Search results

1 – 10 of 241
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 17 July 2023

Noman H. Chowdhury, Marc T.P. Adam and Timm Teubner

A growing body of research has identified time pressure as a key driver of cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS documents (e.g…

283

Abstract

Purpose

A growing body of research has identified time pressure as a key driver of cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS documents (e.g. best practices, guidelines and policies) intended to strengthen CS. The purpose of this paper is to provide an overview of how specifically time pressure is addressed by CS documents.

Design/methodology/approach

The authors conducted a systematic search for CS documents followed by a content analysis of the identified documents. First, the authors carried out a systematic Web search and identified 92 formal and informal CS documents (e.g. security policies, procedures, guidelines, manuals and best practices). Second, they systematically analyzed the resulting documents (n = 92), using a structured approach of data familiarization and low-/high-level coding for the identification and interpretation of themes. Based on this analysis, the authors formulated a conceptual framework that captures the sources and effects of time pressure along the themes of industry, operations and users.

Findings

The authors developed a conceptual framework that outlines the role of time pressure for the CS industry, threats and operations. This provides a shared frame of reference for researchers and practitioners to understand the antecedents and consequences of time pressure in the organizational CS context.

Research limitations/implications

While the analyzed documents acknowledge time pressure as an important factor for CS, the documents provide limited information on how to respond to these concerns. Future research could, hence, consult with CS experts and policymakers to inform the development of effective guidelines and policies on how to address time pressure in the identified areas. A dedicated analysis within each area will allow to investigate the corresponding aspects of time pressure in-depth along with a consideration for targeted guidelines and policies. Last, note that a differentiation between CS document types (e.g. formal vs informal and global vs regional) was beyond the scope of this paper and may be investigated by future work.

Originality/value

This study makes three main contributions to the CS literature. First, this study broadens the understanding of the role of time pressure in CS to consider the organizational perspective along the themes of industry, threats and operations. Second, this study provides the first comprehensive assessment of how organizations address time pressure through CS documents, and how this compares to existing research in academic literature. Third, by developing a conceptual framework, this study provides a shared frame of reference for researchers and practitioners to further develop CS documents that consider time pressure’s role in secure behavior.

Details

Information & Computer Security, vol. 31 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 14 August 2017

Dominik Jung, Marc Adam, Verena Dorner and Anuja Hariharan

Human lab experiments have become an established method in information systems research for investigating user behavior, perception and even neurophysiology. The purpose of this…

438

Abstract

Purpose

Human lab experiments have become an established method in information systems research for investigating user behavior, perception and even neurophysiology. The purpose of this paper is to facilitate experimental research by providing a practical guide on how to implement and conduct lab experiments in the freely available experimental platform Brownie.

Design/methodology/approach

Laying the groundwork of the tutorial, the paper first provides a brief overview of common design considerations for lab experiments and a generic session framework. Building on the use case of the widely used trust game, the paper then covers the different stages involved in running an experimental session and maps the conceptual elements of the study design to the implementation of the experimental software.

Findings

The paper generates findings on how computerized lab experiments can be designed and implemented. Furthermore, it maps out the design considerations an experimenter may take into account when implementing an experiment and organizing it along a session structure (e.g. participant instructions, individual and group interaction, state and trait questionnaires).

Originality/value

The paper reduces barriers for researchers to engage in experiment implementation and replication by providing a step-by-step tutorial for the design and implementation of human lab experiments.

Details

Journal of Systems and Information Technology, vol. 19 no. 3/4
Type: Research Article
ISSN: 1328-7265

Keywords

Access Restricted. View access options
Article
Publication date: 19 July 2013

Gregor Zellner

Business process redesign (BPR) is still a big issue in improving organizations and a lot of methods and techniques exist to support this undertaking. Referring to this, the…

2431

Abstract

Purpose

Business process redesign (BPR) is still a big issue in improving organizations and a lot of methods and techniques exist to support this undertaking. Referring to this, the purpose of this paper is to derive a framework for identifying patterns in BPR that help in discovering new mechanisms which are indispensable to redesign and improve business processes.

