Search results

1 – 10 of 154
Article
Publication date: 25 April 2024

Jayme Stewart, Jessie Swanek and Adelle Forth

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying…

Abstract

Purpose

Despite representing a relatively small portion of the population, those who experience repeat victimization make up a significant share of all sexual and violent crimes, implying that perpetrators target them repeatedly. Indeed, research reveals specific traits (e.g. submissiveness) and behaviors (e.g. gait) related to past victimization or vulnerability. The purpose of this study is to explore the link between personality traits, self-assessed vulnerability and nonverbal cues.

Design/methodology/approach

In all, 40 undergraduate Canadian women were videotaped while recording a dating profile. Self-report measures of assertiveness, personality traits and vulnerability ratings for future sexual or violent victimization were obtained following the video-recording. The videotape was coded for nonverbal behaviors that have been related to assertiveness or submissiveness.

Findings

Self-perceived sexual vulnerability correlated with reduced assertiveness and dominance and increased emotionality (e.g. fear and anxiety). Additionally, nonverbal behaviors differed based on personality traits: self-touch was linked to lower assertiveness, dominance and extraversion and higher submissiveness, emotionality and warm-agreeableness.

Originality/value

To the best of the authors’ knowledge, this is the first study of its kind to consider the relationships between personality, self-perceived vulnerability and nonverbal behaviors among college-aged women. Potential implications, including enhancing autonomy and self-efficacy, are discussed.

Details

Journal of Criminal Psychology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2009-3829

Keywords

Article
Publication date: 24 April 2024

Jan Mei Soon-Sinclair, Rounaq Nayak and Louise Manning

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used…

Abstract

Purpose

The 2008 Chinese melamine milk scandal resulted in six reported fatalities and affected around 300,000 children, of whom 54,000 were hospitalised. Previous studies have used linear approaches to examine the root causes of the melamine milk scandal.

Design/methodology/approach

In the present study, we applied a systems approach to the melamine milk scandal to identify the complex systems-level failures across the supply chain leading to the incident and why food fraud incidents such as this occurred in the dairy sector. Additionally, systemic failures associated with food fraud vulnerability factors were considered (i.e. opportunities, motivation and control measures).

Findings

48 contributory factors of influence were identified and grouped across six sociotechnical levels across the Chinese dairy system, from government to equipment and surroundings. Lack of vertical integration (processes and communication) contributed to the failure. When viewed from a broader perspective, the melamine milk scandal can be linked to a series of human errors and organisational issues associated with government bodies, the dairy supply chain, individual organisations and management decisions and individual actions of staff or processes.

Practical implications

This approach is of value to policymakers and the industry as it supports public health investigations of food fraud incidents and proactive food safety management.

Originality/value

To the best of our knowledge, this is the first study to analyse a food safety or fraud incident using the AcciMap approach and the food fraud vulnerability assessment (FFVA) technique. AcciMap analysis is applied to both unintentional and intentional aspects of the incident.

Details

British Food Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0007-070X

Keywords

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 June 2022

Mina Safizadeh, Massoomeh Hedayati Marzbali, Aldrin Abdullah and Nor Zarifah Maliki

Because of the global increase of climate change effects, floods are becoming more frequent and severer, especially in urban areas of coastal cities and islands where floodplains…

Abstract

Purpose

Because of the global increase of climate change effects, floods are becoming more frequent and severer, especially in urban areas of coastal cities and islands where floodplains have turned into buildings because of rapid urbanisation, leading to a higher risk of damages. Urban heritage areas should be highly considered in the time of evacuation because of the vulnerability of streets and buildings and limitations on taking counteractions. Given these limitations, this study aims to propose a network of potential evacuation routes based on spatial configuration analysis of the heritage areas.

Design/methodology/approach

Penang Island's heritage site, namely, George Town, located on the northwest coast of Malaysia, is chosen as the case study. By using an approach of spatial configuration analysis using space syntax techniques in addition to considering the potential starting points for evacuation and flood risk map of the area, this study analysed the area's street network values for evacuation function during flood crisis time.

Findings

Potential evacuation routes were identified for flood disasters in the George Town heritage area. Furthermore, the proposed evacuation routes were evaluated in terms of time for evacuation by metric step-depth analysis of space syntax.

