nan

Maintenance of The Life In Christ




nan

The Covenant

Holy Scripture uses three verbs in relation to the making of a covenant. In this homily from Palm Sunday, Fr. Pat explores these three Hebrew words.




nan

Faith and Finances

Guest: On this day before US "Tax day," Fr. Michael Tassos and Kevin discuss the role of money and finance (and financial planning) in the Orthodox Christian life. Fr. Michael is a Senior Priest and Certified Public Accountant (CPA).




nan

Sabalenka continues Zheng dominance at WTA Finals

Aryna Sabalenka continues her dominance over Zheng Qinwen with victory in the first match of the season-ending WTA Finals.




nan

O'Sullivan beaten by China's Pang in Nanjing

Ronnie O'Sullivan suffers a 6-4 third-round defeat by Pang Junxu as the seven-time world champion is knocked out of the International Championship in Nanjing.




nan

Nantes condemn alleged racist abuse of Wales' Thomas

Nantes condemn alleged racist abuse of their Wales international Sorba following a recent Ligue 1 defeat at Lens.




nan

Iechyd meddwl: Clwb Rygbi Nant Conwy'n annog trafodaeth

Bu farw chwaraewr rygbi o'r gogledd, Aaron Newman, wedi iddo ladd ei hun yn 20 oed y llynedd.




nan

‘The mould makes my asthma worse,’ says tenant

Tenants say they have experienced mould, mushrooms growing through carpets and water leaks.




nan

Rugby's Wakelin loses to Ding in Nanjing final

China's Ding Junhui wins six frames in a row to beat Englishman Chris Wakelin 10-7 in the final of the International Championship.




nan

Thurrock plans to sue other councils over finances

The council claims it was given bad advice over solar investments that left it with a £1.5bn debt.




nan

Blake Lively is Pregnant Again

Damn, look who’s back? After what seemed like a 10 year hiatus, ya girl is back! Yep, that’s right. I’m writing a shitty celebrity gossip blog, and Blake Lively is pregnant again! Some things never change. It seems like every time I turn around Ryan Reynolds has knocked Blake Lively up again. I’m pretty sure […]

The post Blake Lively is Pregnant Again appeared first on HecklerSpray.




nan

Cómo cuidar la salud financiera de tu negocio

¿Cuánto debo ganar en un negocio de traducción o interpretación? Esta es una pregunta esencial que nos tenemos que hacer todos los freelancers. No hay una sola respuesta, pero sí algunas pautas que debemos tener en cuenta. Te lo contamos en esta entrada. Hace poco...

La entrada Cómo cuidar la salud financiera de tu negocio aparece primero en Traducción Jurídica.



  • Cursos de traducción
  • cursos para traductores
  • finanzas
  • formación para traductores

nan

Wikileaks and Governance

Whether or not you support the leaking of 250,000 embassy cables to the now infamous Wikileaks website, it certainly makes you think. Whatever business you are in there always emails or data that would be embarrassing or more likely harmful to our business if they were made widely available. So what is the lesson to be learnt from the Cablegate affair.

The blame for the issue seems to be landing on a certain US private Bradley Manning. But I place the blame directly on a lack of Governance and poor IT systems. And the measures that have so far been announced - things like removing CD drives from classified systems - are simply the wrong approach. The real problem is why any one person - whatever level of clearance they had - should have access to all 250,000 cables.

Without going into the details of XACML and policy-based entitlement models, suffice it to say that the right approach is to base access not only on the person, but the reason they have for accessing the data. Using policy-based entitlement, it is possible to have a well-defined Governance model where a person is given access to just the right data at just the right time for just the right purpose, and that this can be managed in a process-driven, auditable and controlled manner.

If you live in a crime area and you leave your door open, you will be burgled. If you don't put in place good security and data governance, then it is you that will be blamed, not just the guy who steals your data.

And if you want the technical low-down on XACML, start here, here and here.




nan

La partida de Miguel Llorens, el traductor financiero

Cuando comencé este blog por el año 2008, me propuse encontrar y compartir información valiosa para nosotros, los traductores junior, y por eso siempre tomé como referencia a muchos profesionales con más experiencia en esta profesión.

Uno de ellos es Miguel Llorens, el traductor financiero, que con su inteligencia y sarcasmo me resonaba un poco al Dr. House de la traducción.

