Search results

1 – 10 of over 23000
Article
Publication date: 29 June 2022

Mahsa Kamalipoor, Morteza Akbari, Seyed Reza Hejazi and Alireza Nazarian

COVID-19 has affected most business activities, including technology-based business. The higher the business vulnerability rating, the greater the impacts. After identifying three…

Abstract

Purpose

COVID-19 has affected most business activities, including technology-based business. The higher the business vulnerability rating, the greater the impacts. After identifying three dimensions of vulnerability (exposure, business sensitivity and response capacity), this study aims to determine the potential components and indicators of the vulnerability of technology-based businesses.

Design/methodology/approach

Using the indicator approach, a comprehensive vulnerability model was developed for assessing the vulnerability of the technology-based business against COVID-19.

Findings

In this study, COVID-19, as a biological threat and an exogenous shock, was considered the exposure dimension. Business characteristics, job characteristics, business owner-manager demographics, product and supplier characteristics were identified as the sensitivity dimension, while resources, human capital, technological capitals, social capitals, institutional capitals, infrastructures, management capacity and supply chain capabilities were defined as the adaptive business capability or response capacity. To determine vulnerability and response capacity against exogenous shocks and a pandemic crisis, the framework can act as a useful checklist for managers and owners of technology-based businesses.

Originality/value

Research on the COVID-19, especially in the technology-based business, is still at the emergent stage. This study is a pioneering effort to review the literature on business vulnerability and provide a framework to reduce business vulnerability using the indicator-based approach.

Details

Journal of Business & Industrial Marketing, vol. 38 no. 5
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 12 July 2013

Stefan Taubenberger, Jan Jürjens, Yijun Yu and Bashar Nuseibeh

In any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly…

1021

Abstract

Purpose

In any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly identified or unidentified vulnerabilities – can occur as uncertain data are used. Furthermore, businesses' security needs are not considered sufficiently. Hence, security functions may not protect business assets sufficiently and cost‐effectively. This paper aims to resolve vulnerability errors by analysing the security requirements of information assets in business process models.

Design/methodology/approach

Business process models have been selected for use, because there is a close relationship between business process objectives and risks. Security functions are evaluated in terms of the information flow of business processes regarding their security requirements. The claim that vulnerability errors can be resolved was validated by comparing the results of a current risk assessment approach with the proposed approach. The comparison is conducted both at three entities of an insurance company, as well as through a controlled experiment within a survey among security professionals.

Findings

Vulnerability identification errors can be resolved by explicitly evaluating security requirements in the course of business; this is not considered in current assessment methods.

Originality/value

It is shown that vulnerability identification errors occur in practice. With the explicit evaluation of security requirements, identification errors can be resolved. Risk assessment methods should consider the explicit evaluation of security requirements.

Details

Information Management & Computer Security, vol. 21 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 25 April 2008

Y.H. Wong, Ricky Y.K. Chan, T.K.P. Leung and Jae H. Pae

The purpose of this paper is to understand the impact of the antecedents of the exchange domain (use of coercive influence, ideational favor exchange, calculative…

2093

Abstract

Purpose

The purpose of this paper is to understand the impact of the antecedents of the exchange domain (use of coercive influence, ideational favor exchange, calculative resource‐dependence, and decision uncertainty) on relationship building. The paper examines the link between the two mediating dynamics of embedded trust and relationship‐specific customization and loyalty by developing a model of vulnerability‐based commitment.

Design/methodology/approach

The links between the model elements are tested using data from a survey of clients in the Hong Kong insurance service. Structural equation analysis is used to test research hypotheses and to examine the extent to which vulnerability‐based commitment leads to the development of loyalty.

Findings

The degree of embedded trust between parties is enhanced by the use of coercive influence, favor, and resource‐dependence. Embedded trust has a negative relationship with decision uncertainty. The antecedents of coercive influence, favor, and resource‐dependence have positive impacts on relationship‐specific customization. Vulnerability‐based commitment is positively affected both by trust and customization whilst commitment has a positive impact on loyalty.

Practical implications

A vulnerability‐based commitment model is developed as an analytical and managerial tool for understanding the benefits and hidden vulnerabilities of client loyalty and for implementing effective service strategies.

Originality/value

By understanding the implications of the benefits/costs in commitment vulnerabilities, the findings can help in the design of a loyalty quality system. A new measurement tool is provided to enable researchers to perform more vigorous scale development of commitment.

Details

Journal of Services Marketing, vol. 22 no. 2
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 30 September 2013

Namrata Bhattacharya, Jessica Lamond, David Proverbs and Felix Hammond

The purpose of the research is to develop a conceptual framework to anticipate the vulnerability of value of commercial properties towards changing risk of flooding. The existing…

Abstract

Purpose

The purpose of the research is to develop a conceptual framework to anticipate the vulnerability of value of commercial properties towards changing risk of flooding. The existing patterns, themes, and issues associated with property value and their vulnerability towards flooding were identified and used to inform the development of the conceptual model.

