Search results
1 – 10 of over 1000Shahriar Akter, Mujahid Mohiuddin Babu, Tasnim M. Taufique Hossain, Bidit Lal Dey, Hongfei Liu and Pallavi Singh
The main purpose of this study is to fill the research gap on how B2B global service firms integrate dynamic capabilities within their omnichannel management to influence positive…
Abstract
Purpose
The main purpose of this study is to fill the research gap on how B2B global service firms integrate dynamic capabilities within their omnichannel management to influence positive word of mouth (WOM), customer engagement (CE) and customer equity.
Design/methodology/approach
Drawing on the dynamic capability and WOM theories, a model has been developed that defines the subjects of the empirical test. The paper reports on data collected from 312 service-oriented global firms in Australia, through a cross-sectional survey. Data were analyzed using structural equation modeling.
Findings
The findings suggest that content management (i.e. information consistency, source trustworthiness and endorsement) and concerns management (i.e. privacy, security and recovery) capabilities are the two significant antecedents of positive WOM within a B2B omnichannel setting in international marketing. The findings also confirm the key mediating role of CE between positive WOM and customer equity.
Originality/value
The findings extend dynamic capability theory in the context of international marketing by linking WOM, CE and customer equity. The findings add further theoretical rigor by establishing the nomological chain between positive WOM and customer equity, in which CE plays a key mediating role.
Details
Keywords
Basmah Almekhled and Helen Petrie
This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19…
Abstract
Purpose
This study investigated the attitudes and concerns of Saudi higher educational institution (HEI) academics about privacy and security in online teaching during the COVID-19 pandemic.
Design/methodology/approach
Online Questionnaire questionnaire was designed to explore Saudi HEI academic’s attitudes and concerns about privacy and security issues in online teaching. The questionnaire asked about attitudes and concerns held before the pandemic and since the pandemic. The questionnaire included four sections. At the beginning of the questionnaire, participants were asked what the phrase “online privacy and security” meant to them, to gain an initial understanding of what it meant to academics. A definition for what we intended for the survey was then provided: “that a person’s data, including their identity, is not accessible to anyone other than themselves and others whom they have authorised and that their computing devices work properly and are free from unauthorised interference” (based on my reading of a range of sources, e.g. Schatz et al., 2017; Steinberg, 2019; NCS; Windley, 2005). This was to ensure that participants did understand what I was asking about in subsequent sections.
Findings
This study investigated the attitudes and concerns of Saudi HEI academics about privacy and security in online teaching during the COVID-19 pandemic. The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. This underscores the significance of robust measures to safeguard sensitive information in online teaching, but also the need to make academics aware of the other aspects of online privacy and security. Potential to improve policies and training about online privacy and security in Saudi HEIs: Although many participants were aware of the online privacy and security policies of their HEI, only a small percentage had received training in this area. Thus, there is a need to improve the development and dissemination of policies and to provide academics with appropriate training in this area and encourage them to take available training. Use of videoconferencing and chat technologies and cultural sensitivities: The study highlighted moderate levels of concern among Saudi HEI academics regarding the use of videoconferencing and online chat technologies, and their concerns about cultural factors around the use of these technologies. This emphasizes the need for online teaching and the growing use of technologies in such teaching to respect cultural norms and preferences, highlighting the importance of fostering a culturally sensitive approach to technology deployment and use. Surprising low webcam use: An unexpected finding is the low use of webcams by both academics and students during online teaching sessions, prompting a need for a deeper understanding of the dynamics surrounding webcam engagement in such sessions. This calls for a reevaluation of the effectiveness of webcam use in the teaching process and underscores the importance of exploring methods for enhancing engagement and interaction in online teaching. In summary, this paper investigated the attitudes and concerns about privacy and security in the online teaching of Saudi HEI academics during the coronavirus pandemic. The study reveals areas where further research and policy development can enhance the online teaching experience. As the education landscape continues to evolve, institutions must remain proactive in addressing the concerns of their academics while fostering a culturally sensitive approach to technology deployment.
Research limitations/implications
One limitation of this study is the relatively small qualitative data sample, despite the adequate size of the sample including 36 academics from various Saudi Arabian HEIs for quantitative analysis. It was necessary to make the most of the open-ended questions optional – participants did not have to answer about concerns if they did not want to, as we did not want to make the questionnaire too long and onerous to complete. Consequently, the number of academics responding to the open-ended questions was limited, emphasizing the need for additional data and alternative research methods to further these issues. The study was focused on investigating the concerns of HEI Saudi academics, recognizing that the attitudes and concerns of academics in other countries may differ. Furthermore, the research also includes an exploration of the changes in academic attitudes and concerns before and since the COVID-19 pandemic, which will be the subject of further data analysis.
