scholarly journals Government Cloud Computing and National Security

2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hedaia-t-Allah Nabil Abd Al Ghaffar

Purpose The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs. Design/methodology/approach The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage. Findings The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries. Practical implications Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns. Originality/value The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Kybernetes ◽  
2018 ◽  
Vol 47 (5) ◽  
pp. 854-872 ◽  
Author(s):  
Kaiying Cao ◽  
Qiushi Bo ◽  
Yi He

Purpose This paper aims to study whether the recycling of a third party competes with the trade-in service of a manufacturer, and explores the optimal trade-in and third-party collection authorization strategies for the manufacturer. Design/methodology/approach According to whether to authorize a third party to collect its used products, the manufacturer has two choices: one is not authorization (NA); the other is authorization (A). This paper uses profit-maximization model to investigate the optimal decisions of the manufacturer and the third party under NA and A, respectively, and then explores which choice is better for the manufacturer. Findings It is observed that there is a competition between trade-in service and third-party recycling when the durability parameter of the used product is relatively small. Moreover, when the durability parameter of the used product is relatively large, A is always better choice for the manufacturer; otherwise, NA is a better choice except for the case that the unit trade-in subsidy is low and the salvage of the used product is high. Practical implications These results provide managerial insights for the manufacturer and the third party to make decisions in the field of recycling. Originality/value This paper is among the first papers to study the competition between trade-in program and third party’s collecting program under government’s trade-in subsidy policy. Moreover, this paper presents the conditions under which the manufacturer should authorize or not authorize the third party to collect its used products.


2019 ◽  
Vol 35 (10) ◽  
pp. 15-17

Purpose This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings This research paper concentrates on factors that determine the propensity of large and small European companies to adopt cloud computing services. The results demonstrate that companies of all sizes can benefit from CC as a strategic vehicle for reducing ICT costs, for achieving product/service innovation, and to save costs on their sophisticated administrative systems. Furthermore some additional factors apply only to small companies. Originality/value The briefing saves busy executives, strategists and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2015 ◽  
Vol 31 (6) ◽  
pp. 4-6 ◽  

Purpose – This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design/methodology/approach – This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings – In 2015, there was no shortage of new, disruptive technologies threatening existing media and platforms. However, there were also many new forms where the use of new technologies was not immediately obvious. Straddling both of these spheres were Twitter’s Periscope and its rival Meerkat, which offered users something very simple – to broadcast. Practical implications – The paper provides strategic insights and practical thinking that have influenced some of the world’s leading organizations. Originality/value – The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2020 ◽  
Vol 123 (1) ◽  
pp. 159-175
Author(s):  
Alberto Mazzoleni ◽  
Enrica Pollonini

PurposeWe developed a model to demonstrate how multiple interrelated aspects of a firm influence its recourse to third-party financing, which frequently depends on the characteristics of each food production chain.Design/methodology/approachWe conducted an empirical research on a relevant sample of small- and medium-sized Italian dairy firms. Our research methodology is inspired by the grounded theory (Glaser and Strauss, 1967).FindingsOur findings illustrated that firm indebtedness is the result of intertwined variables, linked to different firm dimensions, including growth, financial structure and economic dynamics.Research limitations/implicationsA portion of the analysed phenomenon is not explained using the sample and econometric tools.Practical implicationsThere are practical implications for the decision-makers in a firm (in particular, the managers and the shareholders) as the model allows to evaluate the influence of a set of mutually interdependent firm variables for the indebtedness level.Originality/valueFirst, we considered the recourse to third-party financing within the context of the systems theory (Millová and Blatný, 2015) and from the perspective of linked causes and mutually connected variables. Second, our research focussed on a well-defined food chain and on features of firms operating in this context. Last, our model considered the impact of the recent economic crisis, which motivated us to review the existing models.


2018 ◽  
Vol 14 (1) ◽  
pp. 66-82
Author(s):  
Nobuyuki Chikudate ◽  
Can M. Alpaslan

Purpose Using as many perspectives as possible to understand large-scale industrial crises can be a daunting task. This paper aims to demonstrate a reasonably complex yet systemic, analytical and critical approach to analyzing what causes crises. Design/methodology/approach The authors use a multi-perspective methodology within which each perspective uses a substantially different ontology and epistemology, offering a deeper understanding of the causes of large-scale crises. The methodology utilizes extant theory and findings, archival data from English and Japanese sources, including narratives of focal people such as Toyota President Akio Toyoda. Findings The analysis suggests that what caused Toyota’s crisis was not just Toyota’s failure to solve its technical problems. It was Toyota’s collective myopia, interactively complex new technologies and misunderstanding of corporate citizenship. Practical implications The authors argue that crises are complex situations best understood from multiple perspectives and that easily observable aspects of crises are often not the most significant causes of crises. In most cases, causes of crises are hidden and taken-for-granted assumptions of managers. Thus, managers must view crises critically from multiple yet distinct viewpoints. Originality/value The authors use Alpaslan and Mitroff’s multi-disciplinary methodology to outline several critical perspectives on Toyota’s messy recall crisis.


