Search results

1 – 10 of over 10000
Open Access
Article
Publication date: 15 February 2024

Mercy T. Musakwa

In this study, the impact of access to electricity on poverty reduction for Botswana is examined using the annual data from 1990 to 2021. The study was motivated by the need to…

Abstract

Purpose

In this study, the impact of access to electricity on poverty reduction for Botswana is examined using the annual data from 1990 to 2021. The study was motivated by the need to establish if access to electricity could be a panacea on poverty reduction in Botswana. Given that the United Nations Sustainable Development Goals deadline is fast approaching, and Botswana being one of the signatories, is expected to end poverty in all its forms – Goal 1. Establishing the role that electrification plays in poverty alleviation, helps in refocusing Botswana’s poverty alleviation strategies on factors that have high impact on poverty. The main objective of this study, therefore, is to investigate the relationship between poverty alleviation and access to electricity in Botswana.

Design/methodology/approach

The study uses the autoregressive distributed lag (ARDL) approach to investigate the nature of the relations. Two poverty proxies were used in this study namely, household consumption expenditure and life expectancy.

Findings

The study found access to electricity to reduce poverty in the long run and in the short run, regardless of the poverty measure used. Thus, access to electricity plays an important role in poverty alleviation and Botswana is recommended to continue with the rural and urban electrification initiatives.

Originality/value

The study explores the impact of access to electricity on poverty reduction in Botswana, a departure from the current studies that examined the same relationship using energy consumption in general. This is on the back of increasing dependence of economic activities on electricity as a major source of energy.

Details

Journal of Humanities and Applied Social Sciences, vol. 6 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Open Access
Article
Publication date: 15 April 2024

Pauli Komonen

Due to e-commerce growth, technological advancements and environmental concerns, developing a more nuanced service portfolio has become a critical issue for last-mile logistics…

Abstract

Purpose

Due to e-commerce growth, technological advancements and environmental concerns, developing a more nuanced service portfolio has become a critical issue for last-mile logistics service providers. Concurrently, consumers are adopting new modes of consumption. This paper aims to investigate the potential for last-mile logistics service providers to act as intermediaries in access-based consumption and to revitalise their service offerings through product-service systems – a pioneering strategy not executed in the market yet.

Design/methodology/approach

This strategic customer foresight study uses a quantitative survey of 1,000 respondents and an online focus group comprising 10 early adopter consumers to investigate emerging last-mile service models. Potential service concepts were identified through the survey, and two distinct concepts were subsequently selected for evaluation and co-development within the focus group. The research was conducted in partnership with an SME logistics company in Finland.

Findings

The consumers expressed selective interest in access-based consumption related to the proposed offering of essential household goods. Young adults and consumers in early middle age living in the city centre emerged as the most potential user groups. Economic reasons and short-term needs were the primary motivations for adopting access-based consumption.

Practical implications

The study showed that engaging consumers in a customer foresight process is viable for SMEs innovating their offerings and demonstrates how the process works in practice.

Originality/value

Documented cases of customer integration into foresight processes are rare in earlier research, and this paper extends the knowledge base through a multidisciplinary examination of future consumer behaviour in the last-mile logistics domain. The paper also expands the limited literature on the role of logistics in access-based consumption.

Details

foresight, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-6689

Keywords

Open Access
Article
Publication date: 3 January 2024

Cameron McCordic, Ines Raimundo, Matthew Judyn and Duncan Willis

Climate hazards in the form of cyclones are projected to become more intense under the pressures of future climate change. These changes represent a growing hazard to low lying…

Abstract

Purpose

Climate hazards in the form of cyclones are projected to become more intense under the pressures of future climate change. These changes represent a growing hazard to low lying coastal cities like Beira, Mozambique. In 2019, Beira experienced the devastating impact of Cyclone Idai. One of the many impacts resulting from this Cyclone was disrupted drinking water access. This investigation explores the distribution of Cyclone Idai’s impact on drinking water access via an environmental justice lens, exploring how preexisting water access characteristics may have predisposed households to the impacts of Cyclone Idai in Beria.

Design/methodology/approach

Relying on household survey data collected in Beira, the investigation applied a decision tree algorithm to investigate how drinking water disruption was distributed across the household survey sample using these preexisting vulnerabilities.

Findings

The investigation found that households that mainly relied upon piped water sources and experienced inconsistent access to water in the year prior to Cyclone Idai were more likely to experience disrupted drinking water access immediately after Cyclone Idai. The results indicate that residents in formal areas of Beira, largely reliant upon piped water supply, experienced higher rates of disrupted drinking water access following Cyclone Idai.

