Search results

1 – 10 of 834
Article
Publication date: 15 February 2024

Nagamani Subramanian and M. Suresh

This study aims to investigate the implementation of lean human resource management (HRM) practices in manufacturing small- and medium-sized enterprises (SMEs) and explore how…

Abstract

Purpose

This study aims to investigate the implementation of lean human resource management (HRM) practices in manufacturing small- and medium-sized enterprises (SMEs) and explore how various factors interact to influence their successful adoption. By exploring the interplay among these factors, the research seeks to identify key drivers affecting the adoption of lean HRM in manufacturing SMEs. Ultimately, the research intends to provide insights that can guide organisations, practitioners and policymakers in effectively implementing lean HRM practices to enhance operational efficiency, workforce engagement and competitiveness within the manufacturing SME sector.

Design/methodology/approach

The study combined total interpretive structural modelling (TISM) and Matrice d'Impacts Croisés Multiplication Appliquée à un Classement (MICMAC) analysis. TISM helped in understanding the hierarchical relationship among different factors influencing lean HRM implementation, whereas MICMAC analysis provided insights into the level of influence and dependence of each factor on others.

Findings

The research revealed that “top management support” emerged as the most independent factor, indicating that strong support from top management is crucial for initiating and sustaining lean HRM practices in manufacturing SMEs. On the other hand, “employee involvement and empowerment” was identified as the most dependent factor, suggesting that fostering a culture of employee engagement and empowerment greatly relies on the successful implementation of lean HRM practices.

Research limitations/implications

While the study provided valuable insights, it has certain limitations. The research was conducted within the specific context of manufacturing SMEs, which might limit the generalizability of the findings to other industries. Expert opinions introduce subjectivity in data collection. Additionally, the study may not cover all critical factors, allowing room for further exploration in future research.

Practical implications

The findings have practical implications for manufacturing SMEs aiming to implement lean HRM practices. Recognising the pivotal role of top management support, organisations should invest in cultivating a strong leadership commitment to lean HRM initiatives. Furthermore, enhancing employee involvement and empowerment can lead to better adoption of lean HRM practices, resulting in improved operational efficiency and overall competitiveness.

Originality/value

This research contributes to the field by offering a comprehensive exploration of the interplay among factors influencing lean HRM implementation. The use of TISM and MICMAC analysis provides a unique perspective on the relationship dynamics between these factors, allowing for a nuanced understanding of their roles in the adoption of lean HRM practices in manufacturing SMEs. The identification of “top management support” as the most independent and “employee involvement and empowerment” as the most dependent factors adds original insights to the existing literature.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 12 September 2024

Ahmed Ali Otoom, Issa Atoum, Heba Al-Harahsheh, Mahmoud Aljawarneh, Mohammed N. Al Refai and Mahmoud Baklizi

The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity…

Abstract

Purpose

The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity through collaborative efforts in the higher education sector. The EduCERT framework addresses this gap by enhancing cyber security and mitigating cybercrime through collaborative incident management, knowledge sharing and university awareness campaigns.

Design/methodology/approach

The authors propose an EduCERT framework following the design science methodology. The framework is developed based on literature and input from focus group experts. Moreover, it is grounded in the principles of the technology-organization-environment framework, organizational learning and diffusion of innovations theory.

Findings

The EduCERT has eight components: infrastructure, governance, knowledge development, awareness, incident management, evaluation and continuous improvement. The framework reinforces national cybersecurity through cooperation between universities and the National Computer Emergency Response Team. The framework has been implemented in Jordan to generate a cybersecurity foundation for higher education. Evaluating the EduCERT framework’s influence on national cybersecurity highlights the importance of adopting comprehensive cyber-security policies and controls. The framework application shows its relevance, effectiveness, adaptability and alignment with best practices.

