Search results

1 – 10 of 59
Article
Publication date: 31 July 2023

Prasetyo Adi Nugroho, Nove E. Variant Anna and Parveen Babbar

The aim of this study is to investigate the benefits and weaknesses of OpenVPN to access Osiris.

Abstract

Purpose

The aim of this study is to investigate the benefits and weaknesses of OpenVPN to access Osiris.

Design/methodology/approach

This study uses a case study approach to describe a phenomenon. The data collected from observation of the real-world environment.

Findings

The benefits of OpenVPN are the following: librarian can access the Osiris and other resources remotely and safely; OpenVPN protects the connection when accessing the Osiris; and librarian can also manage Osiris systems easily to control access, monitoring the users efficiently. However, there are some drawbacks of OpenVPN, such as network infrastructure dependency, require stabile internet connection, configuration complexity, to arrange and configurate OpenVPN needs skills and knowledge on the related field, data protection and security breach.

Originality/value

The originality of this study is the use of OpenVPN to access Osiris that is managed by library. There are some variables to determine the benefits and drawbacks of the OpenVPN such as managing access, data security and efficiency. This study gives an original contribution to the use of OpenVPN in academic libraries.

Details

Library Hi Tech News, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 7 July 2023

Wuyan Liang and Xiaolong Xu

In the COVID-19 era, sign language (SL) translation has gained attention in online learning, which evaluates the physical gestures of each student and bridges the communication…

Abstract

Purpose

In the COVID-19 era, sign language (SL) translation has gained attention in online learning, which evaluates the physical gestures of each student and bridges the communication gap between dysphonia and hearing people. The purpose of this paper is to devote the alignment between SL sequence and nature language sequence with high translation performance.

Design/methodology/approach

SL can be characterized as joint/bone location information in two-dimensional space over time, forming skeleton sequences. To encode joint, bone and their motion information, we propose a multistream hierarchy network (MHN) along with a vocab prediction network (VPN) and a joint network (JN) with the recurrent neural network transducer. The JN is used to concatenate the sequences encoded by the MHN and VPN and learn their sequence alignments.

Findings

We verify the effectiveness of the proposed approach and provide experimental results on three large-scale datasets, which show that translation accuracy is 94.96, 54.52, and 92.88 per cent, and the inference time is 18 and 1.7 times faster than listen-attend-spell network (LAS) and visual hierarchy to lexical sequence network (H2SNet) , respectively.

Originality/value

In this paper, we propose a novel framework that can fuse multimodal input (i.e. joint, bone and their motion stream) and align input streams with nature language. Moreover, the provided framework is improved by the different properties of MHN, VPN and JN. Experimental results on the three datasets demonstrate that our approaches outperform the state-of-the-art methods in terms of translation accuracy and speed.

Details

Data Technologies and Applications, vol. 58 no. 2
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 20 November 2023

Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain and Mahdi Nasrullah Al-Ameen

The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them…

Abstract

Purpose

The purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them as “security tools” in this paper, unless otherwise specified) are designed to protect the security and privacy of people in the digital environment. However, inappropriate use of these tools can lead to unexpected consequences that are preventable. Hence, it is significant to examine why users do not understand the security tools.

Design/methodology/approach

The authors conducted a qualitative study with 40 participants in the USA to investigate the prevalent misconceptions of people regarding security tools, their perceptions of data access and the corresponding impact on their usage behavior and data protection strategies.

Findings

While security vulnerabilities are often rooted in people’s internet usage behavior, this study examined user’s mental models of the internet and unpacked how the misconceptions about security tools relate to those mental models.

Originality/value

Based on the findings, this study offers recommendations highlighting the design aspects of security tools that need careful attention from researchers and industry practitioners, to alleviate users’ misconceptions and provide them with accurate conceptual models toward the desired use of security tools.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 26 April 2023

Anam Jamal Ansari and Naushad Ali PM

This paper aims to find out the digital services of management libraries provided during the library closure and the challenges and initiatives the libraries have taken up to…

Abstract

Purpose

This paper aims to find out the digital services of management libraries provided during the library closure and the challenges and initiatives the libraries have taken up to fulfill the need of their user community during the pandemic crisis.

Design/methodology/approach

To meet the purpose of the study, the investigators have used a survey method. An online questionnaire was devised and administered among the Indian Institutes of Management (IIMs) librarians using Microsoft Forms.