Originality/value

These findings question a commonly held assumption that informal areas are more vulnerable to climate hazards, like cyclones, than formal areas of a city. The findings support the inclusion of informal settlements in the design of climate change adaptation strategies.

Details

Disaster Prevention and Management: An International Journal, vol. 33 no. 6
Type: Research Article
ISSN: 0965-3562

Keywords

Open Access
Article
Publication date: 5 March 2024

Stefanie Fella and Christoph Ratay

Recently emerged Packaging-as-a-Service (PaaS) systems adopt aspects of access-based services and triadic frameworks, which have typically been treated as conceptually separate…

Abstract

Purpose

Recently emerged Packaging-as-a-Service (PaaS) systems adopt aspects of access-based services and triadic frameworks, which have typically been treated as conceptually separate. The purpose of this paper is to investigate the implications of blending the two in what we call “access-based triadic systems,” by empirically evaluating intentions to adopt PaaS systems for takeaway food among restaurants and consumers.

Design/methodology/approach

We derived relevant attributes of PaaS systems from a qualitative pre-study with restaurants and consumers. Next, we conducted two factorial survey experiments with restaurants (N = 176) and consumers (N = 245) in Germany to quantitatively test the effects of those system attributes on their adoption intentions.

Findings

This paper highlights that the role of access-based triadic system providers as both the owners of shared assets and the operators of a triadic system is associated with a novel set of challenges and opportunities: System providers need to attract a critical mass of business and end customers while balancing asset protection and system complexity. At the same time, asset ownership introduces opportunities for improved quality control and differentiation from competition.

Originality/value

Conceptually, this paper extends research on access-based services and triadic frameworks by describing an unexplored hybrid form of non-ownership consumption we call “access-based triadic systems.” Empirically, this paper addresses the need to account for the demands of two distinct target groups in triadic systems and demonstrates how factorial survey experiments can be leveraged in this field.

Details

Journal of Service Management, vol. 35 no. 6
Type: Research Article
ISSN: 1757-5818

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1008

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 4 September 2023

Mapheto J. Mamabolo and Oluwole Olumide Durodolu

This study aims to determine the requirements and find out the challenges for the use of digital library services for rural areas of Capricorn District Municipality, Limpopo…

1847

Abstract

Purpose

This study aims to determine the requirements and find out the challenges for the use of digital library services for rural areas of Capricorn District Municipality, Limpopo province. The research questions of the study are: What are the requirements for the use of digital library services in rural areas of Capricorn District Municipality? What are the challenges of accessing digital library services in rural areas?

Design/methodology/approach

Data was analysed thematically and deductively in this study, as researcher required to accomplish the purpose of the study through consistent structure (Zalaghi and Khazaei, 2016). In deductive analysis, the researcher starts with a set of categories, which are then used to categorize and organize data (Bertram and Christiansen, 2020). The researcher got familiar with data from the interviewing process and when transcribing data from audio tape. The transcription process was done for the coding purposes. Coding allows the researcher to simplify and focus on specific characteristics of data.

Findings

The study findings advocate for the establishment of digital libraries in rural areas. The library authorities are challenged to adapt digital ways of information provision. Since librarians have been providing digital content in libraries for use on users’ laptops and other gadgets, this implies that the Department of Sport, Arts and Culture has been lagging behind in finding innovative ways to provide information, especially in rural areas. To successfully keep libraries as sources of information, transformative measures have to be taken, and where possible, revisit the policies and keep drifting with the societal changes. The library authorities have to delve into new ways of providing LIS to the communities. Unquestionably, information and communication technologies have penetrated our societies and became a way of life. In addition, there are unlimited benefits which can be derived from digital technologies, especially given the lack of physical libraries in rural areas.

Originality/value

To the best of the authors’ knowledge, the academic research is original and has not been published anywhere before.

Details

Digital Library Perspectives, vol. 39 no. 4
Type: Research Article
ISSN: 2059-5816

Keywords

Open Access
Article
Publication date: 26 May 2023

Christopher Amoah, Emmanuel Bamfo-Agyei and Fredrick Simpeh

Higher education institutions are the citadel of knowledge and are heavily involved in formulating building regulations and building infrastructure designs that must conform to…

Abstract

Purpose

Higher education institutions are the citadel of knowledge and are heavily involved in formulating building regulations and building infrastructure designs that must conform to the building regulations. The study aims to identify university infrastructures compliant with disabled access from the perspective of the built environment students in Ghanaian universities.

