Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 22 May 2024

Elia Rigamonti, Benedetta Colaiacovo, Luca Gastaldi and Mariano Corso

This paper analyzes employees’ perceptions of data collection processes for human resource analytics (HRA). More specifically, we study the effect that information sharing…

Abstract

Purpose

This paper analyzes employees’ perceptions of data collection processes for human resource analytics (HRA). More specifically, we study the effect that information sharing practices have on employees’ attributions (i.e. benevolent vs malevolent) through the perceived legitimacy of data collection and monitoring processes. Moreover, we investigate whether employees’ emotional reaction (i.e. fear of datafication) depends on their perceived legitimacy and attributions.

Design/methodology/approach

The research is based on a sample of 259 employees operating for an Italian consulting firm that developed and implemented HRA processes in the last 3 years. The hypothesized model has been tested using structural equation modeling (SEM) on Stata 14.

Findings

This paper demonstrates the mediating role of perceived legitimacy in the relationship between information sharing practices and employees’ benevolent and malevolent attributions about data collection and monitoring processes for HRA practices. Results also reveal that perceived legitimacy predicts employees’ fear of datafication, with benevolent attributions that partially mediate this relationship.

Practical implications

This research indicates that employees perceive, try to make sense of and emotionally react to HRA processes. Moreover, we reveal the crucial role of information sharing practices and perceived legitimacy in determining employees’ attributions and emotional reactions to data collection and monitoring processes.

Originality/value

Combining human resource (HR) attributions, HR system strength, information processing and signaling theories, this work explores employees’ perception, attributive processes and emotional reactions to data collection processes for HRA practices.

Details

Journal of Organizational Effectiveness: People and Performance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2051-6614

Keywords

Open Access
Article
Publication date: 20 May 2024

Sharneet Singh Jagirdar and Pradeep Kumar Gupta

The present study reviews the literature on the history and evolution of investment strategies in the stock market for the period from 1900 to 2022. Conflicts and relationships…

Abstract

Purpose

The present study reviews the literature on the history and evolution of investment strategies in the stock market for the period from 1900 to 2022. Conflicts and relationships arising from such diverse seminal studies have been identified to address the research gaps.

Design/methodology/approach

The studies for this review were identified and screened from electronic databases to compile a comprehensive list of 200 relevant studies for inclusion in this review and summarized for the cognizance of researchers.

Findings

The study finds a coherence to complex theoretical documentation of more than a century of evolution on investment strategy in stock markets, capturing the characteristics of time with a chronological study of events.

Research limitations/implications

There were complications in locating unpublished studies leading to biases like publication bias, the reluctance of editors to publish studies, which do not reveal statistically significant differences, and English language bias.

Practical implications

Practitioners can refine investment strategies by incorporating behavioral finance insights and recognizing the influence of psychological biases. Strategies span value, growth, contrarian, or momentum indicators. Mitigating overconfidence bias supports effective risk management. Social media sentiment analysis facilitates real-time decision-making. Adapting to evolving market liquidity curbs volatility risks. Identifying biases guides investor education initiatives.

Originality/value

This paper is an original attempt to pictorially depict the seminal works in stock market investment strategies of more than a hundred years.

Details

China Accounting and Finance Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1029-807X

Keywords

Open Access
Article
Publication date: 17 April 2024

Elham Rostami and Fredrik Karlsson

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for…

Abstract

Purpose

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs.

Design/methodology/approach

A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. The authors extracted 890 sentences from these ISPs that included one or more of the analyzed keywords. These sentences were analyzed using the new metric – keyword loss of specificity – to assess to what extent the selected keywords were used for pinpointing and guiding actionable advice. Thus, the authors classified the extracted sentences as either actionable advice or other information, depending on the type of information conveyed.

Findings

The results show a significant keyword loss of specificity in relation to pieces of actionable advice in ISPs provided by Swedish public agencies. About two-thirds of the sentences in which the analyzed keywords were used focused on information other than actionable advice. Such dual use of keywords reduces the possibility of pinpointing and communicating clear, actionable advice.

