Search results

1 – 10 of over 2000
Open Access
Book part
Publication date: 16 August 2023

James Martin

Cryptomarkets have expanded rapidly since the launch of Silk Road in 2011, offering a significant new mode for the sale and distribution of illicit drugs. One of the key questions…

Abstract

Cryptomarkets have expanded rapidly since the launch of Silk Road in 2011, offering a significant new mode for the sale and distribution of illicit drugs. One of the key questions accompanying the proliferation of cryptomarkets and online drug distribution concerns how these unique online fora alter relationships between drug suppliers and their customers. Existing research points to an increase in perceptions of safety and respect among people who use cryptomarkets to purchase drugs relative to other ‘offline’ modes of drug acquisition. There is a growing body of evidence that suggests that drug suppliers are also attracted to cryptomarkets by perceptions of increased safety, as well as by market norms and institutional processes that are characterised by respect and courteous engagement. These issues fall broadly under what has been termed market ‘gentrification’ – that is, the substitution of offline drug market norms, which are sometimes characterised by violence, intimidation, suspicion, and exploitation, with relative feelings of safety, respect, and courtesy. This chapter explores the ‘gentrification hypothesis’ and examines how the unique structural characteristics of cryptomarkets, which include user feedback and ratings, dispute resolution systems, and administrator and community ‘policing’ of cryptomarkets, as well as online discussion forums, assist in fostering the development of pro-social norms that appear to be prevalent on cryptomarkets.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Open Access
Article
Publication date: 5 April 2021

Sebastian Martin, Daniela Wetzelhütter and Birgit Grüb

The purpose of this paper is to investigate the influence of external factors on the Facebook dialogue. As both weather and point in time substantially. As both weather and point…

Abstract

Purpose

The purpose of this paper is to investigate the influence of external factors on the Facebook dialogue. As both weather and point in time substantially. As both weather and point in time substantially influence people’s lives, it can be assumed that both factors may also affect communication on Facebook. To the best of the authors’ knowledge, this is the first study focusing on the impact of the external factors “weather” and “point in time” on a public utility’s Facebook communication.

Design/methodology/approach

The potential influence is explored through the case study of an Austrian public utility. The study focuses on 321 postings, published via the company’s official Facebook account between August 2016 and February 2018.

Findings

The empirical results confirm the influence of “weather” and “point in time” indicators on the stakeholder dialogue. The findings highlight how the relevant items affect the posting behavior of a utility, as well as stakeholders’ reactions, comments and shares.

Originality/value

By introducing both external factors to the social media literature, this paper broadens the understanding of Facebook communications beyond the sender and receiver of digital information. In this way, the research contributes to a more holistic view of Facebook dialogue. It provides practical advice on how social media managers of public utilities may use weather forecasts and “point in time” considerations to more strategically foster stakeholder dialogue in social media.

Details

International Journal of Energy Sector Management, vol. 15 no. 3
Type: Research Article
ISSN: 1750-6220

Keywords

Open Access
Article
Publication date: 20 February 2023

Márcio Ribeiro Martins and Rui Augusto Costa

Backpackers can be found all over the world, especially in urban areas where the main enclaves are established. The purpose of this paper is to discuss the operationalisation of…

1069

Abstract

Purpose

Backpackers can be found all over the world, especially in urban areas where the main enclaves are established. The purpose of this paper is to discuss the operationalisation of the term “backpacker” and present a proposal to conceptualise backpackers and backpackers’ segments based on the operational criteria available in literature to avoid incongruities among researchers.

Design/methodology/approach

Based on a literature review, this study provides a critical review of the backpacker conceptualisation and operationalisation using a methodology divided into three phases, a quantitative analysis based on the Scopus database and a bibliometric analysis coupled with a manual analysis of documents (content analysis).

Findings

Substantial heterogeneity and complexity regarding the conceptualisation of backpacker tourism and its diversified subsegments were evident. For this reason, this paper argues that backpacker tourism can and should continue to be analysed from different perspectives, suitably framed in the theoretical instrument constructed to identify and distinguish the different subsegments through its operationalisation features.

