Search results

1 – 10 of 11
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 8 June 2015

Sushma Mishra

The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational security…

2175

Abstract

Purpose

The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational security governance (OSG) objectives pose significant challenges for organizations considering the ever-increasing vulnerability from lack of or misuse of appropriate controls. In recent years, there have been several cases of colossal losses to businesses due to inadequate security governance measure. In many cases, organizations do not even know as to what their ISG objectives might be. Following an extensive empirical study, this paper proposes 6 fundamental and 17 means objectives for designing security governance. The objectives were developed from individual values of information technology and security executives across a wide range of firms. The study comprised 52 interview respondents across 9 firms, which resulted in 23 OSG objectives. Theoretically, the study was grounded in Catton’s (1959) value theory and Keeney’s (1992) value-focused thinking. The objectives provide a useful basis for strategic planning for information security governance.

Design/methodology/approach

This research is grounded in value-focused thinking methodology. Step 1: develop a comprehensive list of personal values underlying the problem being explored. The researcher undertakes extensive interviews, using relevant probes, to elicit underlying values of respondents. Step 2: change the values enlisted to a common form and convert them into objectives. The data collected in Step 1 is collated and presented in a common form, which enables cross-comparison and easy interpretation. Step 3: classify the objectives as means and fundamental for the decision context. Objectives are clustered into groups and then classified into fundamental and means.

Findings

This study uses a value-focused approach to develop OSG objectives. Incorporating individual values in developing governance objectives would facilitate alignment of individual and organizational values about OSG. This study proposes 6 fundamental and 17 means objectives for OSG. The study provides a comprehensive list of OSG that is rooted in values of stakeholders in an organization.

Originality/value

The main contributions study can be classified in two categories. First, it represents a collective set of OSG objectives which touch upon technical, formal, informal, moral and ethical dimensions of governance. This is a unique, synthesized and cohesive framework for OSG, which incorporates several aspects of OSG into one platform, thus allowing the development of a comprehensive security management program. Second, some of the objectives developed in this research (“establish corporate control strategy”, “establish punitive structure”, “establish clear control development process”, “ensure formal control assessment functionality” and “maximize group cohesiveness”) have not been emphasized enough in security governance literature.

Details

Information & Computer Security, vol. 23 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 10 May 2024

Shalini Sahni, Sushma Verma and Rahul Pratap Singh Kaurav

The widespread uptake of digital technology tools for online teaching and learning reached its peak during the nationwide lockdown triggered by the COVID-19 pandemic. It…

377

Abstract

Purpose

The widespread uptake of digital technology tools for online teaching and learning reached its peak during the nationwide lockdown triggered by the COVID-19 pandemic. It transformed the higher education institutions (HEIs) marketplace both in developed and developing countries. However, in this process of digital transformation, several HEIs, specifically from developing countries, faced major challenges. That threatened to affect their sustainability and performance. In this vein, this study conducts a bibliometric review to map the challenges during the COVID-19 pandemic and suggest strategies for HEIs to cope with post-pandemic situations in the future.

Design/methodology/approach

This comprehensive review encompasses 343 papers published between 2020 and 2023, employing a systematic approach that combines bibliometrics and content analysis to thoroughly evaluate the articles.

Findings

The investigation revealed a lack of published work addressing the specific challenges faced by the faculty members affecting their well-being. The study underscores the importance of e-learning technology adoption for higher education sustainability by compelling both students and teachers to rely heavily on social media platforms to maintain social presence and facilitate remote learning. The reduced interpersonal interaction during the pandemic has had negative consequences for academic engagement and professional advancement for both educators and students.

Practical implications

This has implications for policymakers and the management of HEIs, as it may prove useful in reenvisioning and redesigning future curricula. The paper concludes by developing a sustainable learning framework using a blended approach. Additionally, we also provide directions for future research to scholars.

Originality/value

This study has implications for policymakers and HEI management to rethink the delivery of future courses with a focus on education and institute sustainability. Finally, the research also proposes a hybrid learning framework for sustainability and forms a robust foundation for scholars in future research.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Access Restricted. View access options
Article
Publication date: 18 September 2019

Sawinder Kaur, Vivek Mumbarkar, Paramjit S. Panesar, Sushma Gurumayum and Prasad Rasane

The purpose of this study is to isolate yellow pigment producing fungal strain and to determine the media requirement for growth and secondary metabolite production.