2020 ◽  
Vol 31 (7) ◽  
pp. 1373-1390 ◽  
Author(s):  
Carmen Martínez-Mora ◽  
Fernando Merino

PurposeThe purpose of this paper is to illustrate how the introduction of new technologies can lead to reconsidering the division of the production process as well as the location of each stage, which may mean reshoring some of them.Design/methodology/approachThe research is based on the analysis of the consequences of new technologies developed and introduced in the market to be applied in the final stage of jeans manufacturing. The paper presents the relevance of this technology, based on an in-depth interview with the representatives of the firm as well as firm and press reports, specialised websites and so on. The information of the reshoring company has been confirmed by its press releases.FindingsThe results show that a new technology justifies the reconsideration of the stages in which the production process can be divided and, once this division is considered viable, the drivers for reshoring can become more/less important in the reshoring decision.Practical implicationsFirms that previously offshored should consider that new technological processes may lead them to slice their value chains differently, causing them to seek the optimal location for each of the stages.Originality/valueMost of the reshoring literature is based on a static framework where the production process is considered stable and the reasons for reshoring must reside in the change of relevant parameters (such as cost differentials, need to be more flexible, monitoring costs higher than expected, etc.). This paper reveals that changes in the production process, even in traditional sectors, may lead to reshoring/backshoring.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rhiannon Firth ◽  
Andrew Robinson

PurposeThis paper maps utopian theories of technological change. The focus is on debates surrounding emerging industrial technologies which contribute to making the relationship between humans and machines more symbiotic and entangled, such as robotics, automation and artificial intelligence. The aim is to provide a map to navigate complex debates on the potential for technology to be used for emancipatory purposes and to plot the grounds for tactical engagements.Design/methodology/approachThe paper proposes a two-way axis to map theories into to a six-category typology. Axis one contains the parameters humanist–assemblage. Humanists draw on the idea of a human essence of creative labour-power, and treat machines as alienated and exploitative form of this essence. Assemblage theorists draw on posthumanism and poststructuralism, maintaining that humans always exist within assemblages which also contain non-human forces. Axis two contains the parameters utopian/optimist; tactical/processual; and dystopian/pessimist, depending on the construed potential for using new technologies for empowering ends.FindingsThe growing social role of robots portends unknown, and maybe radical, changes, but there is no single human perspective from which this shift is conceived. Approaches cluster in six distinct sets, each with different paradigmatic assumptions.Practical implicationsMapping the categories is useful pedagogically, and makes other political interventions possible, for example interventions between groups and social movements whose practice-based ontologies differ vastly.Originality/valueBringing different approaches into contact and mapping differences in ways which make them more comparable, can help to identify the points of disagreement and the empirical or axiomatic grounds for these. It might facilitate the future identification of criteria to choose among the approaches.


2014 ◽  
Vol 31 (10) ◽  
pp. 17-19 ◽  
Author(s):  
Elizabeth Berndt-Morris ◽  
Kari Chrenka

Purpose – This paper aims to describe the approach of using quick response (QR) codes in a large US research university library. It describes the reasoning behind the numerous decisions that were made throughout the process. Design/methodology/approach – This project was carefully planned to keep detailed organized statistics, effective and clear signage and low expenditures. After one year, the patrons were surveyed regarding library QR use and those results were compared with scan statistics. Findings – This preliminary research into the use of QR codes in a large research library validates that the codes effectively demonstrate the Library’s willingness to reach patrons in innovative ways. It also confirmed the need to promote the usefulness of scanning the codes. Practical implications – Some patrons stated they did not own a smartphone or have an application (app) on their phone that could scan QR codes; therefore, alternate methods of accessing the information should be provided. Social implications – The survey established that not all patrons recognize what QR codes are by name and/or by function, and libraries should recognize this need for education when imploring new technologies. Originality/value – This paper looks at the opportunities provided to libraries through the use of QR codes, including the benefits of using them as a point of need service tool and marketing device.


2019 ◽  
Vol 41 (3) ◽  
pp. 506-519 ◽  
Author(s):  
Hazel Mawdsley ◽  
Alison Thirlwall

Purpose Bullying is a persistent, damaging feature of neoliberal workplaces, despite the increased use of third-party interventions (TPIs). The purpose of this paper is to investigate how TPIs relate to individualisation of the employment contract, whether TPIs deflect attention away from bullying and the impact for targets. Design/methodology/approach Data were gathered from focus groups and interviews with members and officials of three large UK trade unions. Findings TPIs individualise bullying allegations and such interventions are further characterised by impotence, injustice and lack of impartiality, serving to deflect bullying claims and exacerbate targets’ suffering. Practical implications Recommendations are made to improve the efficacy of interventions. Originality/value This paper increases the limited research into the efficacy of TPIs and makes a significant contribution to debates on neoliberal individualism.


2018 ◽  
Vol 42 (6) ◽  
pp. 734-751 ◽  
Author(s):  
Patrick O’Brien ◽  
Scott W.H. Young ◽  
Kenning Arlitsch ◽  
Karl Benedict

Purpose The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the privacy implications of free services that introduce web tracking of users. Design/methodology/approach The home pages of 279 academic libraries were analyzed for the presence of HTTPS, Google Analytics services and privacy-protection features. Findings Results indicate that HTTPS implementation on library websites is not widespread, and many libraries continue to offer non-secured connections without an automatically enforced redirect to a secure connection. Furthermore, a large majority of library websites included in the study have implemented Google Analytics and/or Google Tag Manager, yet only very few connect securely to Google via HTTPS or have implemented Google Analytics IP anonymization. Practical implications Librarians are encouraged to increase awareness of this issue and take concerted and coherent action across five interrelated areas: implementing secure web protocols (HTTPS), user education, privacy policies, informed consent and risk/benefit analyses. Originality/value Third-party tracking of users is prevalent across the web, and yet few studies demonstrate its extent and consequences for academic library websites.


Sign in / Sign up

Export Citation Format

Share Document