Search results

1 – 10 of over 17000
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Book part
Publication date: 13 August 2018

Robert L. Dipboye

Abstract

Details

The Emerald Review of Industrial and Organizational Psychology
Type: Book
ISBN: 978-1-78743-786-9

Access Restricted. View access options
Book part
Publication date: 18 April 2022

KGame A. Molope

Abstract

Details

South Africa’s Democracy at the Crossroads
Type: Book
ISBN: 978-1-80262-927-9

Access Restricted. View access options
Article
Publication date: 12 June 2007

N.L. Clarke and A.R. Mekala

The popularity of mobile devices and the evolving nature of the services and information they can delivery make them increasingly desirable targets for misuse. The ability to…

1750

Abstract

Purpose

The popularity of mobile devices and the evolving nature of the services and information they can delivery make them increasingly desirable targets for misuse. The ability to provide effective authentication of the user becomes imperative if protection against misuse of personally and financially sensitive information is to be provided. This paper discusses the application of biometrics to a mobile device in a transparent and continuous fashion and the subsequent advantages and disadvantages that are in contention with various biometric techniques.

Design/methodology/approach

An investigation was conducted to evaluate the feasibility of utilising signature recognition, to verify users based upon written words and not signatures, thereby enabling transparent handwriting verification. Participants were required to write a number of common words, such as “hello” “sorry” and “thank you”. The ability to correctly verify against their own template and to reject impostors was then established.

Findings

Totally, 20 users participated in the study and an average FAR and FRR of 0 and 1.2 per cent, respectively, were experienced across eight common words.

Research limitations/implications

The initial study has proven very successful, however, further investigations need to be established with a larger population of users and a wider vocabulary of words.

Originality/value

This study has verified the feasibility of applying an existing signature recognition technique to transparent handwriting verification.

Details

Information Management & Computer Security, vol. 15 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Available. Open Access. Open Access
Article
Publication date: 27 February 2024

Siva Shaangari Seathu Raman, Anthony McDonnell and Matthias Beck

Society is critically dependent on an adequate supply of hospital doctors to ensure optimal health care. Voluntary turnover amongst hospital doctors is, however, an increasing…

2921

Abstract

Purpose

Society is critically dependent on an adequate supply of hospital doctors to ensure optimal health care. Voluntary turnover amongst hospital doctors is, however, an increasing problem for hospitals. The aim of this study was to systematically review the extant academic literature to obtain a comprehensive understanding of the current knowledge base on hospital doctor turnover and retention. In addition to this, we synthesise the most common methodological approaches used before then offering an agenda to guide future research.

Design/methodology/approach

Adopting the PRISMA methodology, we conducted a systematic literature search of four databases, namely CINAHL, MEDLINE, PsycINFO and Web of Science.

Findings

We identified 51 papers that empirically examined hospital doctor turnover and retention. Most of these papers were quantitative, cross-sectional studies focussed on meso-level predictors of doctor turnover.

Research limitations/implications

Selection criteria concentrated on doctors who worked in hospitals, which limited knowledge of one area of the healthcare environment. The review could disregard relevant articles, such as those that discuss the turnover and retention of doctors in other specialities, including general practitioners. Additionally, being limited to peer-reviewed published journals eliminates grey literature such as dissertations, reports and case studies, which may bring impactful results.

Practical implications

Globally, hospital doctor turnover is a prevalent issue that is influenced by a variety of factors. However, a lack of focus on doctors who remain in their job hinders a comprehensive understanding of the issue. Conducting “stay interviews” with doctors could provide valuable insight into what motivates them to remain and what could be done to enhance their work conditions. In addition, hospital management and recruiters should consider aspects of job embeddedness that occur outside of the workplace, such as facilitating connections outside of work. By resolving these concerns, hospitals can retain physicians more effectively and enhance their overall retention efforts.

Social implications

Focussing on the reasons why employees remain with an organisation can have significant social repercussions. When organisations invest in gaining an understanding of what motivates their employees to stay in the job, they are better able to establish a positive work environment that likely to promote employee well-being and job satisfaction. This can result in enhanced job performance, increased productivity and higher employee retention rates, all of which are advantageous to the organisation and its employees.

