Search results
1 – 10 of over 1000Hafiez Sofyani and Emile Satia Darma
This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The…
Abstract
Purpose
This study aims to examine the effect of application architecture and application efficiency on the intention to continue using Islamic bank with data security as a moderator. The investigation was situated within the framework of a hacker attack that compromised the security of customer data at one of Indonesia’s largest Islamic bank.
Design/methodology/approach
A survey questionnaire method was used, and the sample population comprised users of Islamic bank in Indonesia. The respondents were then selected purposively with the criteria of individuals who were using mobile banking services. Furthermore, data collection in this study was carried out by distributing questionnaires online. To validate the questionnaire, consultation and validation were conducted by engaging four experts and conducting a pilot study. Hypothesis testing was performed using the structural equation modeling method based on partial least squares.
Findings
The results of the partial least square structural model assessment showed that application efficiency and data security positively influenced the intention to continue using Islamic bank, while application architecture had no effect. Furthermore, data security could not moderate the relationship between application architecture and efficiency toward the intention to continue using Islamic bank.
Practical implications
The results of this study suggested that Islamic banking practitioners must prioritize the enhancement of digital banking services, with a specific focus on improving application efficiency and ensuring robust data security. These two dimensions were critical determinants influencing the intention to continue using Islamic bank.
Originality/value
This study addressed the issue of data security as a moderator, particularly in the context of hacker attacks targeting a major Islamic bank in Indonesia. Furthermore, this current report expounded on the study conducted by Mir et al. (2022) by introducing novel dimensions to the e-service quality of internet banking.
Details
Keywords
Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…
Abstract
Purpose
This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.
Design/methodology/approach
Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.
Findings
Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.
Originality/value
Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.
Details
Keywords
Malik Brakni, Hélène Gorge and Nil Ozcaglar-Toulouse
This study aims to understand the progressive marketization of health data collection and use, through a study of its historical development in France, from the 1930s to the…
Abstract
Purpose
This study aims to understand the progressive marketization of health data collection and use, through a study of its historical development in France, from the 1930s to the present day.
Design/methodology/approach
The authors collected a set of legal, institutional, political and media data. These came from the INA (National Audiovisual Institute), the French national newspaper websites and the websites legifrance.gouv.fr and vie-publique.fr. The authors then conducted a thematic content analysis.
Findings
The study results highlight the changes in the health-care system related to the increased use of data in France over three major periods. The first period – 1930s to 1980s – is marked by the creation of the French social security system to collect large sets of data to better manager people’s health care. The second period – 1980s to 2000s – is characterized by the adoption and assimilation of tools to manage patient data through several national and European regulations. The last period – 2000s to the present – saw the introduction of measures in favor of the digitalization of health care, and consequently of data, in parallel with the advancement of digital technologies in general. The institutional dynamics in healthcare have evolved with the nature of the actors and their practices, in connection with new perceptions about health data.
Originality/value
This research sheds light on the historical transformation of health data collection and use in France, revealing the involvement of diverse stakeholders, the discourses driving data development and the need for regulation. It exposes the dual nature of health data collection and use, initially sanctioned by the state and public entities but later exploited for private interests.
Details
Keywords
Tulsi Pawan Fowdur and Ashven Sanghan
The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical…
Abstract
Purpose
The purpose of this paper is to develop a blockchain-based data capture and transmission system that will collect real-time power consumption data from a household electrical appliance and transfer it securely to a local server for energy analytics such as forecasting.
Design/methodology/approach
The data capture system is composed of two current transformer (CT) sensors connected to two different electrical appliances. The CT sensors send the power readings to two Arduino microcontrollers which in turn connect to a Raspberry-Pi for aggregating the data. Blockchain is then enabled onto the Raspberry-Pi through a Java API so that the data are transmitted securely to a server. The server provides real-time visualization of the data as well as prediction using the multi-layer perceptron (MLP) and long short term memory (LSTM) algorithms.
Findings
The results for the blockchain analysis demonstrate that when the data readings are transmitted in smaller blocks, the security is much greater as compared with blocks of larger size. To assess the accuracy of the prediction algorithms data were collected for a 20 min interval to train the model and the algorithms were evaluated using the sliding window approach. The mean average percentage error (MAPE) was used to assess the accuracy of the algorithms and a MAPE of 1.62% and 1.99% was obtained for the LSTM and MLP algorithms, respectively.
Originality/value
A detailed performance analysis of the blockchain-based transmission model using time complexity, throughput and latency as well as energy forecasting has been performed.
Details
Keywords
Introduction: As Internet usage increases, so does widespread concern about surveillance and privacy. While most of the research primarily focuses on a particular digital setting…
Abstract
Introduction: As Internet usage increases, so does widespread concern about surveillance and privacy. While most of the research primarily focuses on a particular digital setting, these problems cut beyond national boundaries and impact economies everywhere.