Miguel es, tiempo presente, porque las personas que dejan huellas profundas, en algunos o no tanto en otros, no se van. Su energía deambula en los pensamientos de aquellos que mascullando sobre algún tema traductoril percibe el roce ligero de su impresión.

Por eso nos encontraremos a la vuelta de la esquina o de algún término enrevesado.




nan

Rule of Law on the Go: New Developments of Mobile Governance

This paper offers an overview of the emerging domain of mobile governance as an offspring of the broader landscape of e-governance. Mobile governance initiatives have been deployed everywhere in parallel to the development of crowdsourced, open source software applications that facilitate the collection, aggregation, and dissemination of both information and data coming from different sources: citizens, organizations, public bodies, etc. Ultimately, mobile governance can be seen as a tool to promote the rule of law from a decentralized, distributed, and bottom-up perspective.





nan

Insurrection à Washington - Assaut du Capitole: culpabilité pour l'homme photographié dans le bureau de Nancy Pelosi

(Belga) Un Américain, qui avait été immortalisé les pieds sur une table dans le bureau de la cheffe démocrate Nancy Pelosi lors de l'assaut sur le Capitole, a été reconnu coupable lundi de plusieurs délits.

Après une courte délibération, les jurés ont déclaré Richard Barnett, 62 ans, coupable, entre autres, d'entrave à une procédure officielle, vol et intrusion dans un bâtiment officiel avec une arme dangereuse (un bâton de marche capable d'envoyer des décharges électriques). Le 6 janvier 2021, il avait envahi, comme des centaines de partisans de l'ex-président républicain Donald Trump, le siège du Congrès au moment où les élus certifiaient la victoire du démocrate Joe Biden à la présidentielle. Il avait été photographié par l'AFP dans le bureau de la cheffe de la chambre des représentants, Nancy Pelosi, les pieds sur un meuble. Le cliché avait fait le tour du monde et permis à la police de l'interpeller rapidement. Selon le dossier d'accusation, ce partisan de la mouvance complotiste Qanon avait laissé un message insultant à la démocrate et volé une enveloppe qu'elle avait signée. Pendant son procès, il s'était montré défiant, assurant avoir été "poussé à l'intérieur" du Capitole par la foule. Sa peine sera prononcée en mai. En attendant, il reste assigné à résidence avec un bracelet électronique. En deux ans d'enquête, plus de 950 participants à cette attaque ont été arrêtés, et près de 200 condamnés à des peines de prison. (Belga)




nan

Le maire d'extrᅵme-droite de Perpignan s'est augmentᅵ de 17% juste aprᅵs son ᅵlection

C'est un classique. Juste aprï¿œs leur victoire, certains ï¿œlus locaux font voter une augmentation de leur salaire. Une dï¿œcision qui intervient au dï¿œbut de leur mandat, histoire que les ï¿œlecteurs aient le temps...




nan

La justice stoppe une enquï¿œte potentiellement gï¿œnante sur Jean Castex, trois jours aprï¿œs sa nomination comme Premier ministre

Hasard du calendrier ou volontᅵ de prᅵserver le nouveau Premier ministre ? Selon Mediapart, une enquᅵte judiciaire ouverte par le parquet de Perpignan, potentiellement gᅵnante pour Jean Castex, a ᅵtᅵ...




nan

Study on operational risks and preventive measures of supply chain finance

The operation of supply chain finance faces various risks, therefore, studying the operational risks of supply chain finance and corresponding preventive measures is of great significance. Firstly, classify the types of operational risks in supply chain finance. Secondly, based on the risk classification results, the decision tree method is used to evaluate the operational risks of supply chain finance. Finally, based on the risk assessment results, targeted risk prevention measures for supply chain finance operations are proposed, such as strengthening supplier management, optimising logistics and warehouse management, risk analysis and monitoring, and strengthening information security and data protection. The case analysis results show that the accuracy of the evaluation results of this method is higher, and the risk coefficient has been significantly reduced after applying this method, indicating that it can effectively reduce supply chain risk.




nan

An effectiveness analysis of enterprise financial risk management for cost control

