47,072 research outputs found

    Social media as a data gathering tool for international business qualitative research: opportunities and challenges

    Full text link
    Lusophone African (LA) multinational enterprises (MNEs) are becoming a significant pan-African and global economic force regarding their international presence and influence. However, given the extreme poverty and lack of development in their home markets, many LA enterprises seeking to internationalize lack resources and legitimacy in international markets. Compared to higher income emerging markets, Lusophone enterprises in Africa face more significant challenges in their internationalization efforts. Concomitantly, conducting significant international business (IB) research in these markets to understand these MNEs internationalization strategies can be a very daunting task. The fast-growing rise of social media on the Internet, however, provides an opportunity for IB researchers to examine new phenomena in these markets in innovative ways. Unfortunately, for various reasons, qualitative researchers in IB have not fully embraced this opportunity. This article studies the use of social media in qualitative research in the field of IB. It offers an illustrative case based on qualitative research on internationalization modes of LAMNEs conducted by the authors in Angola and Mozambique using social media to identify and qualify the population sample, as well as interact with subjects and collect data. It discusses some of the challenges of using social media in those regions of Africa and suggests how scholars can design their studies to capitalize on social media and corresponding data as a tool for qualitative research. This article underscores the potential opportunities and challenges inherent in the use of social media in IB-oriented qualitative research, providing recommendations on how qualitative IB researchers can design their studies to capitalize on data generated by social media.https://doi.org/10.1080/15475778.2019.1634406https://doi.org/10.1080/15475778.2019.1634406https://doi.org/10.1080/15475778.2019.1634406https://doi.org/10.1080/15475778.2019.1634406Accepted manuscriptPublished versio

    Countering Social Engineering through Social Media: An Enterprise Security Perspective

    Full text link
    The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. Also included is an analysis of existing social media security policies and guidelines within the public and private sectors.Comment: Proceedings of The 7th International Conference on Computational Collective Intelligence Technologies and Applications (ICCCI 2015), LNAI, Springer, Vol. 9330, pp. 54-6

    Enterprise Social Networking Platform and Employees’ Job Mobility

    Get PDF
    We study the association between people\u27 participation in an ESN platform and job mobility events using employees\u27 actions on an S&P500 company\u27s enterprise social networking (ESN) platform. Using cutting-edge text-mining algorithms, we first determine the settings in which employees use these platforms and then assess the relationship between those qualities and job mobility. According to our topic-modeling analysis, employee participation on workplace social networking platforms has multiple dimensions; nonetheless, it is mainly employed for knowledge-sharing, social networking, employee engagement, and volunteer activities. We provide empirical evidence that employees\u27 contributions to knowledge-sharing, social networking, and organizational engagement via ESN lead to a higher likelihood of job mobility; however, a higher number of complaints, perhaps surprisingly, is associated with a higher likelihood of job mobility. We contend that better levels of knowledge-sharing, social networking, and employee engagement with less complaints can be linked to self-promotion, resulting in a higher likelihood of promotion

    Security and Privacy Issues of Big Data

    Get PDF
    This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.Comment: In book Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, IGI Global, 201

    The National Dialogue on the Quadrennial Homeland Security Review

    Get PDF
    Six years after its creation, the Department of Homeland Security (DHS) undertook the first Quadrennial Homeland Security Review (QHSR) to inform the design and implementation of actions to ensure the safety of the United States and its citizens. This review, mandated by the Implementing the 9/11 Commission Recommendations Act of 2007, represents the first comprehensive examination of the homeland security strategy of the nation. The QHSR includes recommendations addressing the long-term strategy and priorities of the nation for homeland security and guidance on the programs, assets, capabilities, budget, policies, and authorities of the department.Rather than set policy internally and implement it in a top-down fashion, DHS undertook the QHSR in a new and innovative way by engaging tens of thousands of stakeholders and soliciting their ideas and comments at the outset of the process. Through a series of three-week-long, web-based discussions, stakeholders reviewed materials developed by DHS study groups, submitted and discussed their own ideas and priorities, and rated or "tagged" others' feedback to surface the most relevant ideas and important themes deserving further consideration.Key FindingsThe recommendations included: (1) DHS should enhance its capacity for coordinating stakeholder engagement and consultation efforts across its component agencies, (2) DHS and other agencies should create special procurement and contracting guidance for acquisitions that involve creating or hosting such web-based engagement platforms as the National Dialogue, and (3) DHS should begin future stakeholder engagements by crafting quantitative metrics or indicators to measure such outcomes as transparency, community-building, and capacity

    THE ROLE OF DATA ARCHITECTURE AS A PART OF ENTERPRISE ARCHITECTURE

    Get PDF
    In the early days of computing, technology simply automated manual processes with greater efficiency. The new organizational context provides input into the data architecture and is the primary tool for the management and sharing of enterprise data. It enables architects, data modelers, and stakeholders to identify, classify, and analyze information requirements across the enterprise, allowing the right priorities for data sharing initiatives. Data architecture states how data are persisted, managed, and utilized within an organization. Data architecture is made up of the structure of all corporate data and its relationships to itself and external systems. In far too many situations, the business community has to enlist the assistance of IT to retrieve information due to the community's inconsistency, lack of intuitiveness, or other factors. The goal of any architecture should illustrate how the components of the architecture will fit together and how the system will adapt and evolve over time.data architecture, enterprise architecture, business process planning,databases, business objects.
    • …
    corecore