Originality/value

This study provides a practical contribution to all researchers interested in the topic of backpackers proposing the operationalisation of the term backpacker and it subsegments to avoid disparate results and deviations. This contribution will enable the correct and objective assessment of the operationalisation of this concept for researchers, managers and destination management organisations, identifying exactly what phenomenon is to be studied.

Details

International Journal of Tourism Cities, vol. 9 no. 1
Type: Research Article
ISSN: 2056-5607

Keywords

Open Access
Article
Publication date: 7 June 2023

Alicia Martín-Navarro, María Paula Lechuga Sancho and Jose Aurelio Medina-Garrido

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users…

1296

Abstract

Purpose

Companies are increasingly implementing business process management systems (BPMSs) to support their processes. However, there is a gap in the literature regarding whether users also use BPMSs to manage the knowledge needed for processes to be completed. This study aims to analyze the factors that cause users to use BPMSs to manage the knowledge required in business processes.

Design/methodology/approach

The paper proposes an original model that integrates two successful information system models applied to BPMSs and knowledge management systems. To test the hypotheses derived from this new model, data were collected from 242 mature BPMS users from 12 Spanish and Latin American companies. Structural equation modeling with AMOS was used to examine the model.

Findings

Users’ perceived usefulness of a BPMS when using it for knowledge management (KM) is the only factor influencing them to use it for KM.

Practical implications

This study has practical implications for managers wishing to successfully implement a BPMS to support processes and for employees to use the knowledge embedded in the tool. The latter will only happen if users perceive the tool’s usefulness for KM.

Originality/value

To the best of the authors’ knowledge, this model is the first empirically validated model to successfully analyze BPMS users’ tendency to use BPMSs as a tool to support necessary KM in processes.

Details

Journal of Knowledge Management, vol. 27 no. 11
Type: Research Article
ISSN: 1367-3270

Keywords

Open Access
Article
Publication date: 21 June 2022

Othmar Manfred Lehner, Kim Ittonen, Hanna Silvola, Eva Ström and Alena Wührleitner

This paper aims to identify ethical challenges of using artificial intelligence (AI)-based accounting systems for decision-making and discusses its findings based on Rest's…

26265

Abstract

Purpose

This paper aims to identify ethical challenges of using artificial intelligence (AI)-based accounting systems for decision-making and discusses its findings based on Rest's four-component model of antecedents for ethical decision-making. This study derives implications for accounting and auditing scholars and practitioners.

Design/methodology/approach

This research is rooted in the hermeneutics tradition of interpretative accounting research, in which the reader and the texts engage in a form of dialogue. To substantiate this dialogue, the authors conduct a theoretically informed, narrative (semi-systematic) literature review spanning the years 2015–2020. This review's narrative is driven by the depicted contexts and the accounting/auditing practices found in selected articles are used as sample instead of the research or methods.

Findings

In the thematic coding of the selected papers the authors identify five major ethical challenges of AI-based decision-making in accounting: objectivity, privacy, transparency, accountability and trustworthiness. Using Rest's component model of antecedents for ethical decision-making as a stable framework for our structure, the authors critically discuss the challenges and their relevance for a future human–machine collaboration within varying agency between humans and AI.

Originality/value

This paper contributes to the literature on accounting as a subjectivising as well as mediating practice in a socio-material context. It does so by providing a solid base of arguments that AI alone, despite its enabling and mediating role in accounting, cannot make ethical accounting decisions because it lacks the necessary preconditions in terms of Rest's model of antecedents. What is more, as AI is bound to pre-set goals and subjected to human made conditions despite its autonomous learning and adaptive practices, it lacks true agency. As a consequence, accountability needs to be shared between humans and AI. The authors suggest that related governance as well as internal and external auditing processes need to be adapted in terms of skills and awareness to ensure an ethical AI-based decision-making.

Details

Accounting, Auditing & Accountability Journal, vol. 35 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Open Access
Article
Publication date: 21 December 2021

Martin Karlsson, Fredrik Karlsson, Joachim Åström and Thomas Denk

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

3863

Abstract

Purpose

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

Design/methodology/approach

The survey using the Organizational Culture Assessment Instrument was sent to white-collar workers in Sweden (n = 674), asking about compliance with information security policies. The survey instrument is an operationalization of the Competing Values Framework that distinguishes between four different types of organizational culture: clan, adhocracy, market and bureaucracy.