This paper aims to analyse the effectiveness of cost control oriented enterprise financial risk management. Firstly, it analyses the importance of enterprise financial risk management. Secondly, the position of cost control in enterprise financial risk management was analysed. Cost control can be used to reduce the operating costs of enterprises, improve their profitability, and thus reduce the financial risks they face. Finally, a corporate financial risk management strategy is constructed from several aspects: establishing a sound risk management system, predicting and responding to various risks, optimising fund operation management, strengthening internal control, and enhancing employee risk awareness. The results show that after applying the proposed management strategy, the enterprise performs well in cost control oriented enterprise financial risk management, with a cost accounting accuracy of 95% and an audit system completeness of 90%. It can also help the enterprise develop emergency plans and provide comprehensive risk management strategy coverage.




nan

International Journal of Electronic Finance




nan

Design of intelligent financial sharing platform driven by consensus mechanism under mobile edge computing and accounting transformation

The intelligent financial sharing platform in the online realm is capable of collecting, storing, processing, analysing and sharing financial data through the integration of AI and big data processing technologies. However, as data volume grows exponentially, the cost of financial data storage and processing increases, and the asset accounting and financial profit data sharing analysis structure in financial sharing platforms is inadequate. To address the issue of data security sharing in the intelligent financial digital sharing platform, this paper proposes a data-sharing framework based on blockchain and edge computing. Building upon this framework, a non-separable task distribution algorithm based on data sharing is developed, which employs multiple nodes for cooperative data storage, reducing the pressure on the central server for data storage and solving the problem of non-separable task distribution. Multiple sets of comparative experiments confirm the proposed scheme has good feasibility in improving algorithm performance and reducing energy consumption and latency.




nan

Design of an intelligent financial sharing platform driven by digital economy and its role in optimising accounting transformation production

With the expansion of business scope, the environment faced by enterprises has also changed, and competition is becoming increasingly fierce. Traditional financial systems are increasingly difficult to handle complex tasks and predict potential financial risks. In the context of the digital economy era, the booming financial sharing services have reduced labour costs and improved operational efficiency. This paper designs and implements an intelligent financial sharing platform, establishes a fund payment risk early warning model based on an improved support vector machine algorithm, and tests it on the Financial Distress Prediction dataset. The experimental results show that the effectiveness of using F2 score and AUC evaluation methods can reach 0.9484 and 0.9023, respectively. After using this system, the average financial processing time per order decreases by 43%, and the overall financial processing time decreases by 27%. Finally, this paper discusses the role of intelligent financial sharing platform in accounting transformation and optimisation of production.




nan

Blockchain powered e-voting: a step towards transparent governance

Elections hold immense significance in shaping the leadership of a nation or organisation, serving as a pivotal moment that influences the trajectory of the entity involved. Despite their centrality to modern democratic systems, elections face a significant hurdle: widespread mistrust in the electoral process. This pervasive lack of confidence poses a substantial threat to the democratic framework, even in the case of prominent democracies such as India and US, where inherent flaws persist in the electoral system. Issues such as vote rigging, electronic voting machine (EVM) hacking, election manipulation, and polling booth capturing remain prominent concerns within the current voting paradigm. Leveraging blockchain for electronic voting systems offers an effective solution to alleviate the prevailing apprehensions associated with e-voting. By incorporating blockchain into the electoral process, the integrity and security of the system could be significantly strengthened, addressing the current vulnerabilities and fostering trust in democratic elections.




nan

Navigating the digital frontier: a systematic review of digital governance's determinants in public administration

The aim of the study is to examine the determinants of digitalisation in public sector. This research is particularly relevant as digital transformation has become a crucial factor in modernising public sector and enhancing service delivery to citizens. The method of the systematic literature review (SLR) was implemented by searching documents on the Scopus database. The initial research reached the 7902 documents and after specifying the keywords the authors found 207 relevant documents. Finally; after the careful read of their abstracts and the use of inclusion and exclusion criteria; the most cited and relevant 32 papers constituted the final sample. Findings highlighted the focus of the literature on technological factors such as the sense of trust and safety as well as the ease of use in the adoption of digital governance; emphasising the need for effective; trustworthy and user-friendly digital services. The most discussed internal factors were leadership and organisational culture. The study offers a deeper understanding of the factors that shape the successful implementation of digital governance initiatives.




nan

International Journal of Electronic Governance




nan

Intellectual capital and its effect on the financial performance of Ethiopian private commercial banks

