Search results

1 – 10 of 10
Article
Publication date: 9 April 2024

Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…

Abstract

Purpose

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.

Design/methodology/approach

Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.

Findings

Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.

Originality/value

Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 23 October 2023

Alexander (Degreat) Narh Tetteh, Qingxiong (Derek) Weng, Lincoln Jisuvei Sungu and Magdalene Zeinab Akosua Adams

The aim of this study is to understand the levels (i.e. mild vs intense) of task conflict (TC) expressions between angel investors and entrepreneurs at the post-investment stage…

Abstract

Purpose

The aim of this study is to understand the levels (i.e. mild vs intense) of task conflict (TC) expressions between angel investors and entrepreneurs at the post-investment stage and how it affect angel investors’ follow-on investment intentions with the same entrepreneur.

Design/methodology/approach

Survey data was gathered from 71 angel investors in China. Mplus was used to test the proposed research model.

Findings

This study found that angels perceive affective conflict (AC) when engaged in intense TC, unlike the case for mild TC expressions. Furthermore, the analysis shows that, unlike mild TC expressions, intense TC expressions impede angels’ reinvestment intentions when they perceive ACs. Other results indicate that when angels perceive that entrepreneurs are not open to coaching, the prominence of mild TC expression is sharply mitigated and becomes as detrimental as intense TC expressions.

Research limitations/implications

This study only focused on one specific aspect of the angel–entrepreneur post-investment relationship: The effect of their TC expressions on angels’ reinvestment intentions. By no means do the authors imply that TC expression in the angel–entrepreneur post-investment relationship is the only factor that matters to angel investors in their follow-on investment intentions with the same entrepreneur.

Practical implications

The findings suggest that entrepreneurs should pay careful attention to TC that may arise between them and their financiers. TCs are not entirely detrimental, but their negative effect might depend on how they are expressed. An appropriate level of TC may also improve enterprise performance and collaboration. Thus, angels and entrepreneurs should set clear goals and performance standards, where task interactions mainly focus on the goals and expected outcomes.

Originality/value

Prior to this study, little was known about whether all TCs potentially lead to ACs. By distinguishing between levels (i.e. mild vs intense) of TC expressions between angels and entrepreneurs, this study adds a novel aspect to it by showing that TC, in and of itself, does not necessarily lead to AC but can lead to AC once its intensity grows.

Details

International Journal of Conflict Management, vol. 35 no. 2
Type: Research Article
ISSN: 1044-4068

Keywords

Book part
Publication date: 13 November 2023

Joel O. Powell and Rylan Fitzpatrick

Viral videos of police violence create demands for new police narratives about using force. Public reactions to videos lead spokespeople to provide justifications that support…

Abstract

Viral videos of police violence create demands for new police narratives about using force. Public reactions to videos lead spokespeople to provide justifications that support narrative structures of the necessity and inevitability of police violence. Ultimately, video is presented as lacking context and credibility when it is viewed unaccompanied by police explanations.

Details

Festschrift in Honor of David R. Maines
Type: Book
ISBN: 978-1-83753-486-9

Keywords

Article
Publication date: 6 October 2023

Yu (Viviane) Chen

The purpose of this study is to conceptually integrate business to consumer (B2C) into business to business (B2B), with a holistic consumer-centric, technology-reinforced…

Abstract

Purpose

The purpose of this study is to conceptually integrate business to consumer (B2C) into business to business (B2B), with a holistic consumer-centric, technology-reinforced, long-term vision for tourism industries and companies to survive and succeed in the era of new technologies 4.0. The research suggests that the tourism-marketing-new technologies decision-making involves customers as the center of the design and decision process.

Design/methodology/approach

The research design includes a qualitative study with 94 in-depth interviews, a literature analysis and a conceptual proposition. The qualitative study follows the tourism consumer desire data analysis, from categorization to integration. The literature analysis applies a systematic literature review approach based on the 29 most up-to-date new-tech papers from peer-reviewed journals. The analysis compares qualitative research findings and literature analysis results and matches the new technology applications with consumer desire understanding. The conceptual framework of tourism marketing/advertising is proposed based on qualitative research and literature analysis.

Findings

The qualitative research deciphers that consumers, based on their imagination and memorization, desire therapy and sceneries and connect such desires to the empathetic and resonating advertising messages. The literature analysis synthesizes the new tech applications in tourism and matches the qualitative research findings with the deciphered desires in tourism. The conceptual model proposes that B2C should be integrated into B2B to provide value for both consumers and businesses and opens avenues of research on this topic.

