Search results

1 – 10 of over 1000
Article
Publication date: 30 April 2024

Hafiez Sofyani and Emile Satia Darma

This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The…

Abstract

Purpose

This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The investigation was situated within the framework of a hacker attack that compromised the security of customer data at one of Indonesia’s largest Islamic bank.

Design/methodology/approach

A survey questionnaire method was used, and the sample population comprised users of Islamic bank in Indonesia. The respondents were then selected purposively with the criteria of individuals who were using mobile banking services. Furthermore, data collection in this study was carried out by distributing questionnaires online. To validate the questionnaire, consultation and validation were conducted by engaging four experts and conducting a pilot study. Hypothesis testing was performed using the structural equation modeling method based on partial least squares.

Findings

The results of the partial least square structural model assessment showed that application efficiency and data security positively influenced the intention to continue using Islamic bank, while application architecture had no effect. Furthermore, data security could not moderate the relationship between application architecture and efficiency toward the intention to continue using Islamic bank.

Practical implications

The results of this study suggested that Islamic banking practitioners must prioritize the enhancement of digital banking services, with a specific focus on improving application efficiency and ensuring robust data security. These two dimensions were critical determinants influencing the intention to continue using Islamic bank.

Originality/value

This study addressed the issue of data security as a moderator, particularly in the context of hacker attacks targeting a major Islamic bank in Indonesia. Furthermore, this current report expounded on the study conducted by Mir et al. (2022) by introducing novel dimensions to the e-service quality of internet banking.

Details

Journal of Islamic Marketing, vol. 15 no. 6
Type: Research Article
ISSN: 1759-0833

Keywords

Article
Publication date: 9 April 2024

Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…

Abstract

Purpose

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.

Design/methodology/approach

Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.

Findings

Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.

Originality/value

Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.

Details

Journal of Systems and Information Technology, vol. 26 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 14 May 2024

Malik Brakni, Hélène Gorge and Nil Ozcaglar-Toulouse

This study aims to understand the progressive marketization of health data collection and use, through a study of its historical development in France, from the 1930s to the…

Abstract

Purpose

This study aims to understand the progressive marketization of health data collection and use, through a study of its historical development in France, from the 1930s to the present day.

Design/methodology/approach

The authors collected a set of legal, institutional, political and media data. These came from the INA (National Audiovisual Institute), the French national newspaper websites and the websites legifrance.gouv.fr and vie-publique.fr. The authors then conducted a thematic content analysis.

Findings

The study results highlight the changes in the health-care system related to the increased use of data in France over three major periods. The first period – 1930s to 1980s – is marked by the creation of the French social security system to collect large sets of data to better manager people’s health care. The second period – 1980s to 2000s – is characterized by the adoption and assimilation of tools to manage patient data through several national and European regulations. The last period – 2000s to the present – saw the introduction of measures in favor of the digitalization of health care, and consequently of data, in parallel with the advancement of digital technologies in general. The institutional dynamics in healthcare have evolved with the nature of the actors and their practices, in connection with new perceptions about health data.

Originality/value

This research sheds light on the historical transformation of health data collection and use in France, revealing the involvement of diverse stakeholders, the discourses driving data development and the need for regulation. It exposes the dual nature of health data collection and use, initially sanctioned by the state and public entities but later exploited for private interests.

Details

Journal of Historical Research in Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1755-750X

Keywords

Article
Publication date: 25 April 2024

Tulsi Pawan Fowdur and Ashven Sanghan

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical…

Abstract

Purpose

The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical appliance and transfer it securely to a local server for energy analytics such as forecasting.

Design/methodology/approach

The data capture system is composed of two current transformer (CT) sensors connected to two different electrical appliances. The CT sensors send the power readings to two Arduino microcontrollers which in turn connect to a Raspberry-Pi for aggregating the data. Blockchain is then enabled onto the Raspberry-Pi through a Java API so that the data are transmitted securely to a server. The server provides real-time visualization of the data as well as prediction using the multi-layer perceptron (MLP) and long short term memory (LSTM) algorithms.

