Search results

1 – 10 of over 14000
Article
Publication date: 28 September 2021

M.K.C.S. Wijewickrama, Nicholas Chileshe, Raufdeen Rameezdeen and J. Jorge Ochoa

The purpose of this paper is twofold: firstly, to identify the information-centric strategies of external stakeholders that influence the quality assurance (QA) in the reverse…

Abstract

Purpose

The purpose of this paper is twofold: firstly, to identify the information-centric strategies of external stakeholders that influence the quality assurance (QA) in the reverse logistics supply chains (RLSC) of demolition waste (DW) and, secondly, to recognize the determinants for using each strategy.

Design/methodology/approach

Semi-structured interviews were conducted with 21 professionals representing five external stakeholder groups: state and local government agencies, non-government organizations (NGOs), forward supply chain upstream and downstream actors. The data was analyzed based on Creswell's five-step process, and the conventional content analysis was used for coding and generating themes.

Findings

The study found seven information-centric influence strategies: regulating, monitoring, leading, incentivizing, demolition approval, forming contracts and specifications. The state government organizations were the most dominant in influencing the QA in RLSC. All external stakeholders use both aggressive and cooperative strategies. The urgent, legitimate and economic core of the issue decides the type of strategy to exert an information-centric influence over the QA in RLSC of DW.

Originality/value

To the author's best knowledge, this study is one of the first investigations performed based on a theoretical basis within the context of RLSC in the construction industry (CI). This study used empirical data to elaborate the stakeholder theory while providing new knowledge on stakeholder influence, particularly those relevant to information sharing. Thus, this study developed a theoretical base that future researchers in the study domain could use.

Details

Benchmarking: An International Journal, vol. 29 no. 6
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 1 January 2004

Mike Bolton

The last decade has seen the emergence of customer relationship management (CRM) as a technique to underpin organisational performance improvement in improving customer retention…

6866

Abstract

The last decade has seen the emergence of customer relationship management (CRM) as a technique to underpin organisational performance improvement in improving customer retention, customer satisfaction and customer value. However, evidence suggests that many CRM initiatives fail. Suggests that CRM does not go far enough in changing the underlying culture and systems of an organisation. What is needed is complete customer‐centric business processing (CCBP), whereby all business processes and all individuals are focused on identifying and meeting the needs of customer. Explains the concepts behind CCBP and describes the key organisational changes that are needed to underpin CCBP.

Details

International Journal of Productivity and Performance Management, vol. 53 no. 1
Type: Research Article
ISSN: 1741-0401

Keywords

Open Access
Article
Publication date: 3 November 2022

Godwin Thomas and Mary-Jane Sule

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…

1722

Abstract

Purpose

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.

Design/methodology/approach

Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.

Findings

Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.

Originality/value

This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Abstract

Details

The Emerald Handbook of Modern Information Management
Type: Book
ISBN: 978-1-78714-525-2

Keywords

Article
Publication date: 11 October 2011

Nhlanhla Boyfriend Wilton Mlitwa and Dwain Birch

The purpose of this paper is to investigate the effectiveness of intrusion detection systems as an access control supplement in protecting electronic information resources and…

Abstract

Purpose

The purpose of this paper is to investigate the effectiveness of intrusion detection systems as an access control supplement in protecting electronic information resources and networks in informationcentric organisations. The study focuses on the strengths and vulnerabilities of intrusion detection systems (IDSs).

Design/methodology/approach

A qualitative case study is conducted with a retail organisation, and an educational institution in Cape Town, South Africa. Using purposive sampling, interviews are held with network administrators of sample institutions to unpack security priorities and the functionalities of IDSs, the significance of the system in concept, whether it is understood within network departments, the cost factor, and its value in securing networks against all possible security challenges. The activity theory is applied as a lens to understanding the security process, and to inform a future security frameworks and research initiatives.

Findings

The findings are clear. Although IDSs have vulnerabilities, they offer an added cushion to conventional network access control efforts. Access control for example, guards the gate but IDSs are the watchdogs in your yard, and IDS closes a gap in a network security that only IDSs can. It alerts you of a potential attacker, enabling you to respond promptly, in whichever way you like. It does however, require deliberate reaction against a detected intrusion to be effective, but remains a useful security tool that should become standard to all network security initiatives. A framework presenting network security as a work activity – with actors who are guided by goals – is offered to guide planning, implementations of network security and further research in future.

