Search results

1 – 10 of 10
Article
Publication date: 1 June 1993

Denis Adams, Albakri Ahmad, Doug Haynes and Jim Sheehan

Begins by summarizing Stafford Beer's minimal model proposed in his report on the organization of Manchester Business School in 1970, and the conclusions made by Sir Douglas…

Abstract

Begins by summarizing Stafford Beer's minimal model proposed in his report on the organization of Manchester Business School in 1970, and the conclusions made by Sir Douglas Hague, when Beer's model was used as a framework to examine current business school practices and a vision for the twenty‐first century. To facilitate learning in a “reality” which closely resembled situations in A‐space, a business simulator course was designed and its cybernetics is explained to show how Beer's ideas were actually used to teach Beer's ideas. Also delineates the experiences of the students' practical use of Beer's VSM. Continuing the theme to interplay teaching, research and consultancy, describes the concept, model and the implementation of Janus — The Centre for Systems Thinking and Organizational Transformation; a centre for those who wish to study, develop, apply and promote Stafford Beer's ideas and works.

Details

Kybernetes, vol. 22 no. 6
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 29 September 2020

Wenyuan Wang and Sira Yongchareon

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups…

Abstract

Purpose

This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups. Further, the report will advise commercial applications and advice of SECaaS as an extended context to help firms make decisions.

Design/methodology/approach

This paper compares the SECaaS categories in Cloud Security Alliance (CSA) with the security clauses in ISO/IEC 27002:2013 to give a comprehensive analysis of those SECaaS categories. Reviewed from a number of related literature, this paper analyzes and categorizes SECaaS into three major groups including protective, detective and reactive based on security control perspectives. This study has discussed the three groups and their interplay to identify the key characteristics and problems that they aim to address.

Findings

This paper also adds new evidence to support a better understanding of the current and future challenges and directions for SECaaS. Also, the study reveals both the positive and negative aspects of SECaaS along with business cases. It advises on various sizes and domains of organizations to consider SECaaS as one of their potential security approaches.

Originality/value

SECaaS has been demonstrated to be one of the increasingly popular ways to address security problems in Cloud computing. As a new concept, SECaaS could be treated as integrated security means and delivered as a service module in the Cloud. However, it is still in infancy and not very widely investigated. Recent studies suggest that SECaaS is an efficient solution for Cloud and real industries. However, shortcomings of SECaaS have not been well-studied and documented. Moreover, reviewing the existing research, researchers did not classify the SECaaS-related categories.

Details

International Journal of Web Information Systems, vol. 16 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 25 August 2021

Ana Faizi, Ali Padyab and Andreas Naess

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

2108

Abstract

Purpose

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

Design/methodology/approach

Four large organizations and five municipalities that use cloud services and conduct ISRA to adhere to their information security risk management practices were studied. Data were gathered qualitatively to answer the study’s research question: How is ISRA practiced on the cloud? The Coat Hanger model was used as a theoretical lens to study and theorize the practices.

Findings

The results showed that the organizations aimed to follow the guidelines, in the form of frameworks or their own experience, to conduct ISRA; furthermore, the frameworks were altered to fit the organizations’ needs. The results further indicated that one of the main concerns with the cloud ISRA was the absence of a culture that integrates risk management. Finally, the findings also stressed the importance of a good understanding and a well-written legal contract between the cloud providers and the organizations using the cloud services.

Originality/value

As opposed to the previous research, which was more inclined to try out and evaluate various cloud ISRA, the study provides insights into the practice of cloud ISRA experienced by the organizations. This study represents the first attempt to investigate cloud ISRA that organizations practice in managing their information security.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 28 December 2023

Amal Al Muqarshi, Sharifa Said Al Adawi and Sara Mohammed Al Bahlani

A majority of higher education institutions (HEIs) in Oman, and internationally, have adopted English as the language of education, driven by its power and its globally accepted…

Abstract

Purpose

A majority of higher education institutions (HEIs) in Oman, and internationally, have adopted English as the language of education, driven by its power and its globally accepted status as the language of knowledge and communication. Such an internationalisation policy has been inadequately evaluated to examine its actual effects. This paper aims at analysing the existing literature with a view to hypothesise the effects of adopting English as a medium of instruction (EMI) on establishing intellectual capital in the Omani context.

Design/methodology/approach

The paper employs a case study design that draws on data generated through a systematic review of 94 peer-reviewed papers that are synthesised using thematic analysis.

Findings

The findings indicate that EMI negatively affects the optimal creation of intellectual capital through limiting access to HE, hindering knowledge transfer, impeding Omanis' employability and hindering faculty's professional growth. EMI leads HEIs to mirror the supplying countries' cultures in terms of materials, ideologies and standards. It affects teaching and research quality, training and communication, the sense of equity, belonging and self-worth amongst students and the relationships amongst faculty members. It also increases reliance on external stakeholders.