Design/methodology/approach

Questionnaire surveys were administered to 500 built environment students across ten technical universities in Ghana with a total population of 3066; 341 were expected based on the formula used. However, upon several reminders, 176 responded. Data collected were analysed using Statistical Package for the Social Sciences.

Findings

The findings show that all university facilities are not fully compliant with disabled access. Structures found to be least compliant are the laboratories, canteens, hall of residence, toilet facilities, football fields, places of worship and transport stations. The facilities with high compliance are the administration block, library, hospital building, lecture halls, department offices and ATM areas. The leading causes for this non-compliant are lack of enforcement of the building regulations, low level of disabled students’ enrolment, age of the building, lack of knowledge and poor building designs.

Practical implications

Compliance with disabled access makes universities world class and creates safe learning spaces for individuals with disabilities, enforcing the right to education for all individuals, particularly those with disabilities. Lack of compliance with disabled access will hamper the full utilisation of these facilities, thereby affecting quality education delivery to people with disabilities.

Originality/value

The findings are essential to the Ghanaian built environment, the lives of disabled individuals and universities. The results provide knowledge on areas of improvement for complete access to structures and facilities by disabled individuals.

Details

Property Management, vol. 41 no. 5
Type: Research Article
ISSN: 0263-7472

Keywords

Open Access
Article
Publication date: 8 August 2023

Nastaran Simarasl, Pooya Tabesh and Younggeun Lee

This research aims to theorize how a critical factor, resource access, can paradoxically impact the comprehensiveness of venture location decision processes and the relationship…

Abstract

Purpose

This research aims to theorize how a critical factor, resource access, can paradoxically impact the comprehensiveness of venture location decision processes and the relationship between decision comprehensiveness and new venture performance. To do so, the authors focus on nascent entrepreneurs’ venture location decision processes and introduce resource access as a double-edged sword.

Design/methodology/approach

In this conceptual article, the authors draw from the strategic decision-making and resource mobilization literature to theorize about the new venture location decision-making process and its performance implications.

Findings

By uncovering the paradox of resource access, the authors propose that high levels of resource access create a paradoxical situation in which nascent entrepreneurs are less likely to use comprehensive decision processes when their benefits are at their greatest.

Originality/value

This work contributes to entrepreneurship research on new venture location and resource mobilization in three important ways. First, the authors advance the literature on nascent entrepreneurs’ location decision-making processes by introducing “location decision comprehensiveness” as a decision process construct and juxtaposing it with resource access to uncover the entrepreneurial decision-making process. Second, the authors develop a more nuanced theorization of the location choices made by nascent entrepreneurs instead of relying on generalized conclusions drawn from well-established corporations’ location decisions. Last, the authors extend the literature on resource mobilization in entrepreneurship by shedding light on the paradoxical aspect of resource access. While previous research has emphasized the favorable effects of resource access on new venture processes and outcomes, the authors contend that it can also negatively impact entrepreneurs’ ability to make effective decisions.

Details

New England Journal of Entrepreneurship, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2574-8904

Keywords

Open Access
Article
Publication date: 1 June 2023

Edward Ayebeng Botchway, Kofi Agyekum, Hayford Pittri and Anthony Lamina

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Abstract

Purpose

This study explores the importance of and vulnerabilities in deploying physical access control (PAC) devices in a typical university setting.

Design/methodology/approach

The study adopts face-to-face and telephone interviews. This study uses a semi-structured interview guide to solicit the views of 25 interviewees on the subject under consideration. Qualitative responses to the interview are thematically analyzed using NVivo 11 Pro analysis application software.

Findings

The findings reveal five importance and seven vulnerabilities in the deployment of PAC devices in the institution. Key among the importance of deploying the devices are “prevent unwanted premise access or intrusions,” “prevent disruptions to university/staff operations on campus” and “protect students and staff from outside intruders.” Key among the identified vulnerabilities are “tailgating”, “delay in emergent cases” and “power outage may affect its usage.”

Originality/value

This study offers insight into a rare area of study, especially in the Sub-Saharan Africa region. Furthermore, the study contributes to the state-of-the-art importance and vulnerabilities in deploying PAC devices in daily human activities. The study is valuable in that it has the potential to establish a foundation for future studies that may delve into investigating issues associated with the deployment of PAC devices.

Details

Frontiers in Engineering and Built Environment, vol. 4 no. 1
Type: Research Article
ISSN: 2634-2499

Keywords

Open Access
Article
Publication date: 15 August 2022

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…

6692

Abstract

Purpose

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.

Design/methodology/approach

This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.

Findings

The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.

Originality/value

Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of over 10000