Research limitations/implications

This research has made the following theoretical contributions: it offers an in-depth understanding of consumer desire, often hidden or subconscious, in the field of tourism. Consumer desires regarding tourism are mostly subconscious and exist long before consumers are exposed to advertising messages. These desires reflect the search for therapy and sceneries and become “embodied” – they exist on multisensorial levels and become part of the body and life and will lead consumers into positive perceptions when marketing communications/advertisements resonate with them. In the latter case, they will subjectively judge advertising as “good,” regardless of the advertising design quality. The research also connects consumer research with a new technologies research review and proposes a conceptual framework to integrate business to consumer (B2C) with business to business (B2B). As such, the research makes theoretical contributions to the integration or the “boundary blurring” between B2C and B2B research and practical suggestions that involved industries and consumers may all benefit from such integration. Conceptually, there is a lack of discussions of the pitfalls of new technologies, a dearth of empirical verification of the applications of new technologies in the proposed fields and a shortage of discussions about ethical issues. Qualitative methods, offering an efficient tool for understanding consumer desires in the tourism industry, have their own limits, as discussed in previous research. The sample is limited to the state of New York population and may be influenced by geographic, demographic and psychological characteristics related to the region.

Practical implications

This research provides advertising practitioners, new technology innovators and tourism industries with a framework to face the combined challenges of understanding hidden consumer desires and applying adequate technologies that resonate with consumer desires to tackle relevant issues. The conceptual proposition of this research fills the gap between qualitative consumer research without concrete practical resolution and new technologies applications without in-depth consumer understanding. Through the conceptual framework, the author provides insights into how industries may benefit from consumer understanding. The business relationships among the industries of marketing, tourism and new technologies should be centered around consumers. Thus, B2C and B2B should be naturally integrated into business practices.

Social implications

Social implications of this research include three major points: first, the understanding of consumer desire for therapeutic power in tourism, which invites more attention to tourism as part of social well-being design instead of a purely for-profit business. Second, a profound comprehension of what consumers need and desire, without which the applications of new technologies may cause severe societal problems. Third, a way to tailor to consumers’ individuality and desires for advertising/marketing that may be considered abusive, stressful and socially destructive if applied in a nonpersonal manner.

Originality/value

Conceptually, this research adds consumer desire, an originally B2C concept, to the B2B context regarding the new technology applications in tourism marketing/advertising. It contributes to the B2B literature by proposing a strong consumer-centric approach, especially the consumer desire understanding, that is not yet investigated in the B2B literature; and a combination of empirical study and literature analysis and the matching of the two for better practice of advertising/marketing, tourism and new technologies applications.

Details

Journal of Business & Industrial Marketing, vol. 39 no. 1
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 6 July 2022

Xin Xia and Pengcheng Xiang

Managers of megaprojects face social risk management challenges throughout the various design, construction, and operation stages, owing to the various conflicts of interest among…

Abstract

Purpose

Managers of megaprojects face social risk management challenges throughout the various design, construction, and operation stages, owing to the various conflicts of interest among stakeholders, public skepticism, and opposition. However, most existing studies have not focused on the dynamic analysis of integrating social risks in these stages. This study developed a dynamic analysis approach to explore the dynamics of critical social risk factors and related stakeholders of megaprojects and built the managerial maps for various stakeholders.

Design/methodology/approach

Based on the social analysis network (SNA), a dynamic network analysis approach for understanding the dynamics of social risk and related stakeholders has been developed by literature and case analysis. The approach comprises the following steps: (1) generating social risk–stakeholder networks in different stages; (2) analysis of the critical stakeholders and social risk factors; (3) dynamic analysis of social risk factors; and (4) developing social risk management maps for various stakeholders. To verify the feasibility and effectiveness of the approach, 40 megaprojects from China were analyzed.

Findings

According to the results, the local government is a critical stakeholder during all stages, inadequate information promotion (IIP) and imperfect communication and coordination mechanism (ICCM) are key social risk sources throughout the megaproject life cycle. Furthermore, the management maps for government organizations, project implementation groups, and external stakeholders were constructed.

