Search results

1 – 10 of 10
Article
Publication date: 29 November 2023

Emine Sendurur and Sonja Gabriel

This study aims to discover how domain familiarity and language affect the cognitive load and the strategies applied for the evaluation of search engine results pages (SERP).

Abstract

Purpose

This study aims to discover how domain familiarity and language affect the cognitive load and the strategies applied for the evaluation of search engine results pages (SERP).

Design/methodology/approach

This study used an experimental research design. The pattern of the experiment was based upon repeated measures design. Each student was given four SERPs varying in two dimensions: language and content. The criteria of students to decide on the three best links within the SERP, the reasoning behind their selection, and their perceived cognitive load of the given task were the repeated measures collected from each participant.

Findings

The evaluation criteria changed according to the language and task type. The cognitive load was reported higher when the content was presented in English or when the content was academic. Regarding the search strategies, a majority of students trusted familiar sources or relied on keywords they found in the short description of the links. A qualitative analysis showed that students can be grouped into different types according to the reasons they stated for their choices. Source seeker, keyword seeker and specific information seeker were the most common types observed.

Originality/value

This study has an international scope with regard to data collection. Moreover, the tasks and findings contribute to the literature on information literacy.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1033

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Case study
Publication date: 24 April 2024

Kimberly A. Whitler, Graham D. Wells and Gerry Yemen

Few cases allow the student to understand the relationship between brand strategy, marketing strategy, implementation, and analysis. While some conceive of the process as being…

Abstract

Few cases allow the student to understand the relationship between brand strategy, marketing strategy, implementation, and analysis. While some conceive of the process as being sequential, this case demonstrates that in fact, this process is more fluid, and that implementation and analysis impact subsequent strategy.

This field-based case provides a rare glimpse into the turnaround of a brand that was all but dead. After Buick suffered more than five decades of declining business results and an inferior brand image versus all rivals, few thought that the brand could be resuscitated. This case provides a valuable under-the-hood look at how the Buick team, over time, progresses through a series of marketing improvements all anchored on an evolved strategy. Specifically, Buick introduced a shift in brand strategy behind an evolved brand essence statement (i.e., brand positioning), improved product lineup, new-to-the-world innovation, enhanced dealership service, and more compelling advertising. The results led to a record number of product awards, significantly improved advertising measures, improved service ratings, and better business results.

Despite significant improvement across multiple dimensions of the business, Buick still trailed key competitors on one of the most important measures Buick tracked—the brand momentum rating—suggesting that there was still more work needed to complete the brand turnaround. The case introduces Molly Peck, the new marketing director on Buick, who is wondering what more, if anything, Buick should do. The material allows for instruction around marketing strategy and the process of converting it into implementation through the use of a creative brief.

Details

Darden Business Publishing Cases, vol. no.
Type: Case Study
ISSN: 2474-7890
Published by: University of Virginia Darden School Foundation

Keywords

Open Access
Article
Publication date: 5 April 2024

Miquel Centelles and Núria Ferran-Ferrer

Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific…

Abstract

Purpose

Develop a comprehensive framework for assessing the knowledge organization systems (KOSs), including the taxonomy of Wikipedia and the ontologies of Wikidata, with a specific focus on enhancing management and retrieval with a gender nonbinary perspective.

Design/methodology/approach

This study employs heuristic and inspection methods to assess Wikipedia’s KOS, ensuring compliance with international standards. It evaluates the efficiency of retrieving non-masculine gender-related articles using the Catalan Wikipedian category scheme, identifying limitations. Additionally, a novel assessment of Wikidata ontologies examines their structure and coverage of gender-related properties, comparing them to Wikipedia’s taxonomy for advantages and enhancements.

Findings

This study evaluates Wikipedia’s taxonomy and Wikidata’s ontologies, establishing evaluation criteria for gender-based categorization and exploring their structural effectiveness. The evaluation process suggests that Wikidata ontologies may offer a viable solution to address Wikipedia’s categorization challenges.

Originality/value

The assessment of Wikipedia categories (taxonomy) based on KOS standards leads to the conclusion that there is ample room for improvement, not only in matters concerning gender identity but also in the overall KOS to enhance search and retrieval for users. These findings bear relevance for the design of tools to support information retrieval on knowledge-rich websites, as they assist users in exploring topics and concepts.

Open Access
Article
Publication date: 3 August 2023

Fury Maulina, Mubasysyir Hasanbasri, Jamiu O. Busari and Fedde Scheele

This study aims to examine how an educational intervention, using the lens of the LEADS framework, can influence the development of primary care doctors’ leadership skills in…

Abstract

Purpose

This study aims to examine how an educational intervention, using the lens of the LEADS framework, can influence the development of primary care doctors’ leadership skills in Aceh, Indonesia. In order to persevere in the face of inadequate resources and infrastructure, particularly in rural and remote settings of low- and middle‐income countries, physicians require strong leadership skills. However, there is a lack of information on leadership development in these settings.

