Search results
1 – 10 of over 285000The purpose of this paper is to develop a multistakeholder scale for assessing an excellent human resource (HR) function to demonstrate the extent to which it is focused on…
Abstract
Purpose
The purpose of this paper is to develop a multistakeholder scale for assessing an excellent human resource (HR) function to demonstrate the extent to which it is focused on creating value from the perspective of its key internal and external stakeholders.
Design/methodology/approach
At the first stage, an in-depth literature review was conducted to extract the best practices for an excellent HR function. Then, to test the validation of the developed framework, it was sent to HR academics and practitioners in different countries. The survey responses were analyzed using the methods of the structural equation modeling (SEM) and confirmatory factorial analysis.
Findings
This study proposes an excellent HR multistakeholder assessment scale consisting of ten criteria based on the perceptions of internal and external HR stakeholders.
Research limitations/implications
This study suggests a framework for assessing overall HR excellence based on the perceptions of key internal and external HR stakeholders. In addition, it is recommended that future researchers empirically test the developed scale across various industries and firm sizes.
Practical implications
HR managers, by using this framework, could continuously assess their HR excellence and compare their HR excellence with other companies’ HR excellence in the industry and then plan for continuous improvement in different HR areas to improve their stakeholders’ experiences.
Originality/value
This paper identifies the enablers and results of an excellent HR department and designs a multistakeholder feedback scale to better understand key internal and external HR stakeholders’ perceptions.
Details
Keywords
The application of the variety‐generation technique to the construction of truncated author‐title search keys for data bases of monograph records is described. Instead of the…
Abstract
The application of the variety‐generation technique to the construction of truncated author‐title search keys for data bases of monograph records is described. Instead of the usual fixed‐length keys (e.g. three characters of the author's surname, and the first three filing characters of the title) the method uses strings of characters which vary in length according to the statistical characteristics of author names and titles in BNB MARC files. The number of these strings is variable within wide limits. By choice of appropriate sets of keys, bibliographic search codes with a higher resolving power than the 3,3 key can be produced. The codes also show favourable distributions for direct construction of hash addresses.
Patricia Sloper, Lisa Jones, Suzanne Triggs, Jane Howarth and Katy Barton
The authors describe the rationale for key worker services for disabled children, factors to consider in developing such services, the role of key workers, how a key worker…
Abstract
The authors describe the rationale for key worker services for disabled children, factors to consider in developing such services, the role of key workers, how a key worker service is operating in one authority and the impact it has had for families who received it.
Details
Keywords
Li Shouwei and Mei Qiang
This paper attempts to construct a public‐key coding system using grey generation and braid group.
Abstract
Purpose
This paper attempts to construct a public‐key coding system using grey generation and braid group.
Design/methodology/approach
The identification (ID) codes of both sides for communication are public for everyone and considered as public keys. Starting from the ID code of both sides of communication, the temporary secret key of communication can be obtained by the grey 1‐AGO algorithm first. Then the new formal common secret key can be obtained by using the element exchangeability of the braid group during the exchanging process of the temporary secret key between two sides of communication. The paper presents an exchange protocol of secret key based on grey data generation and braid group. It also constructs a cipher communication system by using Hash function based on the exchange protocol of secret key last.
Findings
The exchange protocol of secret key and the system of cipher communication which are proposed in this paper make use of the difficult problem of resolving disper se logarithm from generated code to ID code and the conjugate problem which is not ever resolved in braid group, which can ensure the security of the algorithm theoretically.
Practical implications
The main steps of the exchange protocol and cipher communication system in this paper can be achieved through a computer program. They can be used in many communication processes on the internet.
Originality/value
The paper succeeds in realising both secret key generation and exchanging protocol of communication by using grey systems theory and braid group properties.
Details
Keywords
Gareth Williams and Peter King
Key‐safes have become a backbone of community care, enabling formal carers to access the homes of people receiving routine homecare services or emergency services such as…
Abstract
Key‐safes have become a backbone of community care, enabling formal carers to access the homes of people receiving routine homecare services or emergency services such as telecare. People need to have confidence in their security features if they are to wholeheartedly accept the need for keeping a key available in a safe at all times. A project was undertaken to compare the features of a number of popular key‐safes on the market in the UK, considering security as the most important factor but also including the subjective opinions of a panel of relevant stakeholders on issues such as aesthetics, value for money and usability. It was found that the newest device on the market, the Supra C500, was significantly more secure than its rivals, and was the only model in our trial to satisfy domestic security standards for front doors. It is proposed that all key‐safes should be required to achieve a national standard for resistance to forced entry before they can be considered for use as part of a homecare or telecare package in the UK.
Joshua Arvin S. Lat, Rod Xavier R. Bondoc and Kevin Charles V. Atienza
The SOUL System aims to provide a low‐cost secure online two‐factor authentication system that involves both a password and a security token in the form of an ordinary electronic…
Abstract
Purpose
The SOUL System aims to provide a low‐cost secure online two‐factor authentication system that involves both a password and a security token in the form of an ordinary electronic container. Its main goal is to design and build a system that can easily be integrated to existing websites to make the login and registration processes more secure.
Design/methodology/approach
The three main parts of the system are the website, the ordinary hardware device, and trusted third party. The website must first be integrated with the web API provided and then registered to the trusted third party website to allow two‐factor authentication. It must be registered to the trusted third party so that it can be used to register and login to SOUL System integrated websites.
Findings
The design and implementation of the proposed two‐factor authentication system makes use of the hybrid cryptosystem, one‐time passwords, hash functions, trusted third parties, steganographic techniques, signed java applets and cross‐language cryptographic libraries. It protects users from well known attacks such as brute‐force attacks, collision attacks, dictionary attacks, keylogger attacks, man‐in‐the‐middle attacks, and even replay attacks. Currently, the system can be integrated to websites built in PHP, Python, and Java.
Originality/value
The SOUL System is the first two‐factor authentication system that uses both cryptography and steganography to provide secure online authentication with an ordinary USB flash drive. It is designed to work in major operating systems such as Windows, Mac OS X, and Linux with very minimal installation.
Details