Originality/value

This research has three contributions. First, a dynamic analysis approach of stakeholder-associated social risks in megaprojects is developed, which enriches the social risk management theory of megaprojects and provides inspiration for future research focus. Second, the social risk–stakeholder networks and critical social risks in different stages are confirmed to provide a more valid and accurate picture of social risk management in megaprojects. Third, the social risk managerial maps for different stakeholders built in this research will be beneficial for governments, project implementation groups, and external stakeholders to optimize management strategies.

Details

Engineering, Construction and Architectural Management, vol. 30 no. 10
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 2 April 2024

Minyan Wei, Juntao Zheng, Shouzhen Zeng and Yun Jin

The main aim of this paper is to establish a reasonable and scientific evaluation index system to assess the high quality and full employment (HQaFE).

22

Abstract

Purpose

The main aim of this paper is to establish a reasonable and scientific evaluation index system to assess the high quality and full employment (HQaFE).

Design/methodology/approach

This paper uses a novel Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) multi-criteria framework to evaluate the quality and quantity of employment, wherein the integrated weights of attributes are determined by the combined the Criteria Importance Through Inter-criteria Correlation (CRITIC) and entropy approaches.

Findings

Firstly, the gap in the Yangtze River Delta in employment quality is narrowing year by year; secondly, employment skills as well as employment supply and demand are the primary indicators that determine the HQaFE; finally, the evaluation scores are clearly hierarchical, in the order of Shanghai, Jiangsu, Zhejiang and Anhui.

Originality/value

A scientific and reasonable evaluation index system is constructed. A novel CRITIC-entropy-TOPSIS evaluation is proposed to make the results more objective. Some policy recommendations that can promote the achievement of HQaFE are proposed.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Open Access
Article
Publication date: 15 February 2024

Pertti Vakkari

The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the…

Abstract

Purpose

The purpose of this paper is to characterize library and information science (LIS) as fragmenting discipline both historically and by applying Whitley’s (1984) theory about the organization of sciences and Fuchs’ (1993) theory about scientific change.

Design/methodology/approach

The study combines historical source analysis with conceptual and theoretical analysis for characterizing LIS. An attempt is made to empirically validate the distinction between LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.

Findings

The origin of fragmentation in LIS due the contributions of other disciplines can be traced in the 1960s and 1970s for solving the problems produced by the growth of scientific literature. Computer science and business established academic programs and started research relevant to LIS community focusing on information retrieval and bibliometrics. This has led to differing research interests between LIS and other disciplines concerning research topics and methods. LIS has been characterized as fragmented adhocracy as a whole, but we make a distinction between research topics LIS context, L&I services and information seeking as fragmented adhocracies and information retrieval and scientific communication (scientometrics) as technologically integrated bureaucracies.

Originality/value

The paper provides an elaborated historical perspective on the fragmentation of LIS in the pressure of other disciplines. It also characterizes LIS as discipline in a fresh way by applying Whitley’s (1984) theory.

Details

Journal of Documentation, vol. 80 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 19 September 2023

Mohamad Zreik

This paper aims to examine the USA's policy toward Myanmar or Burma, analyzing the bilateral relationship between the two countries from the pre-colonial period to the present…

Abstract

Purpose

This paper aims to examine the USA's policy toward Myanmar or Burma, analyzing the bilateral relationship between the two countries from the pre-colonial period to the present day. It highlights the implications of political shifts in the system of government in Myanmar for the bilateral relationship with the USA, particularly after the 1962 coup and the emergence of rising regional powers like China. The paper also shows how the economic role of Myanmar has increased, leading to more equal relations with the United States of America.

Design/methodology/approach

This paper employs a qualitative research design, analyzing data from both primary and secondary sources. The methodology includes a literature review and document analysis to gain a comprehensive understanding of the USA–Myanmar bilateral relationship. The research also analyzes political and economic developments in Myanmar and the region, placing the USA policy in a broader context.

Findings

The research finds that the USA has been an influential player in Myanmar's politics and economy. However, with Myanmar's integration into the Chinese Belt and Road Initiative and its accession to Association of Southeast Asian Nations (ASEAN), its economic role has become more significant, leading to a more balanced relationship with the USA. The paper also shows that the USA's policy toward Myanmar has undergone significant changes, particularly after the 2011 easing of sanctions by former President Barack Obama.

