used to examine changes in police use-of-force incident records gathered from a large, southwestern US metropolitan police department from 2013 to 2017 based on a TASER policy change and de-escalation training implementation mid-2015.
Findings
Results demonstrate that changes to use-of-force policy regarding one type of force (i.e. use of TASERs) coinciding with de-escalation training influence the prevalence of use-of-force incidents by increasing the reported police use-of-force incidents after the changes were implemented. This finding is somewhat consistent with prior literature but not always in the desired direction.
Practical implications
When police departments make adjustments to use-of-force policies and/or trainings, unintended consequences may occur. Police administrators should measure policy and training outcomes under an evidence-based policing paradigm prior to making those adjustments.
Originality/value
This study is the first to measure the effects of changing use-of-force policy and implementing de-escalation techniques in training on patterns of police use of force and shows that these changes can have a ripple effect across types of force used by police officers.
Details
Keywords
Jennifer L. Paschal, Dianna L. Stone and Eugene F. Stone‐Romero
The widespread use of electronic mail (e‐mail) at work has prompted a growing number of companies to implement e‐mail policies to protect both business interests and the privacy…
Abstract
Purpose
The widespread use of electronic mail (e‐mail) at work has prompted a growing number of companies to implement e‐mail policies to protect both business interests and the privacy of employees. However, very little is known about the effects of such policies on such outcomes for employees such as perceived invasiveness and fairness. Thus, the paper aims to consider these issues.
Design/methodology/approach
This paper uses a 2×2 experimental design and a sample of 592 employed internet users to examine the effects of e‐mail policy characteristics (i.e. policy restrictiveness and policy justification) on perceptions of invasion of privacy (invasiveness) and fairness.
Findings
Results indicate that policy restrictiveness has effects on both invasiveness and fairness, and that policy justification has an effect on fairness. In addition, privacy values are related to both invasiveness and fairness, and moderated the effect of policy restrictiveness on fairness.
Practical implications
Implications for practice and the integration of organizational justice and organizational privacy theory are discussed. In terms of practice, for example, the study's results have implications for the formulation and enforcement of policies concerning the use of e‐mail systems.
Originality/value
This paper is the first to consider the effects of e‐mail policies on employee reactions (i.e. fairness and invasiveness).
Details
Keywords
Mehdia Ajana El Khaddar, Mhammed Chraibi, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi and Abdelilah Maach
This paper aims to demonstrate that a policy-based middleware solution which facilitates the development of context-aware applications and the integration of the heterogeneous…
Abstract
Purpose
This paper aims to demonstrate that a policy-based middleware solution which facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. Ubiquitous computing targets the provision of seamless services and applications by providing an environment that involves a variety of devices having different capabilities. These applications help transforming the physical spaces into computationally active and smart environments. The design of applications in these environments needs to consider the heterogeneous devices, applications preferences and rapidly changing contexts. The applications, therefore, need to be context-aware so that they can adapt to different situations in real-time.
Design/methodology/approach
In this paper, we argue that a policy-based middleware solution that facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. The middleware allows applications to track items and acquire contextual information about them easily, reason about this information captured using different logics and then adapt to changing contexts. A key issue in these environments is to allow heterogeneous applications to express their business rules once, and get the preferred data once they are captured by the middleware without any intervention from the application side.
Findings
Our middleware tackles this problem by using policies to define the different applications’ rules and preferences. These policies can specify rules about the middleware services to be used, type of data captured, devices used, user roles, context information and any other type of conditions.
Originality/value
In this paper, we propose the design of a flexible and performant ubiquitous computing, and context-aware middleware called FlexRFID along with its evaluation results.
Details
Keywords
Svetlana Davis, Sara A. Murphy and Joanna Watkins
The present research aims to understand how and why flexible work arrangement (FWA) policy use by co-workers affects policy non-users by investigating perceived changes to work…
Abstract
Purpose
The present research aims to understand how and why flexible work arrangement (FWA) policy use by co-workers affects policy non-users by investigating perceived changes to work, fairness and organizational identification as factors that shape policy non-users’ job satisfaction.
Design/methodology/approach
A survey was distributed to 300 Canadian respondents solicited from an online panel owned by Qualtrics Inc. Hypotheses were developed and tested using a moderating mediation model. SPSS Macro Process (Hayes) was used to test the hypotheses.
Findings
This survey found that perceiving negative changes to work stemming from co-worker FWA use corresponded to policy non-user job satisfaction, fairness dimensions mediated this effect and organizational identification moderated the relationship driven by interactional fairness. Policy non-users who care most about organizations seem to be most vulnerable to the negative consequences associated with co-worker FWA policy use.
Originality/value
FWA use has been linked to many positive outcomes for policy users. However, the workplace adjustments that occur to accommodate policy use by co-workers could also have implications for policy non-users. This study explores the effects of FWA policy use by co-workers on policy non-users job satisfaction.
