The purpose of this paper is to examine the challenges that small firms in the UK clothing manufacturing sector encounter. It has been suggested that small manufacturers' main…
Abstract
Purpose
The purpose of this paper is to examine the challenges that small firms in the UK clothing manufacturing sector encounter. It has been suggested that small manufacturers' main problems are based on an inadequate information‐sharing structure. This research will explore the strategic significance of information to effective supply chain decisions in small garment‐manufacturing firms.
Design/methodology/approach
The paper is designed to employ Porter's five forces to explain the key factors influencing competition in the UK garment manufacturing industry and the relationship of information technology as a facilitator of shared information. In‐depth interviews and observations are conducted in a multiple case approach.
Findings
Empirical evidence shows that the slow and inefficient reaction of small garment manufacturers to competitive pressures is associated with inaccurate and untimely information sharing among trading partners.
Research limitations/implications
The methodological approach justified the particularity, the specificity, and the boundedness required in case studies and demonstrates the depth of thoroughness and authentic explanations. It might, however, be useful to obtain a broader and wider sampling frame in any future research.
Practical implications
A successful supply chain will have implications for the upstream and downstream managers, who need to integrate their supply chains as part of a team that creates and adds value to the garments that end up in the hands of the consumers.
Originality/value
This paper has been able to stimulate concerns and interests in owner/managers of small garment manufacturers with special reference to their information needs. The evidence obtained demonstrated the overriding need for structured information strategies that will encourage the efficient flow of accurate and timely information across their supply chains.
Details
Keywords
Chipo Katsande, Tendai Shelton Muwani, Gracious Mutipforo, Prosper Tafadzwa Denhere, Njodzi Ranganai, Solomon Marime and Allan C. Muzenda
Universal Health Coverage (UHC) means that all people can access quality essential health services, without having to suffer financial hardship. However, this remains a…
Abstract
Universal Health Coverage (UHC) means that all people can access quality essential health services, without having to suffer financial hardship. However, this remains a significant challenge in many parts of Africa, particularly for marginalized populations in hard-to-reach communities as the financial burden continues to be placed on the poor citizens. The rapid advancement of digital technologies has changed the healthcare landscape by introducing new, frugal methods for healthcare delivery, holding the potential to bridge the healthcare gap and enhance access to quality healthcare for marginalized populations. While the notion of frugal innovation (FI) is gaining worldwide traction, the application of digital technologies in driving FIs within African healthcare systems remains largely untapped. With this aim, the research conducted a comprehensive literature review and searched for articles that addressed digital technologies in the medical field and technology-enabled disruptive digital frugal innovations (DFIs), particularly in the healthcare sector in Africa from Scopus indexed journals. In addition, the technologies identified are examined with respect to their innovation characteristics. Inclusion and exclusion criterion were clearly defined. The inclusion criteria considered studies that explored digital technologies and their intervention characteristics and DFIs in healthcare. Articles that were excluded from the study consisted of those not written in English, studies that addressed broader aspects of technology without specific emphasis on DFIs in healthcare.
Details
Keywords
Jacqueline M. Archibald and Karen Renaud
Penetration tests have become a valuable tool in the cyber security defence strategy in terms of detecting vulnerabilities. Although penetration testing has traditionally focussed…
Abstract
Purpose
Penetration tests have become a valuable tool in the cyber security defence strategy in terms of detecting vulnerabilities. Although penetration testing has traditionally focussed on technical aspects, the field has started to realise the importance of the human in the organisation, and the need to ensure that humans are resistant to cyberattacks. To achieve this, some organisations “pentest” their employees, testing their resilience and ability to detect and repel human-targeted attacks. In a previous paper, the authors reported on PoinTER (Prepare TEst Remediate), a human pentesting framework, tailored to the needs of SMEs. This paper aims to propose improvements to refine the framework. The improvements are based on a derived set of ethical principles that have been subjected to ethical scrutiny
Design/methodology/approach
The authors conducted a systematic literature review of academic research, a review of actual hacker techniques, industry recommendations and official body advice related to social engineering techniques. To meet the requirements to have an ethical human pentesting framework, the authors compiled a list of ethical principles from the research literature which they used to filter out techniques deemed unethical.
Findings
Drawing on social engineering techniques from academic research, reported by the hacker community, industry recommendations and official body advice and subjecting each technique to ethical inspection, using a comprehensive list of ethical principles, the authors propose the refined GDPR-compliant and privacy respecting PoinTER framework. The list of ethical principles, as suggested, could also inform ethical technical pentests.
Originality/value
Previous work has considered penetration testing humans, but few have produced a comprehensive framework such as PoinTER. PoinTER has been rigorously derived from multiple sources and ethically scrutinised through inspection, using a comprehensive list of ethical principles derived from the research literature.