Search results

1 – 10 of over 285000

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Article
Publication date: 5 February 2024

Behrooz Ghlichlee

The purpose of this paper is to develop a multistakeholder scale for assessing an excellent human resource (HR) function to demonstrate the extent to which it is focused on…

Abstract

Purpose

The purpose of this paper is to develop a multistakeholder scale for assessing an excellent human resource (HR) function to demonstrate the extent to which it is focused on creating value from the perspective of its key internal and external stakeholders.

Design/methodology/approach

At the first stage, an in-depth literature review was conducted to extract the best practices for an excellent HR function. Then, to test the validation of the developed framework, it was sent to HR academics and practitioners in different countries. The survey responses were analyzed using the methods of the structural equation modeling (SEM) and confirmatory factorial analysis.

Findings

This study proposes an excellent HR multistakeholder assessment scale consisting of ten criteria based on the perceptions of internal and external HR stakeholders.

Research limitations/implications

This study suggests a framework for assessing overall HR excellence based on the perceptions of key internal and external HR stakeholders. In addition, it is recommended that future researchers empirically test the developed scale across various industries and firm sizes.

Practical implications

HR managers, by using this framework, could continuously assess their HR excellence and compare their HR excellence with other companies’ HR excellence in the industry and then plan for continuous improvement in different HR areas to improve their stakeholders’ experiences.

Originality/value

This paper identifies the enablers and results of an excellent HR department and designs a multistakeholder feedback scale to better understand key internal and external HR stakeholders’ perceptions.

Details

Management Research Review, vol. 47 no. 6
Type: Research Article
ISSN: 2040-8269

Keywords

Abstract

Details

Energy Economics
Type: Book
ISBN: 978-1-83867-294-2

Abstract

Details

Database Management Systems
Type: Book
ISBN: 978-1-78756-695-8

Abstract

Details

An Introduction to Algorithmic Finance, Algorithmic Trading and Blockchain
Type: Book
ISBN: 978-1-78973-894-0

Article
Publication date: 1 February 1975

Michael F. Lynch

The application of the variety‐generation technique to the construction of truncated author‐title search keys for data bases of monograph records is described. Instead of the…

Abstract

The application of the variety‐generation technique to the construction of truncated author‐title search keys for data bases of monograph records is described. Instead of the usual fixed‐length keys (e.g. three characters of the author's surname, and the first three filing characters of the title) the method uses strings of characters which vary in length according to the statistical characteristics of author names and titles in BNB MARC files. The number of these strings is variable within wide limits. By choice of appropriate sets of keys, bibliographic search codes with a higher resolving power than the 3,3 key can be produced. The codes also show favourable distributions for direct construction of hash addresses.

Details

Program, vol. 9 no. 2
Type: Research Article
ISSN: 0033-0337

Article
Publication date: 1 February 2003

Patricia Sloper, Lisa Jones, Suzanne Triggs, Jane Howarth and Katy Barton

The authors describe the rationale for key worker services for disabled children, factors to consider in developing such services, the role of key workers, how a key worker…

Abstract

The authors describe the rationale for key worker services for disabled children, factors to consider in developing such services, the role of key workers, how a key worker service is operating in one authority and the impact it has had for families who received it.

Details

Journal of Integrated Care, vol. 11 no. 1
Type: Research Article
ISSN: 1476-9018

Keywords

Article
Publication date: 26 October 2012

Li Shouwei and Mei Qiang

This paper attempts to construct a public‐key coding system using grey generation and braid group.

Abstract

Purpose

This paper attempts to construct a public‐key coding system using grey generation and braid group.

Design/methodology/approach

The identification (ID) codes of both sides for communication are public for everyone and considered as public keys. Starting from the ID code of both sides of communication, the temporary secret key of communication can be obtained by the grey 1‐AGO algorithm first. Then the new formal common secret key can be obtained by using the element exchangeability of the braid group during the exchanging process of the temporary secret key between two sides of communication. The paper presents an exchange protocol of secret key based on grey data generation and braid group. It also constructs a cipher communication system by using Hash function based on the exchange protocol of secret key last.

Findings

The exchange protocol of secret key and the system of cipher communication which are proposed in this paper make use of the difficult problem of resolving disper se logarithm from generated code to ID code and the conjugate problem which is not ever resolved in braid group, which can ensure the security of the algorithm theoretically.

Practical implications

The main steps of the exchange protocol and cipher communication system in this paper can be achieved through a computer program. They can be used in many communication processes on the internet.

Originality/value

The paper succeeds in realising both secret key generation and exchanging protocol of communication by using grey systems theory and braid group properties.

Details

Grey Systems: Theory and Application, vol. 2 no. 3
Type: Research Article
ISSN: 2043-9377

Keywords

Article
Publication date: 7 September 2010

Gareth Williams and Peter King

Key‐safes have become a backbone of community care, enabling formal carers to access the homes of people receiving routine homecare services or emergency services such as…

Abstract

Key‐safes have become a backbone of community care, enabling formal carers to access the homes of people receiving routine homecare services or emergency services such as telecare. People need to have confidence in their security features if they are to wholeheartedly accept the need for keeping a key available in a safe at all times. A project was undertaken to compare the features of a number of popular key‐safes on the market in the UK, considering security as the most important factor but also including the subjective opinions of a panel of relevant stakeholders on issues such as aesthetics, value for money and usability. It was found that the newest device on the market, the Supra C500, was significantly more secure than its rivals, and was the only model in our trial to satisfy domestic security standards for front doors. It is proposed that all key‐safes should be required to achieve a national standard for resistance to forced entry before they can be considered for use as part of a homecare or telecare package in the UK.

Details

Journal of Assistive Technologies, vol. 4 no. 3
Type: Research Article
ISSN: 1754-9450

Keywords

Article
Publication date: 7 June 2013

Joshua Arvin S. Lat, Rod Xavier R. Bondoc and Kevin Charles V. Atienza

The SOUL System aims to provide a low‐cost secure online two‐factor authentication system that involves both a password and a security token in the form of an ordinary electronic…

1200

Abstract

Purpose

The SOUL System aims to provide a low‐cost secure online two‐factor authentication system that involves both a password and a security token in the form of an ordinary electronic container. Its main goal is to design and build a system that can easily be integrated to existing websites to make the login and registration processes more secure.

Design/methodology/approach

The three main parts of the system are the website, the ordinary hardware device, and trusted third party. The website must first be integrated with the web API provided and then registered to the trusted third party website to allow two‐factor authentication. It must be registered to the trusted third party so that it can be used to register and login to SOUL System integrated websites.

Findings

The design and implementation of the proposed two‐factor authentication system makes use of the hybrid cryptosystem, one‐time passwords, hash functions, trusted third parties, steganographic techniques, signed java applets and cross‐language cryptographic libraries. It protects users from well known attacks such as brute‐force attacks, collision attacks, dictionary attacks, keylogger attacks, man‐in‐the‐middle attacks, and even replay attacks. Currently, the system can be integrated to websites built in PHP, Python, and Java.

Originality/value

The SOUL System is the first two‐factor authentication system that uses both cryptography and steganography to provide secure online authentication with an ordinary USB flash drive. It is designed to work in major operating systems such as Windows, Mac OS X, and Linux with very minimal installation.

1 – 10 of over 285000