This study aims to examine the intellectual capital and its effect on the financial performance of Ethiopian private commercial banks using the pulic model. Quantitative panel data from audited annual reports of Ethiopian private commercial banks from 2011 to 2019 are collected. The robust fixed effect regression model has been adopted to investigate the effect of IC and the financial performance measures of the banks. The study results show a positive relationship between the value added intellectual coefficient (VAIC) and the financial performance of private commercial banks in Ethiopia. The study also revealed that the components of VAIC (i.e., human capital efficiency, capital employed efficiency, and structural capital efficiency) have a positive and significant effect on the financial performance of banks measured by return on asset and return on equity over the study periods. Practically, the results of the study could be useful for shareholders to consider IC as a strategic resource and hence emphasise these intangibles, and to the bank managers to benchmark themselves against the best competitors based on the level of efficiency rankings.




nan

Determinants of FinTech adoption by microfinance institutions in India to increase efficiency and productivity

The present study attempts to find out the determinants of FinTech adoption for financial inclusion by a microfinance institution in India. The factors such as efficiency, consistency, convenience, reliability are taken as predictors of organisational attitude. Similarly, organisational attitude, ease of use, and perceived benefits are considered as antecedents of organisational adoption intention of FinTech in microfinance institutions of India. The purposive sampling technique was used to get a filled survey instrument by target samples. The results indicate that convenience and consistency in the use of FinTech applications build a favourable attitude to adopt it. Furthermore, perceived benefits are the most important antecedents of the adoption intention of FinTech in the microfinance institution in India. Additionally, the reliability of the application has a positive but insignificant impact on organisational attitude to adopt FinTech. The implications of the present study are discussed.




nan

Why provenance of SPARQL 1.1 queries

In this paper, we study and provide algorithms for source-provenance of answers to extended SPARQL queries. Extended SPARQL queries are an extension of SPARQL 1.1 queries which support not only a single dataset but multiple datasets, each in a particular context. For example, normal subqueries, aggregate subqueries, (NOT) EXISTS filter subqueries may (optionally) have their own dataset. Additionally, GRAPH patterns can query multiple RDF graphs from the local FROM NAMED dataset and not just one. For monotonic queries, the source why provenance sets that we derive for an answer mapping are each the minimal set of sources appearing in the query that if we consider as they are while the rest of the sources are considered empty, we derive the same answer mapping. We show that this property does not hold for non-monotonic queries. Among others, knowing source why provenance is of critical importance for judging confidence on the answer, allow information quality assessment, accountability, as well as understanding the temporal and spatial status of information.




nan

Navigating e-customer relationship management through emerging information and communication technologies: moderation of trust and financial risk

This study examines the relationships between ICTs (e.g., chatbots, virtual assistants, social media platforms, e-mail marketing, mobile marketing, data analytics, interactive voice response, big data analytics, push notifications, cloud computing, and augmented reality) and e-customer relationship management (e-CRM) from the banking industry of China. Similarly, this study unfolds the moderation interference of trust and risk between the association of ICTs and e-CRM, respectively. The study provided a positive nexus between ICTs and e-CRM. On the other side, a significant moderation of trust, as well as financial risk was observed between the correlation of ICTs and customer relationship management. This study endows with insights into ICTs which are critical for achieving e-CRM by streamlining interactions and enhancing their experience. Similarly, trust and financial risk were observed as potential forces that sway the association between ICTs and e-CRM.




nan

Exploring the impact of monetary policy on sustainable development with mediation of e-banking services and moderation of financial risk awareness

Monetary policy is essential for sustainable growth where effective monetary policies can improve investment, employment, and consumption by fostering a balanced and resilient economy. However, sustainable development is vital for harmonising economic growth, social equity, and environmental preservation. A number of factors have been discussed in the literature that impact sustainable development. However, this study explicitly tries to investigate the nexus among the monetary policy (MP) toward sustainable development (SD) with the mediation of e-banking services (e-BS) and moderation of financial risk management (FRM) from China drawing on stakeholder theory. It discovered a significant connection between monetary policy and sustainable development along with sub-dimensions of SD. Likewise, this study confirmed a positive mediating influence of e-BS between monetary policy and sustainable development. Finally, the study additionally ensured a positive moderation of financial risk between monetary policy and sustainable development, respectively. These outcomes bestow several interesting insights into monetary policy, e-banking services, financial risk management, and sustainable development.




