Search results
1 – 10 of over 23000Joongsan Oh and Seung‐Kyu Rhee
This study aims to investigate relationships among supplier capabilities, collaboration in new car development, and the competitive advantage of carmakers based on the…
Abstract
Purpose
This study aims to investigate relationships among supplier capabilities, collaboration in new car development, and the competitive advantage of carmakers based on the resource‐based view (RBV).
Design/methodology/approach
A survey of first‐tier suppliers in the Korean automotive parts industry was conducted, and pertinent hypotheses were tested by using the ordinary least squares (OLS) method and hierarchical multiple regression analysis (HMRA).
Findings
It was found that suppliers' flexibility, engineering and modularization capabilities positively influence collaboration in new car development, which in turn positively affects the competitive advantage of carmakers. This result empirically verifies the RBV proposition that one motive for interfirm collaboration can be the opportunity to gain access to other firms' resources/capabilities. The theory of the RBV was further extended by demonstrating that suppliers' quality improvement and modularization capabilities directly contribute to the competitive advantage of carmakers and that the influence of quality improvement and modularization capabilities on this competitive advantage are robust against technological uncertainty. However, the positive effect of collaboration in new car development on the competitive advantage of carmakers is decreased by the moderating effect of technological uncertainty.
Research limitations/implications
The findings of this study were obtained from a limited population of the Korean automotive industry. This study not only empirically verified the proposition of the RBV but also extended the RBV theory by empirically demonstrating direct relationships between suppliers' capabilities and carmakers' competitive advantages.
Practical implications
Suppliers must enhance flexibility, modularization and engineering capabilities in order to vitalize collaboration with carmakers in new car development. As technological uncertainty increases, carmakers should address in‐house the problems caused by technological uncertainty or delegate related jobs only to suppliers with significant capabilities for quality improvement and modularization.
Originality/value
This is one of the few studies to identify the moderating effect of technological uncertainty on interfirm collaboration.
Details
Keywords
Increased focus on knowledge within firms has not addressed the security implication. This paper aims to examine the implications of knowledge management for security.
Abstract
Purpose
Increased focus on knowledge within firms has not addressed the security implication. This paper aims to examine the implications of knowledge management for security.
Design/methodology/approach
This approach highlights the competitive advantage of knowledge with an emphasis on security. This paper reviews security for data and information and explores the dimensions of secure knowledge systems. The emphasis is on knowledge security and the development of future knowledge management systems.
Findings
This paper finds that there exists a general lack of focus on security in the knowledge management framework – both in a research setting and in practical applications. Knowledge is different from information and data and needs special consideration in firms.
Research implications/limitations
Designers of knowledge management systems can implement levels of security for different types of knowledge that reside within the organization. The concept of “secure knowledge management” has provided nascent models to address the management and protection of knowledge resources. Information systems researchers that are investigating knowledge have to include the protection and security of knowledge.
Originality/value
Knowledge management has moved to the forefront of both the research and corporate agendas. Harnessing the information and knowledge contained within firm data warehouses is one method to achieve competitive advantage. Various types of knowledge require different solutions. Designers of knowledge management systems can implement levels of security for different types of knowledge that reside within the organization. Future developments need to address securing the knowledge of a corporation, its most valuable asset.
Details
Keywords
Adnan Alghail, Mohammed Abbas and Liu Yao
Knowledge protection (KP) is one of the main knowledge management (KM) processes that aim to protect the organization’s knowledge from any inside and outside force leakage. In…
Abstract
Purpose
Knowledge protection (KP) is one of the main knowledge management (KM) processes that aim to protect the organization’s knowledge from any inside and outside force leakage. In higher education institutions (HEIs), KP is rarely being discussed and covered in contrast to knowledge sharing (KS) in terms of its determinants. The purpose of this paper is to provide a deep analysis of previous research articles from 1980 to 2019 and examine the associated institutional factors on KP determinants within HEIs as a research objective.
Design/methodology/approach
The preferred reporting items for systematic reviews and meta-analysis was a well-established approach for analyzing the systematic literature review methodology. Several articles were published over the past decades collected from 5 different databases, but after the screening, 101 articles were reviewed and only 22 articles were relevant to the research objective.
Findings
The findings indicated that KP is under academic research topic in KM and has received minimal attention in HEIs compared to KS, which has been frequently studied in HEIs. The literature categorized KP determinants into four areas: technological, organizational structure, behavioral and ethics and organizational culture. It will open the door for academics to investigate further into the factors, theories and models of KP in general and HEIs from a particular perspective.
Practical implications
As evident from the paper finds, with few pieces of literature covered in this topic, HEIs have to protect the knowledge from any illegal usage or any expert’s knowledge loss after leaving the institutions. This study can help university leaders to understand how the different KP determinants can maximize KP without affecting the KS and develop the KP phenomenon for a strategic fit to enhance their institutions’ safe knowledge usage.
