Cloud computing assurance – a review of literature guidance

2017 ◽  
Vol 25 (1) ◽  
pp. 26-46 ◽  
Author(s):  
Rossouw von Solms ◽  
Melanie Willett

Purpose This paper aims to provide guidance on cloud computing assurance from an IT governance point of view. The board and executive management are tasked with ensuring proper governance of organizations, which should in the end contribute to a sense of assurance. Assurance is understood to be a part of corporate governance which provides stakeholders with confidence in a subject matter by evaluating evidence about that subject matter. Evidence will include proof that proper controls and structures are in place, that risks are managed and that compliance with internal and external requirements is demonstrated with regard to the subject matter. Decisions regarding the use of cloud computing in organizations bring these responsibilities to the fore. Design/methodology/approach The design of this paper is based on an extensive review of literature, predominantly best practices and standards, from the fields covering IT governance, cloud computing and assurance. Findings The results from this paper can be used to formulate cloud computing assurance evidence statements, as part of IT governance mandates. Originality/value This paper aims to add value by highlighting the responsibility of managers to ensure assurance when exploiting opportunities presented through IT advances, such as cloud computing; serving to inform management about the advances that have and are being made in the field of cloud computing guidelines; and motivating that these guidelines be used for assurance on behalf of organizations adopting and using cloud computing.

Author(s):  
Yu.V. Kupriyanova ◽  
I.M. Vasilyanova

The article summarizes the key points in the development of the metadialogue phenomenon from a linguistic point of view. Some stages of the development of this concept and the difficulties associated with its structuring are covered. The main research findings of modern foreign and domestic experts on its study are considered. Some characteristics of the subject of the research from the standpoint of various pragmatic installations are given. On the basis of the dynamic structure of the metadialogue development, certain principles of semantic relations connected with the dialectical nature of human cognition are presented. Excursion into the history and evolution of the concept is presented. Several types of formulation of the subject matter are given. In accordance with the goal of speech exposure, internal problems of the development of metadialogue are highlighted and the critical points related to solving these problems are described. The rules of metadialogue flow are explained at the level of steps, the success/failure of which directly affects the final result of communication. The prospects of development of the concept research in accordance with various types of discourse are indicated.


2015 ◽  
Vol 5 (2) ◽  
pp. 148-171
Author(s):  
Denisa Gunišová ◽  
Jana Duchovičová

Authors in this contribution focus on issue of subject matter structure creation by the teacher as an important psycho-didactic domain of education process and how does a student perceive this structure. The aim of the teacher is not only to impart the knowledge to students but also to show them and teach them possible ways of how to understand the subject matter better and how to get to the fundamentals of it. Based on the structure of subject matter created by the teacher a student creates cognitive frames which become basis for his further learning. We pay attention to definition of epistemology of subject matter structure, questions of psycho-didactic approach to teaching, creating structure of subject matter and how does the teacher work with the text. Empirical part of the contribution investigates teachers' preferences of subject matter structure and statistically describes subjective perception of level of understanding of the subject matter by a student influenced by the particular subject matter structure realized by the teacher.


PEDIATRICS ◽  
1959 ◽  
Vol 23 (1) ◽  
pp. 150-150
Author(s):  
JOSEF WARKANY

This book was written, according to the foreword, primarily for students and general practitioners. It is designed as a quick reference to aid in discussions with parents and to facilitate an understanding of the anatomic anomalies discussed, of the resulting functional disturbances and their treatment. The authors are plastic surgeons and the subject matter is chosen essentially from their point of view. They deal with a variety of congenital anomalies but also with disorders resulting from postnatal injuries. Such etiologically heterogeneous subjects as deformities of the skull and brain, facial clefts, hemangiomas, fractures and dislocations of the facial bones and dental caries are discussed.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
João Francisco Pinto Anaruma ◽  
Jorge Henrique Caldeira de Oliveira ◽  
Francisco Anaruma Filho ◽  
Wesley Ricardo de Souza Freitas ◽  
Adriano Alves Teixeira