nan

Unravelling e-governance adoption drivers: insights from the UTAUT 3 model

The study aims to unveil the various determinants that drive the adoption of e-governance services (EGS). Using the UTAUT 3 model, the research investigated these factors within the Indian context. A purposive sampling technique was utilised to collect the samples from 680 respondents through the online survey method. Furthermore, the study employs structural equation modelling (SEM) to examine the structural relationships between the UTAUT3 model's dimensions in the context of e-governance. Findings revealed that the UTAUT3 model adequately predicts the intention to adopt EGS. The present study addressed a significant gap in the literature on EGS and technology adoption by establishing a relationship between different dimensions of the UTAUT3 model and actual usage of EGS. The findings have implications for practitioners and policymakers as they throw light on the effective implementation of e-governance programs, which are essential for providing the citizens with high-quality services.




nan

Leveraging the internet of behaviours and digital nudges for enhancing customers' financial decision-making

Human behaviour, which is led by the human, emotional and occasionally fallible brain, is highly influenced by the environment in which choices are presented. This research paper explores the synergistic potential of the Internet of Behaviours (IoB) and digital nudges in the financial sector as new avenues for intervention while shedding light on the IoB benefits and the digital nudges' added value in these financial settings. Afterward, it proposes an IoB-Nudges conceptual model to explain how these two concepts would be incorporated and investigates their complementary relationship and benefits for this sector. Finally, the paper also discusses key challenges to be addressed by the IoB framework.




nan

Numerical simulation of financial fluctuation period based on non-linear equation of motion

The traditional numerical simulation method of financial fluctuation cycle does not focus on the study of non-linear financial fluctuation but has problems such as high numerical simulation error and long time. To solve this problem, this paper introduces the non-linear equation of motion to optimise the numerical simulation method of financial fluctuation cycle. A comprehensive analysis of the components of the financial market, the establishment of a financial market network model and the acquisition of relevant financial data under the support of the model. Based on the collection of financial data, set up financial volatility index, measuring cycle, the financial wobbles, to establish the non-linear equations of motion, the financial wobbles, the influence factors of the financial volatility cycle as variables in the equation of motion, through the analysis of different influence factors under the action of financial volatility cycle change rule, it is concluded that the final financial fluctuation cycle, the results of numerical simulation. The simulation results show that, compared with the traditional method, the numerical simulation of the proposed method has high precision, low error and short time, which provides relatively accurate reference data for the stable development of regional economy.




nan

Sheer Curation of Experiments: Data, Process, Provenance

This paper describes an environment for the “sheer curation” of the experimental data of a group of researchers in the fields of biophysics and structural biology. The approach involves embedding data capture and interpretation within researchers' working practices, so that it is automatic and invisible to the researcher. The environment does not capture just the individual datasets generated by an experiment, but the entire workflow that represent the “story” of the experiment, including intermediate files and provenance metadata, so as to support the verification and reproduction of published results. As the curation environment is decoupled from the researchers’ processing environment, the provenance is inferred from a variety of domain-specific contextual information, using software that implements the knowledge and expertise of the researchers. We also present an approach to publishing the data files and their provenance according to linked data principles by using OAI-ORE (Open Archives Initiative Object Reuse and Exchange) and OPMV.




nan

E-learning: Incorporating Information Security Governance




nan

IT Control Objectives for Implementing the Public Finance Management Act in South Africa




nan

Planning and Financing Continuing and Non-Formal Education in Nigeria




nan

Place Determinants for the Personalization-Privacy Tradeoff among Students

Aim/Purpose: This exploratory study investigates the influential factors of users’ decisions in the dilemma of whether to agree to online personalization or to protect their online privacy. Background: Various factors related to online privacy and anonymity were considered, such as user’s privacy concern on the Web in general and particularly on social networks, user online privacy literacy, and field of study. Methodology: To this end, 155 students from different fields of study in the Israeli academia were administered closed-ended questionnaires. Findings: The multivariate linear regression analysis showed that as the participants’ privacy concern increases, they tend to prefer privacy protection over online personalization. In addition, there were significant differences between men and women, as men tended to favor privacy protection more than women did. Impact on Society: This research has social implications for the academia and general public as they show it is possible to influence the personalization-privacy tradeoff and encourage users to prefer privacy protection by raising their concern for the preservation of their online privacy. Furthermore, the users’ preference to protect their privacy even at the expense of their online malleability may lead to the reduction of online privacy-paradox behavior. Future Research: Since our results were based on students' self-perceptions, which might be biased, future work should apply qualitative analysis to explore additional types and influencing factors of online privacy behavior.