Originality/value
This is the first research of its type which has extensively examined the literature on KP related to HEIs. Also, this paper provides theoretical and practical insights through understanding the determinants that affect KP practices among academic staff.
Details
Keywords
Maria Luisa Calanag, Koichi Tabata and Shigeo Sugimoto
The long‐term preservation of digital resources is one of the most important issues facing the library community. In particular, libraries need a preservation strategy for digital…
Abstract
The long‐term preservation of digital resources is one of the most important issues facing the library community. In particular, libraries need a preservation strategy for digital objects, since digitization alone provides access but not preservation. The digital library community is also focusing on the problem of designing and implementing long‐term archives or repositories. Digital repository management includes the development and enforcement of policies for tasks such as managing access to collection contents and preserving items in the collection. Comprehensive standards and best practices are currently starting to emerge, and ongoing work has deepened the understanding of the needs and requirements that must be met to carry out effective digital preservation. One of these requirements is the creation and maintenance of metadata in support of the preservation process. This paper would like to share findings from earlier and ongoing work that serve as “groundwork” for the current directions leading to the idea of making metadata a more useful and powerful tool to contribute to the technical solution of digital preservation.
Details
Keywords
Taofeek Tunde Okanlawon, Luqman Oyekunle Oyewobi and Richard Ajayi Jimoh
The purpose of this study is to assess the barriers to the implementation of blockchain technology in construction supply chain management in Nigeria.
Abstract
Purpose
The purpose of this study is to assess the barriers to the implementation of blockchain technology in construction supply chain management in Nigeria.
Design/methodology/approach
This study employed a quantitative research approach through a questionnaire survey that was conducted among professionals in the Nigerian construction industry using the snowball sampling method, which resulted in a selection of 155 respondents. The collected data were analysed using descriptive and exploratory factor analysis (EFA), while Cronbach's alpha was used to assess the reliability.
Findings
The analysis revealed that all barriers ranked above the average mean item score. It also revealed that all professionals have a convergent opinion on the barriers. EFA was used in clustering the identified barriers into two categories: technological and socio-political barrier.
Research limitations/implications
This research was carried out in the Southwestern region which is one of the six geo-political zones in Nigeria using a cross-sectional survey method.
Practical implications
The findings provide valuable insights into the barriers to the implementation of blockchain in supply chain management for professionals and practitioners in the Nigerian construction industry.
Originality/value
The research categorised the barriers into technological and social-political barrier and identified that lack of digitalisation is the major barrier to the implementation of blockchain technology in construction supply chain.
Details
Keywords
Farhad Panahifar, P.J. Byrne, Mohammad Asif Salam and Cathal Heavey
The purpose of this paper is to identify and assess the interrelationships between various characteristics of information sharing and trust and their criticality for effective…
Abstract
Purpose
The purpose of this paper is to identify and assess the interrelationships between various characteristics of information sharing and trust and their criticality for effective information-centred supply chain collaboration initiatives and, in turn, its criticality to overall firm’s performance.
Design/methodology/approach
A survey of 189 executives from different firms was conducted and the resulting data were analysed to investigate how collaboration enablers affect effective collaboration and to determine its impacts on organisational performance. Structural equation modelling through partial least squares is used to study the relationships between four enablers (trust, information readiness, information accuracy and information security), perceived collaboration success, and two outcomes (sales growth and overall operational performance).
Findings
The empirical results indicate that three collaboration enablers including trust, information readiness and secure sharing of information improve supply chain collaboration. The present study finds that “secure sharing of information” was the most important factor in fostering information sharing-centred collaboration. The present study also demonstrates that effective collaboration positively and significantly influences on firm’s performance.
Practical implications
This study provides researchers and practitioners with a more comprehensive understanding about the information sharing-centred collaboration, its enablers and effects on firms’ performance in a supply chain context. Future research should focus on developing additional constructs that may capture other drivers of effective collaboration.
Originality/value
The present study makes an empirical contribution to the body of knowledge by investigating an integrated framework focussing on the enablers of collaboration through information sharing and its impact on firms’ performance.
Details
Keywords
Maria Andersson Vogel, Marie Sallnäs and Tommy Lundström
The purpose of this paper is twofold: first, to report results from a quasi-experimental study of outcomes of a leaving care project for youth placed in secure unit care and…
Abstract
Purpose
The purpose of this paper is twofold: first, to report results from a quasi-experimental study of outcomes of a leaving care project for youth placed in secure unit care and second, based on the (zero) results, to analyse and discuss the interplay between organisational boundaries, social work and the target group when implementing a project such as the one studied.
Design/methodology/approach
The outcome study had a quasi-experimental design. The young people in the leaving care programme were compared with a matched reference group who did not get the special leaving care services. Data were collected (structured Adolescent Drug Abuse Diagnosis-interviews) when the young people entered secure units and on follow-up (registered crime and re-entry into care).
