Search results

1 – 10 of over 191000
Article
Publication date: 11 April 2023

Zeyneb Hafsa Orhan, Sajjad Zaheer and Fatih Kazancı

This paper aims to achieve two goals: first, to evaluate the existing interest-free monetary policy tools in the major Islamic financial hubs of Malaysia, Pakistan and Bahrain…

Abstract

Purpose

This paper aims to achieve two goals: first, to evaluate the existing interest-free monetary policy tools in the major Islamic financial hubs of Malaysia, Pakistan and Bahrain and; second, to suggest how monetary policy tools in Turkey can be used in other countries.

Design/methodology/approach

This study follows a qualitative research method based on literature review, comparison, evaluation and design.

Findings

The policy rate cannot be used due to Shariah concerns. The reserve requirement depends on qard, and the reserves should be kept separately in the central bank. In terms of ijarah sukuk, Shariah concerns should be taken into account and a new structure, as displayed in Figure 3, should be followed. Government investment certificates can be used as an interest-free monetary policy tool. A genuine mudarabah interbank investments can also be used. Wadiah acceptance with no habitual gift can be used as well, and Tawarruq and central bank notes are not preferable due to Shariah concerns as well. Having said that, a Turkey-based tawarruq platform can be structured for others to use instead of applying to London.

Originality/value

This paper’s unique suggestion is to develop an interbank taqaruz market and a taqaruz method with the central bank. It is also unique for Turkey in the subject.

Details

Qualitative Research in Financial Markets, vol. 16 no. 1
Type: Research Article
ISSN: 1755-4179

Keywords

Article
Publication date: 10 June 2019

Lin Jia, Lijuan Huang, Zhijun Yan, Dianne Hall, Jiahe Song and David Paradice

Although the use of instant messaging (IM) at work has been studied in the IS field, its effective use and impact on performance have not been adequately addressed. The purpose of…

Abstract

Purpose

Although the use of instant messaging (IM) at work has been studied in the IS field, its effective use and impact on performance have not been adequately addressed. The purpose of this paper is to explore the antecedents and consequences of the effective use of IM at work by adapting Burton-Jones and Grange’s theory of effective use.

Design/methodology/approach

The authors introduce “Comprehensive IM policy” as a facilitator of adaptation and learning actions to improve the effective use of IM, which will improve communication quality and productivity. The impact of IM competence on effective use is also discussed. Based on a survey of 215 managers, this study applies the partial least square technique to test the research model.

Findings

The results indicate that comprehensive IM policy encourages adaptation and learning actions, which improve the effective use of IM and thereafter improve communication quality and productivity. Meanwhile, IM competence has a substitutive interaction effect with IM reconfiguration and self-learning on effective use.

Originality/value

The results refine the general theory of effective use and provide managers with an approach to leverage IM use at work for performance gains.

Details

Information Technology & People, vol. 33 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 December 2020

Alexis Rain Rockwell, Stephen A. Bishopp and Erin A. Orrick

The current study examines the effect of changing a specific use-of-force policy coupled with de-escalation training implementation on patterns of police use of force.

Abstract

Purpose

The current study examines the effect of changing a specific use-of-force policy coupled with de-escalation training implementation on patterns of police use of force.

Design/methodology/approach

An interrupted time-series analysis was used to examine changes in police use-of-force incident records gathered from a large, southwestern US metropolitan police department from 2013 to 2017 based on a TASER policy change and de-escalation training implementation mid-2015.

Findings

Results demonstrate that changes to use-of-force policy regarding one type of force (i.e. use of TASERs) coinciding with de-escalation training influence the prevalence of use-of-force incidents by increasing the reported police use-of-force incidents after the changes were implemented. This finding is somewhat consistent with prior literature but not always in the desired direction.

Practical implications

When police departments make adjustments to use-of-force policies and/or trainings, unintended consequences may occur. Police administrators should measure policy and training outcomes under an evidence-based policing paradigm prior to making those adjustments.

Originality/value

This study is the first to measure the effects of changing use-of-force policy and implementing de-escalation techniques in training on patterns of police use of force and shows that these changes can have a ripple effect across types of force used by police officers.

Details

Policing: An International Journal, vol. 44 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 14 August 2009

Jennifer L. Paschal, Dianna L. Stone and Eugene F. Stone‐Romero

The widespread use of electronic mail (e‐mail) at work has prompted a growing number of companies to implement e‐mail policies to protect both business interests and the privacy…

1454

Abstract

Purpose

The widespread use of electronic mail (e‐mail) at work has prompted a growing number of companies to implement e‐mail policies to protect both business interests and the privacy of employees. However, very little is known about the effects of such policies on such outcomes for employees such as perceived invasiveness and fairness. Thus, the paper aims to consider these issues.

