Search results

1 – 10 of 216
Article
Publication date: 11 April 2023

Augusto Bargoni, Fauzia Jabeen, Gabriele Santoro and Alberto Ferraris

Few studies have conceptualized how companies can build and nurture international dynamic marketing capabilities (IDMCs) by implementing growth hacking strategies. This paper…

1068

Abstract

Purpose

Few studies have conceptualized how companies can build and nurture international dynamic marketing capabilities (IDMCs) by implementing growth hacking strategies. This paper conceptualizes growth hacking, a managerial-born process to embed a data-driven mind-set in marketing decision-making that combines big-data analysis and continuous learning, allowing companies to adapt their dynamic capabilities to the ever-shifting international competitive arenas.

Design/methodology/approach

Given the scarcity of studies on growth hacking, this paper conceptualizes this managerial-born concept through the double theoretical lenses of IDMCs and information technology (IT) literature.

Findings

The authors put forward research propositions concerning the four phases of growth hacking and the related capabilities and routines developed by companies to deal with international markets. Additional novel propositions are also developed based on the three critical dimensions of growth hacking: big data analytics, digital marketing and coding and automation.

Research limitations/implications

Lack of prior conceptualization as well as the scant literature makes this study liable to some limitations. However, the propositions developed should encourage researchers to develop both empirical and theoretical studies on this managerial-born concept.

Practical implications

This study develops a detailed compendium for managers who want to implement growth hacking within their companies but have failed to identify the necessary capabilities and resources.

Originality/value

The study presents a theoretical approach and develops a set of propositions on a novel phenomenon, observed mainly in managerial practice. Hence, this study could stimulate researchers to deepen the phenomenon and empirically validate the propositions.

Expert briefing
Publication date: 1 March 2024

This leak included corporate documents and internal communications, and detailed a suite of spyware applications developed by Shanghai-based cybersecurity company I-Soon, a…

Executive summary
Publication date: 7 May 2024

INT: Russian hacking will keep ties with West tense

Details

DOI: 10.1108/OXAN-ES286877

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 20 February 2024

NORTH KOREA: Defence is key to combatting hacking

Details

DOI: 10.1108/OXAN-ES285361

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 26 March 2024

Valérie Mérindol and David W. Versailles

Innovation management in the healthcare sector has undergone significant evolutions over the last decades. These evolutions have been investigated from a variety of perspectives…

Abstract

Purpose

Innovation management in the healthcare sector has undergone significant evolutions over the last decades. These evolutions have been investigated from a variety of perspectives: clusters, ecosystems of innovation, digital ecosystems and regional ecosystems, but the dynamics of networks have seldom been analyzed under the lenses of entrepreneurial ecosystems (EEs). As identified by Cao and Shi (2020), the literature is silent about the organization of resource allocation systems for network orchestration in EEs. This article investigates these elements in the healthcare sector. It discusses the strategic role played by entrepreneurial support organizations (ESOs) in resource allocation and elaborates on the distinction between sponsored and nonsponsored ESOs in EEs. ESOs are active in network orchestration. The literature explains that ESOs lift organizational, institutional and cultural barriers, and support entrepreneurs' access to cognitive and technological resources. However, allocation models are not yet discussed. Therefore, our research questions are as follows: What is the resource allocation model in healthcare-related EEs? What is the role played by sponsored and nonsponsored ESOs as regards resource allocation to support the emergence and development of EEs in the healthcare sector?

Design/methodology/approach

The article offers an explanatory, exploratory, and theory-building investigation. The research design offers an abductive research protocol and multi-level analysis of seven (sponsored and nonsponsored) ESOs active in French healthcare ecosystems. Field research elaborates on semi-structured interviews collected between 2016 and 2022.

Findings

This article shows explicit complementarities between top-down and bottom-up resource allocation approaches supported by ESOs in the healthcare sector. Despite explicit originalities in each approach, no network orchestration model prevails. Multi-polar coordination is the rule. Entrepreneurs' access to critical technological and cognitive resources is based on resource allocation modalities that differ for sponsored versus nonsponsored ESOs. Emerging from field research, this research also shows that sponsored and nonsponsored ESOs manage their roles in different ways because they confront original issues about organizational legitimacy.

Originality/value

Beyond the results listed above, the main originalities of the paper relate to the instantiation of multi-level analysis operated during field research and to the confrontation between sponsored versus nonsponsored ESOs in the domain of healthcare-related innovation management. This research shows that ESOs have practical relevance because they build original routes for resource allocation and network orchestration in EEs. Each ESO category (sponsored versus nonsponsored) provides original support for resource allocation. The ESO's legitimacy is inferred either from the sponsor or the services delivered to end-users. This research leads to propositions for future research and recommendations for practitioners: ESO managers, entrepreneurs, and policymakers.