178

Abstract

Purpose

The purpose of this study is to isolate yellow pigment producing fungal strain and to determine the media requirement for growth and secondary metabolite production.

Design/methodology/approach

Fifteen soil samples were collected and studied for a pigment producing fungal sources. Selection of a fungus was based on pigment produced and further conditions, such as effect of media composition and light wavelength on pigment production and growth parameters were optimised.

Findings

Out of the isolates analysed, Epicoccum nigrum was selected for further study as this strain has the potential for pigment production. Among all the media evaluated, potato dextrose agar (PDA) was found to be the best media for growth and sporulation, whilst sabouraud dextrose agar (SDA) was only 29 per cent as capable as the best medium. The radial growth rate in case of PDA was 3 ± 0.02 mm/day, while in case of SDA, it was only 1.09 mm/day. Whilst starch as a carbon source was found to increase the radial growth to 5.15 ± 0.02 mm/day, sucrose significantly (p < 0.05) influenced the sporulation (224,000 ± 1,550 spores/ml) of Epicoccum nigrum. Amongst the various nitrogen sources analysed, peptone significantly increased (p < 0.05) the radial growth (6.55 ± 0.02 mm/day) as well as sporulation (220,000 ± 2,100 spores/ml). The observations also indicated that E. nigrum is able to sense and differentiate between light in different wavelength ranges and respond differently in growth and sporulation. The light passing through a red colour sheet resulted in better radial growth (8.5 ± 0.02 mm/day) in comparison to unfiltered light (3 ± 0.02 mm/day). Yellow pigment production in terms of hue values was significantly influenced by the presence of dextrose, peptone and darkness.

Research limitations/implications

The isolated strain could be studied for variable conditions and stress factors for optimal production of the pigment. Recovery and purification studies could be carried out at pilot and industrial scale.

Practical implications

The isolation of a strain producing valuable microbial pigment will increase the alternatives of natural food colours and enhance the its commercial applications

Originality/value

This study identifies Epicoccum nigrum as a potential source of microbial pigment and facilitates its growth and production for possible applications in industrial pigment production.

Details

Pigment & Resin Technology, vol. 48 no. 6
Type: Research Article
ISSN: 0369-9420

Keywords

Access Restricted. View access options
Article
Publication date: 2 May 2017

Sudhakar Jyothula and Sushma K.

The purpose of this paper is to present a single-precision floating-point multiplier where a low-power operation is attained through the reduction of switching activity. A…

111

Abstract

Purpose

The purpose of this paper is to present a single-precision floating-point multiplier where a low-power operation is attained through the reduction of switching activity. A floating-point multiplier is the basic building block for many applications such as digital signal processing (DSP) processors and multimedia applications involving a large dynamic range.

Design/methodology/approach

A floating-point multiplier was implemented in asynchronous logic such as multi-threshold null conventional logic and the proposed multi-threshold dual spacer dual rail delay insensitive logic (MTD3L). The proposed logic deals with high performance and energy efficiency.

Findings

The Institute of Electrical and Electronics Engineering (IEEE) has provided a standard to define the floating-point representation, which is known as the IEEE 754 standard. Rounding has not been implemented because it is not suitable for high-precision applications.

Originality/value

The performance aspects of the proposed asynchronous MTD3L floating-point multiplier are obtained using a Mentor Graphics tool and are compared with those of the existing asynchronous logic.

Details

Circuit World, vol. 43 no. 2
Type: Research Article
ISSN: 0305-6120

Keywords

Access Restricted. View access options
Book part
Publication date: 13 May 2019

Debasish Nandy

Terrorism has historically been spawned by inequitable, unjust systems with inadequate democratic options to articulate popular aspirations and ensure conflict resolution. The…

Abstract

Terrorism has historically been spawned by inequitable, unjust systems with inadequate democratic options to articulate popular aspirations and ensure conflict resolution. The event of September 11, 2001 changed it all when terrorism hit the center of the increasingly globalized post-Cold War international system. The 9/11 incident has played as the role of a catalyst in initiating joint governmental policies to combat international terrorism both in India and the USA. After the incident, the former US President, George W. Bush, announced to the world community to fight against international terrorism collectively on the basis of a zero-tolerance policy. India has been the victim of cross-border terrorism promoted by Pakistan for a long time. India is the world’s largest democracy and one of its fastest-growing economics. Due to the recurrence of terrorist attacks, its security system and its socioeconomic structure have had to face tremendous pressure. Just after the 9/11 incident (attack on WTC) world’s largest (India) and oldest (USA) democracies have come closer to jointly fight against international terrorism. Both al-Qaida and the Taliban were the common enemies for Washington and New Delhi. At the governmental level, a number of policies and working groups have been organized by the two countries in order to diminish global terrorism. This chapter intends to explore the effects of joint governmental policies by India and the USA for combating international terrorism.