Design/methodology/approach

This paper uses a 2×2 experimental design and a sample of 592 employed internet users to examine the effects of e‐mail policy characteristics (i.e. policy restrictiveness and policy justification) on perceptions of invasion of privacy (invasiveness) and fairness.

Findings

Results indicate that policy restrictiveness has effects on both invasiveness and fairness, and that policy justification has an effect on fairness. In addition, privacy values are related to both invasiveness and fairness, and moderated the effect of policy restrictiveness on fairness.

Practical implications

Implications for practice and the integration of organizational justice and organizational privacy theory are discussed. In terms of practice, for example, the study's results have implications for the formulation and enforcement of policies concerning the use of e‐mail systems.

Originality/value

This paper is the first to consider the effects of e‐mail policies on employee reactions (i.e. fairness and invasiveness).

Details

Journal of Managerial Psychology, vol. 24 no. 6
Type: Research Article
ISSN: 0268-3946

Keywords

Article
Publication date: 7 April 2015

Mehdia Ajana El Khaddar, Mhammed Chraibi, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi and Abdelilah Maach

This paper aims to demonstrate that a policy-based middleware solution which facilitates the development of context-aware applications and the integration of the heterogeneous…

Abstract

Purpose

This paper aims to demonstrate that a policy-based middleware solution which facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. Ubiquitous computing targets the provision of seamless services and applications by providing an environment that involves a variety of devices having different capabilities. These applications help transforming the physical spaces into computationally active and smart environments. The design of applications in these environments needs to consider the heterogeneous devices, applications preferences and rapidly changing contexts. The applications, therefore, need to be context-aware so that they can adapt to different situations in real-time.

Design/methodology/approach

In this paper, we argue that a policy-based middleware solution that facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. The middleware allows applications to track items and acquire contextual information about them easily, reason about this information captured using different logics and then adapt to changing contexts. A key issue in these environments is to allow heterogeneous applications to express their business rules once, and get the preferred data once they are captured by the middleware without any intervention from the application side.

Findings

Our middleware tackles this problem by using policies to define the different applications’ rules and preferences. These policies can specify rules about the middleware services to be used, type of data captured, devices used, user roles, context information and any other type of conditions.

Originality/value

In this paper, we propose the design of a flexible and performant ubiquitous computing, and context-aware middleware called FlexRFID along with its evaluation results.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 8 December 2022

Svetlana Davis, Sara A. Murphy and Joanna Watkins

The present research aims to understand how and why flexible work arrangement (FWA) policy use by co-workers affects policy non-users by investigating perceived changes to work…

Abstract

Purpose

The present research aims to understand how and why flexible work arrangement (FWA) policy use by co-workers affects policy non-users by investigating perceived changes to work, fairness and organizational identification as factors that shape policy non-users’ job satisfaction.

Design/methodology/approach

A survey was distributed to 300 Canadian respondents solicited from an online panel owned by Qualtrics Inc. Hypotheses were developed and tested using a moderating mediation model. SPSS Macro Process (Hayes) was used to test the hypotheses.

Findings

This survey found that perceiving negative changes to work stemming from co-worker FWA use corresponded to policy non-user job satisfaction, fairness dimensions mediated this effect and organizational identification moderated the relationship driven by interactional fairness. Policy non-users who care most about organizations seem to be most vulnerable to the negative consequences associated with co-worker FWA policy use.

Originality/value

FWA use has been linked to many positive outcomes for policy users. However, the workplace adjustments that occur to accommodate policy use by co-workers could also have implications for policy non-users. This study explores the effects of FWA policy use by co-workers on policy non-users job satisfaction.

Details

Employee Relations: The International Journal, vol. 45 no. 2
Type: Research Article
ISSN: 0142-5455

Keywords

Open Access
Article
Publication date: 13 February 2023

Elham Rostami, Fredrik Karlsson and Shang Gao

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

1194

Abstract

Purpose

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

Design/methodology/approach

This study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden.

Findings

This study’s demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs.

Research limitations/implications

The proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process.

Practical implications

Practitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs.

Originality/value

The proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 21 August 2007

Gregorio Martínez Pérez, Félix J. García Clemente and Antonio F. Gómez Skarmeta

The purpose of the paper is to provide a two‐tier framework for managing semantic‐aware distributed firewall policies to be applied to the devices existing in one administrative…

Abstract

Purpose

The purpose of the paper is to provide a two‐tier framework for managing semantic‐aware distributed firewall policies to be applied to the devices existing in one administrative domain.

