Search results

1 – 10 of 738
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 4 May 2010

Raymond Wu and Masayuki Hisada

The purpose of this paper is to propose a metadata‐driven approach and the associated technologies to deal with ever‐rising web security issue. The approach applies metadata…

375

Abstract

Purpose

The purpose of this paper is to propose a metadata‐driven approach and the associated technologies to deal with ever‐rising web security issue. The approach applies metadata techniques to envision semantic validation for new types of vulnerability.

Design/methodology/approach

Token decomposition design was applied to move analysis work into abstract level. This novel approach can solve the issues by using a dual control method to perform vulnerability validation.

Findings

Current analysis has been lack in metadata foundation, the vulnerability is invisible due to semantic obfuscation. This paper reflects the limitation of existing methods. It applies metadata‐driven approach to move physical and syntax analysis into semantic validation.

Research limitations/implications

Currently, certain difficulties may be encountered in preparing benchmarking for dual control process before completing development work. However, this paper tries to create scenarios which can be a reference, to evaluate the semantic validation.

Practical implications

In consideration of the optimized control and vulnerability rate, Structural Query Language (SQL) injection is taken as an example in demonstration. This approach targets large enterprise and high complexity, and the research intends to impact industry to generate common practices such as metadata standards and development tools.

Originality/value

This paper contributes originality in applying metadata strategy to envision semantic structure. It further favours the service industry in building up portfolio foundation in component‐based technologies. As the new type of vulnerability can be precisely specified, it can minimize business impact and achieve efficient vulnerability detection.

Details

Journal of Systems and Information Technology, vol. 12 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Access Restricted. View access options
Article
Publication date: 20 November 2020

Sarra Berraies, Khadija Aya Hamza and Rached Chtioui

The aim of this paper is to highlight the impact of distributed leadership (DL) on exploitative and exploratory innovations through the mediating effects of organizational trust…

3162

Abstract

Purpose

The aim of this paper is to highlight the impact of distributed leadership (DL) on exploitative and exploratory innovations through the mediating effects of organizational trust (OT) and tacit and explicit knowledge sharing (KS).

Design/methodology/approach

Focusing on a quantitative approach, an empirical study was performed within a sample of information and communication technology Tunisian firms. The data collected was analyzed through the Partial Least Squares (PLS) method.

Findings

Findings revealed that DL is a driver of tacit and explicit KS, and exploitative and exploratory innovations. It also highlighted that tacit KS is associated with these two types of innovation. In this line, results showed that tacit KS plays a mediating effect between DL and exploitative and exploratory innovations. Moreover, our research highlighted that DL has a positive impact on OT that in turn boosts tacit and explicit KS.

Originality/value

This paper investigates the links between DL and exploitative and exploratory innovations within knowledge intensive firms (KIFs) that have never been studied in the literature within the context of business firms. This paper pioneers the examination of the mediating roles of explicit and tacit KS and OT in these links as well. This paper highlights the importance of DL for KIFs and sheds the light on how this collectivist approach of leadership creates an atmosphere of trust and fosters tacit and explicit KS to boost exploitative and exploratory innovations.

Details

Journal of Knowledge Management, vol. 25 no. 5
Type: Research Article
ISSN: 1367-3270

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 2007

Raymond Cheng‐Yi Wu

The main purpose of this paper is to research the e‐government architecture issue as a means of addressing the interoperability gap. It will incorporate the new knowledge acquired…

4250

Abstract

Purpose

The main purpose of this paper is to research the e‐government architecture issue as a means of addressing the interoperability gap. It will incorporate the new knowledge acquired in the e‐government integration methodology of the interconnectivity of cross‐layers. These layers include the vertical direction of strategy, business, process, service and information.

Design/methodology/approach

The methodology used in this research as it progressed was component‐base driven and involved the exploration of vertical e‐government integration and common service interoperability between business and IT. The realization of this methodology first required a technical foundation setup followed by a business semantics study and a new concept of enterprise integration. The lack of interconnectivity between these layers is the main concerns with the implication that e‐government architecture needs a robust micro‐mechanism of semantic messaging and metadata to coordinate across layers.

Findings

E‐government architecture became pervasive in the twenty‐first century due to its significant growth in terms of huge volume transactions, the citizens' new service concept, and sophisticated businesses. Enterprise architecture mainly mediates between business and IT to minimize the gap by improving governance, agility and business integrity. All of these disciplines and principles should be applied to attain e‐government transformation and vertical interoperability and common services provisioning are the major findings in the research.

Originality/value

This paper contribute new concept of enterprise vertical integration in e‐government. The integrated solution of coherence of approaches forms the basis of this new concept; it serves as the backbone in vertical integration and addresses the e‐government enterprise gap. It is expected to provide further insights into micro process integration across e‐government enterprise layers.

