Search results
1 – 5 of 5Hamada Elsaid Elmaasrawy and Omar Ikbal Tawfik
This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance…
Abstract
Purpose
This paper aims to examine the impact of the assurance and advisory role of internal audit (ADRIA) on organisational, human and technical proactive measures to enhance cybersecurity (CS).
Design/methodology/approach
The questionnaire was used to collect data for 97 internal auditors (IAu) from the Gulf Cooperation Council countries. The authors used partial least squares (PLS) to test the hypotheses.
Findings
The results show a positive effect of the ADRIA on each of the organisational proactive measures, human proactive measures and technical proactive measures to enhance CS. The study also found a positive effect of the confirmatory role of IA on both human proactive measures and technical proactive measures to enhance CS. No effect of the confirmatory role of IA on the organisational proactive measures is found.
Research limitations/implications
This study focused on only three proactive measures to enhance CS, and this study was limited to the opinions of IAu. In addition, the study was limited to using regression analysis according to the PLS method.
Practical implications
The results of this study show that managers need to consider the influential role of IA as a value-adding activity in reducing CS risks and activating proactive measures. Also, IAu must expand its capabilities, skills and knowledge in CS auditing to provide a bold view of cyber threats. At the same time, the institutions responsible for preparing IA standards should develop standards and guidelines that help IAu to play assurance and advisory roles.
Originality/value
To the best of the authors’ knowledge, this is the first study of its kind that deals with the impact of the assurance and ADRIA on proactive measures to enhance CS. In addition, the study determines the nature of the advisory role and the assurance role of IA to strengthen CS.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Akinade Adebowale Adewojo, Aderinola Ololade Dunmade and Adetola Adebisi Akanbiemu
This study aims to explore the potential use of drones in special library services, aiming to enhance accessibility, services and reliability. It examines how drones can provide…
Abstract
Purpose
This study aims to explore the potential use of drones in special library services, aiming to enhance accessibility, services and reliability. It examines how drones can provide library materials to individuals unable to access traditional services and addresses challenges associated with drone implementation.
Design/methodology/approach
This study involves a literature review and case studies to analyze the feasibility and benefits of incorporating drones into special libraries. This study also discusses the synergy between drone technology and artificial intelligence (AI) in enhancing library operations.
Findings
Drones have the potential to transform special libraries by automating tasks, improving efficiency and expanding outreach. Their application ranges from inventory management and book retrieval to security, surveillance and outreach initiatives. AI-powered drones can provide real-time data on library usage and enhance cost-effectiveness. However, challenges including costs, privacy concerns and regulatory frameworks need to be addressed.
Originality/value
The integration of drones and AI in special library services presents a novel approach to revolutionizing library operations. This study uniquely combines these technologies, emphasizing the importance of proactive consideration of challenges and prospects for successful implementation.
Details
Keywords
Soheila Khoeini, Alireza Noruzi, Nader Naghshineh and Fatemeh Sheikhshoaei
This paper aims to design the digital transformation model for university libraries based on the Delphi method using the Iranian public university libraries as the study case.
Abstract
Purpose
This paper aims to design the digital transformation model for university libraries based on the Delphi method using the Iranian public university libraries as the study case.
Design/methodology/approach
A qualitative approach and the Delphi method were used to conduct the current research. In total, 15 experts in the field of digital transformation of libraries were selected through targeted and snowball sampling. They were asked to complete and finalize items identified from previous research to design a digital transformation model for public university libraries in Iran during successive Delphi rounds. The Delphi method was completed after the third round, upon reaching a favorable consensus.
Findings
The findings obtained from the research led to the presentation of the model in 7 main dimensions, 25 concepts and 139 components. Meanwhile, the concept of “data-centered” and changing the concept of “optimal reorganization of library resources” to the concept of “acquisitions and optimal reorganization of library resources” are among the new achievements of this research. In addition, the components of “promoting data-oriented thinking in the decision-making of library managers,” “encouraging employees to use and analyze data” and “planning to increase the digital literacy of librarians” were added to the concept of “data-oriented”; the components of “having knowledge of digital collection and its rules for the correct identification and evaluation of resources,” “familiarity with digital metadata standards and data transfer standards” and “familiarity with open access platforms” were added to the concept of “librarian knowledge competencies”; and the components of “planning, coordination,” “monitoring and evaluating the progress of library digital transformation projects” and “collaboration and networking with other academic library managers” in the concept of “library manager’s management skills”; the components of “identification of new digital formats and resources,” “creation, preparation and accessibility of game scientific content and free in the library,” “updating the resource organization policy with new organization concepts and rules” and “updating the library collection development policy based on the information needs of users” were added to the concept of “acquisitions and optimal reorganization of library resources” and “Web 2.0 technologies” component were added to the concept of “use of digital technologies in the library.”