Research limitations/implications

The paper highlights the interconnection between the forms of intellectual capital and how some components are antecedents to the creation of the intellectual capital forms. It establishes the moderating role the language of instruction plays in relation to the three sub forms of intellectual capital in higher education.

Practical implications

The paper calls for maximising higher education intellectual capital through adopting bilingual rather than monolingual higher education. It calls upon policymakers to revisit the assumptions underlying higher education systems in order to optimise their outcomes.

Originality/value

The paper is the first one that sheds light on the role of language in intellectual capital construction. Such a moderating role has received almost no attention in the higher education literature that is largely busy quantifying its outcomes rather than ensuring they are actually sustainably generated.

Details

Journal of Intellectual Capital, vol. 25 no. 1
Type: Research Article
ISSN: 1469-1930

Keywords

Article
Publication date: 18 July 2023

Stephen Mujeye

This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.

Abstract

Purpose

This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.

Design/methodology/approach

A survey was used to investigate the differences in behaviors and practices of security-conscious users (group A) and regular users (group B) on mobile devices. Each group will have 50 participants for a total of 100.

Findings

The analysis revealed differences in the behaviors and practices of security-conscious and regular users. The results indicated that security-conscious users engage in behaviors and practices that are more secure on mobile devices when compared with regular users.

Research limitations/implications

The results will help recommend the best behaviors and practices for mobile device users, increasing mobile device security.

Social implications

The results will help society to be more aware of security behaviors and practices on mobile devices.

Originality/value

This study answers the call for addressing the weaknesses and vulnerabilities in mobile device security. It develops a research instrument to measure the differences in behaviors and practices of security-conscious and regular mobile device users.

Details

Information & Computer Security, vol. 31 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 27 February 2024

Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…

Abstract

Purpose

Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.

Design/methodology/approach

The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.

Findings

By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.

Originality/value

There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 8
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 8 March 2021

Yotamu Gangire, Adéle Da Veiga and Marlien Herselman

This paper outlines the development of a validated questionnaire for assessing information security behaviour. The purpose of this paper is to present data from the questionnaire…

Abstract

Purpose

This paper outlines the development of a validated questionnaire for assessing information security behaviour. The purpose of this paper is to present data from the questionnaire validation process and the quantitative study results.

Design/methodology/approach

Data obtained through a quantitative survey (N = 263) at a South African university were used to validate the questionnaire.

Findings

Exploratory factor analysis produced 11 factors. Cronbach’s alpha for the 11 factors were all above 0.7, suggesting that the questionnaire is valid and reliable. The responses show that autonomy questions received positive perception, followed by competence questions and lastly relatedness questions. The correlation analysis results show that there was a statistically significant relationship between competence factors and autonomy factors. There was a partial significant relationship between autonomy and relatedness factors, and between competence and relatedness factors. The study results suggest that competence and autonomy could be more important than relatedness in fostering information security behaviour among employees.

Research limitations/implications

This study used a convenience sampling, a cross-sectional design, and was carried out in a single organisation. This could pose limitations when generalising the study results. Future studies could use random sampling and consider other universities for further validation.

Practical implications

Universities can use the questionnaire to identify developmental areas to improve information security from a behaviour perspective.

Originality/value

This paper provides a research instrument for assessing information security behaviour from the perspective of the self-determination theory.

Details

Information & Computer Security, vol. 29 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 3 May 2022

Shahrokh Nikou, Mark De Reuver and Matin Mahboob Kanafi

Information and digital literacy have recently received much interest, and they are being viewed as critical strategic organisational resources and skills that employees need to…

27526

Abstract

Purpose

Information and digital literacy have recently received much interest, and they are being viewed as critical strategic organisational resources and skills that employees need to obtain in order to function at their workplaces. Yet, the role of employees' literacy seems to be neglected in current literature. This paper aims to explore the roles that information and digital literacy play on the employees' perception in relation to usefulness and ease of use of digital technologies and consequently their intention to use technology in the practices they perform at the workplace.

Design/methodology/approach

This paper builds a conceptual model with key constructs (information literacy and digital literacy) as new antecedents to the technology acceptance model and aims to establish that information literacy and digital literacy are indirect determinants of employees' intention to use digital technologies at the workplace. The data set used in this paper comprises of 121 respondents and structural equation modelling was used.

Findings

The findings reveal that both information literacy and digital literacy have a direct impact on perceived ease of use of technology but not on the perceive usefulness. The findings also show that both literacies have an indirect impact on the intention to use digital technology at work via attitude towards use.

