Search results

1 – 10 of over 11000
Open Access
Article
Publication date: 16 August 2019

Xueyan Yang, Changxi Ma, Changfeng Zhu, Bo Qi, Fuquan Pan and Chengming Zhu

For the purpose of reducing the incidence of hazardous materials transport accident, eliminating the potential threats and ensuring their safety, aiming at the shortcomings in the…

2751

Abstract

Purpose

For the purpose of reducing the incidence of hazardous materials transport accident, eliminating the potential threats and ensuring their safety, aiming at the shortcomings in the process of current hazardous materials transportation management, this paper aims to construct the framework of hazardous materials transportation safety management system under the vehicle-infrastructure connected environment.

Design/methodology/approach

The system takes the intelligent connected vehicle as the main supporter, integrating GIS, GPS, eye location, GSM, networks and database technology.

Findings

By analyzing the transportation characteristics of hazardous materials, this system consists of five subsystems, which are vehicle and driver management subsystem, dangerous sources and hazardous materials management subsystem, route analysis and optimization subsystem, early warning and emergency rescue management subsystem, and basic information query subsystem.

Originality/value

Hazardous materials transportation safety management system includes omnibearing real-time monitoring, timely updating of system database, real-time generation and optimization of emergency rescue route. The system can reduce the transportation cost and improve the ability of accident prevention and emergency rescue of hazardous materials.

Details

Journal of Intelligent and Connected Vehicles, vol. 2 no. 1
Type: Research Article
ISSN: 2399-9802

Keywords

Open Access
Article
Publication date: 8 January 2020

Elham Rostami, Fredrik Karlsson and Ella Kolkowska

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…

1427

Abstract

Purpose

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about.

Design/methodology/approach

The results are based on a literature review of ISP management research published between 1990 and 2017.

Findings

Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.

Research limitations/implications

Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.

Practical implications

The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.

Originality/value

Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 31 December 2011

Ji-Young Park, Jung Ung Min and Jeong Soo Park

Though logistics security only took care of trading phase in the past, many countries in the world have begun to introduce logistics security system as its coverage has been…

Abstract

Though logistics security only took care of trading phase in the past, many countries in the world have begun to introduce logistics security system as its coverage has been extended from production stage to delivery at the final destination. Logistics security system has become indispensable element for global corporations involved in international trading and studies on logistics security keep going on. Most of the studies, however, are focused on discussion of system, cost and influence of logistics security and few of them have been specifically dealing with substantial effectiveness thereof. This study developed the models of supply chain security activities and their outcome by means of using Balanced Scorecard (BCS) which is a well known performance indicator to identify relationship between supply chain security activities and their accomplishment. In this study we have presented 8 supply chain frameworks, human resources management, information system management, facilities/freight management, security process, crisis management capability, relationship with partners, sharing of logistics information and logistics security accomplishment, with reference to standards of C-TPAT and AEO based on WCO framework, 10 supply chain security capabilities. This study further indicates that relationship with partners has more effect on logistics security accomplishment than sharing of logistic information. Just as relationship between corporations in chain of supply and sharing of information among them are important elements in management of supply chain, relationship with partners and sharing of logistic information will have positive effect on supply chain security accomplishment and raise its effectiveness.

Details

Journal of International Logistics and Trade, vol. 9 no. 2
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Article
Publication date: 31 March 2020

Veera Pandiyan Kaliani Sundram, Prem Chhetri and Atika Shamsul Bahrin

This paper presents the concerns in manufacturing supply chain. Further this study investigates the role of information technology (IT) and information sharing (IS) in…

1929

Abstract

This paper presents the concerns in manufacturing supply chain. Further this study investigates the role of information technology (IT) and information sharing (IS) in manufacturing supply chain and determines its impact towards supply chain integration (SCI), supply chain performance (SCP), and manufacturing firm performance (FP) in Malaysia. The theoretical framework was proposed for the study on the basis of existing literature. The study administered a survey questionnaire to collect data from manufacturing firms in Malaysia with 112 respondents. A multiple regression analysis is conducted to establish the relationship between IT, IS, SCI, and FP. The study finds that IT and sharing has significant positive effect towards and performance. Firms that use IT and practice IS across partners in the supply chain are more likely to integrate their internal and external value chain for better performance both within and across the manufacturing firms in the supply chain. This study can be of interest to the manufacturing industry as well as other industry practitioners interested in improving the performance of the organization and supply chain in total. For supply chain practitioners, this results indicate that the firms should adopt IT and IS practices to strategically improve SCI. This in turn will also improve the supply chain network and firm’s performance. This study employs a newly developed framework which depicts the causal relationship between IT, IS, SCI, Supply Chain Performance, and FP in Malaysia. Furthermore, it closes a gap in existing literature by examining the effect IT and communication (ICT) practices toward manufacturing firms’ performance and SCP in a single setting. In addition, the current study attempted to construct a model which would estimate and interpret SCP and FP simultaneously, and to evaluate this model in an empirical fashion.