Findings
The outcome study showed that the leaving care project had no effect on the young people's situation at follow-up regarding re-offending and re-entry into secure unit care. This is understood and discussed in relation to the poor implementation of the leaving care project along with an inbuilt conflict between state and local municipality that overshadowed the good intentions of the project.
Research limitations/implications
The effect study has a quasi-experimental design, and hence differences between the project group and the comparison group at T1 cannot be fully precluded, although nothing is pointing in such a direction. The unclear content of the intervention makes it difficult to decode how the variation in the support given to the young people eventually impacted the results. The zero-results apply to group level, but that may not be valid for each and every one in the project.
Practical implications
According to earlier research, a key person following young persons through different phases of the care trajectory may be of importance. Learning from the CoC project, one can conclude that such a key person should preferably take the role of advocate for the young person, and not be an administrator mainly concerned with coordinating other professionals. Further, when planning and financing is split between organisations, that split hinders efforts to actually mobilise support for young people leaving secure unit care.
Originality/value
Few leaving care services are designed for youth with severe behavioural problems and hence, the research is scarce. This study contributes with important knowledge about leaving care interventions for the target group.
Details
Keywords
Ashish Raniwala, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng and Tzi‐cker Chiueh
This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any…
Abstract
Purpose
This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any prior security association and infrastructure support, to form a secure collaboration workspace, and share files and application content instantly with minimal human intervention.
Design/methodology/approach
The paper looks at the system implementation and experimentation.
Findings
WShare can automatically establish a peer‐to‐peer network among the participating mobile stations, and provides a transparent shared file repository through which the mobile stations can securely exchange files with simple drag‐and‐drop operations. This file sharing application can also be specialized to support the same file beaming service over wireless LAN as that provided by Palm PDAs over infrared links. On the application sharing front, WShare supports a general remote execution mechanism that can synchronize the state of multiple instances of a standard productivity application, such as PowerPoint, Excel, and Word, across different machines. Finally for sharing generic applications, WShare also integrates virtual network computing with reliable wireless broadcast to provide a user‐interface level sharing mechanism. Performance measurement on the fully operational WShare prototype shows that a collaboration workspace among five mobile nodes can be set up within 3.5 seconds.
Originality/value
This paper proposes a new communication paradigm and presents the design, implementation, and evaluation of a fully‐working prototype.
Details
Keywords
This study aims to propose and develop a new digital collaborative supply chain (CSC) model completely based on the emerging Industry 4.0 technologies. The digital model aims to…
Abstract
Purpose
This study aims to propose and develop a new digital collaborative supply chain (CSC) model completely based on the emerging Industry 4.0 technologies. The digital model aims to support the main factors likely to affect CSC. This proposed model combines the most well-known digital tools such as blockchain technology, Internet of Things (IoT) and cloud computing (CC).
Design/methodology/approach
Motivated by its effective solution to enhance trust, traceability, transparency and minimize costs and risks, the combination of the most well-known digital tools such as blockchain technology, IoT and CC to develop a new digital CSC model is addressed in this research. This study first investigates and conducts a deep review analysis that explores how Industry 4.0 technologies can enable collaboration mechanisms. Second, based on an analysis of literature review, the main factors likely to affect CSC have been identified and analysed. Finally, the authors combine digital tools to support the identified factors to enhance transparency, traceability and trust by proposing a new digital CSC model. This proposed model will be used as a referential guide to encourage and motivate SC actors to collaborate in digital CSC.
Findings
This work provides many important contributions to theory and practice. First, role and impacts of the most well-known digital tools such as blockchain technology, IoT and CC for digitizing CSC have separately presented and developed. Second, the authors conceptualized a framework by developing a new digital CSC model. This conceptual digital model can be used as a referential guide for all SC actors in order to motivate them to collaborate in a modern, intelligent, secure and reliable SC. It can also support all factors affecting CSC.
Originality/value
The originality of this study is first investigating separately the roles and impacts of each digital tool on CSC performance. Second, the authors combine the most well-known digital tools such as blockchain technology, IoT and CC in order to develop an efficient, smart, modern and new digital CSC model. In this combination, CC is used as platform as a service enabling to link and connect the blockchain and IoT to support the main factors affecting CSC. Unlike to digital CSC model with only one digital tool, the proposed model is more realistic since depending on the information to be shared with other actors, the most appropriate tool will be automatically detected and used. This solution offers a large choice to SC actors for real time data and information sharing. In addition, the proposed model will largely enhance traceability, transparency and trust in CSC.
Details
Keywords
Zijun Mao and Yuqian Zhu
The study focuses on influential factors of collaboration on government data security by the Chinese government.
Abstract
Purpose
The study focuses on influential factors of collaboration on government data security by the Chinese government.
Design/methodology/approach
The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.
Findings
The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.
Originality/value
The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.
Details