Search results
1 – 3 of 3Poornima Tapas and Deepa Pillai
The purpose of this study is to examine and interpret the findings from different sources on the corporate decisions during COVID-19.
Abstract
Purpose
The purpose of this study is to examine and interpret the findings from different sources on the corporate decisions during COVID-19.
Design/methodology/approach
The COVID-19 is a new phenomenon; grounded theory research approach is adopted to develop propositions on prospect theory and strategic decisions. The paper examines and interprets the findings from different sources on the corporate decisions during COVID-19.
Findings
Conventionally, it is believed that innovation brings risks, and individuals preferred certainty over uncertainty, even if the gains under uncertainty were twice as high. But, the results of the study indicate a divergent trend. Under threat perceptions of risks, companies explore significant opportunities and possibilities for organizational growth.
Practical implications
The study provides a framework to analyze the strategic decisions of corporate enterprises. The decisions replicate value function as concave in a gain situation and convex in a loss realm in times of pandemic crises.
Originality/value
This paper uses “actions taken” by enterprises offering various solutions in the testing times. The study is multidisciplinary in nature; it analyses the transformation strategic decisions in the context of economic and social dimensions for surviving the pandemic crises. The study provides a foundation for future research, as inferences are based on select examples.
Details
Keywords
Deepa Mishra, Angappa Gunasekaran, Stephen J. Childe, Thanos Papadopoulos, Rameshwar Dubey and Samuel Wamba
The emergent field of Internet of Things (IoT) has been evolving rapidly with a geometric growth in the number of academic publications in this field. The purpose of this paper is…
Abstract
Purpose
The emergent field of Internet of Things (IoT) has been evolving rapidly with a geometric growth in the number of academic publications in this field. The purpose of this paper is to review the literature of IoT in past 16 years using rigorous bibliometric and network analysis tools, offering at the same time future directions for the IoT research community and implications for managers and decision makers.
Design/methodology/approach
The authors adopted the techniques of bibliometric and network analysis. The paper reviewed the articles published on IoT from 2000 to 2015.
Findings
This study identifies top contributing authors; key research topics related to the field; the most influential works based on citations and PageRank; and established and emerging research clusters. Scholars are encouraged to further explore this topic.
Research limitations/implications
This study focusses only on vision and applications of IoT. Scholars may explore various other aspects of this area of research.
Originality/value
To the best of authors’ knowledge, this is the first study to review the literature on IoT by using bibliometric and network analysis techniques. The study is unique as it spans a long time period of 16 years (2000-2015). The study proposes a five-cluster classification of research themes that may inform current and future research in IoT.
Details
Keywords
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details