Details

Transforming Government: People, Process and Policy, vol. 1 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Available. Content available
Article
Publication date: 1 March 2007

Zahir Irani

340

Abstract

Details

Transforming Government: People, Process and Policy, vol. 1 no. 1
Type: Research Article
ISSN: 1750-6166

Access Restricted. View access options
Article
Publication date: 28 September 2021

Noura Metawa, Mohamed Elhoseny and Maha Mutawea

This paper aims to provide insights regarding the state of the art of digital transformation for small- and medium-sized enterprises (SMEs) in Egypt and propose avenues for future…

3367

Abstract

Purpose

This paper aims to provide insights regarding the state of the art of digital transformation for small- and medium-sized enterprises (SMEs) in Egypt and propose avenues for future research.

Design/methodology/approach

A proposed framework for the digitization process in SMEs is developed by providing three layers of working steps toward full automation. The paper also provides an extensive analysis of the main requirements for improving the existing traditional information systems' performance in these enterprises. The challenges of digital transformation and the future research direction are discussed as well.

Findings

This paper provided an overview of the importance of digital transformation in real-life applications. The role of the information systems in building a digitalized information processing environment is covered as well. Also, a framework for the shifting process from the traditional approaches to the digitalized systems is proposed. Besides, the paper overviewed the future research directions related to digital transformation in SMEs, especially in Egypt. These research directions are related to technical challenges during the digital transformation process, such as cybersecurity, big data analytics and multimodality data.

Originality/value

Despite the significant governmental and institutions' steps toward full automation and digital transformation, the traditional information systems, infrastructures, and unequipped employees make the digitizing process on-the-fly an open challenge. A technology shift that is not supported by a similar cultural change threatens digital business initiatives and increases the risk of their failure. This paper aims to provide insights regarding the state of the art of digital transformation for SMEs in Egypt and propose avenues for future research.

Details

African Journal of Economic and Management Studies, vol. 13 no. 3
Type: Research Article
ISSN: 2040-0705

Keywords

Access Restricted. View access options
Article
Publication date: 20 May 2020

Ming-Lang Tseng, Chih-Cheng Chen, Kuo-Jui Wu and Raymond Tan

This study integrates economic/ecology (eco)-attributes and performance to build a sustainable service supply chain management (SSCM) model.

612

Abstract

Purpose

This study integrates economic/ecology (eco)-attributes and performance to build a sustainable service supply chain management (SSCM) model.

Design/methodology/approach

This study proposes the use of the fuzzy Delphi method to screen for the less important attributes and applies a network data envelopment analysis to explore the hierarchical and eco-efficient network interrelationships. The causality and hierarchal eco-efficient model is acquired using a fuzzy decision-making trial and evaluation laboratory analysis

Findings

The findings are as follows: (1) the information and technology management process is derived by enhancing sustainable customer and supplier relationship management, and (2) the eco-efficient model is improved based on long-term relationships with suppliers – that is, synergistic suppliers improve the service chain quality and provide services in an appropriate and timely manner – and research and development coordination. The theoretical and managerial implications are discussed.

Research limitations/implications

The eco-efficient model reveals that the sustainable customer relationship management process, sustainable supplier relationship management process and information and technology management process are the major causal attributes in the model.

Practical implications

The eco-efficient model must be based on (1) long-term relationships with suppliers, (2) synergistic suppliers to improve service chain quality, (3) the provision of services in a timely manner and (4) research and development coordination.

Originality/value

Prior studies neglect to build an ecological economy model using the efficiency causality model of hierarchical interrelationships. Traditional SSCM fails to involve the triple bottom line performance toward sustainability.

Details

Management of Environmental Quality: An International Journal, vol. 31 no. 4
Type: Research Article
ISSN: 1477-7835

Keywords

Access Restricted. View access options
Article
Publication date: 8 January 2018

Hossein G.T. Olya, Zehra Altinay Gazi, Fahriye Altinay Aksal and Mehmet Altinay

This paper aims to examine the causal models that predict disabled tourists’ behavioral intentions to use peer-to-peer (p2p) accommodations. This study also explores the causal…

2649

Abstract

Purpose

This paper aims to examine the causal models that predict disabled tourists’ behavioral intentions to use peer-to-peer (p2p) accommodations. This study also explores the causal models through complex combinations of demographic factors, host attributes and the levels of perceived charm, convenience and other service features of the accommodations as a means of describing disabled tourists’ behavioral outcomes.

Design/methodology/approach

A questionnaire was administrated to measure the study variables. Using the convenience sampling technique, the questionnaires were distributed among disabled individuals with orthopedic disorders who reside in North Cyprus in May 2016. The five respondents were later interviewed about their needs and expectations from p2p accommodations. A set of preliminary tests (for both reliability and validity) was conducted, and descriptive statistics were used based on the scale items. Fuzzy set qualitative comparative analysis (fsQCA) was used to test the proposed research model, which revealed sufficient and consistent conditions leading to behavioral intentions of disabled tourists in their use of p2p accommodations. The predictive validity of the model was then tested. Finally, the results of the fsQCA were evaluated based on the key tenets of complexity theory.