Findings

The results indicate that organizational cultures with an internal focus are positively related to employees’ information security policy compliance. Differences in organizational culture with regards to control and flexibility seem to have less effect. The analysis shows that a bureaucratic form of organizational culture is most fruitful for fostering employees’ information security policy compliance.

Research limitations/implications

The results suggest that differences in organizational culture are important for employees’ information security policy compliance. This justifies further investigating the mechanisms linking organizational culture to information security compliance.

Practical implications

Practitioners should be aware that the different organizational cultures do matter for employees’ information security compliance. In businesses and the public sector, the authors see a development toward customer orientation and marketization, i.e. the opposite an internal focus, that may have negative ramifications for the information security of organizations.

Originality/value

Few information security policy compliance studies exist on the consequences of different organizational/information cultures.

Open Access
Article
Publication date: 26 September 2018

Jochen Wirtz, Paul G. Patterson, Werner H. Kunz, Thorsten Gruber, Vinh Nhat Lu, Stefanie Paluch and Antje Martins

The service sector is at an inflection point with regard to productivity gains and service industrialization similar to the industrial revolution in manufacturing that started in…

72213

Abstract

Purpose

The service sector is at an inflection point with regard to productivity gains and service industrialization similar to the industrial revolution in manufacturing that started in the eighteenth century. Robotics in combination with rapidly improving technologies like artificial intelligence (AI), mobile, cloud, big data and biometrics will bring opportunities for a wide range of innovations that have the potential to dramatically change service industries. The purpose of this paper is to explore the potential role service robots will play in the future and to advance a research agenda for service researchers.

Design/methodology/approach

This paper uses a conceptual approach that is rooted in the service, robotics and AI literature.

Findings

The contribution of this paper is threefold. First, it provides a definition of service robots, describes their key attributes, contrasts their features and capabilities with those of frontline employees, and provides an understanding for which types of service tasks robots will dominate and where humans will dominate. Second, this paper examines consumer perceptions, beliefs and behaviors as related to service robots, and advances the service robot acceptance model. Third, it provides an overview of the ethical questions surrounding robot-delivered services at the individual, market and societal level.

Practical implications

This paper helps service organizations and their management, service robot innovators, programmers and developers, and policymakers better understand the implications of a ubiquitous deployment of service robots.

Originality/value

This is the first conceptual paper that systematically examines key dimensions of robot-delivered frontline service and explores how these will differ in the future.

Details

Journal of Service Management, vol. 29 no. 5
Type: Research Article
ISSN: 1757-5818

Keywords

Open Access
Article
Publication date: 23 August 2020

Margaret Hodgins, Sarah MacCurtain and Patricia Mannix-McNamara

Bullying affects at least one-third of the workers through either direct exposure or witnessing, both of which lead to compromised health, and as a result, reduced organizational…

14361

Abstract

Purpose

Bullying affects at least one-third of the workers through either direct exposure or witnessing, both of which lead to compromised health, and as a result, reduced organizational effectiveness or productivity. However, there is very little evidence that organisations provide effective protection from bullying, and in fact, the converse appears to the case. The purpose of this paper to explore the role of both individual and organisational power in the creation and maintenance of the problem. Such an approach moves away from the specific practice of identifying “bullying” that typically engages targets and perpetrators in a dance that is really just around the edges (Sullivan, 2008) of a larger problem; a culture that permits the abuse of power and ill-treatment of workers, in both practices and through organisational politics.

Design/methodology/approach

This paper elucidates key problems with organisational response as identified in the literature and critically examines weak organisational response to workplace bullying using the power theory, arguing that while overt approaches to addressing bullying appear to be underpinned by a simplistic, functionalist understanding of power, practices on the ground are better explained by more sophisticated “second-dimension” theorists.

Findings

There is a need for organisations to move beyond the current individualistic understanding of bullying towards a more nuanced understanding of how anti-bullying policies and procedures are themselves an exercise in institutional power protecting and reinforcing dominant power structures.