Research limitations/implications

Despite the impact of applying the framework in the Jordanian context, it is essential to acknowledge that the proposed EduCERT framework’s practical implementation may encounter challenges specific to diverse international educational environment sectors. However, framework customization for global applicability could address varied educational institutions in other countries.

Practical implications

Furthermore, the proposed EduCERT framework is designed with universal applicability that extends beyond the specific country’s context. The principles and components presented in the framework can serve as valuable design advice for establishing collaborative and resilient cybersecurity frameworks in educational settings worldwide. Therefore, the research enhances the proposed framework’s practical utility and positions it as an invaluable contribution to the broader discourse on global cybersecurity in academia.

Originality/value

This paper enhances national cybersecurity in the higher education sector, addressing the need for a more integrated response mechanism. The EduCERT framework demonstrates its effectiveness, adaptability and alignment with best practices, offering valuable guidance for global educational institutions.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 19 July 2024

Renato de Oliveira Souza, Sandro Cabral and Priscila Fernandes Ribeiro

This paper aims to examine the effects on firms' outcomes of a new government regulation on the private security industry that aimed to enhance the selection and training…

Abstract

Purpose

This paper aims to examine the effects on firms' outcomes of a new government regulation on the private security industry that aimed to enhance the selection and training processes for armed-private security officers.

Design/methodology/approach

By using human capital theory and using a data set built from various public sources, this study analyzes the effects of a new regulation implemented in 2013–2014 in Brazil mandating psychological assessments for hiring private security armed officers. Firm-level data and a Difference-in-Differences (DiD) identification strategy are used to investigate the effects on turnover and human capital outcomes.

Findings

The study identifies substantial changes resulting from the new government regulation in private security firms. While it has led to increased turnover rates, the regulation has also facilitated firms in enhancing the human capital composition of their workforce by enabling the recruitment of more experienced personnel.

Research limitations/implications

This research informs to current debates on the effects of policy interventions on firm's outcomes by showing how regulations aimed to improve the configuration of human capital can generate win-win situations for both firms and citizens, despite the short-term trade-offs between higher turnover rates and improved human capital outcomes.

Practical implications

Refining selection and training processes can enhance the workforce in private security firms by replacing less capable professionals with more experienced ones. Insights from this study offer guidance to policymakers and industry practitioners in shaping effective business and public policies.

Social implications

This study underscores the role of training and psychological assessments in enhancing the composition of human capital in the private security industry.

Originality/value

By highlighting the role of policy interventions in establishing barriers to unskilled workers engaging in hazardous activities, this study contributes to the burgeoning literature in strategic management on the interaction between policy interventions and firm outcomes.

Details

RAUSP Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2531-0488

Keywords

Article
Publication date: 24 September 2024

Cevat Ercik and Kerem Kardaş

The aim of this study is to examine in detail the impact of technological advancements on the workforce within the tourism industry. Specifically, it seeks to understand the…

Abstract

Purpose

The aim of this study is to examine in detail the impact of technological advancements on the workforce within the tourism industry. Specifically, it seeks to understand the effects of information and communication technologies (ICT), social media, the internet and websites, mobile technologies and other technological developments on workforce dynamics, skill requirements and job descriptions. The research intends to analyze how technological innovations are transforming the workforce and how these transformations are influencing practices within the industry.

Design/methodology/approach

This study employs a comprehensive literature review to understand the impact of technological innovations on the workforce in the tourism industry. The research aims to conduct an in-depth examination of empirical data obtained from extensive databases in the fields of technology and tourism and detail the effects of technological advancements on the workforce. Additionally, it includes a general assessment of trends and transformation processes within the sector by synthesizing findings from existing literature on the relationship between technology and workforce.

Findings

The results of the research reveal that technological innovations have fundamentally transformed workforce dynamics and job descriptions. Developments in information technology have led to the automation of routine tasks and the creation of high-skilled new job roles. Social media has contributed to the emergence of new job roles and skill requirements, while the internet and websites have altered digital marketing strategies. Mobile technologies have increased the necessity for the workforce to develop mobile skills. Furthermore, big data and artificial intelligence applications have enhanced the workforce’s data management and analysis capabilities.