Design/methodology/approach

The first part of this research process follows the principles of design science research by deriving the framework as an artifact. The second part focuses on the justification (“Justify/Evaluate”) of the framework using a literature review and a laboratory experiment.

Findings

A framework for identifying BPR pattern is derived and in parts validated by literature that helps to support the act of improving business processes. The advantages of this approach lie in the integrity of deriving possible patterns and the fact that it is not limited (as attempts in related work suffered from). The practical implications and added value of the (selected) patterns could be validated by conducting a laboratory experiment.

Research limitations/implications

The justification of the framework is based on a narrow literature review, just to show that this framework is applicable. For a more detailed evaluation a broader literature review is needed. The laboratory experiment was conducted for four patterns only. This also needs to be expanded in further research.

Practical implications

The paper is valuable for academics and practitioners because the impact of BPR on organizational performance is high. Using the identified BPR pattern facilitates the redesign of business processes, as shown in the experiment.

Originality/value

The originality of the paper lies in the possibility to easily identify BPR pattern to support the redesign of existing business processes.

Access Restricted. View access options
Article
Publication date: 24 August 2010

W. David Holford

The purpose of this paper is to examine how knowledge is constructed and risk is induced within the workgroup environment of a large North American aerospace company.

702

Abstract

Purpose

The purpose of this paper is to examine how knowledge is constructed and risk is induced within the workgroup environment of a large North American aerospace company.

Design/methodology/approach

Based on an epistemological position on knowledge and risk, an initial conceptual framework is proposed. This is then evaluated and re‐constructed across a qualitative and ethnographic case study approach involving direct observations and interviews, whereby empirical results were interpreted and analysed across discourse analysis.

Findings

A dialogical model is proposed describing both verbal and non‐verbal interactions between group members leading towards knowledge complexification on the one hand and risk mitigation on the other hand. Factors leading towards dialogical breakdown and subsequent risk induction are also presented.

Research limitations/implications

This single case study prevents generalizing the findings across the entire firm in question, and by extension any manner of external validity outside of the firm's context. Additional workgroups/teams within the firm need to be evaluated, while similar studies in other institutions within the knowledge economy are to be envisaged.

Practical implications

Workgroup managers must nurture an environment conducive towards mutual trust and respect, where individuals are given the time and freedom to express themselves, all the while being open to differing viewpoints and experiences. Coercive dialogue between members should be discouraged. It is proposed that this can be achieved across a parental “safety net” approach.

Originality/value

The paper presents the “how” and “why” of an effective dialogical knowledge constructing process occurring at the interpersonal level, attempts to propose how management can to help achieve this within their organisation, and attempts to bridge the areas of knowledge creation and risk induction at the interpersonal/workgroup level.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 5 no. 2
Type: Research Article
ISSN: 1746-5648

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 1993

Marc T. Jones

The ideology of the New Right draws many of its foundationalconcepts from the work of Adam Smith. This appropriation andvulgarization of Smith′s work constitutes a major injustice…

303

Abstract

The ideology of the New Right draws many of its foundational concepts from the work of Adam Smith. This appropriation and vulgarization of Smith′s work constitutes a major injustice to this seminally important theorist. In particular, the moral underpinnings of Smith′s project are often ignored, as are his insights on the potential dysfunctions and pathologies a capitalist society might foster. Most critiques of capitalism are launched from a Marxian‐based perspective. Finds, however, that by examining post‐Rogernomics New Zealand in light of the potential dysfunctions identified by Smith, the father of capitalism himself proves to be the most trenchant critic of the current order.

Details

International Journal of Social Economics, vol. 20 no. 12
Type: Research Article
ISSN: 0306-8293

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 2001

Magda El‐Sherbini

This article is a survey of representative metadata efforts comparing them to MARC 21 metadata in order to determine if new electronic formats require the development of a new set…

3896

Abstract

This article is a survey of representative metadata efforts comparing them to MARC 21 metadata in order to determine if new electronic formats require the development of a new set of standards. This study surveys the ongoing metadata projects in order to identify what types of metadata exist and how they are used and also compares and analyzes selected metadata elements in an attempt to illustrate how they are related to MARC 21 metadata format elements.

