Search results

1 – 8 of 8
Article
Publication date: 9 June 2022

Nivisha Singh, Ritesh Pandey, Rohit Gupta, Baidyanath Biswas and Shubhi Gupta

This study aims to synthesize extant literature on the concept of reverse knowledge transfer (RKT) built up over the past two decades with the help of bibliometric analyssis and…

Abstract

Purpose

This study aims to synthesize extant literature on the concept of reverse knowledge transfer (RKT) built up over the past two decades with the help of bibliometric analyssis and also to suggest promising new areas for research in this field.

Design/methodology/approach

The study adopts a literature review methodology combined with bibliometric and network analysis based on 117 papers identified from the Scopus database. In particular, this study has tried to identify and capture themes not previously fully captured or evaluated by other reviews on this topic.

Findings

The authors have identified research themes and research gaps in the area of RKT. Overall, the review shows the main outlets that have published papers on RKT and the theoretical background this research is built on. This study exhibits core themes in this area that have persisted and grown consistently such as the subsidiary’s role in RKT. In addition, the review highlights less researched themes such as role of boundary spanning in RKT, which open exciting avenues for new research opportunities.

Research limitations/implications

This study finds that RKT research has experienced remarkable growth from a complete viewpoint in recent years. There was a surge in publications in the area from 2008 onwards, and many of its influential papers seemed to have been published between 2013 and 2018. Prominent themes in this body of research have been identified and potential for future studies has been explored.

Originality/value

To the best of the authors’ knowledge, this is the first study to map, synthesize and discuss the literature concerning RKT.

Details

VINE Journal of Information and Knowledge Management Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5891

Keywords

Open Access
Article
Publication date: 30 June 2022

Bhawana Rathore, Rohit Gupta, Baidyanath Biswas, Abhishek Srivastava and Shubhi Gupta

Recently, disruptive technologies (DTs) have proposed several innovative applications in managing logistics and promise to transform the entire logistics sector drastically…

4457

Abstract

Purpose

Recently, disruptive technologies (DTs) have proposed several innovative applications in managing logistics and promise to transform the entire logistics sector drastically. Often, this transformation is not successful due to the existence of adoption barriers to DTs. This study aims to identify the significant barriers that impede the successful adoption of DTs in the logistics sector and examine the interrelationships amongst them.

Design/methodology/approach

Initially, 12 critical barriers were identified through an extensive literature review on disruptive logistics management, and the barriers were screened to ten relevant barriers with the help of Fuzzy Delphi Method (FDM). Further, an Interpretive Structural Modelling (ISM) approach was built with the inputs from logistics experts working in the various departments of warehouses, inventory control, transportation, freight management and customer service management. ISM approach was then used to generate and examine the interrelationships amongst the critical barriers. Matrics d’Impacts Croises-Multiplication Applique a Classement (MICMAC) analysed the barriers based on the barriers' driving and dependence power.

Findings

Results from the ISM-based technique reveal that the lack of top management support (B6) was a critical barrier that can influence the adoption of DTs. Other significant barriers, such as legal and regulatory frameworks (B1), infrastructure (B3) and resistance to change (B2), were identified as the driving barriers, and industries need to pay more attention to them for the successful adoption of DTs in logistics. The MICMAC analysis shows that the legal and regulatory framework and lack of top management support have the highest driving powers. In contrast, lack of trust, reliability and privacy/security emerge as barriers with high dependence powers.

Research limitations/implications

The authors' study has several implications in the light of DT substitution. First, this study successfully analyses the seven DTs using Adner and Kapoor's framework (2016a, b) and the Theory of Disruptive Innovation (Christensen, 1997; Christensen et al., 2011) based on the two parameters as follows: emergence challenge of new technology and extension opportunity of old technology. Second, this study categorises these seven DTs into four quadrants from the framework. Third, this study proposes the recommended paths that DTs might want to follow to be adopted quickly.

Practical implications

The authors' study has several managerial implications in light of the adoption of DTs. First, the authors' study identified no autonomous barriers to adopting DTs. Second, other barriers belonging to any lower level of the ISM model can influence the dependent barriers. Third, the linkage barriers are unstable, and any preventive action involving linkage barriers would subsequently affect linkage barriers and other barriers. Fourth, the independent barriers have high influencing powers over other barriers.

Originality/value

The contributions of this study are four-fold. First, the study identifies the different DTs in the logistics sector. Second, the study applies the theory of disruptive innovations and the ecosystems framework to rationalise the choice of these seven DTs. Third, the study identifies and critically assesses the barriers to the successful adoption of these DTs through a strategic evaluation procedure with the help of a framework built with inputs from logistics experts. Fourth, the study recognises DTs adoption barriers in logistics management and provides a foundation for future research to eliminate those barriers.

Details

The International Journal of Logistics Management, vol. 33 no. 5
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 26 August 2020

Rohit Gupta, Baidyanath Biswas, Indranil Biswas and Shib Sankar Sana

This paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios…

Abstract

Purpose

This paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios, optimal investment of firm, optimal efforts of attackers and their economic utilities are determined.