Originality/value

This study makes a significant contribution to understanding the impact of technological innovations on the workforce in the tourism industry. The findings emphasize how technological changes have altered skill requirements and job descriptions, highlighting the increased need for continuous education and skill development.

Details

Worldwide Hospitality and Tourism Themes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1755-4217

Keywords

Article
Publication date: 13 September 2024

Ifeyinwa Juliet Orji and Chukwuebuka Martinjoe U-Dominic

Cybersecurity has received growing attention from academic researchers and industry practitioners as a strategy to accelerate performance gains and social sustainability…

38

Abstract

Purpose

Cybersecurity has received growing attention from academic researchers and industry practitioners as a strategy to accelerate performance gains and social sustainability. Meanwhile, firms are usually prone to cyber-risks that emanate from their supply chain partners especially third-party logistics providers (3PLs). Thus, it is crucial to implement cyber-risks management in 3PLs to achieve social sustainability in supply chains. However, these 3PLs are faced with critical difficulties which tend to hamper the consistent growth of cybersecurity. This paper aims to analyze these critical difficulties.

Design/methodology/approach

Data were sourced from 40 managers in Nigerian 3PLs with the aid of questionnaires. A novel quantitative methodology based on the synergetic combination of interval-valued neutrosophic analytic hierarchy process (IVN-AHP) and multi-objective optimization on the basis of a ratio analysis plus the full multiplicative form (MULTIMOORA) is applied. Sensitivity analysis and comparative analysis with other decision models were conducted.

Findings

Barriers were identified from published literature, finalized using experts’ inputs and classified under organizational, institutional and human (cultural values) dimensions. The results highlight the most critical dimension as human followed by organizational and institutional. Also, the results pinpointed indigenous beliefs (e.g. cyber-crime spiritualism), poor humane orientation, unavailable specific tools for managing cyber-risks and skilled workforce shortage as the most critical barriers that show the highest potential to elicit other barriers.

Research limitations/implications

By illustrating the most significant barriers, this study will assist policy makers and industry practitioners in developing strategies in a coordinated and sequential manner to overcome these barriers and thus, achieve socially sustainable supply chains.

Originality/value

This research pioneers the use of IVN-AHP-MULTIMOORA to analyze cyber-risks management barriers in 3PLs for supply chain social sustainability in a developing nation.

Details

Journal of Enterprise Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 2 July 2024

Ruti Gafni and Yair Levy

Artificial intelligence (AI) can assist in the worldwide shortage of cybersecurity workers in technical and managerial roles. Thus, the purpose of this study was to investigate…

Abstract

Purpose

Artificial intelligence (AI) can assist in the worldwide shortage of cybersecurity workers in technical and managerial roles. Thus, the purpose of this study was to investigate the role of AI in automating many of the routine tasks associated with cybersecurity. As such, AI enables cybersecurity personnel to reduce their workloads and focus on more strategic aspects of their work.

Design/methodology/approach

This study is an exploratory field study. The authors started by conducting a literature review to assess the possibility that AI tools can provide and how they can improve cybersecurity efficacy. Following this, the authors identified the specific core tasks for two cybersecurity work roles (technical and managerial) and searched for specific commercial tools that can perform each of the tasks. Then, the authors used the free ChatGPT 3.5 to list the current cybersecurity systems that use AI for the associated tasks, which the authors then reviewed with the tools’ documentation and websites to confirm these tasks were conducted or assisted by AI.

Findings

Results indicated that all 14 cybersecurity tasks of the technical work role are currently noted to be performed by commercial cybersecurity systems with AI-integrated capabilities, while only 11 of the 17 managerial work role tasks currently appear to be performed by AI.