Details

Library Review, vol. 50 no. 1
Type: Research Article
ISSN: 0024-2535

Keywords

Access Restricted. View access options
Article
Publication date: 1 September 1997

Rebecca Bradshaw

One of the projects being funded in the Access to Network Resources (ANR) category of the Electronic Libraries Programme in the UK is ADAM. ADAM aims to provide an information…

4334

Abstract

One of the projects being funded in the Access to Network Resources (ANR) category of the Electronic Libraries Programme in the UK is ADAM. ADAM aims to provide an information gateway to quality assured information on the Internet in Art, Design, Architecture and Media. This paper outlines the background to the project, ways in which resources are selected for the ADAM database, methods of searching ADAM and plans for the future.

Details

Program, vol. 31 no. 3
Type: Research Article
ISSN: 0033-0337

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 1995

Fernanda M. Campos, M. Inês Lopes and Rosa M. Galvão

As a preliminary part of the feasibility study of UseMARCON this paper introduces the history of MARC formats, identifying subsets or families among them, and provides information…

275

Abstract

As a preliminary part of the feasibility study of UseMARCON this paper introduces the history of MARC formats, identifying subsets or families among them, and provides information about their current application by different national bibliographic agencies, networks and library systems, especially in Europe. The application of MARC formats is reviewed either as internal/cataloguing formats or as exchange formats available in tape services. Special attention is paid to the actual use and trends of UNIMARC, since UNIMARC itself represents a new stage in the evolution of MARC formats, devised to improve and facilitate the exchange of bibliographic information between different systems.

Details

Program, vol. 29 no. 4
Type: Research Article
ISSN: 0033-0337

Access Restricted. View access options
Article
Publication date: 1 March 1987

Durward Lee Power

InfoBaserBibSrch (originally called BibSrch) began as a hobby and has turned into a vocation. In developing the product, there was no sponsor to whom to answer. No one's…

49

Abstract

InfoBaserBibSrch (originally called BibSrch) began as a hobby and has turned into a vocation. In developing the product, there was no sponsor to whom to answer. No one's requirements list had to be satisfied. The development process was an opportunity to explore, experiment, and challenge assumptions. My guidelines resulted from listening over the last twenty years to librarians critique systems. The product was in development for three years before the first test site was selected. Many people gave moral support and helped critique the product. My colleagues at the Federal Library and Information Center Committee provided special assistance, for which I am most grateful.

Details

Reference Services Review, vol. 15 no. 3
Type: Research Article
ISSN: 0090-7324

Access Restricted. View access options
Article
Publication date: 13 June 2016

James M. Wilson

The purpose of this paper is to describe and analyse a historic performance-based pay system used in 1803-1810 to reward Marc Isambard Brunel for his innovative engineering…

770

Abstract

Purpose

The purpose of this paper is to describe and analyse a historic performance-based pay system used in 1803-1810 to reward Marc Isambard Brunel for his innovative engineering designs used in the Portsmouth Block Mills. This was used to ensure that Brunel would continue his work on the project once the design was complete to resolve any problems and make any desirable improvements to the machines and the system as a whole.

Design/methodology/approach

This research analyses archived correspondence between the project’s initiators: the Navy Board and Samuel Bentham along with the Admiralty as well as Marc Brunel. Basic financial analyses are applied to the historic cost and investment data.

Findings

The scheme was well designed and successfully kept Brunel involved in the implementation and operational phases of the project. However, there were numerous problems that delayed the project’s completion, thereby creating additional work for Brunel and also delaying and reducing his payments. Brunel was alienated by these developments.

Research limitations/implications

This research has exploited the archived data as fully as possible, and although there are no known deficiencies in the records, it would be desirable to have more complete and detailed information on the investment in, and operations of, the factory.

Practical implications

Reward systems should be designed and implemented so that events outside management’s and worker’s control should not disadvantage either group.

Originality/value

Detailed information about the operations and financial performance of an early factory are analysed in depth. These reveal how management and an innovative engineer interacted regularly over several years with numerous insights on their day-to-day relations.

Details

Journal of Management History, vol. 22 no. 3
Type: Research Article
ISSN: 1751-1348

Keywords

1 – 10 of 241
Per page
102050