Purpose: This study critically analyses the Data Protection Bill 2019’s effectiveness within the context of surveillance and privacy in India’s digital economy. Investigating critical provisions of the bill, comparing it to international privacy laws and standards, and identifying potential gaps and weaknesses, this study provides insights into the bill’s ability to protect personal data and limit surveillance practices.
Methodology: The chapter is based on secondary sources of data, including academic articles, government reports, and news articles on the topics of surveillance, privacy, and the Data Protection Bill 2019 in India, involving content and critical discourse analyses.
Findings: The Data Protection Bill 2019 evaluation reveals a set of provisions with the overarching intent to safeguard citizens’ privacy worldwide and curtail undue surveillance practices exercised by both governmental bodies and private enterprises. Intricately delineates the entitlements of individuals concerning their data, encompassing vital aspects such as the right to access, rectify, and erase their data, the bill mandates stringent adherence to the principle of explicit consent when collecting and processing personal data.
Nevertheless, a comprehensive analysis also reveals several gaps and constraints inherent in the bill’s framework. One such area is the inclusion of exemptions for governmental entities, an aspect that raises international concerns regarding potential disparities in data protection practices.
Details
Keywords
Xin-Jean Lim, Jun-Hwa Cheah, Jennifer Yee-Shan Chang, Weng Marc Lim, Alastair M. Morrison and Yogesh K. Dwivedi
This study synthesises the self-determination theory (SDT), expectation-confirmation model (ECM), and protection motivation theory (PMT) to formulate an integrated theoretical…
Abstract
Purpose
This study synthesises the self-determination theory (SDT), expectation-confirmation model (ECM), and protection motivation theory (PMT) to formulate an integrated theoretical framework that elucidates the process of shaping the intention to continue using facial recognition payment (FRP) under the conditional impact of perceived technology security.
Design/methodology/approach
Data from 667 Beijing Winter Olympics visitors with FRP experience were collected through an online survey and analysed using variance based-structural equation modelling (VB-SEM).
Findings
This study reveals that the intention to continue using FRP evolves through three key stages. Initially, in the expectation stage, the multidimensional concept of artificial autonomy (sensing, thought, and action), which is underpinned by self-determination, is pivotal, strongly influencing perceptions of service enhancement and fostering trust in FRP. Subsequently, the confirmation stage underscores the importance of perceived service enhancement and trust as vital drivers in maintaining FRP usage, while also contributing to subjective well-being. Crucially, perceived technology security emerges as a key moderating factor, enhancing positive perceptions and intentions towards FRP, thus influencing its sustained adoption.
Originality/value
This study stands out by revealing the nuanced interplay between artificial autonomy and user perceptions, particularly concerning service enhancement, technology security, and trust, as they influence well-being and the continued adoption of FRP. Robustly grounded in the integrated theoretical framework of SDT, ECM, and PMT, the study’s findings are critical for comprehending the core elements and specific drivers that promote sustained FRP use, especially as we consider its potential widespread implementation. Therefore, this study not only advances theoretical understanding but also offers practical guidance for optimising FRP deployment strategies in a rapidly evolving technological landscape.
Details
Keywords
Prashant Jain, Dhanraj P. Tambuskar and Vaibhav Narwane
The advancements in internet technologies and the use of sophisticated digital devices in supply chain operations incessantly generate enormous amounts of data, which is termed as…
Abstract
Purpose
The advancements in internet technologies and the use of sophisticated digital devices in supply chain operations incessantly generate enormous amounts of data, which is termed as big data (BD). The BD technologies have brought about a paradigm shift in the supply chain decision-making towards profitability and sustainability. The aim of this work is to address the issue of implementation of the big data analytics (BDA) in sustainable supply chain management (SSCM) by identifying the relevant factors and developing a structural model for this purpose.
Design/methodology/approach
Through a comprehensive literature review and experts’ opinion, the crucial factors are found using the PESTEL framework, which covers political, economic, social, technological, environmental and legal factors. The structural model is developed based on the results of the total interpretive structural modelling (TISM) procedure and MICMAC analysis.
Findings
The policy support regarding IT, culture of data-based decision-making, inappropriate selection of BDA technologies and the laws related to data security and privacy are found to affect most of the other factors. Also, the company’s vision towards environmental performance and willingness for material and energy optimization are found to be crucial for the environmental and social sustainability of the supply chain.
Research limitations/implications
The study is focused on the manufacturing supply chain in emerging economies. It may be extended to other industry sectors and geographical areas. Also, additional factors may be included to make the model more robust.
Practical implications
The proposed model imparts an understanding of the relative importance and interrelationship of factors. This may be useful to managers to assess their strengths and weaknesses and ascertain their priorities in the context of their organization for developing a suitable investment plan.
Social implications
The study establishes the importance of BDA for conservation and management of energy and material. This is crucial to develop strategies for enhancing eco-efficiency of the supply chain, which in turn enhances the economic returns for the society.
Originality/value
This study addresses the implementation of BDA in SSCM in the context of emerging economies. It uses the PESTEL framework for identifying the factors, which is a comprehensive framework for strategic planning and decision-making. This study makes use of the TISM methodology for model development and deliberates on the social and environmental implications too, apart from theoretical and managerial implications.