Practical implications

The rapid integration of AI capabilities into commercial cybersecurity systems may suggest that the cybersecurity workforce must be currently trained on how to use AI tools in their daily operations, especially as it pertains to technical cybersecurity work roles.

Social implications

The cybersecurity workforce shortage is reported to exceed four million cybersecurity workers worldwide in 2023. Thus, further understanding of the role of AI in improving the efficiency of technical and managerial cybersecurity tasks is significant.

Originality/value

The value of this research lies in the initial assessment of the current AI capabilities of commercial cybersecurity systems, which will ultimately provide the “super-human” performances resulting from human-AI teaming.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 February 2024

Ayodeji Emmanuel Oke, John Aliu, Lydia Uyi Ehiosun, Ahmed Farouk Kineber and Seyi Segun Stephen

The construction industry in Nigeria, like many others worldwide, grapples with increasing demands for enhanced efficiency, transparency and security. While distributed ledger…

Abstract

Purpose

The construction industry in Nigeria, like many others worldwide, grapples with increasing demands for enhanced efficiency, transparency and security. While distributed ledger technology (DLT) offers substantial potential in tackling these issues, its implementation faces numerous obstacles. This study aims to investigate the challenges hindering the adoption of DLT within the Nigerian construction sector, capitalizing on a recognized research gap in this field.

Design/methodology/approach

A comprehensive literature review identified 20 challenges to DLT adoption. A structured questionnaire was developed and distributed to 98 construction professionals selected from a pool of 5,330 members using purposive and snowball sampling. Background information was assessed using frequency and percentage, data normality with the Shapiro–Wilk test and nonparametric data compared using the Kruskal–Wallis H-test. Factor analysis was then used to reduce the challenges into a more coherent set.

Findings

Findings revealed the top five challenges: power supply issues, data privacy and compliance, an uncertain legal framework, insufficient training and education and a lack of skilled workforce. Further analysis revealed four clusters of challenges, namely, technical and infrastructure barriers, organizational and cultural challenges, financial and economic challenges and regulatory and legal challenges.

Practical implications

Through the evaluation of challenges and potential strategies to overcome them, this study aims to lay a foundation that assists construction entities in effectively harnessing the benefits of DLT while navigating the obstacles inherent in its adoption.

Originality/value

This study contributes to the existing body of knowledge by offering insights into the challenges surrounding the adoption of DLT, specifically within the Nigerian construction sector. By juxtaposing the findings from this study with existing research conducted in other countries such as India, South Africa and the USA, a more comprehensive understanding of the challenges unique to the Nigerian context can be gained.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 17 July 2024

Eliana Stavrou and Andriani Piki

The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challenges…

Abstract

Purpose

The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challenges, the multidisciplinary, everchanging and complex nature of the cybersecurity domain has further challenged the acquisition and retention of cybersecurity talent. Empowering reskilling and upskilling in cybersecurity necessitates efficacious educational endeavours which promote self-confidence and foster a growth mindset. The purpose of this paper is to highlight that cultivating self-efficacy in cybersecurity education can help promote competency development and effectively address the prominent skills gaps. This notion applies equally to both aspiring individuals pursuing a career in cybersecurity and professionals in the field who may wish to better articulate the skills they already possess, the skills they lack and newly surfacing skills that need to be developed.

Design/methodology/approach

The study discusses the imminent need for adopting a “skills-first” approach in cybersecurity and explores innovative pedagogies and professional frameworks that can inform and frame such an approach. Subsequently, a critical analysis of the importance of self-efficacy towards motivating and supporting upskilling in cybersecurity is performed. A case study is presented, expanding the authors’ previous work on cybersecurity professional development, to demonstrate the mediating role that self-efficacy can play in developing core cybersecurity competencies. The case study presents the design of a new cybersecurity curriculum in the context of postgraduate, synchronous distance cybersecurity education, and it is utilised as a basis to discuss how the proposed curriculum cultivates self-efficacy attitudes.