Originality/value

The review concludes that there has been little consideration of the retention, as opposed to the turnover, of hospital doctors. We argue that more expansive methodological approaches would be useful, with more qualitative approaches likely to be particularly useful. We also call on future researchers to consider focussing further on why doctors remain in posts when so many are leaving.

Details

Journal of Health Organization and Management, vol. 38 no. 9
Type: Research Article
ISSN: 1477-7266

Keywords

Access Restricted. View access options
Article
Publication date: 26 May 2022

Ioannis Stylios, Andreas Skalkos, Spyros Kokolakis and Maria Karyda

This research aims to build a system that will continuously. This paper is an extended version of SECPRE 2021 paper and presents a research on the development and validation of a…

405

Abstract

Purpose

This research aims to build a system that will continuously. This paper is an extended version of SECPRE 2021 paper and presents a research on the development and validation of a behavioral biometrics continuous authentication (BBCA) system that is based on users keystroke dynamics and touch gestures on mobile devices. This paper aims to build a system that will continuously authenticate the user of a smartphone.

Design/methodology/approach

Session authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the establishment of the authenticated session. Moreover, smartphones themselves are used as authentication means, especially in two-factor authentication schemes, which are often required by several services. Whether the smartphone is in the hands of the legitimate user constitutes a great concern and correspondingly whether the legitimate user is the one who uses the services. In response to these concerns, BBCA technologies have been proposed on a large corpus of literature. This paper presents a research on the development and validation of a BBCA system (named BioPrivacy), which is based on the user’s keystroke dynamics and touch gestures, using a multi-layer perceptron (MLP). Also, this paper introduces a new BB collection tool and proposes a methodology for the selection of an appropriate set of BB.

Findings

The system achieved the best results for keystroke dynamics which are 97.18% accuracy, 0.02% equal error rate, 97.2% true acceptance rate and 0.02% false acceptance rate.

Originality/value

This paper develops a new BB collection tool, named BioPrivacy, by which behavioral data of users on mobile devices can be collected. This paper proposes a methodology for the selection of an appropriate set of BB. This paper presents the development of a BBCA system based on MLP.

Details

Information & Computer Security, vol. 30 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 4 April 2016

Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh and Ke Chen

The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is…

596

Abstract

Purpose

The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is becoming very common. These mobile electronic services typically use a knowledge-based authentication method to authenticate a user (claimed identity). However, this authentication method is vulnerable to several security attacks. To counter the attacks and to make the authentication process more secure, this paper aims to investigate the use of touch dynamics biometrics in conjunction with a personal identification number (PIN)-based authentication method, and demonstrate its benefits in terms of strengthening the security of authentication services for mobile devices.

Design/methodology/approach

The investigation has made use of three light-weighted matching functions and a comprehensive reference data set collected from 150 subjects.

Findings

The investigative results show that, with this multi-factor authentication approach, even when the PIN is exposed, as much as nine out of ten impersonation attempts can be successfully identified. It has also been discovered that the accuracy performance can be increased by combining different feature data types and by increasing the input string length.

Originality/value

The novel contributions of this paper are twofold. Firstly, it describes how a comprehensive experiment is set up to collect touch dynamics biometrics data, and the set of collected data is being made publically available, which may facilitate further research in the problem domain. Secondly, the paper demonstrates how the data set may be used to strengthen the protection of resources that are accessible via mobile devices.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Access Restricted. View access options
Article
Publication date: 1 October 2003

N.L. Clarke, S.M. Furnell, B.M. Lines and P.L. Reynolds

The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for…

1535

Abstract

The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. This paper details the feasibility of a non‐intrusive subscriber authentication technique – the use of keystroke dynamics. This feasibility study comprises a number of investigations into the ability of neural networks to authenticate users successfully based on their interactions with a mobile phone keypad. The initial results are promising with network classification performing well, achieving a 9.8 per cent false rejection rate and an 11.0 per cent false acceptance rate.

Details

Information Management & Computer Security, vol. 11 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 29 March 2011

Yair Levy, Michelle M. Ramim, Steven M. Furnell and Nathan L. Clarke

Concerns for information security in e‐learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students'…

633

Abstract

Purpose

Concerns for information security in e‐learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students' authentication during online exams beyond passwords. This paper aims to assess e‐learners' intention to provide multibiometric data and use of multibiometrics during online exams.