Research limitations/implications

The suggested metric provides a means to assess the quality of how keywords are used in ISPs for different purposes. The results show that more research is needed on how keywords are used in ISPs.

Practical implications

The authors recommended that ISP designers exercise caution when using keywords in ISPs and maintain coherency in their use of keywords. ISP designers can use the suggested metrics to assess the quality of actionable advice in their ISPs.

Originality/value

The keyword loss of specificity metric adds to the few quantitative metrics available to assess ISP quality. To the best of the authors’ knowledge, applying this metric is a first attempt to measure the quality of actionable advice in ISPs.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 28 March 2024

Elgazzar Iman Mahmoud Khalil

At the beginning of the 21st century, a new class of information workers, the “information have-less” has risen. This class of workers alleviates the influence of information and…

Abstract

Purpose

At the beginning of the 21st century, a new class of information workers, the “information have-less” has risen. This class of workers alleviates the influence of information and communication technologies (ICTs) revolution on poverty and unemployment. The purpose of this study is to investigate the presence of this class of workers in Egypt and assess the size and potential growth of this category of workers.

Design/methodology/approach

The study clarifies the conceptual framework of the new division of labor, in the information age. The Central Agency for Public Mobilization and Statistics, American Chamber of Commerce in Egypt, Ministry of Communications and Information Technology and Information and Decision Support Center websites provided secondary data for this study. These data are used to assess the size of “the information have less” in Egypt.

Findings

The division of work and class, in the 21st century, depends on the level of skills possessed to work with ICTs. So, class and labor nowadays could be divided into self-programmable labor (Innovators). Information have-less labor class, adding value to the economy by learning skills and presenting repetitive work. Generic labor class, who cannot work with ICTs, and work in jobs, that do not need computers or other ICTs. The study has shown that the “information have-less” labor class is present in Egypt since the beginning of the 21st century, in all its categories; entrepreneurism, the service sector and the manufacturing sector. There are approximately 50% of this labor class in the service sector and only 13% of the information have-less works in manufacturing sector despite the great opportunities that Egypt has to expand manufacturing to absorb more employment. The inclusion of information technology (IT), in all domains, has not decreased employment in Western countries but has reallocated information have-less employment toward the service sector, and there would probably be the same effect in Egypt.

Practical implications

The study highlights the need for Egyptian policymakers to encourage the manufacturing and service sectors to provide huge working opportunities. The Egyptian government has to change the educational policies, at all stages, to include digital learning skills so IT can be incorporated in a wide range of economic activities. Further research includes: conducting a survey to measure the contribution of the entrepreneurial part of the information have-less employment in Egypt. In addition, a model may be developed, by the researcher to examine the reallocation of employees in Egypt.

Originality/value

Studying employment, in Egypt, using the conceptual framework of the information age is rarely being done.

Details

Review of Economics and Political Science, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 19 February 2024

Mamekwa Katlego Kekana, Marius Pretorius and Nicole Varela Aguiar De Abreu

Business rescue, as a mechanism to aid financially distressed companies in South Africa, has received considerable academic and practical recognition. However, the business rescue…

Abstract

Purpose

Business rescue, as a mechanism to aid financially distressed companies in South Africa, has received considerable academic and practical recognition. However, the business rescue plan is an overlooked and, perhaps, underdeveloped aspect of the regime. For stakeholders, this is the ultimate decision-making document. Creditors are the most influential stakeholders in business rescue proceedings owing to their voting rights. For creditors to make informed decisions and exercise their votes meaningfully, the business rescue plan should be transparent and adequately disclose relevant and reliable information. This study aims to identify creditors’ primary information needs to enhance the sufficiency and decision-usefulness of business rescue plans, not only to entice the vote of creditors but to enforce accountability from practitioners.

Design/methodology/approach

Using a qualitative research design, semi-structured interviews were conducted with 14 executives from 10 South African financial institutions.

