The purpose of this paper is to provide a thorough empirical investigation of the potential link between corporate innovations and corporate competitiveness in the context…
The purpose of this paper is to provide a thorough empirical investigation of the potential link between corporate innovations and corporate competitiveness in the context of the UK IT industry.
This research uses a panel of 216 UK IT firms for the period from 2000 to 2016. The sample data for this study were extracted from the Worldscope, extracted from the Datastream database from Thomson Reuters. For the analysis of the data, the generalised method of moments model is applied.
The results of this study provide empirical evidence that there exists a strong, positive link between corporate innovations and corporate competitiveness. Such evidence further reinforces the common view in the current literature of strategic management that because of the nature of their business, firms in the IT industry need to enhance their innovative capacities on a continual basis because of their critical role on these firms’ success and survival. Also, it is found that when the proxies for corporate innovations are lagged by two periods, their impact on corporate competitiveness becomes relatively more significant. However, when they are further lagged, i.e. by three periods, such an impact turns out to be relatively less pronounced.
The data gathered for this paper was restricted to IT-oriented firms in the UK. Using a secondary database (Datastream), the paper considered the period of 2000-2016.
The research makes a significant contribution to the current debate on the relationship between information technology, innovation and performance, referred to in the literature as the productivity paradox, by studying the problem in the IT industry. It supports organisations from the sector in their efforts to deal with the dynamic nature of technological innovations and of the context where they operate. Methodologically, the way the study has measured the concepts of innovation and performance and the lessons learned from their analysis has also brought value to the research.
There is little doubt that the explosive growth of the cyberspace has provided a wealth of opportunities for a broad range of legal and illegal enterprises. One of the…
There is little doubt that the explosive growth of the cyberspace has provided a wealth of opportunities for a broad range of legal and illegal enterprises. One of the characteristics of the cyberspace is that it removes many barriers (e.g. geographical, accessing potential customers, cost of entry) from the path of savvy entrepreneurs. As such, a new particular brand of entrepreneurs has been born – these are entrepreneurs working at the limits of legality or plainly outside any legal frameworks. The purpose of this work is to explore the area of illegal cyber-entrepreneurship and to illustrate some of the factors that have contributed to its explosive growth over the last two decades.
The work is utilising case studies drawn from literature and news sources to illustrate the theoretical concepts that are being explored. The literature consulted in this work supports the discussion around the areas of entrepreneurship, cyberspace and various aspects related to illegal exploitation of the cyberspace.
The positioning of illegal enterprises within existing theoretical frameworks is explored and a modelling of the characteristics of such enterprises is being proposed. The duality of the opportunities available within the cyberspace is illustrated, with an emphasis on the fact that there will always be a ‘gap’ between the opportunities offered by the cyberspace and the possible illegal nature of some of the entrepreneurial activities that are taking place in this space.
This work explores and positions the illegal entrepreneurial activities taking place in the cyberspace. This contributes to the advancement of knowledge in this area. Given the fast moving nature of this area, there are opportunities for updating this work on a regular basis.
The purpose of this chapter is to introduce the topic and discuss the individual chapters in this volume as well as to provide an intellectual orientation which will…
The purpose of this chapter is to introduce the topic and discuss the individual chapters in this volume as well as to provide an intellectual orientation which will hopefully inspire casual readers to read further. The main thesis behind this volume is that entrepreneurial crime and illegal enterprise span two very distinct yet complimentary academic disciplines – namely Criminology and Entrepreneurial/Business Studies. And that we need to take cognisance of both instead of writing and publishing in disciplinary silos.
Our methodological approach in this volume is predominantly qualitative and in addition mainly review based. Our editorial approach is/was one of laissez-faire in that we did not want to stifle authorial creativity or impose order where there was none, or very little. The result is a very eclectic collection of interesting readings which we hope will challenge researchers interested in the topics to cross inter- and intra-disciplinary literature in search of new theoretical models.
Rather than findings we see the contribution of the volume as being an attempt to start conversations between disciplines. We appreciate that this is only a beginning. There are discoveries and perhaps a need to redraw boundaries. One surprising finding was how much the authors all drew on the seminal work of William Baumol to the extent that it has become a common framework for understanding the cross overs.
There are many limitations to the chapters in this volume. The main one is that in any edited volume the editors are faced with a dilemma of allowing more voices to emerge or imposing a restrictive explanatory framework which in turn shoe horns the chapters into an over-arching sense-making architecture. The limitation of this volume is that it can only present a few of the voices and only begin a synthesis. Interested researchers must work hard to draw meaning from the eclectic voices.
The practical implications from this chapter and the edited chapters are manifold. The chapters deal with complex issues and we have opted to allow the authorial voice to be heard and to allow disciplinary writing styles to remain as they are. This allows a very practical understanding of everyday implications to emerge.
There are many policy implications which arise from this introductory chapter and the chapters in this volume but these will take time to manifest themselves. The main point to take away is that to understand and interdict crime and in particular entrepreneurial crime we must draw on inter-disciplinary knowledge and theories of entrepreneurship and business in a wider sense.
This chapter introduces a series of apparently separate yet interconnected chapters which explore the bounds and boundaries of illegal entrepreneurship and its originality lies in its approach.
Total quality management (TQM) has spread its wings in every sphere of the global corporate world and Indian companies are no exception. In this paper, first the growth…
Total quality management (TQM) has spread its wings in every sphere of the global corporate world and Indian companies are no exception. In this paper, first the growth and spread of TQM in India is traced from its initiation to current status. Further, the paper has tried to identify the causes for poor quality of products and service, and the gaps that exist between the expectations and the outcome after adopting the TQM practices. Later a critical view of the quality scene in India is presented, and finally, based on these observations suitable guidelines and recommendations are made to bridge this gap. It is concluded that there is still a long way to go for Indian companies to receive the stamp of acceptance for their products at international level.
Many investigations are going on in monitoring, contact tracing, predicting and diagnosing the COVID-19 disease and many virologists are urgently seeking to create a…
Many investigations are going on in monitoring, contact tracing, predicting and diagnosing the COVID-19 disease and many virologists are urgently seeking to create a vaccine as early as possible. Even though there is no specific treatment for the pandemic disease, the world is now struggling to control the spread by implementing the lockdown worldwide and giving awareness to the people to wear masks and use sanitizers. The new technologies, including the Internet of things (IoT), are gaining global attention towards the increasing technical support in health-care systems, particularly in predicting, detecting, preventing and monitoring of most of the infectious diseases. Similarly, it also helps in fighting against COVID-19 by monitoring, contract tracing and detecting the COVID-19 pandemic by connection with the IoT-based smart solutions. IoT is the interconnected Web of smart devices, sensors, actuators and data, which are collected in the raw form and transmitted through the internet. The purpose of this paper is to propose the concept to detect and monitor the asymptotic patients using IoT-based sensors.
In recent days, the surge of the COVID-19 contagion has infected all over the world and it has ruined our day-to-day life. The extraordinary eruption of this pandemic virus placed the World Health Organization (WHO) in a hazardous position. The impact of this contagious virus and scarcity among the people has forced the world to get into complete lockdown, as the number of laboratory-confirmed cases is increasing in millions all over the world as per the records of the government.
COVID-19 patients are either symptomatic or asymptotic. Symptomatic patients have symptoms such as fever, cough and difficulty in breathing. But patients are also asymptotic, which is very difficult to detect and monitor by isolating them.
Asymptotic patients are very hazardous because without knowing that they are infected, they might spread the infection to others, also asymptotic patients might be having very serious lung damage. So, earlier prediction and monitoring of asymptotic patients are mandatory to save their life and prevent them from spreading.