Originality/value

Although many works have traced the history of USA–Myanmar ties, this study provides a fresh perspective by setting past events against the backdrop of contemporary geopolitical upheavals, therefore highlighting the complex evolution of their bilateral dynamics. The paper contributes to the literature on the USA–Myanmar bilateral relationship by providing a comprehensive analysis of the relationship from a historical perspective. The research also adds to the discussion of the implications of political and economic developments in Myanmar for the bilateral relationship with the USA. The findings of this study have important implications for policymakers and scholars interested in the USA's role in Southeast Asia and its relations with rising regional powers like China.

Details

Southeast Asia: A Multidisciplinary Journal, vol. 23 no. 3
Type: Research Article
ISSN: 1819-5091

Keywords

Article
Publication date: 18 March 2024

James D. Grant

The goal was emancipatory, to characterise and dislodge oppressive management practices, to allow for the possibility of seeking an alternative organisational construction free of…

Abstract

Purpose

The goal was emancipatory, to characterise and dislodge oppressive management practices, to allow for the possibility of seeking an alternative organisational construction free of postcolonial/subaltern subordination and discrimination in a local, well-documented narrative.

Design/methodology/approach

The study was informed by a postcolonial/subaltern perspective and drew on the employment experience of an Aboriginal woman, Canada’s first Indigenous Dean of a law school. The researcher employed a combination of case study and critical discourse analysis with the aim of advancing rich analyses of the complex workings of power and privilege in sustaining Western, postcolonial relations.

Findings

The study made several conclusions: first, that the institution, a medium-sized Canadian university, carefully controlled the Indigenous subaltern to remake her to be palatable to Western sensibilities. Second, the effect of this control was to assimilate her, to subordinate her Indigeneity and to civilise in a manner analogous to the purpose of Indian residential schools. Third, that rather than management’s action being rational and neutral, focused on goal attainment, efficiency and effectiveness, it was an implicit moral judgement based on her race and an opportunity to exploit her value as a means for the university’s growth and status.

Originality/value

Through a postcolonial/subaltern perspective, this study demonstrated how management practices reproduced barriers to the participation of an Indigenous woman and the First Nations community that an organisation was intended to serve. The study demonstrated how a Western perspective – that of a university’s administration, faculty and staff – was privileged, or taken for granted, and the Indigenous perspective subordinated, as the university remained committed to the dispossession of Indigenous knowledge and values.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 19 no. 1
Type: Research Article
ISSN: 1746-5648

Keywords

Article
Publication date: 12 July 2023

Muhammad Asif, Rab Nawaz Lodhi, Farhan Sarwar and Muhammad Ashfaq

The current study focuses on many risk categories that have emerged in the digital ecosystem of the financial technology industry, which has dramatically changed traditional…

Abstract

Purpose

The current study focuses on many risk categories that have emerged in the digital ecosystem of the financial technology industry, which has dramatically changed traditional financial systems as a result of innovations in financial technology.

Design/methodology/approach

The Web of Science Core Collection database was used to find a data set of 719 pertinent papers on the subject encompassing the year 2015–2023. The sample procedure was carried out utilising the PRISMA approach. The keywords were first gathered relating to technological risks in banking sectors and after confirming the keywords, the authors performed the search by the “topic” which covers “title” in the search bar. On February 15, 2023, the Web of Science database was searched using the terms “Cyber security risk OR data theft OR financial crimes OR financial stability risk OR operational risk OR default risk OR money laundering OR financial terrorism AND FinTech AND banking sector”. Two-step approach is applied in this study. First, descriptive analysis is applied using RStudio to highlight prominent authors, countries and affiliations. Furthermore, relationship among authors, countries and keywords is shown by using three fields plot. Second, using VOSviewer, co-occurrence of keyword analysis is used to determine the most influential themes.

Findings

The findings show that 2,611 documents have been published from 2016 to 2023. Year 2021 is the most productive year in terms of number of publications. The results also show that WANG XC is tied for the position of most prolific contributing author. In a similar vein, the United States leads the world in publication output. Furthermore, Southwestern University of Finance and Economics in China is leading the list with 15 articles. The results from the co-occurrence of keywords reveal that “default risk”, “operational risk”, “money laundering”, “credit risk”, “corporate governance”, “systematic risk”, “financial stability risk”, “risk management” and “crises” are the frequently keywords.

Originality/value

The results of this study are beneficial to academia and industry in order to advance their current understanding of FinTech and associated concerns. This work expands the understanding of the technology hazards facing the banking industry from a broad perspective.

Details

International Journal of Bank Marketing, vol. 42 no. 1
Type: Research Article
ISSN: 0265-2323

Keywords

1 – 10 of 10