Findings

The findings reveal under which conditions disabled tourists tend to use p2p accommodations. This empirical study has relied upon the use of causal models integrating combinations of demographic variables and host and accommodation place attributes (i.e. charm, convenience and service features) which were put forth as sufficient predictive configurations of the behavioral outcomes of disabled tourists within the context of a sharing economy. Ultimately, this study finds that p2p customers are not limited to travelers with low income levels.

Research limitations/implications

The views of people with orthopedic problems in North Cyprus were obtained for testing the configurational model, which means that the results do not necessarily represent a large range of customers’ perspectives. Although this limitation was addressed through the application of a powerful compensatory analytical approach (fsQCA), it is advised that data from tourists with various types of disabilities in other countries be collected for future studies.

Practical implications

The results of this study provide practical implications for hosts on how to combine accommodation place characteristics (e.g. charm, convenience and service) with their own personal attributes (e.g. knowledge and eagerness) to bolster the disabled tourists’ intentions to use p2p accommodations. It is hoped that the results of the fsQCA using the demographic variables presented here will guide businesses toward performing target marketing. This is useful for hosts who wish to attract more disabled tourists, a profitable segment of the market.

Social implications

This study draws social attention to the disabled tourists as potential customers in the sharing economy. Conducting an empirical study that considers the social inclusion of tourists with disabilities in the emerging version of hospitality business is helpful to both the supply and demand sides.

Originality/value

To the best knowledge of the authors, this is the first empirical study that investigates the indicators of disabled tourists’ intentions to use p2p accommodations. This study also adds to the current literature by modeling the behavioral intentions of disabled tourists within a sharing economy using a pragmatic and set-theoretic approach (i.e. fsQCA in conjunction with complexity theory).

Details

International Journal of Contemporary Hospitality Management, vol. 30 no. 1
Type: Research Article
ISSN: 0959-6119

Keywords

Access Restricted. View access options
Article
Publication date: 27 November 2020

Chaoqun Wang, Zhongyi Hu, Raymond Chiong, Yukun Bao and Jiang Wu

The aim of this study is to propose an efficient rule extraction and integration approach for identifying phishing websites. The proposed approach can elucidate patterns of…

399

Abstract

Purpose

The aim of this study is to propose an efficient rule extraction and integration approach for identifying phishing websites. The proposed approach can elucidate patterns of phishing websites and identify them accurately.

Design/methodology/approach

Hyperlink indicators along with URL-based features are used to build the identification model. In the proposed approach, very simple rules are first extracted based on individual features to provide meaningful and easy-to-understand rules. Then, the F-measure score is used to select high-quality rules for identifying phishing websites. To construct a reliable and promising phishing website identification model, the selected rules are integrated using a simple neural network model.

Findings

Experiments conducted using self-collected and benchmark data sets show that the proposed approach outperforms 16 commonly used classifiers (including seven non–rule-based and four rule-based classifiers as well as five deep learning models) in terms of interpretability and identification performance.

Originality/value

Investigating patterns of phishing websites based on hyperlink indicators using the efficient rule-based approach is innovative. It is not only helpful for identifying phishing websites, but also beneficial for extracting simple and understandable rules.

Details

The Electronic Library , vol. 38 no. 5/6
Type: Research Article
ISSN: 0264-0473

Keywords

Access Restricted. View access options
Article
Publication date: 11 December 2019

Louise Kiernan, Ann Ledwith and Raymond Lynch

The purpose of this paper is to explore the conversation activities of design teams to negotiate task conflict and reach consensus.

1139

Abstract

Purpose

The purpose of this paper is to explore the conversation activities of design teams to negotiate task conflict and reach consensus.

Design/methodology/approach

Four case studies were conducted to analyse the conversation activities that teams use in the course of design projects.

Findings

The conversation activities that teams used to negotiate conflict and bring about consensus were identified. These conversation activities are associated with collaboration, communication and social skills enabling teams to engage in the high level of information exchange and negotiation that is required to manage task conflict. How they were used to negotiate conflict and help reach consensus is also discussed.

Research limitations/implications

The findings from this research are based on a small number of participants; hence, it cannot be generalised without further study with larger groups. However, the questions this paper has raised can be generalised to other design tasks and groups.

Practical implications

The findings have implications for the management of design teams and teams working on complex unstructured problems both in industry and education. They highlight how conflict can be constructively managed to bring about consensus that integrates the knowledge and perspective of all team members.

Originality/value

The benefits of task conflict have been disputed in the literature. This research has identified the conversation activities that facilitate the constructive management of task conflict to bring about consensus that integrates the perspectives and knowledge of a team.

Details

International Journal of Conflict Management, vol. 31 no. 2
Type: Research Article
ISSN: 1044-4068

Keywords

Access Restricted. View access options

Abstract

Details

Applying Partial Least Squares in Tourism and Hospitality Research
Type: Book
ISBN: 978-1-78756-700-9

1 – 10 of 738
Per page
102050