Originality/value

Security awareness is crucial to effective e‐citizenry, but complacency could be a threat. As a unique contribution, the paper presents an activity‐theory work‐activity framework of analysing network security. Further, the paper presents original, industry‐specific interview findings, raising awareness that existing security measures need to be viewed as a continuous work‐activity whose planning and implementations are embedded on goals and processes towards pursued outcomes. Access controls themselves should be monitored. They should be supplemented by effective intrusion detection systems if unauthorised access is to be effectively minimised.

Details

Journal of Engineering, Design and Technology, vol. 9 no. 3
Type: Research Article
ISSN: 1726-0531

Keywords

Content available
Book part
Publication date: 15 December 2017

Abstract

Details

The Emerald Handbook of Modern Information Management
Type: Book
ISBN: 978-1-78714-525-2

Book part
Publication date: 4 August 2017

Ronald H. Stevens, Trysha L. Galloway and Ann Willemsen-Dunlap

In this chapter we highlight a neurodynamic approach that is showing promise as a quantitative measure of team performance.

Abstract

Purpose

In this chapter we highlight a neurodynamic approach that is showing promise as a quantitative measure of team performance.

Methodology/approach

During teamwork the rapid electroencephalographic (EEG) oscillations that emerge on the scalp were transformed into symbolic data streams which provided historical details at a second-by-second resolution of how the team perceived the evolving task and how they adjusted their dynamics to compensate for, and anticipate new task challenges. Key to this approach are the different strategies that can be used to reduce the data dimensionality, including compression, abstraction and taking advantage of the natural redundancy in biologic signals.

Findings

The framework emerging is that teams continually enter and leave organizational neurodynamic partnerships with each other, so-called metastable states, depending on the evolving task, with higher level dynamics arising from mechanisms that naturally integrate over faster microscopic dynamics.

Practical implications

The development of quantitative measures of the momentary dynamics of teams is anticipated to significantly influence how teams are assembled, trained, and supported. The availability of such measures will enable objective comparisons to be made across teams, training protocols, and training sites. They will lead to better understandings of how expertise is developed and how training can be modified to accelerate the path toward expertise.

Originality/value

The innovation of this study is the potential it raises for developing globally applicable quantitative models of team dynamics that will allow comparisons to be made across teams, tasks, and training protocols.

Details

Team Dynamics Over Time
Type: Book
ISBN: 978-1-78635-403-7

Keywords

Content available
Book part
Publication date: 4 August 2017

Abstract

Details

Team Dynamics Over Time
Type: Book
ISBN: 978-1-78635-403-7

Article
Publication date: 23 September 2014

Tom P. Abeles

The purpose of this article is to present a viewpoint on the future of academic publishing. It is important for a traditional peer-reviewed academic journal that is focused on the…

423

Abstract

Purpose

The purpose of this article is to present a viewpoint on the future of academic publishing. It is important for a traditional peer-reviewed academic journal that is focused on the future, particularly of post-secondary education, to be sensitive to the waters in which it swims and to sense how the climate is changing within the journal area and education as a whole.

Design/methodology/approach

This is a viewpoint on the future of academic publishing.

Findings

The rapid development of the Internet and the semantic Web is showing that: The traditional double-blind peer review process is changing to a variety of processes from both pre- and post-review to open reviews; open access is firmly established and growing; there is a shift in promotion/tenure towards more emphasis on teaching; the semantic Web is introducing changes in the impact value of journals in research and education, including the function of the institutions themselves.

Social implications

Islands of concentrated knowledge locked in Ivory Towers are now readily accessible, broadly changing how individuals gain and improve competencies and use of increasing, evolving knowledge bases.

Originality/value

This article discusses the following: There is a growing alternative to the hegemony of the traditional publishers of journals even with the moderate response to open access. Basic knowledge as offered in institutions is becoming a commodity, the cost of which is asymptotically approaching zero; “Big Data” and the semantic engines on the Internet are amplifying the human capabilities of accessing, parsing and rapidly evaluating an increasing knowledge base, impacting research and education.

Content available
Article
Publication date: 11 October 2011

Theo C. Haupt

292

Abstract

Details

Journal of Engineering, Design and Technology, vol. 9 no. 3
Type: Research Article
ISSN: 1726-0531

1 – 10 of over 14000