Design/methodology/approach

This study applied an educational intervention consisting of a two-day workshop. The authors evaluated the impact of the workshop on participants’ knowledge and skill by combining quantitative pre- and post-intervention questionnaires (based on Levels 1 and 2 of Kirkpatrick’s model) with qualitative post-intervention in-depth interviews, using a phenomenological approach and thematic analysis.

Findings

The workshop yielded positive results, as evidenced by participants’ increased confidence to apply and use the information and skills acquired during the workshop. Critical success factors were as follows: participants were curiosity-driven; the use of multiple learning methodologies that attracted participants; and the use of authentic scenarios as a critical feature of the program.

Originality/value

The intervention may offer a preliminary model for improving physician leadership skills in rural and remote settings by incorporating multiple teaching approaches and considering local cultural norms.

Details

Leadership in Health Services, vol. 37 no. 5
Type: Research Article
ISSN: 1751-1879

Keywords

Case study
Publication date: 24 April 2024

Jared D. Harris, Samuel L. Slover, Bradley R. Agle, George W. Romney, Jenny Mead and Jimmy Scoville

In early 2014, recent Stanford University graduate Tyler Shultz was in a quandary. He had been working at Theranos, a blood-diagnostic company founded by Elizabeth Holmes, a…

Abstract

In early 2014, recent Stanford University graduate Tyler Shultz was in a quandary. He had been working at Theranos, a blood-diagnostic company founded by Elizabeth Holmes, a Stanford-dropout wunderkind, for almost a year. Shultz had learned enough about the company to realize that its practices and the efficacy of its much-touted finger-prick blood-testing technology were questionable and that the company was going to great lengths to hide this fact from the public and from regulators.

Theranos and Holmes were Silicon Valley darlings, enjoying positive press and lavish attention from potential investors and technology titans alike. Just as companies like PayPal had revolutionized the stagnant payments industry and Uber had upended the for-hire transportation sector, Theranos had been positioned as the latest technology firm to substantially disrupt yet another mature sector: the medical laboratory business. By the start of 2014, the company had raised more than $400 million in funding, and had an estimated market valuation of $9 billion.

Shultz's situation was exacerbated by the fact that his grandfather, the highly respected former US Secretary of State George Shultz, was on the Theranos board and was one of Elizabeth Holmes's biggest supporters.

But Tyler Shultz worried about the customers he was convinced were receiving highly unreliable and often inaccurate blood-test results. With so much at stake, Shultz wondered how he should proceed. Should he raise his concerns with the firm's investors? Blow the whistle externally? Report to industry regulators? Go away quietly?

This case and its subsequent four brief follow-up cases are based largely on interviews with Tyler Shultz, and outline the dilemma he faced and the various steps he would take both to extricate himself from his unsavory position and let the public know the full extent of the deception at Theranos.

Five optional handouts are available to instructors to further discussion after the case has been debriefed. The handouts serve as additional decision points for the students if your class time permits.

Article
Publication date: 6 February 2024

Ali Haruna, Honoré Tekam Oumbé and Armand Mboutchouang Kountchou

The purpose of this paper is to examine the adoption of Islamic finance products (murabaha, musharakah, mudarabah, salam, ijara, istisna and Qard Hassan) by small and medium-sized…

Abstract

Purpose

The purpose of this paper is to examine the adoption of Islamic finance products (murabaha, musharakah, mudarabah, salam, ijara, istisna and Qard Hassan) by small and medium-sized enterprises (SMEs) in Cameroon, a non-Islamic Sub-Saharan African country.

Design/methodology/approach

It used primary data collected from a cross-section of 1,358 SMEs in eight regions of Cameroon using self-administered structured questionnaires. To facilitate the analyses and interpretation, these products are grouped into four groups based on certain characteristics. A multivariate probit model is estimated to take into account the interaction between these different Islamic finance products.

Findings

This study revealed that the desire to comply with Sharia law, awareness, attitude and intention were critical determinants of the decision to adopt Islamic finance products by Cameroonian SMEs. The least influential factors were perceived behavioral control, subjective norms, enterprise characteristics (size, age and location) and socio-demographic characteristics of the entrepreneur (gender, age and marital status). The extension of the multivariate approach permitted us to compute for predicted probabilities which revealed that there exists a synergy effect between the different Islamic finance products. That is, Cameroonian SMEs combine different Islamic finance products at the same time based on their needs. This is especially the case between the partnership-based products (musharakah and mudarabah) and manufacture/rent products (istisna and ijara).