nan

Business Priorities Driving BYOD Adoption: A Case Study of a South African Financial Services Organization

Aim/Purpose: Bring your own device (BYOD) provides opportunities for both the organization and employees, but the adoption of BYOD also introduces risks. This case study of an organization’s BYOD program identifies key positive and negative influences on the adoption decision. Background: The consumerization of IT introduced the BYOD phenomenon into the enterprise environment. As mobile and Internet technologies improve employees are opting to use their personal devices to access organizational systems to perform their work tasks. Such devices include smartphones, tablets and laptop computers. Methodology: This research uses a case study approach to investigate how business priorities drive the adoption of BYOD and how resulting benefits and risks are realized and managed by the organization. Primary empirical data was collected using semi-structured interviews with 15 senior employees from a large South African financial services organization. Policy documents from the organization were analyzed as secondary data. Contribution: Thematic analysis of the data revealed six major themes: improving employee mobility; improving client service and experience; creating a competitive industry advantage; improving business processes; information security risks; and management best practices. Findings: The themes were analyzed using the Technology-Organization-Environment (TOE) framework, showing the key positive and negative influences on the adoption decision. Recommendations for Practitioners: Organizations need to clearly understand the reasons they want to introduce BYOD in their organizations. The conceptual framework can be applied by practitioners in their organizations to achieve their BYOD business objectives. Recommendations for Researchers: BYOD remains an important innovation for organizations with several aspects worthy of further study. The TOE framework presents a suitable lens for analysis, but other models should also be considered. Impact on Society: The findings show that organizations can use BYOD to improve client service, gain competitive advantage, and improve their processes using their digital devices and backend systems. The BYOD trend is thus not likely to go away anytime soon. Future Research: The applicability of findings should be validated across additional contexts. Additional models should also be used.




nan

An Empirical Examination of the Effects of CTO Leadership on the Alignment of the Governance of Big Data and Information Security Risk Management Effectiveness

Aim/Purpose: Board of Directors seek to use their big data as a competitive advantage. Still, scholars note the complexities of corporate governance in practice related to information security risk management (ISRM) effectiveness. Background: While the interest in ISRM and its relationship to organizational success has grown, the scholarly literature is unclear about the effects of Chief Technology Officers (CTOs) leadership styles, the alignment of the governance of big data, and ISRM effectiveness in organizations in the West-ern United States. Methodology: The research method selected for this study was a quantitative, correlational research design. Data from 139 participant survey responses from Chief Technology Officers (CTOs) in the Western United States were analyzed using 3 regression models to test for mediation following Baron and Kenny’s methodology. Contribution: Previous scholarship has established the importance of leadership styles, big data governance, and ISRM effectiveness, but not in a combined understanding of the relationship between all three variables. The researchers’ primary objective was to contribute valuable knowledge to the practical field of computer science by empirically validating the relationships between the CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness. Findings: The results of the first regression model between CTOs leadership styles and ISRM effectiveness were statistically significant. The second regression model results between CTOs leadership styles and the alignment of the governance of big data were not statistically significant. The results of the third regression model between CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness were statistically significant. The alignment of the governance of big data was a significant predictor in the model. At the same time, the predictive strength of all 3 CTOs leadership styles was diminished between the first regression model and the third regression model. The regression models indicated that the alignment of the governance of big data was a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness. Recommendations for Practitioners: With big data growing at an exponential rate, this research may be useful in helping other practitioners think about how to test mediation with other interconnected variables related to the alignment of the governance of big data. Overall, the alignment of governance of big data being a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness suggests the significant role that the alignment of the governance of big data plays within an organization. Recommendations for Researchers: While this exact study has not been previously conducted with these three variables with CTOs in the Western United States, overall, these results are in agreement with the literature that information security governance does not significantly mediate the relationship between IT leadership styles and ISRM. However, some of the overall findings did vary from the literature, including the predictive relationship between transactional leadership and ISRM effectiveness. With the finding of partial mediation indicated in this study, this also suggests that the alignment of the governance of big data provides a partial intervention between CTOs leadership styles and ISRM effectiveness. Impact on Society: Big data breaches are increasing year after year, exposing sensitive information that can lead to harm to citizens. This study supports the broader scholarly consensus that to achieve ISRM effectiveness, better alignment of governance policies is essential. This research highlights the importance of higher-level governance as it relates to ISRM effectiveness, implying that ineffective governance could negatively impact both leadership and ISRM effectiveness, which could potentially cause reputational harm. Future Research: This study raised questions about CTO leadership styles, the specific governance structures involved related to the alignment of big data and ISRM effectiveness. While the research around these variables independently is mature, there is an overall lack of mediation studies as it relates to the impact of the alignment of the governance of big data. With the lack of alignment around a universal framework, evolving frameworks could be tested in future research to see if similar results are obtained.