Findings

The study's findings suggested that all the libraries under investigation must avail of various digital library services in the wake of the coronavirus pandemic. Further, the investigators recommend that libraries formulate a disaster preparedness and management plan in the wake of the COVID-19 pandemic so that libraries can prepare themselves for the future.

Originality/value

The pandemic has affected every aspect of life and changed the digital library services scenario. Thus, it is essential to examine the role libraries have played during the COVID-19 pandemic and distinguish the challenges and initiatives libraries have taken to tackle the problems they faced. This study has been conducted on the digital library services that were provided by the libraries of IIMs.

Details

Digital Library Perspectives, vol. 39 no. 4
Type: Research Article
ISSN: 2059-5816

Keywords

Article
Publication date: 12 February 2024

Kate-Riin Kont

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates…

Abstract

Purpose

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.

Design/methodology/approach

The data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.

Findings

The research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.

Originality/value

The cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.

Details

Library Management, vol. 45 no. 1/2
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 6 June 2023

Zeljko Tekic, Andrei Parfenov and Maksim Malyy

Starting from intention–behaviour models and building upon the growing evidence that aggregated internet search query data represent a good proxy of human interests and…

Abstract

Purpose

Starting from intention–behaviour models and building upon the growing evidence that aggregated internet search query data represent a good proxy of human interests and intentions. The purpose of this study is to demonstrate that the internet search traffic information related to the selected key terms associated with establishing new businesses, reflects well the dynamics of entrepreneurial activity in a country and can be used for predicting entrepreneurial activity at the national level.

Design/methodology/approach

Theoretical framework is based on intention–behaviour models and supported by the knowledge spillover theory of entrepreneurship. Monthly data on new business registration from 2018 to 2021 is derived from the open database of the Russian Federal Tax Service. Terms of internet search interest are identified through interviews with the recent founders of new businesses, whereas the internet search query statistics on the identified terms are obtained from Google Trends and Yandex Wordstat.

Findings

The results suggest that aggregated data about web searches related to opening a new business in a country is positively correlated with the dynamics of entrepreneurial activity in the country and, as such, may be useful for predicting the level of that activity.

Practical implications

The results may serve as a starting point for a new approach to measure, monitor and predict entrepreneurial activities in a country and can help in better addressing policymaking issues related to entrepreneurship.

Originality/value

To the best of the authors’ knowledge, this study is original in its approach and results. Building on intention–behaviour models, this study outlines, to the best of the authors’ knowledge, the first usage of big data for analysing the intention–behaviour relationship in entrepreneurship. This study also contributes to the ongoing debate about the value of big data for entrepreneurship research by proposing and demonstrating the credibility of internet search query data as a novel source of quality data in analysing and predicting a country’s entrepreneurial activity.

Details

Journal of Entrepreneurship in Emerging Economies, vol. 16 no. 2
Type: Research Article
ISSN: 2053-4604

Keywords

Article
Publication date: 29 September 2022

Alka Rai and Sunil Maheshwari

The coronavirus crisis has a huge impact on how we work, learn and even live; the purpose of the study is to bring insights on different approaches to deal with challenging…

Abstract

Purpose

The coronavirus crisis has a huge impact on how we work, learn and even live; the purpose of the study is to bring insights on different approaches to deal with challenging situation like COVID-19. For this reason, the study will facilitate to develop understanding on how to conquer the hurdle of business continuity during challenging times, along with dealing of other challenges like ensuring health and well-being of employees, abiding by the regulation and guidelines, prioritizing the need and handling of different resources (most importantly human).

Design/methodology/approach

The data was collected from case study organization during May 2020. For data collection, various internal documents from the case study organization were referred, including various report, circulars, guidelines, office information note. Further, press release and information from website of the case company were also explored. The interview of different group of decision makers (i.e. top management, human resource managers and head at plant sites) was also performed during data collection.

Findings

The study has initiated to identify with the approach of the case company to deal with the COVID-19 pandemic and to overcome the challenges posed by unprecedented crisis.

Originality/value

The COVID-19 crisis has underlined the significance of the power utilities, as electricity is critical to ensure the smooth functioning of various sectors of the economy. Considering the importance of power sector for economy, this article has taken to investigate the crisis management model of one of India’s major power producer companies.