Originality/value

A few studies have focused on practical guidelines for evacuation routes based on spatial configuration analysis, an important yet neglected approach in this regard, especially concerning urban island areas. This study can contribute to providing strategies to reduce vulnerability and casualties in urban heritage areas.

Details

Journal of Facilities Management , vol. 22 no. 2
Type: Research Article
ISSN: 1472-5967

Keywords

Case study
Publication date: 24 April 2024

Elena Loutskina, Gerry Yemen and Jenny Mead

This case requires students to evaluate alternative dual-share-class corporate structures that allow companies and entrepreneurs to pursue profit with purpose. The case explores…

Abstract

This case requires students to evaluate alternative dual-share-class corporate structures that allow companies and entrepreneurs to pursue profit with purpose. The case explores Impact Makers, an IT consulting company based in Richmond, Virginia. While original founders of the firm hold all voting rights, the cash flow rights belong to two nonprofits setting the stage for a Newman's Own model of management consulting. The case discusses whether and how the alternative corporate structure aids the firm's overall strategy to attract top-quality employees, pay them competitive salaries, and provide superior service to its clients while donating 100% of its lifetime value to charitable causes, largely through partnerships with various nonprofit organizations. More importantly, the case asks students to evaluate how such a dual-share-class and dual-purpose company can raise capital to fund continued growth.

The case opens with CEO Michael Pirron reminding himself of all the questions he had run through to execute a strategy to further grow Impact Makers' consulting business both through expanding a menu of services and through conquering new geographical markets. To do either, or both, the company needed a cash infusion. Internal cash was limited, as up to 40% of it flowed to charitable partners, demonstrating Impact Makers' commitment to its mission. Raising debt for a company without fixed assets was challenging and time consuming. Complicating it all was that being structured as a nonstock corporation rendered equity raising difficult. Could Impact Makers raise money to grow and stay true to community values at the same time?

Details

Darden Business Publishing Cases, vol. no.
Type: Case Study
ISSN: 2474-7890
Published by: University of Virginia Darden School Foundation

Keywords

Article
Publication date: 20 March 2024

Ahmad Mtair Al-Hawamleh

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless…

Abstract

Purpose

The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-government services, aiming to improve efficiency, accessibility and citizen-centricity. Nonetheless, the country faces challenges such as evolving cyber threats. The purpose of this study is to investigate the factors influencing cybersecurity practices to ensure the reliability and security of e-government services.

Design/methodology/approach

This paper investigates the multifaceted dynamics of cybersecurity practices and their impact on the quality and effectiveness of e-government services. Five key factors explored include organizational culture, technology infrastructure, adherence to standards and regulations, employee training and awareness and financial investment in cybersecurity. This study used a quantitative method to gather data from 320 participants. The researcher collected 285 completed questionnaires, excluding unusable or incomplete responses, and analyzed the final data set using partial least squares structural equation modeling.

Findings

The findings show that financial investment in cybersecurity, employee training and awareness and adherence to cybersecurity regulations significantly influence the adoption of robust cybersecurity practices. However, the relationship between organizational culture and cybersecurity practices is less straightforward. The research establishes a strong positive correlation between cybersecurity practices and e-government service quality, highlighting the role of security in fostering public trust and user satisfaction and meeting the evolving needs of citizens and businesses.

Originality/value

This research contributes valuable empirical evidence to the fields of e-government and cybersecurity, offering insights that can inform evidence-based policy decisions and resource allocation. By understanding the nuanced dynamics at play, Saudi Arabia is better poised to fortify its digital governance infrastructure and provide secure, high-quality e-government services to its constituents.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 16 August 2022

Khadija Echefaj, Abdelkabir Charkaoui, Anass Cherrafi, Anil Kumar and Sunil Luthra

The purpose of this study is to identify and prioritize capabilities and practices to ensure a resilient supply chain during an unexpected disruption. In addition, this study…

Abstract

Purpose

The purpose of this study is to identify and prioritize capabilities and practices to ensure a resilient supply chain during an unexpected disruption. In addition, this study ranks maturity factors that influence the main capabilities identified.