Design/methodology/approach

Based on data collected from 163 e‐learners from two institutions, the authors compared such measures when provided by their university versus by a third‐party service vendor. The multibiometrics discussed included fingerprint, face, and voice recognition.

Findings

The results show a clear indication by the learners that they are significantly more willing to provide their biometric data and intend to use multibiometrics when provided by their university compared with same services provided by a third‐party vendor.

Research limitations/implications

Research implications include the need for better understanding of multibiometrics implementations in educational settings.

Practical implications

The findings are profound for vendors of multibiometrics as they must adjust their approach when implementing such technologies at higher educational institutions, rather than simply opt to license the use of such solutions and to host them.

Originality/value

This study helps higher educational institutions better understand that learners do not appear to object to the use of multibiometrics technologies during online exams, rather the way in which such technologies are implemented and managed on‐campus.

Details

Campus-Wide Information Systems, vol. 28 no. 2
Type: Research Article
ISSN: 1065-0741

Keywords

Access Restricted. View access options
Book part
Publication date: 22 June 2023

Marilyn A. Brown, Jasmine Crowe, John Lanier, Michael Oxman, Roy Richards and L. Beril Toktay

Now more than ever, climate action requires both private and public investment in building a sustainable future for all. COP26 affirmed the importance of collective action at all…

Abstract

Now more than ever, climate action requires both private and public investment in building a sustainable future for all. COP26 affirmed the importance of collective action at all scales coupled with supporting public policy to limit global warming to a 1.5-degree trajectory. This chapter outlines the process and building blocks that culminated in the launch of the Drawdown Georgia Business Compact, whose mission is to leverage the collective impact of Georgia’s business community to achieve net zero carbon emissions in the state by 2050. In bringing together companies across diverse industries, the Business Compact creates a community of practice where cross-sector collaboration accelerates Georgia’s path to actualizing COP26’s decarbonization vision while also considering ‘beyond carbon’ issues such as the economy, equity, public health, and the environment. This is a regional and voluntary approach to Sustainable Development Goal (SDG) 17 (Strengthen the means of implementation and revitalize the Global Partnership for Sustainable Development), which recognizes multi-stakeholder partnerships as important vehicles to achieve SDGs.

Details

Higher Education and SDG17: Partnerships for the Goals
Type: Book
ISBN: 978-1-80455-707-5

Keywords

Access Restricted. View access options
Article
Publication date: 21 June 2019

Ramona Diana Leon, Laurențiu Mihai Treapăt, Anda Gheorghiu and Sergiu Octavian Stan

The paper aims to develop a microcredit evaluation model (MEM) which could serve as a useful tool for banks and NBFIs when SMEs’ economic and financial risks are evaluated.

189

Abstract

Purpose

The paper aims to develop a microcredit evaluation model (MEM) which could serve as a useful tool for banks and NBFIs when SMEs’ economic and financial risks are evaluated.

Design/methodology/approach

Based on the literature review, a set of 17 qualitative and quantitative prudential indicators is selected. Further, a calculation system is developed which relies on the multiple criteria analysis model elaborated by Altman (1968); starting from this, a matrix is developed and a rating system is built. The model is tested among six NBFIs which operate on the Romanian market; three of them are labeled by the Romanian Central Bank as the worst performers, while the other ones are qualified as the best performers. Data are collected from companies’ annual reports and also from the Ministry of Finance.

Findings

It proves that the MEM can serve as a useful tool for the national and international NBFIs’ risk assessment. It can anticipate NBFIs’ success or fall. Furthermore, its results can be guaranteed with a probability of 95 per cent, calculated through the VaR method. Last but not least, it can also be used by the international NBFIs which intend to enter in the Romanian market.

Originality/value

The present paper proposes an original model based on both quantitative and qualitative indicators organized in an integrative equation. The MEM helps both parties involved in the financial grant awarding process – NBFIs are able to better assess requests from SMEs, enabling them to increase the volume of granting, whereas SMEs are able to access money for development projects more easily.

1 – 10 of over 17000
Per page
102050