Details
Keywords
This study aims to determine how the applications of blockchain technology (BT) can play a crucial role in managing financial flows in the humanitarian supply chain (HSC) and what…
Abstract
Purpose
This study aims to determine how the applications of blockchain technology (BT) can play a crucial role in managing financial flows in the humanitarian supply chain (HSC) and what benefits and challenges are associated with BT in a humanitarian setting.
Design/methodology/approach
The present study used a qualitative research approach, incorporating a systematic literature review and conducting semi-structured interviews with 12 experts in the fields of humanitarian operations, supply chain management, fintech and information technology.
Findings
The findings show that the humanitarian sector has the potential to reap significant benefits from BT, including secure data exchange, efficient SCM, streamlined donor financing, cost-effective financial transactions, smooth digital cash flow management and the facilitation of cash programs and crowdfunding. Despite the promising prospects, this study also illuminated various challenges associated with the application of BT in the HSC. Key challenges identified include scalability issues, high cost and resource requirements, lack of network reliability, data privacy, supply chain integration, knowledge and training gaps, regulatory frameworks and ethical considerations. Moreover, the study highlighted the importance of implementing mitigation strategies to address the challenges effectively.
Research limitations/implications
The present study is confined to exploring the benefits, challenges and corresponding mitigation strategies. The research uses a semi-structured interview method as the primary research approach.
Originality/value
This study adds to the existing body of knowledge concerning BT and HSC by explaining the pivotal role of BT in improving the financial flow within HSC. Moreover, it addresses a notable research gap, as there is a scarcity of studies that holistically cover the expert perspectives on benefits, challenges and strategies related to blockchain applications for effective financial flows within humanitarian settings. Consequently, this study seeks to bridge this knowledge gap and provide valuable insights into this critical area.
Details
Keywords
Philip Hong Wei Jiang and William Yu Chung Wang
The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of…
Abstract
Purpose
The purpose of this paper is to explain how enterprise resource planning (ERP) implementation evolves by cloud computing in different industries with different delivery models of cloud ERP. This paper also investigates infrastructure as a service (IaaS) as a delivery approach for cloud ERP. Case research on IaaS is rarely found in the literature. In addition, this paper intends to reveal how this transformation from on-premises to the cloud would influence the ERP implementation process.
Design/methodology/approach
A multiple-case study is conducted to identify the different deployed models of cloud ERP systems in the implementation projects. The influences of emerging cloud computing technology on ERP implementation are investigated by interviewing consultants related to the projects.
Findings
The findings illustrate that not only software as a service (SaaS) but also IaaS and platform as a service cloud computing services are widely applied in cloud ERP implementation. This study also indicates that certain technical limitations of cloud ERP might have a positive effect on the outcome of ERP implementation.
Originality/value
This study investigates how cloud computing influences ERP implementation from different aspects. The result identifies both SaaS and IaaS as two different approaches widely adopted in cloud ERP implementation. Besides, this study has discussed in-depth and analyzed these two cloud ERP paradigms in five factors, including functionality, performance, portability, security, cost and customization. The classification and suggestions are original to the literature.
Details
Keywords
Dona Budi Kharisma and Alvalerie Diakanza
This paper aims to identify the reasons why cases of leakage of patient personal data often occur in the health sector. This paper also analyzes personal data protection…
Abstract
Purpose
This paper aims to identify the reasons why cases of leakage of patient personal data often occur in the health sector. This paper also analyzes personal data protection regulations in the health sector from a comparative legal perspective between Indonesia, Singapore and the European Union (EU).
Design/methodology/approach
This type of research is legal research. The research approach used is the statute approach and conceptual approach. The focus of this study in this research is Indonesia with a comparative study in Singapore and the EU.
Findings
Cases of leakage of patient personal data in Indonesia often occur. In 2021, the data for 230,000 COVID-19 patients was leaked and sold on the Rapid Forums dark web forum. A patient’s personal data is a human right that must be protected. Compared to Singapore and the EU, Indonesia is a country that does not yet have a law on the protection of personal data. This condition causes cases of leakage of patients’ personal data to occur frequently.
Research limitations/implications
This study analyzes the regulation and protection of patients’ personal data in Indonesia, Singapore and the EU to construct a regulatory design for the protection of patients’ personal data.
Practical implications
The results of this study are useful for constructing regulations governing the protection of patients’ personal data. The regulation is to protect the patient’s personal data like a patient’s human right.
Social implications
The ideal regulatory design can prevent data breaches. Based on the results of comparative studies, in Singapore and the EU, cases of personal data leakage are rare because they have a regulatory framework regarding the protection of patients’ personal data.
Originality/value
Legal strategies that can be taken to prevent and overcome patient data breaches include the establishment of an Act on Personal Data Protection; the Personal Data Protection Commission; and management of patients’ personal data.
Details