PurposeThe purpose of this paper is to analyze and map the main areas of the Circular Economy literature of the first two decades of 21st century, offering a broad vision about the growth of the theme during these years.Design/methodology/approachThe research was divided into two stages: the first was a systematic review of literature and the second consisted on generation and analysis of bibliographic maps.FindingsThe publication indicates the prominence of China and European Union countries in the production of articles about Circular Economy. Furthermore, the topic is restricted to academic area, and that research on Circular Economy is still very focused on theory studies, even with exponential growth in the number of published articles about the theme since 2015. Finally, it also provides a collection of information as the principal authors, the most cited publications, citations, co-citations and countries that have most published beyond which are the most discussed topics.Research limitations/implicationsA possible limitation of the research is that it was performed only in the Scopus database. It may be suggested as future searches that other databases are included as well, and another suggestion is to reduce the time period between research samples due to the exponential increase in the number of publications and topics discussed lately.Practical implicationsThe results of this paper can guide future researches about the development of Circular Economy during the next decades or years and serve as a facilitator for researchers and for managers that want to know more about the topic.Originality/valueA mapping of the principal players and main discussions about Circular Economy made in the first two decades of the 21st century and an analysis about the growth and changes about the theme.


2015 ◽  
Vol 9 (1) ◽  
pp. 1-16 ◽  
Author(s):  
Tamgid Ahmed Chowdhury

Purpose – This paper aims to argue that the traditional belief that “consumer ethnocentrism is a phenomenon of the developed countries only” is no longer true. To establish this argument, our study assesses the applicability of the Consumer Ethnocentric Tendencies Scale (CETSCALE) in Bangladesh by judging the unidimensionality feature of the same. Design/methodology/approach – The methodology is based on sample of 788 respondents collected from 27 border and non-border districts of Bangladesh. Findings – Statistically significant results show that for the consumers of border and non-border districts, the original CETSCALE is, to a great extent, applicable as those groups have shown positive attitudes in retaining 12-14 items out of the 17 items of the original scale. However, the groups and the respondents as a whole did not agree with the unidimensionality feature of the CETSCALE. Practical implications – The results of the study show that Bangladeshi consumers prefer to see “Made in Bangladesh” tags when buying consumer products – a significant potential threat that the multinational companies need to address while planning to expand business in Bangladesh. Originality/value – This type of rigorous study on Bangladesh has never been done before. Moreover, the study identifies the difference in ethnocentric behavior of the consumers living in border and non-border areas – a study of ethnocentrism from a different point of view.


2018 ◽  
Vol 10 (4) ◽  
pp. 412-420 ◽  
Author(s):  
Aleksandr Gudkov ◽  
Elena Dedkova ◽  
Kristina Dudina

PurposeThis paper aims to discuss recent developments in the Russian tourism industry and the main reasons for new initiatives in local destination development.Design/methodology/approachThe study is based on qualitative research methodology. A summary of key literature is presented alongside the analysis of the survey results.FindingsThis paper sheds light on the challenges and changes that took place in the Russian tourism business between 2014 and 2017. The subject is poorly covered in academic literature. The basic data for analysis presented in official statistics are scarce. Therefore a more effective way of obtaining relevant information was to conduct a survey using a semi-structured questionnaire, with tourism business actors as respondents.Research limitations/implicationsThis paper provides mostly conceptual analysis based on limited empirical data; directions for further empirical research are proposed in the conclusion.Originality/valueThe paper reveals something of the impact of economic and geopolitical factors, both negative and positive ones, on the restructuring of the Russian tourism market and the emergence of promising opportunities for the development of new domestic destinations. As a result, tourism market actors are able to become more diverse.