Research limitations/implications
This study is limited to Iranian public university libraries, and the findings may not be directly transferable to other contexts. In addition, the Delphi method, while effective for expert consensus, relies on subjective opinions and may not fully capture the complexities of digital transformation. Future research could explore the implementation challenges of the proposed model and its long-term impact on library services and user satisfaction. Despite these limitations, the study offers a valuable foundation for digital transformation initiatives in Iranian university libraries and can inform policy decisions and resource allocation.
Practical implications
The proposed digital transformation model offers practical guidance for Iranian university libraries. By implementing the model, libraries can enhance their services through data-driven decision-making, improved resource management and the adoption of new technologies. Librarians can develop the necessary digital competencies to effectively manage digital collections and engage with users. In addition, the model emphasizes the importance of collaboration among library managers, fostering knowledge sharing and best practices. Ultimately, the practical application of this model can lead to more efficient, user-centered and innovative library services.
Social implications
The proposed digital transformation model for Iranian university libraries holds significant social implications. By enhancing access to information and resources, it can democratize knowledge and foster innovation. Increased digital literacy among librarians will equip them to better serve diverse user communities. However, equitable access to digital services must be ensured to prevent the widening of the digital divide. The model’s focus on data-driven decision-making can improve resource allocation and user satisfaction. By promoting collaboration and knowledge sharing, libraries can become more central to their communities and contribute to regional development. Ultimately, the success of this model depends on addressing potential challenges such as privacy concerns, digital security and the need for ongoing training and support.
Originality/value
The proposed model, with its 7 main dimensions, 25 concepts and 139 components, provides a roadmap for enhancing library services, resource management and decision-making. By emphasizing data-centered approaches, promoting digital literacy among librarians and integrating Web 2.0 technologies, libraries can adapt to the evolving needs of users. Collaboration and networking with other academic library managers can foster knowledge exchange and collective problem-solving. By implementing the proposed model, libraries can adapt to changing user needs, enhance services and contribute to the academic community’s success. However, implementing this model requires addressing challenges related to equity, privacy and accessibility, ensuring that all users benefit from the digital transformation. Overall, this research serves as a valuable resource for university library managers, guiding them toward effective digital adaptation and improved user experiences.
Details
Keywords
This study adopts a qualitative approach to a critical media analysis of the multifaceted aspects of child marriage in the Yemeni context as an example of the broader Arab…
Abstract
Purpose
This study adopts a qualitative approach to a critical media analysis of the multifaceted aspects of child marriage in the Yemeni context as an example of the broader Arab context. It seeks to provide a deeper understanding of the current situation, underlying causes and consequences of child marriage, as well as efforts to curb the practice.
Design/methodology/approach
This study utilizes a thematic analysis approach, examining various textual and multimodal sources on child marriage. A corpus of Arab media, including news and opinion articles, online discussions and public comments, was compiled and analyzed. Additionally, sentiment analysis techniques were employed to examine a YouTube report about Nujood Ali, a victim of child marriage in Yemen, to gauge the emotional tone and attitudes of viewers towards the media coverage and the practice itself.
Findings
This study identifies prevalent themes, narratives and perspectives related to child marriage in Yemen, highlighting the diverse journalism genres addressing the issue. The thematic analysis of the media corpus reveals several themes that align with findings from other studies, particularly those discussing the practice, its causes and its prevalence. The sentiment analysis of a YouTube report on Nujood Ali reveals significant insights into the public’s emotional response and attitude towards child marriage.
Research limitations/implications
This study is limited to the content available in the compiled corpus and the specific methodologies employed, including thematic and sentiment analysis. These limitations might influence the generalizability of the findings.
Originality/value
This study is distinctive in its comprehensive and multidisciplinary approach to examining child marriage in Yemen and the broader Arab context. It employs a selection of digital humanities software to attempt a systematic, critical media analysis on child marriage in Yemen. Thematic analysis has uncovered unique insights, such as the inadvertent consequences of legislation intended to protect children, which have instead exacerbated the problem. In addition, the media has highlighted the negative role played by some religious scholars in Yemeni Parliament. These scholars have used their political power and immunity to obstruct efforts to end the practice, either directly or by mobilizing their supporters. A sentiment analysis of YouTube comments clearly indicates that the practice of child marriage is not widely accepted within the Yemeni community, despite some perceptions to the contrary.
Details