nan

Gender Differences among IT Professionals in Dealing with Change and Skill Set Maintenance




nan

Decision Making for Predictive Maintenance in Asset Information Management




nan

Determinants of Intent to Continue Using Online Learning: A Tale of Two Universities




nan

A Knowledge Integration Methodology for Developing Customized Maintenance Documents




nan

Identification of Influential Factors in Implementing IT Governance: A Survey Study of Indonesian Companies in the Public Sector

Aim/Purpose: This study is carried out to determine the factors influencing the implementation of IT governance in public sector. Background: IT governance in organizations plays strategic roles in deciding whether IT strategies and investments of both private and public organizations could be efficient, consistent, and transparent. IT governance has the potential to be the best practice that could improve organizational performance and competency. Methodology: The study involves qualitative and quantitative approaches, where data were collected through questionnaire, observation, interview, and document study through a sample of 367 respondents. The collected data were analyzed using Structured Equation Modeling (SEM) for validating the model and testing the hypotheses. Besides, semi-structured interview, observation, and document study were also carried out to obtain the management’s feedback on the implementation of IT governance and its activities. Contribution: The results of this study contribute to knowledge regarding good IT governance. Practically, this study can be used as a guideline for the future development and good IT governance. Findings: The findings reveal that policy has a significant direct influence on system planning, the management of IT investment, system realization, operation and maintenance, and organizational culture. The existence of IT governance policies, the success of the IT process can work well. Monitoring and evaluation processes also significantly affect system plan-ning, management of IT investment, system realization, operation and maintenance, and organizational culture. It indicates the process of monitoring and evaluation required for indications of financial efficiency, infrastructure, resources, risk and organizational success. Recommendations for Practitioners: It is important for organizational management to pay more attention to the organization’s internal controls in order to create good IT governance. Recommendation for Researchers: A comparative study between Indonesia and developing countries on the implementation of IT governance is needed to capture the differences be-tween those countries. Impact on Society: Knowledge of the factors influencing the implementation of IT governance as an effort to implement and improve the quality of IT governance. Future Research: Future studies should look further at the policy and IT governance models, specifically in public organizations, besides other influencing factors. Moreover, the outcome of this study could be generated as a guideline for the advanced development of IT governance and as a point of improvement as a way to generate a better good IT governance. It is essential because such evidence is lacking in current literature.




nan

The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel

Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter.