Findings

The results for the blockchain analysis demonstrate that when the data readings are transmitted in smaller blocks, the security is much greater as compared with blocks of larger size. To assess the accuracy of the prediction algorithms data were collected for a 20 min interval to train the model and the algorithms were evaluated using the sliding window approach. The mean average percentage error (MAPE) was used to assess the accuracy of the algorithms and a MAPE of 1.62% and 1.99% was obtained for the LSTM and MLP algorithms, respectively.

Originality/value

A detailed performance analysis of the blockchain-based transmission model using time complexity, throughput and latency as well as energy forecasting has been performed.

Details

Sensor Review, vol. 44 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

Book part
Publication date: 20 May 2024

Farha Khan and Akansha Mer

Introduction: As Internet usage increases, so does widespread concern about surveillance and privacy. While most of the research primarily focuses on a particular digital setting…

Abstract

Introduction: As Internet usage increases, so does widespread concern about surveillance and privacy. While most of the research primarily focuses on a particular digital setting, these problems cut beyond national boundaries and impact economies everywhere.

Purpose: This study critically analyses the Data Protection Bill 2019’s effectiveness within the context of surveillance and privacy in India’s digital economy. Investigating critical provisions of the bill, comparing it to international privacy laws and standards, and identifying potential gaps and weaknesses, this study provides insights into the bill’s ability to protect personal data and limit surveillance practices.

Methodology: The chapter is based on secondary sources of data, including academic articles, government reports, and news articles on the topics of surveillance, privacy, and the Data Protection Bill 2019 in India, involving content and critical discourse analyses.

Findings: The Data Protection Bill 2019 evaluation reveals a set of provisions with the overarching intent to safeguard citizens’ privacy worldwide and curtail undue surveillance practices exercised by both governmental bodies and private enterprises. Intricately delineates the entitlements of individuals concerning their data, encompassing vital aspects such as the right to access, rectify, and erase their data, the bill mandates stringent adherence to the principle of explicit consent when collecting and processing personal data.

Nevertheless, a comprehensive analysis also reveals several gaps and constraints inherent in the bill’s framework. One such area is the inclusion of exemptions for governmental entities, an aspect that raises international concerns regarding potential disparities in data protection practices.

Details

Sustainable Development Goals: The Impact of Sustainability Measures on Wellbeing
Type: Book
ISBN: 978-1-83797-098-8

Keywords

Article
Publication date: 3 June 2024

Xin-Jean Lim, Jun-Hwa Cheah, Jennifer Yee-Shan Chang, Weng Marc Lim, Alastair M. Morrison and Yogesh K. Dwivedi

This study synthesises the self-determination theory (SDT), expectation-confirmation model (ECM), and protection motivation theory (PMT) to formulate an integrated theoretical…

Abstract

Purpose

This study synthesises the self-determination theory (SDT), expectation-confirmation model (ECM), and protection motivation theory (PMT) to formulate an integrated theoretical framework that elucidates the process of shaping the intention to continue using facial recognition payment (FRP) under the conditional impact of perceived technology security.

Design/methodology/approach

Data from 667 Beijing Winter Olympics visitors with FRP experience were collected through an online survey and analysed using variance based-structural equation modelling (VB-SEM).

Findings

This study reveals that the intention to continue using FRP evolves through three key stages. Initially, in the expectation stage, the multidimensional concept of artificial autonomy (sensing, thought, and action), which is underpinned by self-determination, is pivotal, strongly influencing perceptions of service enhancement and fostering trust in FRP. Subsequently, the confirmation stage underscores the importance of perceived service enhancement and trust as vital drivers in maintaining FRP usage, while also contributing to subjective well-being. Crucially, perceived technology security emerges as a key moderating factor, enhancing positive perceptions and intentions towards FRP, thus influencing its sustained adoption.