Practical implications

Policymakers are encouraged to develop stakeholder-oriented strategies to promote effective consumer education in Islamic finance products which will boost awareness. Also, Islamic finance institutions should endeavor to develop innovative financial products that are Sharia-compliant and economically beneficial to the individual and business needs of SMEs. Moreover, policymakers and management of Islamic finance institutions should ensure the putting in place of effective governance structures to guide Islamic finance operations. Finally, policymakers should endeavor to take into account the possible synergy between the different Islamic finance products in their quest to develop this activity.

Originality/value

To the best of the authors’ knowledge, this is the first study that analyses the adoption of different Islamic finance products while taking into account the possible synergy that exists between these products.

Details

Journal of Islamic Marketing, vol. 15 no. 5
Type: Research Article
ISSN: 1759-0833

Keywords

Open Access
Article
Publication date: 14 February 2024

Thomas D. Wilson

The aim of this paper is to review the psychological literature on curiosity and its relationship to information-seeking behaviour, and compare this with the information science…

Abstract

Purpose

The aim of this paper is to review the psychological literature on curiosity and its relationship to information-seeking behaviour, and compare this with the information science literature on the same subject.

Design/methodology/approach

The approach adopted is that of a comparative literature review, with an analysis of the papers retrieved in terms of their theoretical approach, context, study population and research method.

Findings

Curiosity is understood as a multi-faceted cognitive trait in humans and the relationship to information-seeking behaviour is explored through an exploration of other personality characteristics. There is very little citation of the information science literature in the psychological papers, and only a little more citation of the psychological literature in the information science papers.

Originality/value

The author is not aware of any similar exploration of the literature on curiosity.

Details

Journal of Documentation, vol. 80 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 2 January 2024

Eylem Thron, Shamal Faily, Huseyin Dogan and Martin Freer

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…

Abstract

Purpose

Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new security and safety risks that can be realised, both in terms of human error, and malicious and non-malicious behaviour. This study aims to identify the human factors (HF) and cyber-security risks relating to the role of signallers on the railways and explores strategies for the improvement of “Digital Resilience” – for the concept of a resilient railway.

Design/methodology/approach

Overall, 26 interviews were conducted with 21 participants from industry and academia.

Findings

The results showed that due to increased automation, both cyber-related threats and human error can impact signallers’ day-to-day operations – directly or indirectly (e.g. workload and safety-critical communications) – which could disrupt the railway services and potentially lead to safety-related catastrophic consequences. This study identifies cyber-related problems, including external threats; engineers not considering the human element in designs when specifying security controls; lack of security awareness among the rail industry; training gaps; organisational issues; and many unknown “unknowns”.

Originality/value

The authors discuss socio-technical principles through a hexagonal socio-technical framework and training needs analysis to mitigate against cyber-security issues and identify the predictive training needs of the signallers. This is supported by a systematic approach which considers both, safety and security factors, rather than waiting to learn from a cyber-attack retrospectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Case study
Publication date: 21 September 2023

Vishwanatha S.R. and Durga Prasad M.

The case was developed from secondary sources and interviews with a security analyst. The secondary sources include company annual reports, news reports, analyst reports, industry…

Abstract

Research methodology

The case was developed from secondary sources and interviews with a security analyst. The secondary sources include company annual reports, news reports, analyst reports, industry reports, company websites, stock exchange websites and databases such as Bloomberg and CMIE Prowess.

Case overview/synopsis

Increasing competition in product and capital markets has put tremendous pressure on managers to become more cost competitive. To address their firms' uncompetitive cost structures, managers may have to consider dramatic restructuring of their businesses. During 2014–2017, Tata Steel Ltd (TSL) UK considered a series of divestitures and a merger plan to nurse the company back to health. The case considers the economics of the restructuring plan. The case is designed to help students analyze a corporate downsizing program undertaken by a large Indian company in the UK and to highlight the dynamic role of the CFO and governance issues in family firms. It introduces students to issues surrounding a typical restructuring and provides students a platform to practice the estimation of value creation in a restructuring exercise. While some cases on corporate restructuring in the context of developed economies are available, there are very few cases written in an emerging market context. This case bridges that gap. TSL presents a unique opportunity to study corporate restructuring necessitated by a failed cross-border acquisition. It illustrates the potential for value loss in large, cross-border acquisitions. It shows how managerial hubris can prompt family firm owners to overbid in acquisitions and create legacy hot spots. In addition, the case can be used to discuss the causes of governance failures such as weak institutional monitoring and poor legal enforcement in emerging markets that could potentially harm minority shareholders.

Complexity academic level

The case was developed from secondary sources and interviews with a security analyst. The secondary sources include company annual reports, news reports, analyst reports, industry reports, company websites, stock exchange websites and databases such as Bloomberg and CMIE Prowess.

1 – 10 of 10