Details

International Journal of Entrepreneurial Behavior & Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-2554

Keywords

Article
Publication date: 23 April 2024

Chen Zhong, Hong Liu and Hwee-Joo Kam

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…

11

Abstract

Purpose

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity competitions among Reddit users. These users constitute a substantial demographic of young individuals, often participating in communities oriented towards college students or cybersecurity enthusiasts. The authors specifically focus on novice learners who showed an interest in cybersecurity but have not participated in competitions. By understanding their views and concerns, the authors aim to devise strategies to encourage their continuous involvement in cybersecurity learning. The Reddit platform provides unique access to this significant demographic, contributing to enhancing and diversifying the cybersecurity workforce.

Design/methodology/approach

The authors propose to mine Reddit posts for information about learners’ attitudes, interests and experiences with cybersecurity competitions. To mine Reddit posts, the authors developed a text mining approach that integrates computational text mining and qualitative content analysis techniques, and the authors discussed the advantages of the integrated approach.

Findings

The authors' text mining approach was successful in extracting the major themes from the collected posts. The authors found that motivated learners would want to form a strategic way to facilitate their learning. In addition, hope and fear collide, which exposes the learners’ interests and challenges.

Originality/value

The authors discussed the findings to provide education and training experts with a thorough understanding of novice learners, allowing them to engage them in the cybersecurity industry.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 May 2024

Richard Kapend, Mark Button and Peter Stiernstedt

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional…

Abstract

Purpose

A significant number of criminal and deviant acts are investigated by nonpolice actors. These include private investigators who charge fees for their services, professional services firms such as firms of accountants who also charge fees, in-house investigators employed by private organisations and in-house investigators of public sector organisations who are not sworn police officers. Some of these investigators, such as private investigators, have been exposed in unethical activities such as illegal surveillance and blagging to name some. In this respect, this study aims to uncover the ethical orientations of investigators using cluster analysis.

Design/methodology/approach

This study is based upon an online survey of private investigators predominantly in the UK, i.e. investigators beyond the public police. An innovate statistical inferential analysis was used to investigate the sample which resulted in the development of three ethical orientations of such investigators.

Findings

Based upon a survey response from 331 of these types of investigators this study illustrates the extent they engage in unethical activities, showing a very small minority of largely private investigators who engage in such activities.

Originality/value

A unique feature of this study is the use of an innovative statistical approach using an unsupervised machine learning model, namely, TwoStep cluster analysis, to successfully group and classify respondents based on their ethical orientation. The model derived three types of ethical orientation: ethical, inbetweeners and risk takers.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 2 April 2024

Tiera Chante Tanksley

This paper aims to center the experiences of three cohorts (n = 40) of Black high school students who participated in a critical race technology course that exposed anti-blackness…

Abstract

Purpose

This paper aims to center the experiences of three cohorts (n = 40) of Black high school students who participated in a critical race technology course that exposed anti-blackness as the organizing logic and default setting of digital and artificially intelligent technology. This paper centers the voices, experiences and technological innovations of the students, and in doing so, introduces a new type of digital literacy: critical race algorithmic literacy.

Design/methodology/approach

Data for this study include student interviews (called “talk backs”), journal reflections and final technology presentations.

Findings

Broadly, the data suggests that critical race algorithmic literacies prepare Black students to critically read the algorithmic word (e.g. data, code, machine learning models, etc.) so that they can not only resist and survive, but also rebuild and reimagine the algorithmic world.

Originality/value

While critical race media literacy draws upon critical race theory in education – a theorization of race, and a critique of white supremacy and multiculturalism in schools – critical race algorithmic literacy is rooted in critical race technology theory, which is a theorization of blackness as a technology and a critique of algorithmic anti-blackness as the organizing logic of schools and AI systems.

Details

English Teaching: Practice & Critique, vol. 23 no. 1
Type: Research Article
ISSN: 1175-8708

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

20

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Open Access
Article
Publication date: 1 February 2023

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

4312

Abstract

Purpose

The purpose of this study is to assess the impact of cyberfraud in the South African banks with the aim to provide recommendations to effectively mitigate it.

Design/methodology/approach

The study uses a qualitative approach involving the use of structured questionnaires. The questionnaires were made available to the staff of 17 licensed banks in South Africa who deal with management, operation, administration and banking services. Two hypotheses were formulated and non-parametric statistical analyses involving the use of Chi-square test, Fischer’s Exact test and Spearman’s correlation were carried out. The two hypotheses formulated were tested to draw a conclusion.

Findings

The results obtained indicate that the impact of cyberfraud in the South African banking industry is highly significant and has affected the reputation of some of the banks. This calls for the need to review the diverse ways of curbing cyberfraud to lessen their impact and that of associated fraud risks on the banking operation.

Practical implications

This study provides an analysis on the relationship cyberfraud occurrences and the reputation of South African banks. The implementation of the recommendations may reinforce the existing security measures in the fight against cyberfraud.

Originality/value

The novelty of this study lies in the fact that the assessment of the impact of cyberfraud on the banking industry in South Africa has not been sufficiently highlighted by the existing literature.

Details

Journal of Financial Crime, vol. 31 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 216