Search results

1 – 10 of over 23000
Article
Publication date: 1 June 2010

Joongsan Oh and Seung‐Kyu Rhee

This study aims to investigate relationships among supplier capabilities, collaboration in new car development, and the competitive advantage of carmakers based on the…

3072

Abstract

Purpose

This study aims to investigate relationships among supplier capabilities, collaboration in new car development, and the competitive advantage of carmakers based on the resource‐based view (RBV).

Design/methodology/approach

A survey of first‐tier suppliers in the Korean automotive parts industry was conducted, and pertinent hypotheses were tested by using the ordinary least squares (OLS) method and hierarchical multiple regression analysis (HMRA).

Findings

It was found that suppliers' flexibility, engineering and modularization capabilities positively influence collaboration in new car development, which in turn positively affects the competitive advantage of carmakers. This result empirically verifies the RBV proposition that one motive for interfirm collaboration can be the opportunity to gain access to other firms' resources/capabilities. The theory of the RBV was further extended by demonstrating that suppliers' quality improvement and modularization capabilities directly contribute to the competitive advantage of carmakers and that the influence of quality improvement and modularization capabilities on this competitive advantage are robust against technological uncertainty. However, the positive effect of collaboration in new car development on the competitive advantage of carmakers is decreased by the moderating effect of technological uncertainty.

Research limitations/implications

The findings of this study were obtained from a limited population of the Korean automotive industry. This study not only empirically verified the proposition of the RBV but also extended the RBV theory by empirically demonstrating direct relationships between suppliers' capabilities and carmakers' competitive advantages.

Practical implications

Suppliers must enhance flexibility, modularization and engineering capabilities in order to vitalize collaboration with carmakers in new car development. As technological uncertainty increases, carmakers should address in‐house the problems caused by technological uncertainty or delegate related jobs only to suppliers with significant capabilities for quality improvement and modularization.

Originality/value

This is one of the few studies to identify the moderating effect of technological uncertainty on interfirm collaboration.

Details

Management Decision, vol. 48 no. 5
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 1 July 2006

Ebrahim Randeree

Increased focus on knowledge within firms has not addressed the security implication. This paper aims to examine the implications of knowledge management for security.

15423

Abstract

Purpose

Increased focus on knowledge within firms has not addressed the security implication. This paper aims to examine the implications of knowledge management for security.

Design/methodology/approach

This approach highlights the competitive advantage of knowledge with an emphasis on security. This paper reviews security for data and information and explores the dimensions of secure knowledge systems. The emphasis is on knowledge security and the development of future knowledge management systems.

Findings

This paper finds that there exists a general lack of focus on security in the knowledge management framework – both in a research setting and in practical applications. Knowledge is different from information and data and needs special consideration in firms.

Research implications/limitations

Designers of knowledge management systems can implement levels of security for different types of knowledge that reside within the organization. The concept of “secure knowledge management” has provided nascent models to address the management and protection of knowledge resources. Information systems researchers that are investigating knowledge have to include the protection and security of knowledge.

Originality/value

Knowledge management has moved to the forefront of both the research and corporate agendas. Harnessing the information and knowledge contained within firm data warehouses is one method to achieve competitive advantage. Various types of knowledge require different solutions. Designers of knowledge management systems can implement levels of security for different types of knowledge that reside within the organization. Future developments need to address securing the knowledge of a corporation, its most valuable asset.

Details

Journal of Knowledge Management, vol. 10 no. 4
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 26 March 2021

Adnan Alghail, Mohammed Abbas and Liu Yao

Knowledge protection (KP) is one of the main knowledge management (KM) processes that aim to protect the organization’s knowledge from any inside and outside force leakage. In…

Abstract

Purpose

Knowledge protection (KP) is one of the main knowledge management (KM) processes that aim to protect the organization’s knowledge from any inside and outside force leakage. In higher education institutions (HEIs), KP is rarely being discussed and covered in contrast to knowledge sharing (KS) in terms of its determinants. The purpose of this paper is to provide a deep analysis of previous research articles from 1980 to 2019 and examine the associated institutional factors on KP determinants within HEIs as a research objective.

Design/methodology/approach

The preferred reporting items for systematic reviews and meta-analysis was a well-established approach for analyzing the systematic literature review methodology. Several articles were published over the past decades collected from 5 different databases, but after the screening, 101 articles were reviewed and only 22 articles were relevant to the research objective.

Findings

The findings indicated that KP is under academic research topic in KM and has received minimal attention in HEIs compared to KS, which has been frequently studied in HEIs. The literature categorized KP determinants into four areas: technological, organizational structure, behavioral and ethics and organizational culture. It will open the door for academics to investigate further into the factors, theories and models of KP in general and HEIs from a particular perspective.

Practical implications

As evident from the paper finds, with few pieces of literature covered in this topic, HEIs have to protect the knowledge from any illegal usage or any expert’s knowledge loss after leaving the institutions. This study can help university leaders to understand how the different KP determinants can maximize KP without affecting the KS and develop the KP phenomenon for a strategic fit to enhance their institutions’ safe knowledge usage.