Design/methodology/approach

This paper is conducted in three stages. First, capabilities and practices are extracted through a literature review. Second, capabilities and practices are ranked using the analytical hierarchical process method. Third, a gray technique for order preference by similarity to ideal solution method is used to rank maturity factors influencing capabilities.

Findings

The findings indicate that responsiveness, readiness, flexibility and adaptability are the most important capabilities for supply chain resilience. Also, commitment and communication are the highest maturity factors influencing resilience capabilities.

Research limitations/implications

The findings provide a hierarchical vision of capabilities and practices for industries to increase resilience. Limitations of the paper are related to capabilities, practices and number of experts consulted.

Practical implications

This paper highlights the importance of high-maturity practices in resilience capability adoption. The findings of this study will encourage decisions-makers to increase maturity practices to build resilience against disruption.

Originality/value

The paper reveals that developing powerful capabilities, good practices and a high level of maturity improve supply chain resilience.

Details

Journal of Global Operations and Strategic Sourcing, vol. 17 no. 2
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 26 January 2023

Afiqah R. Radzi, Nur Farhana Azmi, Syahrul Nizam Kamaruzzaman, Rahimi A. Rahman and Eleni Papadonikolaki

Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result…

Abstract

Purpose

Digital twin (DT) and building information modeling (BIM) are interconnected in some ways. However, there has been some misconception about how DT differs from BIM. As a result, industry professionals reject DT even in BIM-based construction projects due to reluctance to innovate. Furthermore, researchers have repeatedly developed tools and techniques with the same goals using DT and BIM to assist practitioners in construction projects. Therefore, this study aims to assist industry professionals and researchers in understanding the relationship between DT and BIM and synthesize existing works on DT and BIM.

Design/methodology/approach

A systematic review was conducted on published articles related to DT and BIM. A total record of 54 journal articles were identified and analyzed.

Findings

The analysis of the selected journal articles revealed four types of relationships between DT and BIM: BIM is a subset of DT, DT is a subset of BIM, BIM is DT, and no relationship between BIM and DT. The existing research on DT and BIM in construction projects targets improvements in five areas: planning, design, construction, operations and maintenance, and decommissioning. In addition, several areas have emerged, such as developing geo-referencing approaches for infrastructure projects, applying the proposed methodology to other construction geometries and creating 3D visualization using color schemes.

Originality/value

This study contributed to the existing body of knowledge by overviewing existing research related to DT and BIM in construction projects. Also, it reveals research gaps in the body of knowledge to point out directions for future research.

Details

Construction Innovation , vol. 24 no. 3
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 15 December 2022

Tanuj Mathur and Ujjwal Kanti Paul

Home insurance is widely recognised as a tool for mitigating economic risk associated with natural disasters. This study aims to analyse the influence of homeowners’ home…

Abstract

Purpose

Home insurance is widely recognised as a tool for mitigating economic risk associated with natural disasters. This study aims to analyse the influence of homeowners’ home insurance knowledge (both objective and subjective types), perceived benefits (PB) and perceived vulnerability towards disaster loss (PVUL) on their intention to purchase (ITP).

Design/methodology/approach

This research makes use of survey data collected from 394 respondents (the homeowners) residing in various parts of India. The structural equation modelling is used to verify 11 hypotheses proposed in the study.

Findings

The findings indicate that both objective knowledge (OK) and subjective knowledge (SK) of home insurance have significant influence on homeowners’ benefit perception and PVUL. The homeowners’ PB of home insurance negatively affect PVUL. The OK of home insurance has a stronger influence on homeowners’ ITP home insurance than SK while the homeowners benefit perceptions and PVUL significantly affects homeowners’ ITP home insurance. These findings confirms that if homeowners are knowledgeable about home insurance, they perceive the plans as more beneficial and feel less vulnerable about catastrophic events, resulting in positive intentions towards purchasing them.

Originality/value

To the best of the authors’ knowledge, this is the first comprehensive research that assesses the Indian homeowners’ knowledge, PB and PVUL in influencing their ITP home insurance. The finding of this paper will assist both public and private insurance companies in India and similar markets in designing and implementing effective strategies to sell home insurance policies.

Details

International Journal of Housing Markets and Analysis, vol. 17 no. 3
Type: Research Article
ISSN: 1753-8270

Keywords

1 – 10 of 154