Details

The Impact of Global Terrorism on Economic and Political Development
Type: Book
ISBN: 978-1-78769-919-9

Keywords

Access Restricted. View access options
Article
Publication date: 29 November 2018

Sushma Priyadarsini Yalla, Som Sekhar Bhattacharyya and Karuna Jain

Post 1991, given the advent of liberalization and economic reforms, the Indian telecom sector witnessed a remarkable growth in terms of subscriber base and reduced competitive…

236

Abstract

Purpose

Post 1991, given the advent of liberalization and economic reforms, the Indian telecom sector witnessed a remarkable growth in terms of subscriber base and reduced competitive tariff among the service providers. The purpose of this paper is to estimate the impact of regulatory announcements on systemic risk among the Indian telecom firms.

Design/methodology/approach

This study employed a two-step methodology to measure the impact of regulatory announcements on systemic risk. In the first step, CAPM along with the Kalman filter was used to estimate the daily β (systemic risk). In the second step, event study methodology was used to assess the impact of regulatory announcements on daily β derived from the first step.

Findings

The results of this study indicate that regulatory announcements did impact systemic risk among telecom firms. The study also found that regulatory announcements either increased or decreased systemic risk, depending upon the type of regulatory announcements. Further, this study estimated the market-perceived regulatory risk premiums for individual telecom firms.

Research limitations/implications

The regulatory risk premium was either positive or negative, depending upon the different types of regulatory announcements for the telecom sector firms. Thus, this study contributes to the theory of literature by testing the buffering hypothesis in the context of Indian telecom firms.

Practical implications

The study findings will be useful for investors and policy-makers to estimate the regulatory risk premium as and when there is an anticipated regulatory announcement in the Indian telecom sector.

Originality/value

This is one of the first research studies in exploring regulatory risk among the Indian telecom firms. The research findings indicate that regulatory risk does exist in the telecom firms of India.

Details

International Journal of Emerging Markets, vol. 13 no. 5
Type: Research Article
ISSN: 1746-8809

Keywords

Access Restricted. View access options
Case study
Publication date: 15 August 2024

Ridhima Bhanot Sharma and Sumanjit Dass

After completion of the case study, the students will be able to understand the complexity of diversification and market expansion strategies in a growing consumer-driven market…

Abstract

Learning outcomes

After completion of the case study, the students will be able to understand the complexity of diversification and market expansion strategies in a growing consumer-driven market context, apply strategic frameworks to analyze the Indian oral care market, analyze brand positioning principles to develop a marketing strategy for Aquawhite and evaluate and identify the pros and cons of the various decisions taken during market diversification.

Case overview/synopsis

This case study seeks to examine the market expansion dilemmas faced by Aquawhite, a brand in the oral health-care sector, and the role of key decision-makers in addressing these challenges. This case study aims to provide insights into the complexities of brand extension and market expansion strategies in the context of a developing consumer-driven market. This case study is structured as a qualitative analysis based on publicly available information, including Aquawhite’s historical data, market trends and industry reports. Additionally, insights from relevant interviews with key stakeholders within the company have been considered to present a comprehensive view. This case study highlights the dilemmas faced by Aquawhite as it navigates market expansion. It reveals the critical role of Nikhil Nanda, the managing director in addressing these dilemmas and shaping the brand’s future. This case study emphasizes the need for a strategic approach that balances market dynamics with brand identity.

Complexity academic level

This case study is suitable for use in undergraduate and postgraduate-level courses on marketing management and strategic management. This case study provides insights into brand development, market entry and expansion strategies. It can be used to discuss the marketing mix, segmentation and targeting, as well as competitive analysis.

Supplementary materials

Teaching notes are available for educators only.

Subject code

CSS 8: Marketing.

Details

Emerald Emerging Markets Case Studies, vol. 14 no. 3
Type: Case Study
ISSN: 2045-0621

Keywords

Access Restricted. View access options
Article
Publication date: 7 November 2023

Ashwini K. and Jagadeesh V.K.