2018 ◽  
Vol 60 (1) ◽  
pp. 69-78
Author(s):  
Ridoan Karim ◽  
Imtiaz Mohammad Sifat

Purpose This paper aims to provide a comparative discussion on silence as a misrepresentation in contractual obligations between common law and Islamic law. The objective of this paper is to – from a legal pluralism point of view – highlight the contrasts between the two traditions and provide recommendations for best practices to achieve fairness and equity among the contracting parties. While common law does not treat silence as conscious misrepresentation, in Islamic law, silence does not constitute affirmative will. This has repercussions for the contracting parties because if future disputes arise, the aggrieved party in Islamic law reserves the option to rescind or nullify the contract – an opportunity not afforded by common law. We have discussed and analyzed the implementations of the different contractual terms, such as fraud, misrepresentation, trickery and deception in relation with Islamic law principles and common law practices. This research is an effort to draw the attention for further development in both Islamic law and common law practices on contractual obligation. The notion of misrepresentation – subset of a broader gamut of fraud – is arguably nebulous in Islamic literature as well. We delve into these nuances and provide examples both from common law and Islamic law precedents and provide recommendations for reform in both traditions. Design/methodology/approach This paper operates under qualitative methodological framework and uses secondary sources for analysis. Sources include journal databases, review of cases, classical/medieval Islamic scripts, etc. Findings This paper provides a general comparative study between common law’s principle and practice and Islamic law’s principle to forge a better understanding of fine-tuning existing practice and contribute to the debate on determining the best practices to unify international trade and custom exercise. Common law principle, obviously, holds a historical and traditional reputation as those principles are derived from long years of practice and judicial interpretation. Such historical legal system should accommodate fresh ideas in their repertoire and welcome novel ideas which would positively influence its own practice. This paper affords the freedom to the reader to interpret which general principle is acceptable in terms of contractual obligation. Originality/value Previous works exist on the issue of misrepresentation. However, those are mostly explanations of fraud and deceit in Islamic law or common law. The treatment of silence as affirmative will is seldom touched upon. To the authors’ knowledge, this is the first attempt at contrasting the treatment of silence in common and Islamic law. They have also advocated pluralistic practices and argued for legal reform whereby both traditions can benefit from each other.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Irene Ryan

PurposeThe purpose of this paper is to reflexively reconsider the effects of the author’s pre-understandings, both academic and non-academic, on the subject matter and the research setting. The unforeseen implications of this disjuncture on our research practice and the expected deliverables are discussed.Design/methodology/approachThe paper engages in a critical, self-reflexive dialogue of a journey through a stimulating yet, uncomfortable piece of feminist, organizational ethnographic research drawing on the insights from the author's research diary.FindingsThe account presented in this paper describes the problematic nature of undertaking a collaborative, reciprocal research project in the distinctive and foreign cultural landscape of the military. The author shows the importance of delving into matters of positionality and preparedness for what might emerge, as a form of closure.Practical implicationsThe paper provides insights into the importance of sponsors to access “the field” and our obligation as researchers to produce written deliverables.Originality/valueThis paper contributes to the emerging literature on the significance of reflexivity in feminist inspired organizational ethnographies in highly gendered settings such as the military.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Adegboyega Adekunle Ige

Purpose A review of literature revealed that many publications on efforts at combatting money laundering focus on two frameworks, namely, legal/legislative and institutional, while overlooking the third and equally important framework – the “regulatory/ supervisory framework.” This paper aims to eradicate the dearth in literature with regards to this third and seldom acknowledged framework and it aims at filling that gap. Design/methodology/approach The analysis took the form of a desk study, which distinguished the three frameworks for combatting money laundering and provided a comprehensive list of the main actors in each regime within the Nigerian legal context. The Money Laundering (Prevention and Prohibition) Act, 2016 was examined in detail. Findings Three categories of regulators were identified and discussed in this paper: the supervisory bodies that regulate the activities of financial institutions, namely, Central Bank of Nigeria, Securities and Exchange Commission and Nigerian Insurance Commission; The Bureau for Money Laundering Control which supervises – designated non-financial institutions and businesses; the Attorney General of the Federation; and (Self-Regulatory Organizations. The Attorney General of the Federation was identified as the prime regulator within the context of the 2016 Act. Suggestions on how the regulators could make the most of their roles were made in the concluding part. Research limitations/implications This paper only considered the Nigerian legal context and only the extant law – the Money Laundering (Prevention and Prohibition) Act, 2016 was critically examined. Originality/value The findings in this paper and the writing approach are original.


Sign in / Sign up

Export Citation Format

Share Document