Design/ methodology/approach

Literature review is performed to identify the factors affecting vulnerability of commercial property values to the impact of flood risk in the UK. The review approach was based on related literature contributing to identified themes and sub-themes. The extant literature is summarized into two distinct themes of “vulnerability” and “value” contributing to changing risk of flooding. The synthesised literature is then utilized in developing the conceptual map which further paved the way towards designing the conceptual framework.

Findings

The generic conceptual framework presented explores the interaction between different internal and external influencing factors affecting the vulnerability of value of commercial property system. The framework highlighted the importance of space and time within the system. An extensive review of previous studies in both the residential and commercial sectors for different disaster studies reveals that the main research challenge in assessing the vulnerability of property values are the intensive data requirements. The need for data is considered to be the main restrictive factor resulting in lack of empirical studies in this field.

Originality/value

This study brings together two existing research domains of flood vulnerability and property value. Practitioners and researchers will find this study useful in developing an improved understanding of the vulnerability of commercial properties to flooding. The conceptual framework is an important outcome of the research which will encourage further research in this considerably neglected field.

Details

International Journal of Disaster Resilience in the Built Environment, vol. 4 no. 3
Type: Research Article
ISSN: 1759-5908

Keywords

Open Access
Article
Publication date: 7 June 2024

Paul Chipangura, Dewald van Niekerk, Fortune Mangara and Annegrace Zembe

This study aimed to address the underexplored domain of organisational vulnerability, with a specific focus on understanding how vulnerability is understood in organisations and…

Abstract

Purpose

This study aimed to address the underexplored domain of organisational vulnerability, with a specific focus on understanding how vulnerability is understood in organisations and the underlying pathways leading to vulnerability.

Design/methodology/approach

This study utilised a narrative literature review methodology, using Google Scholar as the primary source, to analyse the concepts of organisational vulnerability in the context of disaster risk studies. The review focused on relevant documents published between the years 2000 and 2022.

Findings

The analysis highlights the multifaceted nature of organisational vulnerability, which arises from both inherent weaknesses within the organisation and external risks that expose it to potential hazards. The inherent weaknesses are rooted in internal vulnerability pathways such as organisational culture, managerial ignorance, human resources, and communication weaknesses that compromise the organisation’s resilience. The external dimension of vulnerability is found in cascading vulnerability pathways, e.g. critical infrastructure, supply chains, and customer relationships.

Originality/value

As the frequency and severity of disasters continue to increase, organisations of all sizes face heightened vulnerability to unforeseen disruptions and potential destruction. Acknowledging and comprehending organisational vulnerability is a crucial initial step towards enhancing risk management effectiveness, fostering resilience, and promoting sustainable success in an interconnected global environment and an evolving disaster landscape.

Details

Disaster Prevention and Management: An International Journal, vol. 33 no. 6
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 4 January 2021

Arvid Hoffmann, Simon McNair and Jason Pallant

The purpose of the paper is to examine how psychological characteristics predict membership of and transitions between states of higher vs lower financial vulnerability – and vice…

Abstract

Purpose

The purpose of the paper is to examine how psychological characteristics predict membership of and transitions between states of higher vs lower financial vulnerability – and vice versa – over time.

Design/methodology/approach

This research uses a dynamic latent class model (latent transition analysis) to explore the dynamics of consumers’ financial vulnerability over time using longitudinal data obtained by repeatedly administering a measure of financial vulnerability.

Findings

This research finds that consumers in a state of lower vulnerability are “fragile” in having a relatively high likelihood of moving to a state of higher vulnerability, whereas those in a state of higher vulnerability are “entrenched” in having a relatively low likelihood of moving to a state of lower vulnerability. This pattern of results is called the “financial vulnerability trap.” While financial self-efficacy explains state membership, the consideration of future consequences drives state transitions.

Research limitations/implications

Future research could follow consumers over a longer period and consider the role of alternative psychological characteristics besides those examined.

Practical implications

This research provides practitioners with actionable insights regarding the drivers of changes in consumers’ financial vulnerability across time, showing the value of financial self-efficacy and the consideration of future consequences when developing strategies to prevent consumers from sliding from a state of lower to higher financial vulnerability over time.

Originality/value

There is scant research on financial vulnerability. Further, prior research has not examined whether and how consumers’ psychological characteristics help explain their membership of and transitions between states of different levels of financial vulnerability over time.

Article
Publication date: 11 June 2024

Rebekah Russell-Bennett, Rowan Bedggood and Maria M. Raciti

The purpose of this editorial is to call out the practice of using identity-first language and labelling consumers and customers, describing them as “vulnerable” and offers…

Abstract

Purpose

The purpose of this editorial is to call out the practice of using identity-first language and labelling consumers and customers, describing them as “vulnerable” and offers practical strategies for person-first language of consumers/customers experiencing vulnerability.

Design/methodology/approach

The authors use Australian Indigenous and Indigenous women’s standpoint theory to reflect on their own use of terminology in the field of consumer/customer vulnerability and use their personal experiences to offer a series of practical strategies.

Findings

The authors propose six motivations for the use of person-first language in the field of consumer/customer vulnerability: easy to use, an English language convention, common practice, easy to measure, unintentional ignorance and an “us vs them” mindset.

