Search results

1 – 10 of over 1000

Abstract

Details

Business and Management Doctorates World-Wide: Developing the Next Generation
Type: Book
ISBN: 978-1-78973-500-0

Article
Publication date: 26 September 2023

Philip Tin Yun Lee, Aki Pui Yi Hui, Richard Wing Cheung Lui and Michael Chau

This paper aims to examine why retail firms seldom achieve full integration of online and offline channels as prescribed in omni-channel literature. It examines the intermediate…

Abstract

Purpose

This paper aims to examine why retail firms seldom achieve full integration of online and offline channels as prescribed in omni-channel literature. It examines the intermediate process of channel integration from an internal, operational perspective.

Design/methodology/approach

This study is composed of two parts. In the first part, the authors interviewed informants from nine firms that were engaged in channel integration. In the second part, the authors conducted case studies with three firms from the cosmetics and skincare industry against the backdrop of the COVID-19 pandemic to find evidence to support or negate the propositions made in the first part.

Findings

The first part identified six operational challenges to channel integration. The authors categorized these challenges into two groups: inter-channel communication and inter-channel competition. Inter-channel competition carries more weight at the latter stage of integration. The authors also identified two antecedents that affect the seriousness of these challenges: heterogeneity among channels in business operation and external competitive pressure. In the second part, the authors found that both inter-channel communication and inter-channel competition were improved because of the external competitive pressure exerted by the COVID-19 pandemic. However, the heterogeneity of offline channels against online channels in business operation is a double-edged sword.

Originality/value

The study identifies the changing effects of the challenges of channel integration and their antecedents in the midst of integration. The positive influence of a specific dimension of channel heterogeneity against other channels increases and then decreases along channel integration. The identification of the changing effects lays the foundation for a finer stage model of channel integration.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

Abstract

Details

Microfinance and Development in Emerging Economies
Type: Book
ISBN: 978-1-83753-826-3

Article
Publication date: 17 January 2023

Hélène Bussy-Socrate and Karina Sokolova

Relying on social influence and sociomateriality theories, this research provides new insights about the social and material drivers relating to the sexualisation of online…

1008

Abstract

Purpose

Relying on social influence and sociomateriality theories, this research provides new insights about the social and material drivers relating to the sexualisation of online behaviour of social media influencers.

Design/methodology/approach

Using a netnographic approach, observation data were gathered from the Instagram accounts of 20 influencers dedicated to beauty and fashion. In addition, 15 in-depth interviews were conducted with women adopting sexualisation practices online. The data were analysed using an abductive strategy; all materials were coded according to thematic analysis principles.

Findings

The authors observe that sexualisation is a result of a complex system of social interactions encouraged and reinforced by multiple factors and actors. In particular, the authors outline the major influence of technology that has become a non-human authority defining implicit norms and shaping the beliefs and behaviours of women influencers.

Originality/value

In contrast to existing literature which mainly focuses on the negative consequences of sexualisation, this work sheds some light on social constructs in social media. The authors contribute to the growing literature on social media influencers. Although many works focus on their persuasiveness, this work helps to better understand the social setting, motivations and pressures that are contained in social and technological contexts.

Details

Information Technology & People, vol. 37 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 9 January 2023

Stephen McCarthy, Wendy Rowan, Carolanne Mahony and Antoine Vergne

Social media platforms are a pervasive technology that continues to define the modern world. While social media has brought many benefits to society in terms of connection and…

1159

Abstract

Purpose

Social media platforms are a pervasive technology that continues to define the modern world. While social media has brought many benefits to society in terms of connection and content sharing, numerous concerns remain for the governance of social media platforms going forward, including (but not limited to) the spread of misinformation, hate speech and online surveillance. However, the voice of citizens and other non-experts is often missing from such conversations in information systems literature, which has led to an alleged gap between research and the everyday life of citizens.

Design/methodology/approach

The authors address this gap by presenting findings from 16 h of online dialog with 25 citizens on social media platform governance. The online dialog was undertaken as part of a worldwide consultation project called “We, the internet”, which sought to provide citizens with a voice on a range of topics such as “Digitalization and Me,” “My Data, Your Data, Our Data” and “A Strong Digital Public Sphere.” Five phases of thematic analysis were undertaken by the authors to code the corpus of qualitative data.