Originality/value

This study stands out by revealing the nuanced interplay between artificial autonomy and user perceptions, particularly concerning service enhancement, technology security, and trust, as they influence well-being and the continued adoption of FRP. Robustly grounded in the integrated theoretical framework of SDT, ECM, and PMT, the study’s findings are critical for comprehending the core elements and specific drivers that promote sustained FRP use, especially as we consider its potential widespread implementation. Therefore, this study not only advances theoretical understanding but also offers practical guidance for optimising FRP deployment strategies in a rapidly evolving technological landscape.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 18 April 2022

Prashant Jain, Dhanraj P. Tambuskar and Vaibhav Narwane

The advancements in internet technologies and the use of sophisticated digital devices in supply chain operations incessantly generate enormous amounts of data, which is termed as…

Abstract

Purpose

The advancements in internet technologies and the use of sophisticated digital devices in supply chain operations incessantly generate enormous amounts of data, which is termed as big data (BD). The BD technologies have brought about a paradigm shift in the supply chain decision-making towards profitability and sustainability. The aim of this work is to address the issue of implementation of the big data analytics (BDA) in sustainable supply chain management (SSCM) by identifying the relevant factors and developing a structural model for this purpose.

Design/methodology/approach

Through a comprehensive literature review and experts’ opinion, the crucial factors are found using the PESTEL framework, which covers political, economic, social, technological, environmental and legal factors. The structural model is developed based on the results of the total interpretive structural modelling (TISM) procedure and MICMAC analysis.

Findings

The policy support regarding IT, culture of data-based decision-making, inappropriate selection of BDA technologies and the laws related to data security and privacy are found to affect most of the other factors. Also, the company’s vision towards environmental performance and willingness for material and energy optimization are found to be crucial for the environmental and social sustainability of the supply chain.

Research limitations/implications

The study is focused on the manufacturing supply chain in emerging economies. It may be extended to other industry sectors and geographical areas. Also, additional factors may be included to make the model more robust.

Practical implications

The proposed model imparts an understanding of the relative importance and interrelationship of factors. This may be useful to managers to assess their strengths and weaknesses and ascertain their priorities in the context of their organization for developing a suitable investment plan.

Social implications

The study establishes the importance of BDA for conservation and management of energy and material. This is crucial to develop strategies for enhancing eco-efficiency of the supply chain, which in turn enhances the economic returns for the society.

Originality/value

This study addresses the implementation of BDA in SSCM in the context of emerging economies. It uses the PESTEL framework for identifying the factors, which is a comprehensive framework for strategic planning and decision-making. This study makes use of the TISM methodology for model development and deliberates on the social and environmental implications too, apart from theoretical and managerial implications.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 3
Type: Research Article
ISSN: 1726-0531

Keywords

Open Access
Article
Publication date: 31 May 2024

Saurav Negi

This study aims to determine how the applications of blockchain technology (BT) can play a crucial role in managing financial flows in the humanitarian supply chain (HSC) and what…

Abstract

Purpose

This study aims to determine how the applications of blockchain technology (BT) can play a crucial role in managing financial flows in the humanitarian supply chain (HSC) and what benefits and challenges are associated with BT in a humanitarian setting.

Design/methodology/approach

The present study used a qualitative research approach, incorporating a systematic literature review and conducting semi-structured interviews with 12 experts in the fields of humanitarian operations, supply chain management, fintech and information technology.

Findings

The findings show that the humanitarian sector has the potential to reap significant benefits from BT, including secure data exchange, efficient SCM, streamlined donor financing, cost-effective financial transactions, smooth digital cash flow management and the facilitation of cash programs and crowdfunding. Despite the promising prospects, this study also illuminated various challenges associated with the application of BT in the HSC. Key challenges identified include scalability issues, high cost and resource requirements, lack of network reliability, data privacy, supply chain integration, knowledge and training gaps, regulatory frameworks and ethical considerations. Moreover, the study highlighted the importance of implementing mitigation strategies to address the challenges effectively.