Originality/value
This research delves into Saudi HEI academics' perceptions and concerns regarding privacy and security in online education during the COVID-19 Pandemic. Notably, it highlights the moderate priority placed on online privacy and security, the unexpectedly low usage of webcams and the potential for enhancing policies and training. The study emphasizes the necessity for comprehensive measures to protect sensitive data and the importance of tailored policies for educators. It also underscores the need for a more nuanced understanding of webcam usage dynamics, offering valuable insights for institutions aiming to improve online education and address educators' concerns amidst evolving educational landscapes.
Details
Keywords
Paula Rodríguez-Torrico, Rebeca San José Cabezudo and Sonia San-Martín
In the channel-mix era, the customer journey involves combining channels during all the stages of the decision-making process, such that creating and maintaining relationships…
Abstract
Purpose
In the channel-mix era, the customer journey involves combining channels during all the stages of the decision-making process, such that creating and maintaining relationships with consumers poses a challenge to retailers. This work aims to explore what role brands play in this issue by analyzing what impact the perceived benefits of brand channel-mix have on consumer self–brand connection (SBC) and what their effect is in enduring consumer–brand relationships (i.e. future channel-mix use and word of mouth [WOM]). This paper also explores the moderating role of product involvement in these relations.
Design/methodology/approach
The authors carried out a personal questionnaire with a sample of 288 consumers who were recruited after leaving one of the stores of a clothing brand that is a successful example of distribution channel management.
Findings
Insofar as consumers perceive channel-mix benefits, SBC will be higher and (or as a result) their future intentions with the brand will be more intense. In addition, the results show that product involvement moderates the relationship between SBC and channel-mix use intention and WOM.
Originality/value
This work contributes to channel-mix, relationship marketing, brand and product involvement literature by analyzing how customers may be retained in the channel-mix era through brand management and by considering product category involvement. This study merges brand and product variables to explore their impact on relationship marketing within channel-mix behaviors.
Details
Keywords
Alireza Moghayedi, Kathy Michell, Karen Le Jeune and Mark Massyn
Safety and security (S&S) are critical concerns in South Africa, especially in Cape Town, one of the country’s most crime-ridden cities. The University of Cape Town (UCT)…
Abstract
Purpose
Safety and security (S&S) are critical concerns in South Africa, especially in Cape Town, one of the country’s most crime-ridden cities. The University of Cape Town (UCT), situated on a large, open campus, has experienced increased malefaction. Facilities management (FM) services at universities bear the primary responsibility for providing S&S to their communities. To comprehensively understand and address the community’s demands regarding S&S, the current study was conducted to investigate the challenges specific to open universities. This study aims to determine whether implementing community-based FM (CbFM) principles and using technological innovations could offer a more effective and sustainable solution.
Design/methodology/approach
The study adopted interpretivist overarching case study methodology, which is ontologically based. A mixed-method approach was used to incorporate the strengths and limitations of the weaknesses of both methods. The data collection took the form of an online survey of the university community and semi-structured interviews with university executive management to obtain data from the single case study of UCT. Descriptive statistics were used to analyze the quantitative data, and thematic analysis was used to identify emergent themes from the qualitative data.
Findings
The study presents an overall view of the provision of S&S at UCT, the unique challenges faced by management and the main S&S issues affecting the community. Moreover, the study reveals that UCT has implemented community participation processes in the past with limited success. This is because the strategies implemented constitute a narrow perspective of community participation. Therefore, a much smarter and more inclusive perspective using technological innovation is required for successful community participation to occur and to be successfully used in providing S&S toward achieving future-proofing facilities.
Originality/value
This research has demonstrated the influence of CbFM and innovative technologies on the S&S of the open campus. Hence, future-proof facilities can be achieved when FM actively engages university communities in managing campuses through technological innovation.
Details
Keywords
Mustafa Saritepeci, Hatice Yildiz Durak, Gül Özüdoğru and Nilüfer Atman Uslu
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains…
Abstract
Purpose
Online privacy pertains to an individual’s capacity to regulate and oversee the gathering and distribution of online information. Conversely, online privacy concern (OPC) pertains to the protection of personal information, along with the worries or convictions concerning potential risks and unfavorable outcomes associated with its collection, utilization and distribution. With a holistic approach to these relationships, this study aims to model the relationships between digital literacy (DL), digital data security awareness (DDSA) and OPC and how these relationships vary by gender.
Design/methodology/approach
The participants of this study are 2,835 university students. Data collection tools in the study consist of personal information form and three different scales. Partial least squares (PLS), structural equation modeling (SEM) and multi-group analysis (MGA) were used to test the framework determined in the context of the research purpose and to validate the proposed hypotheses.
Findings
DL has a direct and positive effect on digital data security awareness (DDSA), and DDSA has a positive effect on OPC. According to the MGA results, the hypothesis put forward in both male and female sub-samples was supported. The effect of DDSA on OPC is higher for males.
Originality/value
This study highlights the positive role of DL and perception of data security on OPC. In addition, MGA findings by gender reveal some differences between men and women.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-03-2023-0122
Details
Keywords
Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…
Abstract
Purpose
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.
Design/methodology/approach
The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.