Details

Journal of International Logistics and Trade, vol. 18 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Article
Publication date: 6 February 2024

Matthew Quayson, Eric Kofi Avornu and Albert Kweku Bediako

Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is…

Abstract

Purpose

Blockchain technology enhances information management in healthcare supply chains by securing healthcare information and providing medical resource traceability. However, there is no decision framework to support blockchain implementation for managing information, especially in emerging economies’ healthcare supply chains. This paper develops a hierarchical decision model for implementing blockchain technology for information management in emerging economies’ healthcare supply chains.

Design/methodology/approach

This study uses 20 health supply chain experts in Ghana to rank 17 decision criteria for implementing blockchain for healthcare information management using the best-worst method (BWM) multi-criteria decision technique.

Findings

The results show that “security” and “privacy,” “infrastructural facility” and “presence of training facilities” are the top three critical factors impacting blockchain adoption in the health supply chain for healthcare information management. Other sub-factors are prioritized.

Practical implications

To implement blockchain effectively to enhance information management in the healthcare supply chain, health institutions, blockchain technology providers and state authorities should concentrate on the highly critical factors extracted from the study.

Originality/value

This is the first study that develops a hierarchical decision model for implementing blockchain technology in emerging economies' health supply chains.

Details

Modern Supply Chain Research and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2631-3871

Keywords

Open Access
Article
Publication date: 27 July 2023

Andrea Kő, Gábor Tarján and Ariel Mitev

This paper aims to provide a maturity model for information security awareness (MMISA), based on the literature, expert interviews and feedback. In addition to developing the…

813

Abstract

Purpose

This paper aims to provide a maturity model for information security awareness (MMISA), based on the literature, expert interviews and feedback. In addition to developing the MMISA, the authors investigate the role of the three decisive factors that affect ISA maturity level: risk management mechanism, organizational structure and ISA.

Design/methodology/approach

The research methodology is a combined one; qualitative and quantitative methods were applied, including surveying the literature, interviews and developing a survey to collect quantitative data about decisive factors that affect ISA maturity level. The authors perform a variance-based partial least squares-structural equation modeling (PLS-SEM) investigation of the relationships between these factors.

Findings

The investigation of decisive factors of ISA maturity levels revealed that if the authors identify a strong risk assessment mechanism (through a documented methodology and reliable results), the authors can expect a high level of ISA. If there is a well-defined organizational structure with clear responsibilities, this supports the linking of a risk management mechanism with the level of ISA. The connection between organizational structure and ISA maturity level is supported by ISA activities: an increased level of awareness actions strengthens an organizational structure via the best practices learned by the staff.

Originality/value

The main contribution of the proposed MMISA model is that the model offers controls and audit evidence for maturity levels. Beyond that, the authors distinguish in the MMISA model controls supporting knowledge and controls supporting attitude, emphasizing that this is not enough to know what to do, but the proper attitude is required too. The authors didn't find any other ISA maturity model which has a similar feature. The contribution of the authors' work is that the authors provide a method for solving this complex measurement problem via the MMISA, which also offers direct guidance for the daily practices of organizations.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 17 May 2021

Alessandro Creazza, Claudia Colicchia, Salvatore Spiezia and Fabrizio Dallari

The purpose of this paper is to explore the perceptions of supply chain managers regarding the elements that make up cyber supply chain risk management (CSCRM) and the related…

11197

Abstract

Purpose

The purpose of this paper is to explore the perceptions of supply chain managers regarding the elements that make up cyber supply chain risk management (CSCRM) and the related level of alignment, to understand how organizations can deploy a CSCRM strategy that goes beyond the technical, internal functioning of single companies and moves beyond the dyad, to create a better alignment that can ultimately lead to improved cyber supply chain resilience.

Design/methodology/approach

An exploratory survey in the fast-moving consumer goods (FMCG) industry involving over 100 organizations in Italy was conducted. Results were analysed through one-way analysis of variance, to appraise the differences in the perceptions of the various actors of the FMCG supply chain (Manufacturers, Logistics Service Providers, Retailers).

Findings

While a certain degree of alignment of the perceptions across the FMCG supply chain exists, the study found that Logistics Service Providers can play a crucial role as orchestrators of the CSCRM process towards a more “supply chain-oriented” response to cyber threats and risk events. The research also highlights the necessity to see people as key elements for improving cyber resilience in the supply chain.

Research limitations/implications

Through a vertical analysis of a supply chain, the study extends the existing theory on CSCRM, which contains isolated case studies. It also contributes to extending the current theory with the proposal of the paradigm of Logistics Service Providers as orchestrators of the CSCRM process. The study combines different classifications of CSCRM initiatives and embraces theories external to the supply chain literature.