Design/methodology/approach

Throughout the analysis, a single firm and two attackers for a “firm as a leader” in a sequential game setting and “firm versus attackers” in a simultaneous game setting are considered. While the firm makes investments to secure its information assets, the attackers spend their efforts to launch breaches.

Findings

It is observed that the firm needs to invest more when it announces its security investment decisions ahead of attacks. In contrast, the firm can invest relatively less when all agents are unaware of each other’s choices in advance. Further, the study reveals that attackers need to exert higher effort when no agent enjoys the privilege of being a leader.

Research limitations/implications

In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon – Loeb breach function, with the help of fuzzy expectation operator.

Practical implications

This study reports that the optimal breach effort exerted by each attacker is proportional to its obtained economic benefit for both sequential and simultaneous attack scenarios. A set of numerical experiments and sensitivity analyzes complement the analytical modeling.

Originality/value

In a novel approach, inherent system vulnerability of the firm, financial benefit of attackers from the breach and monetary loss suffered by the firm are considered, as fuzzy variables in the well-recognized Gordon – Loeb breach function, with the help of fuzzy expectation operator.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 14 October 2020

Saurabh Kumar, Baidyanath Biswas, Manjot Singh Bhatia and Manoj Dora

The present study aims to identify and investigate the antecedents of enhanced level of cyber-security at the organisational level from both the technical and the human resource…

1642

Abstract

Purpose

The present study aims to identify and investigate the antecedents of enhanced level of cyber-security at the organisational level from both the technical and the human resource perspective using human–organisation–technology (HOT) theory.

Design/methodology/approach

The study has been conducted on 151 professionals who have expertise in dealing with cyber-security in organisations in sectors such as retail, education, healthcare, etc. in India. The analysis of the data is carried out using partial least squares based structural equation modelling technique (PLS-SEM).

Findings

The results from the study suggest that “legal consequences” and “technical measures” adopted for securing cyber-security in organisations are the most important antecedents for enhanced cyber-security levels in the organisations. The other significant antecedents for enhanced cyber-security in organisations include “role of senior management” and “proactive information security”.

Research limitations/implications

This empirical study has significant implications for organisations as they can take pre-emptive measures by focussing on important antecedents and work towards enhancing the level of cyber-security.

Originality/value

The originality of this research is combining both technical and human resource perspective in identifying the determinants of enhanced level of cyber-security in the organisations.

Details

Journal of Enterprise Information Management, vol. 34 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 26 October 2021

Rohit Gupta, Bhawana Rathore and Baidyanath Biswas

This study aims to review and organize the research articles which focused on the impact of COVID-19 pandemic in the supply chain (SC) domain through a bibliometric and network…

1034

Abstract

Purpose

This study aims to review and organize the research articles which focused on the impact of COVID-19 pandemic in the supply chain (SC) domain through a bibliometric and network analysis.

Design/methodology/approach

Initially, a total of 772 research articles with selected keywords were retrieved from the Scopus database for the year 2020 (with the commencement of COVID-19 outbreak). After the filtration and refinement, 484 research articles were found relevant and unique. Further, this study systematically reviews and evaluates the 484 research articles including influential authors, keys journals, influential research work, and collaboration among the countries and institutes with the help of bibliometric analysis tool. The emergent research clusters are identified and established.

Findings

The findings reveal that the total number of related publications are steadily growing with the United States leading the way. European countries have made notable accomplishments as well. In addition, both the most cited publications and the keyword distribution provide research guidance for future research.

Practical implications

This study focuses on the need and advancement of the literature on the impacts of the COVID-19 pandemic on SCs to frame a research agenda for researchers and practitioners.

Originality/value

The present study offers future research directions in the area of SC under the pandemic situation.

Details

International Journal of Quality & Reliability Management, vol. 39 no. 10
Type: Research Article
ISSN: 0265-671X

Keywords

Open Access
Article
Publication date: 3 July 2023

Shubhi Gupta, Govind Swaroop Pathak and Baidyanath Biswas

This paper aims to determine the impact of perceived virtuality on team dynamics and outcomes by adopting the Input-Mediators-Outcome (IMO) framework. Further, it also…

Abstract

Purpose

This paper aims to determine the impact of perceived virtuality on team dynamics and outcomes by adopting the Input-Mediators-Outcome (IMO) framework. Further, it also investigates the mediating role of team processes and emergent states.

Design/methodology/approach

The authors collected survey data from 315 individuals working in virtual teams (VTs) in the information technology sector in India using both offline and online questionnaires. They performed the analysis using Partial Least Squares Structural Equation Modelling (PLS-SEM).

Findings

The authors investigated two sets of hypotheses – both direct and indirect (or mediation interactions). Results show that psychological empowerment and conflict management are significant in managing VTs. Also, perceived virtuality impacts team outcomes, i.e. perceived team performance, team satisfaction and subjective well-being.