Details

The Learning Organization, vol. 30 no. 5
Type: Research Article
ISSN: 0969-6474

Keywords

Article
Publication date: 17 August 2021

Abir Al-Harrasi, Abdul Khalique Shaikh and Ali Al-Badi

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and…

1126

Abstract

Purpose

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was to investigate and identify the threats related to data theft caused by insiders in organisations and explore the efforts made by them to control data leakage.

Design/methodology/approach

The study proposed a conceptual model to protect organisations’ data by preventing data theft by malicious insiders. The researchers conducted a comprehensive literature review to achieve the objectives of this study. The collection of the data for this study is based on earlier studies conducted by several researchers from January 2011 to December 2020. All the selected literature is from journal articles, conference articles and conference proceedings using various databases.

Findings

The study revealed three main findings: first, the main risks inherent in data theft are financial fraud, intellectual property theft, and sabotage of IT infrastructure. Second, there are still some organisations that are not considering data theft by insiders as being a severe risk that should be well controlled. Lastly, the main factors motivating the insiders to perform data leakage activities are financial gain, lack of fairness and justice in the workplace, the psychology or characteristics of the insiders, new technologies, lack of education and awareness and lack of management tools for understanding insider threats.

Originality/value

The study provides a holistic view of data theft by insiders, focusing on the problem from an organisational point of view. Organisations can therefore take into consideration our recommendations to reduce the risks of data leakage by their employees.

Details

International Journal of Organizational Analysis, vol. 31 no. 3
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 9 July 2021

Alanah Mitchell

This paper aims to explore key collaboration technology affordances from virtual collaboration and remote work during the time of COVID-19. The purpose of this exploration is to…

3964

Abstract

Purpose

This paper aims to explore key collaboration technology affordances from virtual collaboration and remote work during the time of COVID-19. The purpose of this exploration is to improve the understanding of technology-supported collaboration in order to achieve individual and organizational success with the adoption, use and implementation of virtual collaboration in a pandemic and post-pandemic world.

Design/methodology/approach

Qualitative data is collected from 55 graduate students during a time of work transition due to COVID-19. This paper distills key collaboration technology affordances identified from participant feedback.

Findings

This paper identifies topics of virtual collaboration success as well as challenges related to organizational transitions during COVID-19. The findings from this work relate to four collaboration technology affordances including: (1) flexibility and productivity, (2) social connectedness and organizational culture, (3) technology support and (4) management and leadership. Additionally, this research provides insight into the complexities of virtual collaboration in these areas while also making recommendations for the post-pandemic future.

Originality/value

This research makes a contribution through the analysis of a unique set of data elaborating on participant experiences during a global pandemic as well as through the exploration of future implications.

Details

Information Technology & People, vol. 36 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 29 December 2023

Nadeem Siddique, Muhammad Safdar, Adeel Ahmad and Muhammad Ajmal Khan

The paper aims to systematically collect and review the literature on work from home (WFH) and libraries. Another objective of the review is to identify the services professionals…

Abstract

Purpose

The paper aims to systematically collect and review the literature on work from home (WFH) and libraries. Another objective of the review is to identify the services professionals offered while WFH, tools used, challenges and opportunities in this connection.

Design/methodology/approach

The study consulted four databases, namely, Web of Science, Scopus, Google Scholar and Library, Information Science and Technology Abstracts, to collect and review the literature on the topic. Preferred Reporting Items for Systematic Reviews and Meta-Analyses guideline was used to select the eligible studies for this review. A total of 27 studies out of 1,571 were considered eligible for the study. The authors also consulted Boynton and Greenhalgh (2004) guide for assessing the quality of the reviewed research. All types of studies and except books were selected for the review. However, the researchers did not apply the time limitation.

Findings

The research identified that libraries provided various services, including Mystery Box, live chat and 24-hour service, using different tools, including MS Teams, Zoom and Google Meet, while WFH. The study shared different challenges and opportunities identified from the reviewed literature, for libraries.

Originality/value

To the best of the authors’ knowledge, this is the first systematic review conducted to systematically collect and review the literature produced on WFH in terms of libraries regarding offered services, tools used to serve the users, challenges and opportunities. The review filled the literature gap and shared implications for library professionals and related stakeholders.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

1 – 10 of 59