Practical implications

Through the empirical analysis, this study helps practitioners in streamlining the design of cyber security strategies and actions that span across the supply chain for better alignment. This could mean more coordination of efforts and more targeted/accurate investments in CSCRM initiatives. The study invites practitioners to ponder the perceived relevance of the human factor as a source of risk and the perceived importance of countermeasures aimed at mitigating risk events stemming from that source.

Originality/value

By focusing on an entire supply chain, this is one of the first studies on CSCRM that goes beyond the dyad. Its originality also lies in its use of the investigations of perceptions along the supply chain as pillars for the alignment of CSCRM strategies and mitigation initiatives. This original perspective allows for discovering the role of Logistics Service Providers in driving the alignment of the efforts towards better outcomes of the CSCRM process.

Details

Supply Chain Management: An International Journal, vol. 27 no. 1
Type: Research Article
ISSN: 1359-8546

Keywords

Open Access
Article
Publication date: 10 August 2021

Tom A.E. Aben, Wendy van der Valk, Jens K. Roehrich and Kostas Selviaridis

Inter-organisational governance is an important enabler for information processing, particularly in relationships undergoing digital transformation (DT) where partners depend on…

7970

Abstract

Purpose

Inter-organisational governance is an important enabler for information processing, particularly in relationships undergoing digital transformation (DT) where partners depend on each other for information in decision-making. Based on information processing theory (IPT), the authors theoretically and empirically investigate how governance mechanisms address information asymmetry (uncertainty and equivocality) arising in capturing, sharing and interpreting information generated by digital technologies.

Design/methodology/approach

IPT is applied to four cases of public–private relationships in the Dutch infrastructure sector that aim to enhance the quantity and quality of information-based decision-making by implementing digital technologies. The investigated relationships are characterised by differing degrees and types of information uncertainty and equivocality. The authors build on rich data sets including archival data, observations, contract documents and interviews.

Findings

Addressing information uncertainty requires invoking contractual control and coordination. Contract clauses should be precise and incentive schemes functional in terms of information requirements. Information equivocality is best addressed by using relational governance. Identifying information requirements and reducing information uncertainty are a prerequisite for the transformation activities that organisations perform to reduce information equivocality.

Practical implications

The study offers insights into the roles of both governance mechanisms in managing information asymmetry in public–private relationships. The study uncovers key activities for gathering, sharing and transforming information when using digital technologies.

Originality/value

This study draws on IPT to study public–private relationships undergoing DT. The study links contractual control and coordination as well as relational governance mechanisms to information-processing activities that organisations deploy to reduce information uncertainty and equivocality.

Details

International Journal of Operations & Production Management, vol. 41 no. 7
Type: Research Article
ISSN: 0144-3577

Keywords

Open Access
Book part
Publication date: 29 November 2023

Maryke Hunter-Hüsselmann, Dalene Pieterse and Changu Batisani

This chapter discusses the growing importance of research-related information in the face of increased complexities and competitiveness within higher education environments…

Abstract

This chapter discusses the growing importance of research-related information in the face of increased complexities and competitiveness within higher education environments globally. It provides some reflections on the importance of institutional research cultures to effectively address these challenges, focussing on the African context, and the role of effective research support through institutional structures such as a dedicated research office. The increasingly strategic role of research management has led to the need for a more active and visionary role in the positioning of institutions by supporting decision-making and contributing to the development and visibility of institutional research portfolios. The authors provide their insights into the scope of research-related information, the need for research offices to perform this strategic function, how these information sets can be applied in reports, evidence-based decisions, institutional showcasing, and enhanced research support. The chapter includes aspects to consider when establishing a research-related information management function within institutions.

Open Access
Article
Publication date: 7 June 2023

Alicia Martín-Navarro, María Paula Lechuga Sancho and Jose Aurelio Medina-Garrido

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users…

1312

Abstract

Purpose

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users also use BPMSs to manage the knowledge needed for processes to be completed. This study aims to analyze the factors that cause users to use BPMSs to manage the knowledge required in business processes.

Design/methodology/approach

The paper proposes an original model that integrates two successful information system models applied to BPMSs and knowledge management systems. To test the hypotheses derived from this new model, data were collected from 242 mature BPMS users from 12 Spanish and Latin American companies. Structural equation modeling with AMOS was used to examine the model.

Findings

Users’ perceived usefulness of a BPMS when using it for knowledge management (KM) is the only factor influencing them to use it for KM.

Practical implications

This study has practical implications for managers wishing to successfully implement a BPMS to support processes and for employees to use the knowledge embedded in the tool. The latter will only happen if users perceive the tool’s usefulness for KM.

Originality/value

To the best of the authors’ knowledge, this model is the first empirically validated model to successfully analyze BPMS users’ tendency to use BPMSs as a tool to support necessary KM in processes.

Details

Journal of Knowledge Management, vol. 27 no. 11
Type: Research Article
ISSN: 1367-3270

Keywords

1 – 10 of over 11000