The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation…

62

Abstract

Purpose

The purpose of this paper is to present an up-to-date survey on the non-orthogonal multiple access (NOMA) technique with co-operative strategy, a fast-evolving fifth-generation (5 G) technology. NOMA is used for serving many mobile users, both in power and code domains. This paper considers the power-domain NOMA, which is now discussed as NOMA.

Design/methodology/approach

The first part of the paper discusses NOMA-based cooperative relay systems using different relay strategies over different channel models. In various research works, the analytical expressions of many performance metrics were derived, measured and simulated for better performance of the NOMA systems. In the second part, a brief introduction to diversity techniques is discussed. The multiple input and multiple output system merged with cooperative NOMA technology, and its future challenges were also presented in this part. In the third part, the paper surveys some new conceptions such as cognitive radio, index modulation multiple access, space-shift keying and reconfigurable intelligent surface that can be combined with NOMA systems for better performance.

Findings

The paper presents a brief survey of diverse research projects being carried out in the field of NOMA. The paper also surveyed two different relaying strategies that were implemented in cooperative NOMA over different channels and compared several performance parameters that were evaluated and derived in these implementations.

Originality/value

The paper provides a scope for recognizable future work and presents a brief idea of the new techniques that can be united with NOMA for better performance in wireless systems.

Details

World Journal of Engineering, vol. 21 no. 6
Type: Research Article
ISSN: 1708-5284

Keywords

Access Restricted. View access options
Article
Publication date: 26 November 2020

N.V. Brindha and V.S. Meenakshi

Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of…

79

Abstract

Purpose

Any node in a mobile ad hoc network (MANET) can act as a host or router at any time and so, the nodes in the MANET are vulnerable to many types of attacks. Sybil attack is one of the harmful attacks in the MANET, which produces fake identities similar to legitimate nodes in the network. It is a serious threat to the MANET when a malicious node uses the fake identities to enter the network illegally.

Design/methodology/approach

A MANET is an independent collection of mobile nodes that form a temporary or arbitrary network without any fixed infrastructure. The nodes in the MANET lack centralized administration to manage the network and change their links to other devices frequently.

Findings

So for securing a MANET, an approach based on biometric authentication can be used. The multimodal biometric technology has been providing some more potential solutions for the user to be able to devise an authentication in MANETs of high security.

Research limitations/implications

The Sybil detection approach, which is based on the received signal strength indicator (RSSI) variations, permits the node to be able to verify the authenticity of communicating nodes in accordance with their localizations.

Practical implications

As the MANET node suffers from a low level of memory and power of computation, there is a novel technique of feature extraction that is proposed for the multimodal biometrics that makes use of palm prints that are based on a charge-coupled device and fingerprints, along with the features that are fused.

Social implications

This paper proposes an RSSI-based multimodal biometric solution to detect Sybil attack in MANETs.

Originality/value

The results of the experiment have indicated that this method has achieved a performance which is better compared to that of the other methods.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

Access Restricted. View access options
Article
Publication date: 14 May 2024

Rohit Raj, Arpit Singh, Vimal Kumar and Pratima Verma

Recent technological advancements, often linked to Industry 4.0, require organizations to be more agile and innovative. Blockchain technology (BT) holds immense potential in…

381

Abstract

Purpose

Recent technological advancements, often linked to Industry 4.0, require organizations to be more agile and innovative. Blockchain technology (BT) holds immense potential in driving organizations to achieve efficiency and transparency in supply chains. However, there exist some insurmountable challenges associated with the adoption of BT in organizational supply chains (SC). This paper attempts to categorically identify and systematize the most influential challenges in the implementation of BT in SC.

Design/methodology/approach

This study resorts to an extensive literature review and consultations with experts in the field of supply chain management (SCM), information technology and academia to identify, categorize and prioritize the major challenges using VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) and Combined Compromise Solution method (CoCoSo).

Findings

The top three classes of challenges revealed in this study are privacy challenges (PC), infrastructure challenges (IC) and transparency challenges (TC). Maintaining a balance between data openness and secrecy and rectification of incorrect/erroneous input are the top two challenges in the PC category, integration of BT with sustainable practices and ensuring legitimacy are the top two challenges in the IC category, and proper and correct information sharing in organizations was the top most challenge in the TC category.

Originality/value

Future scholars and industry professionals will be guided by the importance of the challenges identified in this study to develop an economical and logical approach for integrating BT to increase the efficiency and outcome of supply chains across several industrial sectors.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 8
Type: Research Article
ISSN: 0265-671X

Keywords

1 – 10 of 11
Per page
102050