Originality/value

This is the first research of its type which has extensively examined the literature on KP related to HEIs. Also, this paper provides theoretical and practical insights through understanding the determinants that affect KP practices among academic staff.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 53 no. 3
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 1 June 2004

Maria Luisa Calanag, Koichi Tabata and Shigeo Sugimoto

The long‐term preservation of digital resources is one of the most important issues facing the library community. In particular, libraries need a preservation strategy for digital…

2238

Abstract

The long‐term preservation of digital resources is one of the most important issues facing the library community. In particular, libraries need a preservation strategy for digital objects, since digitization alone provides access but not preservation. The digital library community is also focusing on the problem of designing and implementing long‐term archives or repositories. Digital repository management includes the development and enforcement of policies for tasks such as managing access to collection contents and preserving items in the collection. Comprehensive standards and best practices are currently starting to emerge, and ongoing work has deepened the understanding of the needs and requirements that must be met to carry out effective digital preservation. One of these requirements is the creation and maintenance of metadata in support of the preservation process. This paper would like to share findings from earlier and ongoing work that serve as “groundwork” for the current directions leading to the idea of making metadata a more useful and powerful tool to contribute to the technical solution of digital preservation.

Details

Collection Building, vol. 23 no. 2
Type: Research Article
ISSN: 0160-4953

Keywords

Open Access
Article
Publication date: 15 August 2023

Taofeek Tunde Okanlawon, Luqman Oyekunle Oyewobi and Richard Ajayi Jimoh

The purpose of this study is to assess the barriers to the implementation of blockchain technology in construction supply chain management in Nigeria.

1367

Abstract

Purpose

The purpose of this study is to assess the barriers to the implementation of blockchain technology in construction supply chain management in Nigeria.

Design/methodology/approach

This study employed a quantitative research approach through a questionnaire survey that was conducted among professionals in the Nigerian construction industry using the snowball sampling method, which resulted in a selection of 155 respondents. The collected data were analysed using descriptive and exploratory factor analysis (EFA), while Cronbach's alpha was used to assess the reliability.

Findings

The analysis revealed that all barriers ranked above the average mean item score. It also revealed that all professionals have a convergent opinion on the barriers. EFA was used in clustering the identified barriers into two categories: technological and socio-political barrier.

Research limitations/implications

This research was carried out in the Southwestern region which is one of the six geo-political zones in Nigeria using a cross-sectional survey method.

Practical implications

The findings provide valuable insights into the barriers to the implementation of blockchain in supply chain management for professionals and practitioners in the Nigerian construction industry.

Originality/value

The research categorised the barriers into technological and social-political barrier and identified that lack of digitalisation is the major barrier to the implementation of blockchain technology in construction supply chain.

Details

Frontiers in Engineering and Built Environment, vol. 4 no. 1
Type: Research Article
ISSN: 2634-2499

Keywords

Article
Publication date: 9 April 2018

Farhad Panahifar, P.J. Byrne, Mohammad Asif Salam and Cathal Heavey

The purpose of this paper is to identify and assess the interrelationships between various characteristics of information sharing and trust and their criticality for effective…

4139

Abstract

Purpose

The purpose of this paper is to identify and assess the interrelationships between various characteristics of information sharing and trust and their criticality for effective information-centred supply chain collaboration initiatives and, in turn, its criticality to overall firm’s performance.

Design/methodology/approach

A survey of 189 executives from different firms was conducted and the resulting data were analysed to investigate how collaboration enablers affect effective collaboration and to determine its impacts on organisational performance. Structural equation modelling through partial least squares is used to study the relationships between four enablers (trust, information readiness, information accuracy and information security), perceived collaboration success, and two outcomes (sales growth and overall operational performance).

Findings

The empirical results indicate that three collaboration enablers including trust, information readiness and secure sharing of information improve supply chain collaboration. The present study finds that “secure sharing of information” was the most important factor in fostering information sharing-centred collaboration. The present study also demonstrates that effective collaboration positively and significantly influences on firm’s performance.

Practical implications

This study provides researchers and practitioners with a more comprehensive understanding about the information sharing-centred collaboration, its enablers and effects on firms’ performance in a supply chain context. Future research should focus on developing additional constructs that may capture other drivers of effective collaboration.

Originality/value

The present study makes an empirical contribution to the body of knowledge by investigating an integrated framework focussing on the enablers of collaboration through information sharing and its impact on firms’ performance.

Details

Journal of Enterprise Information Management, vol. 31 no. 3
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 9 September 2014

Maria Andersson Vogel, Marie Sallnäs and Tommy Lundström

The purpose of this paper is twofold: first, to report results from a quasi-experimental study of outcomes of a leaving care project for youth placed in secure unit care and…

Abstract

Purpose

The purpose of this paper is twofold: first, to report results from a quasi-experimental study of outcomes of a leaving care project for youth placed in secure unit care and second, based on the (zero) results, to analyse and discuss the interplay between organisational boundaries, social work and the target group when implementing a project such as the one studied.

Design/methodology/approach

The outcome study had a quasi-experimental design. The young people in the leaving care programme were compared with a matched reference group who did not get the special leaving care services. Data were collected (structured Adolescent Drug Abuse Diagnosis-interviews) when the young people entered secure units and on follow-up (registered crime and re-entry into care).