Findings
The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.
Research limitations/implications
This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.
Practical implications
Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.
Originality/value
The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.
Details
Keywords
Ghulam Mustafa, Waqas Rafiq, Naveed Jhamat, Zeeshan Arshad and Farhana Aziz Rana
This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and…
Abstract
Purpose
This study aims to evaluate blockchain as an e-government governance model. It assesses its alignment with legal frameworks, emphasizing robustness against disruptions and adherence to existing laws.
Design/methodology/approach
The paper explores blockchain’s potential in e-government, focusing on legal, ethical and governance aspects. It conducts an in-depth analysis of blockchain’s integration into data governance, emphasizing legal compliance and resilient security protocols.
Findings
The study comprehensively evaluates blockchain’s implementation, covering privacy, interoperability, consensus mechanisms, scalability and regulatory alignment. It highlights governance’s critical role in ensuring legal compliance within blockchain paradigms.
Research limitations/implications
Ethical and legal concerns arising from blockchain adoption remain unresolved. The study underscores how blockchain challenges its core principles of anonymity and decentralization in e-government settings.
Practical implications
The framework outlined offers potential for diverse technological environments, albeit raising ethical and legal queries. It emphasizes governance’s pivotal role in achieving legal compliance in blockchain adoption.
Social implications
Blockchain’s impact on legal and ethical facets necessitates further exploration to align with its core principles while addressing governance in e-government settings.
Originality/value
This study presents a robust framework for assessing blockchain’s viability in e-government, emphasizing legal compliance, despite ethical and legal intricacies that challenge its fundamental principles.
Details
Keywords
Chao Lu and Xiaohai Xin
The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address…
Abstract
Purpose
The promotion of autonomous vehicles introduces privacy and security risks, underscoring the pressing need for responsible innovation implementation. To more effectively address the societal risks posed by autonomous vehicles, considering collaborative engagement of key stakeholders is essential. This study aims to provide insights into the governance of potential privacy and security issues in the innovation of autonomous driving technology by analyzing the micro-level decision-making processes of various stakeholders.
Design/methodology/approach
For this study, the authors use a nuanced approach, integrating key stakeholder theory, perceived value theory and prospect theory. The study constructs a model based on evolutionary game for the privacy and security governance mechanism of autonomous vehicles, involving enterprises, governments and consumers.
Findings
The governance of privacy and security in autonomous driving technology is influenced by key stakeholders’ decision-making behaviors and pivotal factors such as perceived value factors. The study finds that the governmental is influenced to a lesser extent by the decisions of other stakeholders, and factors such as risk preference coefficient, which contribute to perceived value, have a more significant influence than appearance factors like participation costs.
Research limitations/implications
This study lacks an investigation into the risk sensitivity of various stakeholders in different scenarios.
Originality/value
The study delineates the roles and behaviors of key stakeholders and contributes valuable insights toward addressing pertinent risk concerns within the governance of autonomous vehicles. Through the study, the practical application of Responsible Innovation theory has been enriched, addressing the shortcomings in the analysis of micro-level processes within the framework of evolutionary game.
Details
Keywords
Joseph Ikechukwu Uduji and Nduka Elda Okolo-Obasi
The purpose of this paper is to critically examine the multinational oil companies’ (MOCs) corporate social responsibility (CSR) initiatives in Nigeria. Its special focus is to…
Abstract
Purpose
The purpose of this paper is to critically examine the multinational oil companies’ (MOCs) corporate social responsibility (CSR) initiatives in Nigeria. Its special focus is to investigate the impact of the global memorandum of understanding (GMoU) on gender and food security in the Niger Delta region of Nigeria.
Design/methodology/approach
This paper adopts a survey research technique aimed at gathering information from a representative sample of the population. A total of 800 women respondents were sampled across the rural areas of the Niger Delta region. It is essentially cross-sectional, describing and interpreting the current situation.
Findings
The results from the use of a combined propensity score matching (PSM) and logit model indicate that the CSR interventions of the MOCs using GMoUs have contributed to empowering women to effectively discharge their role in food and nutritional security. This is achieved by enhancing coherence in policies on gender, agriculture, nutrition, health, trade and other relevant areas in the Niger Delta. The findings also show that the CSR intervention of MOCs supported ecologically sound approaches to food production, such as agro-ecology that promotes sustainable farming and women’s empowerment in the region.
Practical implications
This suggests that recognizing and respecting the local knowledge of farmers, including women farmers, will help develop locally relevant food and nutrition security in sub-Saharan Africa.
Social implications
This implies that promoting the implementation of everybody’s right to food, particularly that of women, as well as giving women rights to other resources such as land, in addition to engaging women and men in challenging the inequitable distribution of food within the household, will help strengthen food security in Africa.
Originality/value
This research contributes to the gender debate in agriculture from a CSR perspective in developing countries and serves as a basis for the host communities to demand social projects. It concludes that corporate establishments have an obligation to help solve problems of public concern.
Details