Practical implications

Managers and decision-makers should pay close attention to the literacy levels of their staff. Because literacies are such an important skillset in the digital age, managers and chief information officers may want to start by identifying which work groups or individuals require literacy training and instruction, and then provide specific and relevant training or literacy interventions to help those who lack sufficient literacy.

Originality/value

This is one of the first studies to consider information literacy and digital literacy as new antecedents of the technology acceptance model at the workplace environment.

Details

Journal of Documentation, vol. 78 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 17 July 2023

Mahender Singh Kaswan, Rajeev Rathi, Jiju Antony, Jennifer Cross, Jose Arturo Garza-Reyes, Mahipal Singh, Inder Preet Singh and Michael Sony

The coronavirus (COVID-19) pandemic has led to a surge in demand for health-care facilities, medicines, vaccines and other health-care items. The purpose of this study is to…

480

Abstract

Purpose

The coronavirus (COVID-19) pandemic has led to a surge in demand for health-care facilities, medicines, vaccines and other health-care items. The purpose of this study is to investigate different facets of integrated Green Lean Six Sigma and Industry 4.0 approach in the context of COVID-19 for better healthcare management. Integrating Green Lean Six Sigma (GLSS) and Industry 4.0 (I4.0) has the potential to meet the modern demand of health-care units and also leads to improving the quality of inpatient care with better safety, hygiene and real-time diagnoses. A systematic review has been conducted to determine the tools/techniques, challenges, application areas and potential benefits for the adoption of an integrated GLSS-I4.0 approach within health-care facilities from the perspective of COVID management. Further, a conceptual framework of integrated GLSS-I4.0 has been proposed for better COVID management.

Design/methodology/approach

To conduct the literature review, the authors used the preferred reporting items for systematic reviews and meta-analysis and covers relevant papers from the arrival of COVID-19. Based on the systematic understanding of the different facets of the integrated GLSS-I4.0 approach and through insights of experts (academicians and health-care personnel), a conceptual framework is proposed to combat COVID-19 for better detection, prevention and cure.

Findings

The systematic review presented here provides different avenues to comprehend the different facets of the integrated GLSS-I4.0 approach in different areas of COVID health-care management. In this study, the proposed framework reveals that the Internet of Things, big data and artificial intelligence are the major constituents of I4.0 technologies that lead to better COVID management. Moreover, integration of I4.0 with GLSS aids during different stages of the COVID management, right from diagnosis, manufacture of items and inpatient and outpatient care of the affected person.

Practical implications

This study provides a significant knowledge database to the practitioners by understanding different tools and techniques of an integrated approach for better COVID management. Moreover, the proposed framework aids to grab day-to-day information from the affected people and ensures reduced hospital stay with better space utilization and the creation of a healthy environment around the patient. This inclusive implementation of the proposed framework will enhance knowledge base in medical areas and provides different novel prospects to combat other medical urgencies.

Originality/value

To the best of the authors’ knowledge, this study is the first of its kind to review different facets of the integrated GLSS-I4.0 approach with a view of the COVID health-care perspective and provides a conceptual framework.

Details

International Journal of Lean Six Sigma, vol. 15 no. 1
Type: Research Article
ISSN: 2040-4166

Keywords

Article
Publication date: 30 December 2024

Rohit Raj, Vimal Kumar, Arpit Singh and Pratima Verma

This study aims to investigate the relationship between patient satisfaction (PS) and the parameters in healthcare and supply chain management (HLSCM).

Abstract

Purpose

This study aims to investigate the relationship between patient satisfaction (PS) and the parameters in healthcare and supply chain management (HLSCM).

Design/methodology/approach

The structural equation modeling (SEM) and fuzzy-set qualitative comparative analysis (fsQCA) method have been employed to identify correlation and possible configuration of causal factors that influence PS, including lack of resilience (LS), lack of visibility (LV), cost management (CM) and integration and interoperability (II).

Findings

The results from SEM confirmed that PS is highly correlated with lack of visibility, CM and II as critical parameters. Moreover, fsQCA findings state that the configuration of high levels of both resilience and lack of visibility, as well as high levels of II, are crucial for PS.

Research limitations/implications

The researchers also identified the configuration of factors that lead to low PS. The study’s results could assist healthcare providers in improving their supply chain operations, resulting in more effective and efficient healthcare service delivery and ultimately improving PS.

Originality/value

The fsQCA method used in the study provides a more nuanced understanding of the complex interplay between these factors. The inclusion of supply chain management characteristics as parameters in the evaluation of PS is a novel aspect of this research. Previous studies largely focused on more traditional factors such as physical care, waiting times and hospital amenities. By considering supply chain management factors, this study provides insights into an under-explored area of PS research, which has important implications for healthcare providers looking to improve their operations and PS.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

1 – 10 of 10