Details
Keywords
Elham Rostami, Fredrik Karlsson and Shang Gao
This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).
Abstract
Purpose
This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).
Design/methodology/approach
This study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden.
Findings
This study’s demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs.
Research limitations/implications
The proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process.
Practical implications
Practitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs.
Originality/value
The proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.
Details
Keywords
Gregorio Martínez Pérez, Félix J. García Clemente and Antonio F. Gómez Skarmeta
The purpose of the paper is to provide a two‐tier framework for managing semantic‐aware distributed firewall policies to be applied to the devices existing in one administrative…
Abstract
Purpose
The purpose of the paper is to provide a two‐tier framework for managing semantic‐aware distributed firewall policies to be applied to the devices existing in one administrative domain.
Design/methodology/approach
Special attention is paid to the CIM‐based information model defined as the ontology to be used in this framework and the AI‐based reasoning mechanisms and components used to perform the conflict discovery tasks over the distributed firewall policies.
Findings
Mechanisms presented allow the solving some of the current issues of the network‐centric security model being used in the Internet. The two‐tier framework designed provides semantic‐aware mechanisms to perform conflict detection and automatic enforcement of policy rules in the distributed firewall scenario. This framework is based on the use of a standard information model and a semantic‐aware policy language to formally define (and then process) firewall policies.
Research limitations/implications
Ongoing work is focused on identifying all kind of conflicts and anomalies that may exist in firewall systems; in parallel to this task a semi‐automatic resolver of conflicting policies is currently under design.
Practical implications
Network and security administrators can specify firewall policies and validate them to find syntactic and semantic errors (i.e. policy conflicts). A framework for automated validation and distribution of policies at different levels is included. This ensures that firewall policies produce the desired effects, facilitating the creation and maintenance of firewall rules in one administrative domain.
Originality/value
A practical and novel two‐tier system that provides detection of conflicts in rules existing in a distributed firewall scenario and the automatic and secure deployment of these rules. A packet‐filtering model, which is simple and powerful enough for the conflict discovery and rule analysis processes, has been proposed. Moreover, ontology and rule reasoning are being proposed as techniques for the conflict detection problem in this particular scenario.
Details
Keywords
Tongwei Qiu, Biliang Luo, Shangpu Li and Qinying He
The purpose of this paper is to assess the links between basic farmland preservation and land transfers in rural China.
Abstract
Purpose
The purpose of this paper is to assess the links between basic farmland preservation and land transfers in rural China.
Design/methodology/approach
The Chinese provincial panel data from 2006 to 2016 were analyzed with the use of Arellano–Bond linear dynamic panel data estimations.
Findings
The basic farmland preservation policy negatively affects the land transfer rate. In addition, this policy is most likely to limit land transfers between local acquaintances in the major grain-producing areas. Further evidence indicates that the basic farmland preservation policy has a negative impact on land rentals in general. Considering that land transfers such as exchanges and take-overs are excluded from rental transactions between acquaintances, the policy’s constraints on land use are likely to hinder land rentals between acquaintances, which are market-oriented.
Practical implications
Overall, this study’s analysis suggests that the farmland preservation policy’s constraints on land use rights are likely to result in a major diminishment of the rural rental markets. Under this policy, land that is designated as basic farmland cannot be converted to another use. However, it remains possible to improve the productivity of agriculture through other means. These possible avenues for improvement include enhancing the efficiency of production through expanding the scale of farming operations and developing the social services aspect of agriculture (i.e. the basic farmland preservation policy is likely to realize more social revenue than can be gained from land transfers). Thus, the arrangement of the basic farmland preservation policy in China can be managed in a way that is both economical and reasonable.
Originality/value
To ensure food security, China has enacted several laws and regulations to preserve basic farmland, and it has promoted land transfers to improve farm productivity. Therefore, it is important to understand whether the basic farmland preservation policy restricts land use rights and hinders land transfers that could improve productivity. This study provides empirical evidence showing that the basic farmland preservation policy is actually not conducive to promoting land transfers and that it even discourages the market orientation of land rentals between acquaintances. In dealing with this issue, the Chinese Government should seek to balance the relationship between preserving basic farmland and promoting land transfers.
Details
Keywords
Analyzes policies from 96 law enforcement agencies on their use of less‐than‐lethal force. Includes a review of several topics: policy purpose, definitions of lethal and…
Abstract
Analyzes policies from 96 law enforcement agencies on their use of less‐than‐lethal force. Includes a review of several topics: policy purpose, definitions of lethal and less‐than‐lethal force, provisions for authorized and unauthorized weapons, training requirements, avoiding excessive force, medical aid and report requirements. Concludes that most policies are deficient in one or more topic areas. Provides recommendations on how to improve these policies.
Details