Research limitations/implications

The literature from which this paper is drawn is limited to studies published in English.

Practical implications

The authors advocate a realistic assessment of the role of both individual and organisational power in the creation and maintenance of workplace bullying, as a way forward to plan appropriate intervention.

Social implications

Workplace bullying is problematic for organisations at several levels, and therefore for society.

Originality/value

That power is relevant to workplace bullying has been apparent since the work of Brodsky in 1976 and Einarsen's early work, this paper builds on a the more nuanced work of McKay (2014), D'Cruz and Noronha (2009), Liefooghe and MacDavey's (2010) and Hutchinson et al. (2010), exploring the organisational response to the raising of bullying issues by individual employees as an exercise of power.

Details

International Journal of Workplace Health Management, vol. 13 no. 3
Type: Research Article
ISSN: 1753-8351

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1033

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 12 March 2018

Richard Lamboll, Adrienne Martin, Lateef Sanni, Kolawole Adebayo, Andrew Graffham, Ulrich Kleih, Louise Abayomi and Andrew Westby

The purpose of this paper is to explain why the high quality cassava flour (HQCF) value chain in Nigeria has not performed as well as expected. The specific objectives are to…

3255

Abstract

Purpose

The purpose of this paper is to explain why the high quality cassava flour (HQCF) value chain in Nigeria has not performed as well as expected. The specific objectives are to: analyse important sources of uncertainty influencing HQCF value chains; explore stakeholders’ strategies to respond to uncertainty; and highlight the implications of different adaptation strategies for equity and the environment in the development of the value chain.

Design/methodology/approach

The authors used a conceptual framework based on complex adaptive systems to analyse the slow development of the value chain for HQCF in Nigeria, with a specific focus on how key stakeholders have adapted to uncertainty. The paper is based on information from secondary sources and grey literature. In particular, the authors have drawn heavily on project documents of the Cassava: Adding Value for Africa project (2008 to present), which is funded by the Bill & Melinda Gates Foundation, and on the authors’ experience with this project.

Findings

Policy changes; demand and supply of HQCF; availability and price of cassava roots; supply and cost of energy are major sources of uncertainty in the chain. Researchers and government have shaped the chain through technology development and policy initiatives. Farmers adapted by selling cassava to rival chains, while processors adapted by switching to rival cassava products, reducing energy costs and vertical integration. However, with uncertainties in HQCF supply, the milling industry has reserved the right to play. Vertical integration offers millers a potential solution to uncertainty in HQCF supply, but raises questions about social and environmental outcomes in the chain.

Research limitations/implications

The use of the framework of complex adaptive systems helped to explain the development of the HQCF value chain in Nigeria. The authors identified sources of uncertainty that have been pivotal in restricting value chain development, including changes in policy environment, the demand for and supply of HQCF, the availability and price of cassava roots, and the availability and cost of energy for flour processing. Value chain actors have responded to these uncertainties in different ways. Analysing these responses in terms of adaptation provides useful insights into why the value chain for HQCF in Nigeria has been so slow to develop.

Social implications

Recent developments suggest that the most effective strategy for the milling industry to reduce uncertainty in the HQCF value chain is through vertical integration, producing their own cassava roots and flour. This raises concerns about equity. Until now, it has been assumed that the development of the value chain for HQCF can combine both growth and equity objectives. The validity of this assumption now seems to be open to question. The extent to which these developments of HQCF value chains can combine economic growth, equity and environmental objectives, as set out in the sustainable development goals, is an open question.

Originality/value

The originality lies in the analysis of the development of HQCF value chains in Nigeria through the lens of complex adaptive systems, with a particular focus on uncertainty and adaptation. In order to explore adaptation, the authors employ Courtney et al.’s (1997) conceptualization of business strategy under conditions of uncertainty. They argue that organisations can assume three strategic postures in response to uncertainty and three types of actions to implement that strategy. This combination of frameworks provides a fresh means of understanding the importance of uncertainty and different actors’ strategies in the development of value chains in a developing country context.

Details

Journal of Agribusiness in Developing and Emerging Economies, vol. 8 no. 1
Type: Research Article
ISSN: 2044-0839

Keywords

1 – 10 of over 2000