Research limitations/implications

The interplay between the behavioural team process (conflict management) and the emergent state (psychological empowerment) was examined. The study also helps broaden our understanding of the various psychological variables associated with teamwork in the context of VTs.

Practical implications

Findings from this study will aid in assessing the consequences of virtual teamwork at both individual and organisational levels, such as guiding the design and sustainability of VT arrangements, achieving higher productivity in VTs, and designing effective and interactive solutions in the virtual space.

Social implications

The study examined the interplay between behavioural team processes (such as conflict management) and emergent states (such as psychological empowerment). The study also theorises and empirically tests the relationships between perceived virtuality and team outcomes (i.e. both affective and effectiveness). It may serve as a guide to understanding team dynamics in VTs better.

Originality/value

This exploratory study attempts to enhance the current understanding of the research and practice of VTs within a developing economy.

Article
Publication date: 27 July 2021

Praveen Ranjan Srivastava, Kinshuk Sengupta, Ajay Kumar, Baidyanath Biswas and Alessio Ishizaka

The new coronavirus is a highly infectious disease with mutating variants leading to pervasive risk around geographies and public health system. The economy has been suffering due…

1818

Abstract

Purpose

The new coronavirus is a highly infectious disease with mutating variants leading to pervasive risk around geographies and public health system. The economy has been suffering due to the strategic lockdown adopted by the local administrative bodies, and in most of the countries, it is further leading to a major wave of unemployment with millions of job and business losses affecting the hotels, travel and tourism industry widely. To attain a sustainable business in the post-pandemic situations, the industry now must think of information system approaches to convince tourists to feel safe with the most hygienic hospitality and services to be offered in any property. The key aspect of the study is to provide the impact of new-age AI-driven technology solutions that will dominate the future direction of the modernized hospitality industry promising robust health-safety measures in a hotel, and further help create sustainable business and leisure travel facilities to cope with post-epidemic scenarios.

Design/methodology/approach

The study emphasizes to provide a robust technology-oriented framework based on a mixed research method that would help hotels to adopt and implement new-age AI-driven solution within the hotel premise to serve customers with at most hygiene, contactless service and thereafter, aiming for faster recovery of businesses and regaining customer trust to fuel booking intent in the post-epidemic scenario.

Findings

The paper provides a technology-focused solution that would impact hotel industries' post-pandemic scenario. The study contributes to helping boost the tourism industry using information management solutions such as biosensors, robotic room services and contactless hosting. The findings show the adoption of robots/RPA solutions and Biosensors by the industry will be a disruptive paradigm shift.

Originality/value

The study expands the scope of research in information technology and management with a focus on the hospitality industry while contributing to new factors impacting customer buying behavior in the industry.

Details

Journal of Enterprise Information Management, vol. 35 no. 1
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 5 March 2018

Baidyanath Biswas and Arunabha Mukhopadhyay

Malicious attackers frequently breach information systems by exploiting disclosed software vulnerabilities. Knowledge of these vulnerabilities over time is essential to decide the…

Abstract

Purpose

Malicious attackers frequently breach information systems by exploiting disclosed software vulnerabilities. Knowledge of these vulnerabilities over time is essential to decide the use of software products by organisations. The purpose of this paper is to propose a novel G-RAM framework for business organisations to assess and mitigate risks arising out of software vulnerabilities.

Design/methodology/approach

The G-RAM risk assessment module uses GARCH to model vulnerability growth. Using 16-year data across 1999-2016 from the National Vulnerability Database, the authors estimate the model parameters and validate the prediction accuracy. Next, the G-RAM risk mitigation module designs optimal software portfolio using Markowitz’s mean-variance optimisation for a given IT budget and preference.

Findings

Based on an empirical analysis, this study establishes that vulnerability follows a non-linear, time-dependent, heteroskedastic growth pattern. Further, efficient software combinations are proposed that optimise correlated risk. The study also reports the empirical evidence of a shift in efficient frontier of software configurations with time.

Research limitations/implications

Existing assumption of independent and identically distributed residuals after vulnerability function fitting is incorrect. This study applies GARCH technique to measure volatility clustering and mean reversal. The risk (or volatility) represented by the instantaneous variance is dependent on the immediately previous one, as well as on the unconditional variance of the entire vulnerability growth process.

Practical implications

The volatility-based estimation of vulnerability growth is a risk assessment mechanism. Next, the portfolio analysis acts as a risk mitigation activity. Results from this study can decide patch management cycle needed for each software – individual or group patching. G-RAM also ranks them into a 2×2 risk-return matrix to ensure that the correlated risk is diversified. Finally the paper helps the business firms to decide what to purchase and what to avoid.

Originality/value

Contrary to the existing techniques which either analyse with statistical distributions or linear econometric methods, this study establishes that vulnerability growth follows a non-linear, time-dependent, heteroskedastic pattern. The paper also links software risk assessment to IT governance and strategic business objectives. To the authors’ knowledge, this is the first study in IT security to examine and forecast volatility, and further design risk-optimal software portfolios.

Details

Journal of Enterprise Information Management, vol. 31 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 8 of 8