Findings

Drawing on the Theory of Communicative Action, the authors discuss three dialogical processes critical to citizen discourse: lifeworld reasoning, rationalization and moral action. The findings point toward citizens’ perspectives of current and future issues associated with social media platform governance, including concerns around the multiplicity of digital identities, consent for vulnerable groups and transparency in content moderation. The findings also reveal citizens’ rationalization of the dilemmas faced in addressing these issues going forward, including tensions such as digital accountability vs data privacy, protection vs inclusion and algorithmic censorship vs free speech.

Originality/value

Based on outcomes from this dialogical process, moral actions in the form of policy recommendations are proposed by citizens and for citizens. The authors find that tackling these dark sides of digitalization is something too important to be left to “Big Tech” and equally requires an understanding of citizens’ perspectives to ensure an informed and positive imprint for change.

Details

Internet Research, vol. 33 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 7 September 2023

Ariana Polyviou, Nancy Pouloudi and Will Venters

The authors study how cloud adoption decision making unfolds in organizations and present the dynamic process leading to a decision to adopt or reject cloud computing. The authors…

Abstract

Purpose

The authors study how cloud adoption decision making unfolds in organizations and present the dynamic process leading to a decision to adopt or reject cloud computing. The authors thus complement earlier literature on factors that influence cloud adoption.

Design/methodology/approach

The authors adopt an interpretive epistemology to understand the process of cloud adoption decision making. Following an empirical investigation drawing on interviews with senior managers who led the cloud adoption decision making in organizations from across Europe. The authors outline a framework that shows how cloud adoptions follow multiple cycles in three broad phases.

Findings

The study findings demonstrate that cloud adoption decision making is a recursive process of learning about cloud through three broad phases: building perception about cloud possibilities, contextualizing cloud possibilities in terms of current computing resources and exposing the cloud proposition to others involved in making the decision. Building on these findings, the authors construct a framework of this process which can inform practitioners in making decisions on cloud adoption.

Originality/value

This work contributes to authors understanding of how cloud adoption decisions unfold and provides a framework for cloud adoption decisions that has theoretical and practical value. The study further demonstrates the role of the decision-leader, typically the CIO, in this process and identifies how other internal and external stakeholders are involved. It sheds light on the relevance of the phases of the cloud adoption decision-making process to different cloud adoption factors identified in the extant literature.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 26 April 2023

Alireza Shojaifar and Samuel A. Fricker

This paper aims to present the evaluation of a self-paced tool, CyberSecurity Coach (CYSEC), and discuss the adoption of CYSEC for cybersecurity capability improvement in small…

Abstract

Purpose

This paper aims to present the evaluation of a self-paced tool, CyberSecurity Coach (CYSEC), and discuss the adoption of CYSEC for cybersecurity capability improvement in small- and medium-sized enterprises (SMEs). Cybersecurity is increasingly a concern for SMEs. Previous literature has explored the role of tools for awareness raising. However, few studies validated the effectiveness and usefulness of cybersecurity tools for SMEs in real-world practices.

Design/methodology/approach

This study is built on a qualitative approach to investigating how CYSEC is used in SMEs to support awareness raising and capability improvement. CYSEC was placed in operation in 12 SMEs. This study first conducted a survey study and then nine structured interviews with chief executive officers (CEOs) and chief information security officers (CISO).

Findings

The results emphasise that SMEs are heterogeneous. Thus, one cybersecurity solution may not suit all SMEs. The findings specify that the tool’s adoption varied quite widely. Four factors are primary determinants influencing the adoption of CYSEC: personalisation features, CEOs’ or CISOs’ awareness level, CEOs’ or CISOs’ cybersecurity and IT knowledge and skill and connection to cybersecurity expertise.

Originality/value

This empirical study provides new insights into how a self-paced tool has been used in SMEs. This study advances the understanding of cybersecurity activities in SMEs by studying the adoption of CYSEC. Moreover, this study proposes significant dimensions for future research.

Details

Information & Computer Security, vol. 31 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 November 2023

Marko Niemimaa

The purpose of this research is to study how compliance evaluation becomes performed in practice. Compliance evaluation is a common practice among organizations that need to…

Abstract

Purpose

The purpose of this research is to study how compliance evaluation becomes performed in practice. Compliance evaluation is a common practice among organizations that need to evaluate their posture against a set of criteria (e.g. a standard, legislative framework and “best practices”). The results of these evaluations have significant importance for organizations, especially in the context of information security and continuity. The author argues that how these evaluations become performed is not merely a “social” activity but shaped by the materiality of the evaluation criteria

Design/methodology/approach

The authors adopt a sociomaterial practice-based view to study the compliance evaluation through in situ participant observations from compliance evaluation workshops to evaluate organizational compliance against a information security and business continuity criteria. The empirical material was analyzed to construct vignettes that serve to illustrate the practice of compliance evaluation.