Research limitations/implications

The present study is confined to exploring the benefits, challenges and corresponding mitigation strategies. The research uses a semi-structured interview method as the primary research approach.

Originality/value

This study adds to the existing body of knowledge concerning BT and HSC by explaining the pivotal role of BT in improving the financial flow within HSC. Moreover, it addresses a notable research gap, as there is a scarcity of studies that holistically cover the expert perspectives on benefits, challenges and strategies related to blockchain applications for effective financial flows within humanitarian settings. Consequently, this study seeks to bridge this knowledge gap and provide valuable insights into this critical area.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 28 March 2022

Philip Hong Wei Jiang and William Yu Chung Wang

The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of…

Abstract

Purpose

The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of cloud ERP. This paper also investigates infrastructure as a service (IaaS) as a delivery approach for cloud ERP. Case research on IaaS is rarely found in the literature. In addition, this paper intends to reveal how this transformation from on-premises to the cloud would influence the ERP implementation process.

Design/methodology/approach

A multiple-case study is conducted to identify the different deployed models of cloud ERP systems in the implementation projects. The influences of emerging cloud computing technology on ERP implementation are investigated by interviewing consultants related to the projects.

Findings

The findings illustrate that not only software as a service (SaaS) but also IaaS and platform as a service cloud computing services are widely applied in cloud ERP implementation. This study also indicates that certain technical limitations of cloud ERP might have a positive effect on the outcome of ERP implementation.

Originality/value

This study investigates how cloud computing influences ERP implementation from different aspects. The result identifies both SaaS and IaaS as two different approaches widely adopted in cloud ERP implementation. Besides, this study has discussed in-depth and analyzed these two cloud ERP paradigms in five factors, including functionality, performance, portability, security, cost and customization. The classification and suggestions are original to the literature.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 54 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 6 September 2022

Dona Budi Kharisma and Alvalerie Diakanza

This paper aims to identify the reasons why cases of leakage of patient personal data often occur in the health sector. This paper also analyzes personal data protection…

Abstract

Purpose

This paper aims to identify the reasons why cases of leakage of patient personal data often occur in the health sector. This paper also analyzes personal data protection regulations in the health sector from a comparative legal perspective between Indonesia, Singapore and the European Union (EU).

Design/methodology/approach

This type of research is legal research. The research approach used is the statute approach and conceptual approach. The focus of this study in this research is Indonesia with a comparative study in Singapore and the EU.

Findings

Cases of leakage of patient personal data in Indonesia often occur. In 2021, the data for 230,000 COVID-19 patients was leaked and sold on the Rapid Forums dark web forum. A patient’s personal data is a human right that must be protected. Compared to Singapore and the EU, Indonesia is a country that does not yet have a law on the protection of personal data. This condition causes cases of leakage of patients’ personal data to occur frequently.

Research limitations/implications

This study analyzes the regulation and protection of patients’ personal data in Indonesia, Singapore and the EU to construct a regulatory design for the protection of patients’ personal data.

Practical implications

The results of this study are useful for constructing regulations governing the protection of patients’ personal data. The regulation is to protect the patient’s personal data like a patient’s human right.

Social implications

The ideal regulatory design can prevent data breaches. Based on the results of comparative studies, in Singapore and the EU, cases of personal data leakage are rare because they have a regulatory framework regarding the protection of patients’ personal data.

Originality/value

Legal strategies that can be taken to prevent and overcome patient data breaches include the establishment of an Act on Personal Data Protection; the Personal Data Protection Commission; and management of patients’ personal data.

Details

International Journal of Human Rights in Healthcare, vol. 17 no. 2
Type: Research Article
ISSN: 2056-4902

Keywords

1 – 10 of over 1000