Findings

The findings reveal that comprehensive disclosure of financial, commercial and legal information in business rescue plans was a critical antecedent for stakeholder decision-making. Additionally, leadership and social impact information were influential determinants. This study advances academic knowledge and, for practitioners, adds value to the development of business rescue plans. This can enhance creditors' confidence in supporting the rescue effort and approving the plan.

Practical implications

This study advances academic knowledge and, for practitioners, adds value to the development of business rescue plans. This can enhance creditors' confidence in supporting the rescue effort and approving the plan.

Originality/value

The originality of this article lies in its investigation of how creditors assess the information in BR plans as a precursor to supporting the company’s reorganisation in a creditor-friendly business rescue system such as South Africa. This study provides novel insights into the decision-making process, particularly how creditors assess BR plans, address information asymmetry and vote on the plan.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Open Access
Article
Publication date: 15 February 2024

Makutla Gibson Mojapelo

The purpose of this study was to investigate a framework for the implementation of freedom of information (FOI) legislation in South Africa, against Article 19’s nine principles…

Abstract

Purpose

The purpose of this study was to investigate a framework for the implementation of freedom of information (FOI) legislation in South Africa, against Article 19’s nine principles of FOI legislation.

Design/methodology/approach

This qualitative study used semi-structured interviews to collect data from six experts selected by means of the snowball sampling technique and content analysis. The study used a modified Delphi design consisting of two rounds of interviews.

Findings

The results showed that little effort is made by government officials to demonstrate commitment to the implementation of FOI legislation.

Practical implications

The passing of FOI is expected to reduce corruption, increase public participation, reduce the level of secrecy and increase transparency and openness. This is not the case as the implementation of this socioeconomic right in South Africa is faced by numerous challenges, such as a lack of political will, secrecy laws providing for the opposite of what the FOI legislation seeks to achieve, poor legislative interpretation and a lack of clear policies. The study proposes a framework aimed at addressing these challenges.

Originality/value

The study provides a framework for the implementation of FOI legislation. The framework was developed under the guidance of Article 19 principles of freedom of information legislation.

Details

Information Discovery and Delivery, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-6247

Keywords

Open Access
Article
Publication date: 6 February 2024

Matthew Quayson, Eric Kofi Avornu and Albert Kweku Bediako

Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is…

Abstract

Purpose

Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is no decision framework to support blockchain implementation for managing information, especially in emerging economies’ healthcare supply chains. This paper develops a hierarchical decision model for implementing blockchain technology for information management in emerging economies’ healthcare supply chains.

Design/methodology/approach

This study uses 20 health supply chain experts in Ghana to rank 17 decision criteria for implementing blockchain for healthcare information management using the best-worst method (BWM) multi-criteria decision technique.

Findings

The results show that “security” and “privacy,” “infrastructural facility” and “presence of training facilities” are the top three critical factors impacting blockchain adoption in the health supply chain for healthcare information management. Other sub-factors are prioritized.

Practical implications

To implement blockchain effectively to enhance information management in the healthcare supply chain, health institutions, blockchain technology providers and state authorities should concentrate on the highly critical factors extracted from the study.

Originality/value

This is the first study that develops a hierarchical decision model for implementing blockchain technology in emerging economies' health supply chains.

Details

Modern Supply Chain Research and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2631-3871

Keywords

Open Access
Article
Publication date: 23 May 2024

Hui Ma, Shenglan Chen, Xiaoling Liu and Pengcheng Wang

To enrich the research on the economic consequences of enterprise digital development from the perspective of capacity utilization.

Abstract

Purpose

To enrich the research on the economic consequences of enterprise digital development from the perspective of capacity utilization.

Design/methodology/approach

Using a sample of listed firms from 2010 to 2020, this paper exploits text analysis of annual reports to construct a proxy for enterprise digital development.

