Search results

1 – 5 of 5
Article
Publication date: 11 March 2019

David Martin, David Engvall, Kerry Burke, Gerald Hodgkins, Matthew Franker and Reid Hooper

To summarize and explain the US Securities and Exchange Commission’s (Commission) recent report of investigation cautioning public companies to consider cyber-related threats when…

256

Abstract

Purpose

To summarize and explain the US Securities and Exchange Commission’s (Commission) recent report of investigation cautioning public companies to consider cyber-related threats when designing and implementing internal accounting controls.

Design/methodology/approach

Explains that the Commission’s report arose out of a Commission enforcement investigation into the internal accounting controls of nine unidentified public companies that were victims of email scams, explains that the Commission issued the report to emphasize that cybersecurity remains a high priority for the Commission and the report should serve as a reminder that all public companies need to consider cyber-related threats when devising and maintaining internal accounting controls and provides practical considerations for public companies to consider in light of the Commission’s report.

Findings

Public companies should assume that the Commission is actively monitoring all areas related to cybersecurity, including corporate disclosures of cyber-related incidents and also whether companies have established policies, procedures, and internal controls in place to ensure cyber-related incidents are prevented. Given that assumption, public companies should take prompt steps to assess and, if appropriate, improve internal accounting controls, disclosure controls, and cyber-related policies and procedures to address the risk of cyber-related incidents.

Originality/value

Practical guidance from experienced securities lawyers.

Details

Journal of Investment Compliance, vol. 20 no. 1
Type: Research Article
ISSN: 1528-5812

Keywords

Article
Publication date: 1 March 1934

THIS is the time of the year when, with the strong opening of the Spring publishing season, librarians take a review of matters which definitely concern books. There is a cant…

Abstract

THIS is the time of the year when, with the strong opening of the Spring publishing season, librarians take a review of matters which definitely concern books. There is a cant saying amongst certain eager librarians that their colleagues are too concerned with technical matters and too little, if at all, concerned with books. There may have been isolated cases of this kind, but it is merely untrue to say that the average librarian is not concerned, deeply and continuously, with the literary activity of his day. It is well that men should live in their own time and be thoroughly interested in the work of new writers. There is danger that exclusive occupation with them may lead to an unbalanced view of the book world. If one judged from the criticisms that occasionally appear in our contemporaries, one would suppose that the only books that mattered were the authentic fiction of the day, and by authentic is meant the books which go beyond average contemporary thought and conventions. Librarianship, however, is concerned with all books of all subjects and of all time. This note is merely a prelude to a number of THE LIBRARY WORLD which deals mainly with literature and with reading. Here we return again to the perennial fiction question.

Details

New Library World, vol. 36 no. 9
Type: Research Article
ISSN: 0307-4803

Article
Publication date: 7 June 2019

Shelby D. Hunt

The purpose of this paper is to provide a retrospection on the importance, origins and development of the research programs in the author’s career.

Abstract

Purpose

The purpose of this paper is to provide a retrospection on the importance, origins and development of the research programs in the author’s career.

Design/methodology/approach

The study uses an autobiographical approach.

Findings

Most of the articles, research monographs and books that constitute this research and publishing efforts can be categorized into seven distinct, but related, research programs: channels of distribution; marketing theory; marketing’s philosophy debates; macromarketing and ethics; relationship marketing; resource-advantage theory; and marketing management and strategy. The value system that has guided these research programs has been shaped by specific events that took place in the author’s formative years. This essay chronicles these events and the origins and development of the seven research programs.

Originality/value

Chronicling the importance, origins and development of the seven research programs will hopefully motivate and assist other scholars in developing their own research programs.

Details

Journal of Historical Research in Marketing, vol. 11 no. 1
Type: Research Article
ISSN: 1755-750X

Keywords

Content available
Book part
Publication date: 11 August 2021

Amanda DiGioia

Abstract

Details

Gender and Parenting in the Worlds of Alien and Blade Runner
Type: Book
ISBN: 978-1-83982-941-3

Open Access
Article
Publication date: 12 July 2023

Nicola Cobelli and Emanuele Blasioli

The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management…

1583

Abstract

Purpose

The purpose of this study is to introduce new tools to develop a more precise and focused bibliometric analysis on the field of digitalization in healthcare management. Furthermore, this study aims to provide an overview of the existing resources in healthcare management and education and other developing interdisciplinary fields.

Design/methodology/approach

This work uses bibliometric analysis to conduct a comprehensive review to map the use of the unified theory of acceptance and use of technology (UTAUT) and the unified theory of acceptance and use of technology 2 (UTAUT2) research models in healthcare academic studies. Bibliometric studies are considered an important tool to evaluate research studies and to gain a comprehensive view of the state of the art.

Findings

Although UTAUT dates to 2003, our bibliometric analysis reveals that only since 2016 has the model, together with UTAUT2 (2012), had relevant application in the literature. Nonetheless, studies have shown that UTAUT and UTAUT2 are particularly suitable for understanding the reasons that underlie the adoption and non-adoption choices of eHealth services. Further, this study highlights the lack of a multidisciplinary approach in the implementation of eHealth services. Equally significant is the fact that many studies have focused on the acceptance and the adoption of eHealth services by end users, whereas very few have focused on the level of acceptance of healthcare professionals.

Originality/value

To the best of the authors’ knowledge, this is the first study to conduct a bibliometric analysis of technology acceptance and adoption by using advanced tools that were conceived specifically for this purpose. In addition, the examination was not limited to a certain era and aimed to give a worldwide overview of eHealth service acceptance and adoption.

Details

The TQM Journal, vol. 35 no. 9
Type: Research Article
ISSN: 1754-2731

Keywords

1 – 5 of 5