Findings

The outcome study showed that the leaving care project had no effect on the young people's situation at follow-up regarding re-offending and re-entry into secure unit care. This is understood and discussed in relation to the poor implementation of the leaving care project along with an inbuilt conflict between state and local municipality that overshadowed the good intentions of the project.

Research limitations/implications

The effect study has a quasi-experimental design, and hence differences between the project group and the comparison group at T1 cannot be fully precluded, although nothing is pointing in such a direction. The unclear content of the intervention makes it difficult to decode how the variation in the support given to the young people eventually impacted the results. The zero-results apply to group level, but that may not be valid for each and every one in the project.

Practical implications

According to earlier research, a key person following young persons through different phases of the care trajectory may be of importance. Learning from the CoC project, one can conclude that such a key person should preferably take the role of advocate for the young person, and not be an administrator mainly concerned with coordinating other professionals. Further, when planning and financing is split between organisations, that split hinders efforts to actually mobilise support for young people leaving secure unit care.

Originality/value

Few leaving care services are designed for youth with severe behavioural problems and hence, the research is scarce. This study contributes with important knowledge about leaving care interventions for the target group.

Details

Journal of Children's Services, vol. 9 no. 3
Type: Research Article
ISSN: 1746-6660

Keywords

Article
Publication date: 20 November 2009

Ashish Raniwala, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng and Tzi‐cker Chiueh

This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any…

Abstract

Purpose

This paper aims to describe the design, implementation, and evaluation of a novel file and application sharing system that enables a group of mobile stations that do not have any prior security association and infrastructure support, to form a secure collaboration workspace, and share files and application content instantly with minimal human intervention.

Design/methodology/approach

The paper looks at the system implementation and experimentation.

Findings

WShare can automatically establish a peer‐to‐peer network among the participating mobile stations, and provides a transparent shared file repository through which the mobile stations can securely exchange files with simple drag‐and‐drop operations. This file sharing application can also be specialized to support the same file beaming service over wireless LAN as that provided by Palm PDAs over infrared links. On the application sharing front, WShare supports a general remote execution mechanism that can synchronize the state of multiple instances of a standard productivity application, such as PowerPoint, Excel, and Word, across different machines. Finally for sharing generic applications, WShare also integrates virtual network computing with reliable wireless broadcast to provide a user‐interface level sharing mechanism. Performance measurement on the fully operational WShare prototype shows that a collaboration workspace among five mobile nodes can be set up within 3.5 seconds.

Originality/value

This paper proposes a new communication paradigm and presents the design, implementation, and evaluation of a fully‐working prototype.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 24 July 2023

Mustapha Hrouga

This study aims to propose and develop a new digital collaborative supply chain (CSC) model completely based on the emerging Industry 4.0 technologies. The digital model aims to…

Abstract

Purpose

This study aims to propose and develop a new digital collaborative supply chain (CSC) model completely based on the emerging Industry 4.0 technologies. The digital model aims to support the main factors likely to affect CSC. This proposed model combines the most well-known digital tools such as blockchain technology, Internet of Things (IoT) and cloud computing (CC).

Design/methodology/approach

Motivated by its effective solution to enhance trust, traceability, transparency and minimize costs and risks, the combination of the most well-known digital tools such as blockchain technology, IoT and CC to develop a new digital CSC model is addressed in this research. This study first investigates and conducts a deep review analysis that explores how Industry 4.0 technologies can enable collaboration mechanisms. Second, based on an analysis of literature review, the main factors likely to affect CSC have been identified and analysed. Finally, the authors combine digital tools to support the identified factors to enhance transparency, traceability and trust by proposing a new digital CSC model. This proposed model will be used as a referential guide to encourage and motivate SC actors to collaborate in digital CSC.

Findings

This work provides many important contributions to theory and practice. First, role and impacts of the most well-known digital tools such as blockchain technology, IoT and CC for digitizing CSC have separately presented and developed. Second, the authors conceptualized a framework by developing a new digital CSC model. This conceptual digital model can be used as a referential guide for all SC actors in order to motivate them to collaborate in a modern, intelligent, secure and reliable SC. It can also support all factors affecting CSC.

Originality/value

The originality of this study is first investigating separately the roles and impacts of each digital tool on CSC performance. Second, the authors combine the most well-known digital tools such as blockchain technology, IoT and CC in order to develop an efficient, smart, modern and new digital CSC model. In this combination, CC is used as platform as a service enabling to link and connect the blockchain and IoT to support the main factors affecting CSC. Unlike to digital CSC model with only one digital tool, the proposed model is more realistic since depending on the information to be shared with other actors, the most appropriate tool will be automatically detected and used. This solution offers a large choice to SC actors for real time data and information sharing. In addition, the proposed model will largely enhance traceability, transparency and trust in CSC.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 2
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 12 April 2023

Zijun Mao and Yuqian Zhu

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Abstract

Purpose

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Design/methodology/approach

The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.

Findings

The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.

Originality/value

The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

1 – 10 of over 23000