Design/methodology/approach

Special attention is paid to the CIM‐based information model defined as the ontology to be used in this framework and the AI‐based reasoning mechanisms and components used to perform the conflict discovery tasks over the distributed firewall policies.

Findings

Mechanisms presented allow the solving some of the current issues of the network‐centric security model being used in the Internet. The two‐tier framework designed provides semantic‐aware mechanisms to perform conflict detection and automatic enforcement of policy rules in the distributed firewall scenario. This framework is based on the use of a standard information model and a semantic‐aware policy language to formally define (and then process) firewall policies.

Research limitations/implications

Ongoing work is focused on identifying all kind of conflicts and anomalies that may exist in firewall systems; in parallel to this task a semi‐automatic resolver of conflicting policies is currently under design.

Practical implications

Network and security administrators can specify firewall policies and validate them to find syntactic and semantic errors (i.e. policy conflicts). A framework for automated validation and distribution of policies at different levels is included. This ensures that firewall policies produce the desired effects, facilitating the creation and maintenance of firewall rules in one administrative domain.

Originality/value

A practical and novel two‐tier system that provides detection of conflicts in rules existing in a distributed firewall scenario and the automatic and secure deployment of these rules. A packet‐filtering model, which is simple and powerful enough for the conflict discovery and rule analysis processes, has been proposed. Moreover, ontology and rule reasoning are being proposed as techniques for the conflict detection problem in this particular scenario.

Details

Internet Research, vol. 17 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 25 September 2019

Tongwei Qiu, Biliang Luo, Shangpu Li and Qinying He

The purpose of this paper is to assess the links between basic farmland preservation and land transfers in rural China.

Abstract

Purpose

The purpose of this paper is to assess the links between basic farmland preservation and land transfers in rural China.

Design/methodology/approach

The Chinese provincial panel data from 2006 to 2016 were analyzed with the use of Arellano–Bond linear dynamic panel data estimations.

Findings

The basic farmland preservation policy negatively affects the land transfer rate. In addition, this policy is most likely to limit land transfers between local acquaintances in the major grain-producing areas. Further evidence indicates that the basic farmland preservation policy has a negative impact on land rentals in general. Considering that land transfers such as exchanges and take-overs are excluded from rental transactions between acquaintances, the policy’s constraints on land use are likely to hinder land rentals between acquaintances, which are market-oriented.

Practical implications

Overall, this study’s analysis suggests that the farmland preservation policy’s constraints on land use rights are likely to result in a major diminishment of the rural rental markets. Under this policy, land that is designated as basic farmland cannot be converted to another use. However, it remains possible to improve the productivity of agriculture through other means. These possible avenues for improvement include enhancing the efficiency of production through expanding the scale of farming operations and developing the social services aspect of agriculture (i.e. the basic farmland preservation policy is likely to realize more social revenue than can be gained from land transfers). Thus, the arrangement of the basic farmland preservation policy in China can be managed in a way that is both economical and reasonable.

Originality/value

To ensure food security, China has enacted several laws and regulations to preserve basic farmland, and it has promoted land transfers to improve farm productivity. Therefore, it is important to understand whether the basic farmland preservation policy restricts land use rights and hinders land transfers that could improve productivity. This study provides empirical evidence showing that the basic farmland preservation policy is actually not conducive to promoting land transfers and that it even discourages the market orientation of land rentals between acquaintances. In dealing with this issue, the Chinese Government should seek to balance the relationship between preserving basic farmland and promoting land transfers.

Details

China Agricultural Economic Review, vol. 12 no. 1
Type: Research Article
ISSN: 1756-137X

Keywords

Article
Publication date: 1 March 1997

Tom McEwen

Analyzes policies from 96 law enforcement agencies on their use of less‐than‐lethal force. Includes a review of several topics: policy purpose, definitions of lethal and…

2201

Abstract

Analyzes policies from 96 law enforcement agencies on their use of less‐than‐lethal force. Includes a review of several topics: policy purpose, definitions of lethal and less‐than‐lethal force, provisions for authorized and unauthorized weapons, training requirements, avoiding excessive force, medical aid and report requirements. Concludes that most policies are deficient in one or more topic areas. Provides recommendations on how to improve these policies.

Details

Policing: An International Journal of Police Strategies & Management, vol. 20 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

1 – 10 of over 191000