Findings

The research analysis shows how the information security and business continuity criteria themselves partake in the compliance evaluations by operating through (ventriloqually) the evaluators on three strata: the material, the textual and the structural. The author also provides a conceptualization of a hybrid agency.

Originality/value

This research contributes to lack of studies on the organizational-level compliance. Further, the research is an original contribution to information security and business continuity management by focusing on the practices of compliance evaluation. Further, the research has theoretical novelty by adopting the ventriloqual agency as a hybrid agency to study the sociomateriality of a phenomenon.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 November 2023

Salman Shooshtarian, Tayyab Maqsood, Peter S.P. Wong, Savindi Caldera, Tim Ryley, Atiq Zaman and Ana María Cáceres Ruiz

The utilisation of products with recycled content (PwRC) in construction projects has been identified as a targeted way to achieve sustainable management of construction and…

Abstract

Purpose

The utilisation of products with recycled content (PwRC) in construction projects has been identified as a targeted way to achieve sustainable management of construction and demolition waste resources. However, sustainable applications of these resources are subject to a wide array of factors that demand a thorough investigation. This study, therefore, explores the motivations, barriers and strategies for optimal PwRC uptake using a multiple-case study approach.

Design/methodology/approach

This study adopted an interpretive multiple-case study approach. The case studies were selected from recently completed construction projects including two infrastructure projects, one commercial project and one residential project. A series of semi-structured interviews were carried out to collect the data. For each case study, four participants were interviewed; these participants represented design, client, supply and building teams.

Findings

The study revealed the main barriers, motivations and opportunities for adoption of PwRC resources in four construction projects. These factors are believed to influence the utilisation of PwRC to varying extents and/or in diverse ways. The findings also suggest that there is a significant opportunity for stakeholders to adopt more sustainable waste management practices, and the use of institutional drivers can help achieve this goal.

Research limitations/implications

The primary research contribution of the study lies in proposing three key research directions: investigating regulatory constraints impacting the use of PwRC, addressing supply chain challenges and enhancing quality assurance.

Originality/value

The research has a practical contribution to the industry through a suite of actionable strategies to increase the uptake of PwRC. The strategies are mostly focussed on stakeholders' education, the regulation that supports PwRC and project management planning. The two major motivations – referring to two of the three pillars of sustainability (economy and environment) – provide a basis for organisational changes to ensure achieving sustainability in construction activities.

Details

Smart and Sustainable Built Environment, vol. 13 no. 2
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 4 October 2022

Carolina Yukari Veludo Watanabe, Eduardo Henrique Diniz and Eusebio Scornavacca

This paper aims to identify the role of blogs in helping women victims of intimate partner sexual violence to restore their self-integrity.

Abstract

Purpose

This paper aims to identify the role of blogs in helping women victims of intimate partner sexual violence to restore their self-integrity.

Design/methodology/approach

The authors’ research uses an interpretive stance, supported by motivational and “self” theories to analyze 33 blogs reporting the experiences of women in Brazil who suffered sexual violence perpetrated by an intimate partner.

Findings

This study identifies the reasons why women who suffer violence from intimate partners write blog posts. It also develops an analytical framework that bridges the gap between the design and use of IT-artifacts and the context of sexual violence from an intimate partner. Women who suffer violence from intimate partners look for blogs in order to find a safe space for expression, a knowledge hub and a social support network. Blogs play a pivotal role in supporting the journey of reconstructing their self-integrity.

Research limitations/implications

The results help to understand the role of blogs in helping victims in vulnerable situations trying to restore their self-integrity. It also contributes to improve the design and functionality of such platforms as an important resource for social support networks.

Practical implications

This study shows the positive impact of blogs as a tool to support victims in the process of restoring their self-integrity.

Social implications

This study aims to promote the use of digital artifacts such as blogs as a complementary instrument to fight violence against women.

Originality/value

The analytical framework used in this paper helps to understand the role of IT-artifacts in the context of sexual violence from an intimate partner.

Details

Information Technology & People, vol. 36 no. 6
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 1000