Findings

A skills-first approach is becoming the new norm in contemporary workplaces. This work highlights the importance of actively nurturing self-efficacy attitudes through innovative cybersecurity curricula that can be tailored to the learners’ needs, instigating a drive for learning and, ultimately, helping learners effectively upskilling by portraying a self-directed learning path and a professional growth mindset in cybersecurity.

Originality/value

The authors present the importance of cultivating self-efficacy in higher and lifelong education to foster reskilling and upskilling in cybersecurity. An innovative cybersecurity curriculum was constructed and delivered with a group of learners demonstrating how self-efficacy can be leveraged through interactive, reflective and self-assessment educational activities that enhanced motivation and self-awareness, curiosity, attention to detail and resilience – key skills for a successful career in cybersecurity.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 4 September 2024

Samuel Kotey and Shanmugapriya T.

This paper aims to investigate the factors influencing trade artisans’ choice of skills selection as apprentice’s trainee in the Ghanaian construction sector and to identify and…

Abstract

Purpose

This paper aims to investigate the factors influencing trade artisans’ choice of skills selection as apprentice’s trainee in the Ghanaian construction sector and to identify and address the challenges associated with traditional apprenticeship. Trade artisans with technical know-how in construction and general workplace skills from the traditional apprenticeship training (TAT) in the area of construction were selected from selected sites and training centers.

Design/methodology/approach

This paper adopted the purposive sampling technique with the aim of gathering knowledge from individuals with expertise in the research area, particularly trade craftsmen who have been trained through the TAT system and are directly involved in construction-related works. Partial least square structure equation modelling (PLS-SEM) analytical approach and principal component analysis were used to reduce the dimensionality of the data set and preserve as much information as possible.

Findings

Three major components, namely, personal and social interest, job assessment and stability and family and faith were identified as the variables that influence an artisan's choice of a skill trade. These influenced the choice of apprenticeship training by young trainees in choosing apprenticeship as a mode of training. Personal interest, living situation of artisans and parents’ educational attainment are the most influencing factors that determine artisans’ choice of selected trades. Moreover, the study also shed light on the challenges inherent in traditional apprenticeship systems, such as the lack of formal technical education, limited access to modern technology and information and poor working conditions.

Practical implications

The study underscores the imperative for stakeholders to enhance apprenticeship programmes within the construction sector. This involves providing more stable job opportunities, improving working conditions and offering access to modern technology and information. Such enhancements not only attract more young individuals to apprenticeship training but also ensure the sustainability and relevance of the workforce in meeting industry demands.

Originality/value

The study finally developed a model that could be used as a foundation for future PLS-SEM evaluation and identified the factors that influence the selection of apprenticeship training by trade artisans.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 23 April 2024

Chen Zhong, Hong Liu and Hwee-Joo Kam

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…

57

Abstract

Purpose

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity competitions among Reddit users. These users constitute a substantial demographic of young individuals, often participating in communities oriented towards college students or cybersecurity enthusiasts. The authors specifically focus on novice learners who showed an interest in cybersecurity but have not participated in competitions. By understanding their views and concerns, the authors aim to devise strategies to encourage their continuous involvement in cybersecurity learning. The Reddit platform provides unique access to this significant demographic, contributing to enhancing and diversifying the cybersecurity workforce.

Design/methodology/approach

The authors propose to mine Reddit posts for information about learners’ attitudes, interests and experiences with cybersecurity competitions. To mine Reddit posts, the authors developed a text mining approach that integrates computational text mining and qualitative content analysis techniques, and the authors discussed the advantages of the integrated approach.

Findings

The authors' text mining approach was successful in extracting the major themes from the collected posts. The authors found that motivated learners would want to form a strategic way to facilitate their learning. In addition, hope and fear collide, which exposes the learners’ interests and challenges.

Originality/value

The authors discussed the findings to provide education and training experts with a thorough understanding of novice learners, allowing them to engage them in the cybersecurity industry.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 834