Originality/value

To the best of the authors’ knowledge, this paper is the first to call out the practice of using identity-first language in the consumer/customer vulnerability field and offer practical strategies to enable person-first language.

Details

Journal of Services Marketing, vol. 38 no. 5
Type: Research Article
ISSN: 0887-6045

Keywords

Book part
Publication date: 1 September 2016

Leila Rodriguez

This chapter highlights the agency of Nigerian immigrant business owners in constructing their business-related social networks. Literature on immigrant business owners emphasizes…

Abstract

Purpose

This chapter highlights the agency of Nigerian immigrant business owners in constructing their business-related social networks. Literature on immigrant business owners emphasizes their social network embeddedness as a key explanatory factor in their economic integration. I show here ways in which members of one immigrant group purposely shape these networks into the most advantageous form: impersonal/socially distant suppliers, personal/socially close employees, and impersonal/socially distant customers.

Methodology/approach

Data for the chapter come from 36 semistructured qualitative interviews conducted in New York City with Nigerian small business owners and participant observation in their businesses.

Findings

Nigerian immigrant business owners in New York tend over time to shift from business networks of primarily Nigerian or other socially close suppliers, employees, and customers, to networks of mainly socially close employees, and socially distant suppliers and customers.

Research limitations/implications

The chapter’s concern is limited to Nigerian immigrant business owners in New York City. Others in other places may behave differently.

Originality/value

The literature on immigrant business owners is dominated by Asian and Latin American examples while this chapter features the experiences of Nigerian immigrants. It also presents a group that does not fit the widely accepted disadvantage hypothesis of immigrant self-employment. Finally, where many studies treat social networks as static structures, this chapter emphasizes the agency of immigrants in altering the composition of their networks to maximize their position in it.

Details

The Economics of Ecology, Exchange, and Adaptation: Anthropological Explorations
Type: Book
ISBN: 978-1-78635-227-9

Keywords

Article
Publication date: 5 September 2016

Gayan Wedawatta and Bingunath Ingirige

Small and medium sized enterprises (SMEs), which form a significant portion in many economies, are some of the most vulnerable to the impact of extreme weather events (EWEs). This…

Abstract

Purpose

Small and medium sized enterprises (SMEs), which form a significant portion in many economies, are some of the most vulnerable to the impact of extreme weather events (EWEs). This is of particular importance to the construction industry, as an overarching majority of construction companies are SMEs who account for the majority of employment and income generation within the industry. In the UK, previous research has identified construction SMEs as some of the worst affected by EWEs. The paper aims to discuss these issues.

Design/methodology/approach

Given the recent occurrences of EWEs and predictions suggesting increases in both the intensity and frequency of EWEs in the future, improving the resilience of construction SMEs is vital for achieving a resilient construction industry. A conceptual framework is first developed which is then populated and expanded based on empirical evidence. Positioned within a pragmatic research philosophy, case study research strategy was adopted as the overall research strategy in undertaking this investigation.

Findings

Based on the findings of two in-depth case studies of construction SMEs, a framework was developed to represent EWE resilience of construction SMEs, where resilience was seen as a collective effect of vulnerability, coping strategies, and coping capacities of SMEs, characteristics of the EWE and the wider economic climate.

Originality/value

The paper provides an original contribution towards the overarching agenda of the resilience of SMEs, and policy making in the area of EWE risk management by presenting a novel conceptual framework depicting the resilience of medium sized construction companies.

Article
Publication date: 4 January 2011

David Reynolds

The purpose of this paper is to highlight the benefits of alternative, business‐based approaches to tackling the trade in counterfeit goods.

1608

Abstract

Purpose

The purpose of this paper is to highlight the benefits of alternative, business‐based approaches to tackling the trade in counterfeit goods.

Design/methodology/approach

The findings in the paper are based on over six years of personal experience in the brand protection business, on top of over 20 years operational experience dealing with organized crime topics. The conclusions are also based on assessments drawing on a large body of intelligence on the operations, business practices, and vulnerabilities of counterfeiters and the relative impact of anti‐counterfeiting programs.

Findings

A careful understanding of the trade in counterfeits reveals a number of vulnerabilities in the business model that can be exploited to disrupt or deter the counterfeiters. In particular, sales brokers often see the smallest profit margins, survive hand to mouth, and put themselves at risk by directly touting sales of counterfeits to persons they do not know over the internet and in face‐to‐face meetings. They offer a natural entry point to the business for both intelligence collection and targeted seizures and influence campaigns. These campaigns can and should exploit both the lack of means to mitigate counter‐party risk and the natural distrust seen among participants in criminal businesses. Raising the perception of costs and risks only slightly can prompt counterfeiters to move away from certain brands and industries, sometimes permanently. A means to measure the effectiveness of such influence campaigns for a company is possible using a metric that takes into account the impact of disruption and targeted seizures leading to an estimate of recovered potential sales.

Originality/value

The approach detailed in the paper is unique and has not been successfully pursued and fully exploited by any firm or organization charged with tackling the trade in counterfeits.

Details

Journal of Financial Crime, vol. 18 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of over 23000