nan

Understanding the Determinants of Wearable Payment Adoption: An Empirical Study

Aim/Purpose: The aim of this study is to determine the variables which affect the intention to use Near Field Communication (NFC)-enabled smart wearables (e.g., smartwatches, rings, wristbands) payments. Background: Despite the enormous potential of wearable payments, studies investigating the adoption of this technology are scarce. Methodology: This study extends the Technology Acceptance Model (TAM) with four additional variables (Perceived Security, Trust, Perceived Cost, and Attractiveness of Alternatives) to investigate behavioral intentions to adopt wearable payments. The moderating role of gender was also examined. Data collected from 311 Kuwaiti respondents were analyzed using Structural Equation Modeling (SEM) and multi-group analysis (MGA). Contribution: The research model provided in this study may be useful for academics and scholars conducting further research into m-payments adoption, specifically in the case of wearable payments where studies are scarce and still in the nascent stage; hence, addressing the gap in existing literature. Further, this study is the first to have specifically investigated wearable payments in the State of Kuwait; therefore, enriching Kuwaiti context literature. Findings: This study empirically demonstrated that behavioral intention to adopt wearable payments is mainly predicted by attractiveness of alternatives, perceived usefulness, perceived ease of use, perceived security and trust, while the role of perceived cost was found to be insignificant. Recommendations for Practitioners: This study draws attention to the importance of cognitive factors, such as perceived usefulness and ease of use, in inducing users’ behavioral intention to adopt wearable payments. As such, in the case of perceived usefulness, smart wearable devices manufacturers and banks enhance the functionalities and features of these devices, expand on the financial services provided through them, and maintain the availability, performance, effectiveness, and efficiency of these tools. In relation to ease of use, smart wearable devices should be designed with an easy to use, high quality and customizable user interface. The findings of this study demonstrated the influence of trust and perceived security in motivating users to adopt wearable payments, Hence, banks are advised to focus on a relationship based on trust, especially during the early stages of acceptance and adoption of wearable payments. Recommendation for Researchers: The current study validated the role of attractiveness of alternatives, which was never examined in the context of wearable payments. This, in turn, provides a new dimension about a determinant factor considered by customers in predicting their behavioral intention to adopt wearable payments. Impact on Society: This study could be used in other countries to compare and verify the results. Additionally, the research model of this study could also be used to investigate other m-payments methods, such as m-wallets and P2P payments. Future Research: Future studies should investigate the proposed model in a cross-country and cross-cultural perspective with additional economic, environmental, and technological factors. Also, future research may conduct a longitudinal study to explain how temporal changes and usage experience affect users’ behavioral intentions to adopt wearable payments. Finally, while this study included both influencing factors and inhibiting factors, other factors such as social influence, perceived compatibility, personal innovativeness, mobility, and customization could be considered in future research.




nan

Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa

Aim/Purpose: The paper’s objective is to examine the challenges of using the mobile phone to mine location data for effective contact tracing of symptomatic, pre-symptomatic, and asymptomatic individuals and the implications of this technology for public health governance. Background: The COVID-19 crisis has created an unprecedented need for contact tracing across South Africa, requiring thousands of people to be traced and their details captured in government health databases as part of public health efforts aimed at breaking the chains of transmission. Contact tracing for COVID-19 requires the identification of persons who may have been exposed to the virus and following them up daily for 14 days from the last point of exposure. Mining mobile phone location data can play a critical role in locating people from the time they were identified as contacts to the time they access medical assistance. In this case, it aids data flow to various databases designated for COVID-19 work. Methodology: The researchers conducted a review of the available literature on this subject drawing from academic articles published in peer-reviewed journals, research reports, and other relevant national and international government documents reporting on public health and COVID-19. Document analysis was used as the primary research method, drawing on the case studies. Contribution: Contact tracing remains a critical strategy in curbing the deadly COVID-19 pandemic in South Africa and elsewhere in the world. However, given increasing concern regarding its invasive nature and possible infringement of individual liberties, it is imperative to interrogate the challenges related to its implementation to ensure a balance with public governance. The research findings can thus be used to inform policies and practices associated with contact tracing in South Africa. Findings: The study found that contact tracing using mobile phone location data mining can be used to enforce quarantine measures such as lockdowns aimed at mitigating a public health emergency such as COVID-19. However, the use of technology can expose the public to criminal activities by exposing their locations. From a public governance point of view, any exposure of the public to social ills is highly undesirable. Recommendations for Practitioners: In using contact tracing apps to provide pertinent data location caution needs to be exercised to ensure that sensitive private information is not made public to the extent that it compromises citizens’ safety and security. The study recommends the development and implementation of data use protocols to support the use of this technology, in order to mitigate against infringement of individual privacy and other civil liberties. Recommendation for Researchers: Researchers should explore ways of improving digital applications in order to improve the acceptability of the use of contact tracing technology to manage pandemics such as COVID-19, paying attention to ethical considerations. Impact on Society: Since contact tracing has implications for privacy and confidentiality it must be conducted with caution. This research highlights the challenges that the authorities must address to ensure that the right to privacy and confidentiality is upheld. Future Research: Future research could focus on collecting primary data to provide insight on contact tracing through mining mobile phone location data. Research could also be conducted on how app-based technology can enhance the effectiveness of contact tracing in order to optimize testing and tracing coverage. This has the potential to minimize transmission whilst also minimizing tracing delays. Moreover, it is important to develop contact tracing apps that are universally inter-operable and privacy-preserving.