Findings

Results show that enterprise digital development not only improves their own capacity utilization but also generates a positive spillover effect on the capacity utilization of peer firms and firms in the supply chain. Next, based on the incomplete information about market demand and potential competitors when making capacity-building decisions, the mechanism tests show that improving the accuracy of market forecasts and reducing investment surges are potential channels behind the baseline results. Cross-sectional tests show the baseline result is more pronounced when industries are highly homogeneous and when firms have access to less information.

Originality/value

This paper contributes to the research related to the economic consequences of digital development. With the development of the digital economy, the real effects of enterprise digital development have also triggered extensive interest and exploration. Existing studies mainly examine the impact on physical operations, such as specialization division of labor, innovation activities, business performance or total factor productivity (Huang, Yu, & Zhang, 2019; Yuan, Xiao, Geng, & Sheng, 2021; Wang, Kuang, & Shao, 2017; Li, Liu, & Shao, 2021; Zhao, Wang, & Li, 2021). These studies measure the economic benefits from the perspective of the supply (output) side but neglect the importance of the supply system to adapt to the actual market demand. In contrast, this paper focuses on capacity utilization, aimed at estimating the net economic effect of digital development by considering the supply-demand fit scenario. Thus, our findings enrich the relevant studies on the potential consequences of digital development.

Details

China Accounting and Finance Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1029-807X

Keywords

Open Access
Article
Publication date: 25 December 2023

Vicki Catherine Waye, Collette Snowden, Jane Knowler, Paula Zito, Jack Burton and Joe McIntyre

The purpose of this paper is to examine whether mandatory disclosure of information accompanying the sale of real estate achieves its aim of informed purchasers.

Abstract

Purpose

The purpose of this paper is to examine whether mandatory disclosure of information accompanying the sale of real estate achieves its aim of informed purchasers.

Design/methodology/approach

Using a case study approach focused on mandatory disclosure in South Australia data was collected from interviews and focus groups with key personnel in the property industry involved in the production of information required to fulfil vendors’ disclosure obligations.

Findings

The authors found that purchasers are ill-served by a long and complex form of mandatory disclosure with a short time frame that prevents the use of the information provided. Without good form design and increased digital affordances provided by the cadastral and conveyancing systems, mandatory disclosure is insufficient to ensure minimisation of information asymmetry between vendor and purchaser.

Originality/value

To the best of the authors’ knowledge, this is the first Australian qualitative study that examines the utility of mandatory vendor disclosure in real estate sales and the first to consider the impact of the digitalisation of cadastral and conveyancing systems upon the efficacy of mandatory disclosure regimes.

Details

Journal of Property, Planning and Environmental Law, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9407

Keywords

Open Access
Article
Publication date: 6 October 2023

Reijo Savolainen

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Abstract

Purpose

To elaborate the picture of credibility assessment by examining how participants of online discussion evaluate the informational credibility of conspiracy theories.

Design/methodology/approach

Descriptive quantitative analysis and qualitative content analysis of 2,663 posts submitted to seven Reddit threads discussing a conspiracy operation, that is, the damage of the Nord Stream gas pipelines in September 2022. It was examined how the participants of online discussion assess the credibility of information constitutive of conspiracy theories speculating about (1) suspected actors responsible for the damage, (2) their motives and (3) the ways in which the damage was made. The credibility assessments focussed on diverse sources offering information about the above three factors.

Findings

The participants assessed the credibility of information by drawing on four main criteria: plausibility of arguments, honesty in argumentation, similarity to one's beliefs and provision of evidence. Most assessments were negative and indicated doubt about the informational believability of conspiracy theories about the damage. Of the information sources referred to in the discussion, the posts submitted by fellow participants, television programmes and statements provided by governmental organizations were judged most critically, due to implausible argumentation and advocacy of biased views.

Research limitations/implications

As the study focuses on a sample of posts dealing with conspiracy theories about a particular event, the findings cannot be generalized to concern the informational credibility conspiracy narratives.

Originality/value

The study pioneers by providing an in-depth analysis of the nature of credibility assessments by focussing on information constitutive of conspiracy theories.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Access

Only content I have access to

Year

Content type

Earlycite article (1254)
1 – 10 of over 1000