Search results

21 – 30 of 302
Book part
Publication date: 6 June 2017

Sanjay Pinto

This chapter maps existing patterns of broad-based worker ownership and control in contemporary advanced capitalism and considers future possibilities for expanding democracy…

Abstract

This chapter maps existing patterns of broad-based worker ownership and control in contemporary advanced capitalism and considers future possibilities for expanding democracy within firms. Section one discusses worker ownership and control arrangements in relation to different theories of the firm and shows how these arrangements map onto different national systems. Section two compares Germany, which is characterized by worker control without ownership, and the United States, which is marked by worker ownership without control. Section three explores three pathways through which broad-based worker ownership and control might be deepened and more strongly coupled in the future.

Details

Sharing in the Company
Type: Book
ISBN: 978-1-78560-966-4

Keywords

Abstract

Details

Ethics and Hidden Greed
Type: Book
ISBN: 978-1-80455-868-3

Book part
Publication date: 30 November 2020

Uğur Akdu

Rapid development of IT and communication technologies resulted in the “Smart” concept, which of late has become quite popular. The smart concept signifies the integration of…

Abstract

Rapid development of IT and communication technologies resulted in the “Smart” concept, which of late has become quite popular. The smart concept signifies the integration of organizational networks and smart features that enrich the ecosystem, facilitate daily activities for all stakeholders, and for automatization. Smart concept was discussed as a complicated technological infrastructure in urban areas intended to promote economic, social and environmental welfare. The latest technological developments gave rise to the concepts of smart planet, smart city and smart destination that have become important in recent years. Technological innovations have had a big influence on the development of the tourism industry. Smart concept is conceptualized as smart tourism for tourism sector. Smart Tourism generally has a positive effect on the rapid change of information and technology and on the tourism sector, tourism activities and increase in customer satisfaction. In this chapter, the concept of Smart and its smart technologies are explained and information about its reflections on the tourism sector and smart tourism destinations are discussed.

Details

The Emerald Handbook of ICT in Tourism and Hospitality
Type: Book
ISBN: 978-1-83982-689-4

Keywords

Article
Publication date: 11 December 2018

Claudia Colicchia, Alessandro Creazza and David A. Menachof

The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to…

5234

Abstract

Purpose

The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to what extent along the supply chain. In fact, the increasing level of connectivity is transforming supply chains, and it creates new opportunities but also new risks in the cyber space. Hence, cyber supply chain risk management (CSCRM) is emerging as a new management construct. The ultimate aim is to help organizations in understanding and improving the CSCRM process and cyber resilience in their supply chains.

Design/methodology/approach

This research relied on a qualitative approach based on a comparative case study analysis involving five large multinational companies with headquarters, or branches, in the UK.

Findings

Results highlight the importance for CSCRM to shift the viewpoint from the traditional focus on companies’ internal information technology (IT) infrastructure, able to “firewall themselves” only, to the whole supply chain with a cross-functional approach; initiatives for CSCRM are mainly adopted to “respond” and “recover” without a well-rounded approach to supply chain resilience for a long-term capacity to adapt to changes according to an evolutionary approach. Initiatives are adopted at a firm/dyadic level, and a network perspective is missing.

Research limitations/implications

This paper extends the current theory on cyber and information risks in supply chains, as a combination of supply chain risk management and resilience, and information risk management. It provides an analysis and classification of cyber and information risks, sources of risks and initiatives to managing them according to a supply chain perspective, along with an investigation of their adoption across the supply chain. It also studies how the concept of resilience has been deployed in the CSCRM process by companies. By laying the first empirical foundations of the subject, this study stimulates further research on the challenges and drivers of initiatives and coordination mechanisms for CSCRM at a supply chain network level.

Practical implications

Results invite companies to break the “silos” of their activities in CSCRM, embracing the whole supply chain network for better resilience. The adoption of IT security initiatives should be combined with organisational ones and extended beyond the dyad. Where applicable, initiatives should be bi-directional to involve supply chain partners, remove the typical isolation in the CSCRM process and leverage the value of information. Decisions on investments in CSCRM should involve also supply chain managers according to a holistic approach.

Originality/value

A supply chain perspective in the existing scientific contributions is missing in the management of cyber and information risk. This is one of the first empirical studies dealing with this interdisciplinary subject, focusing on risks that are now very high in the companies’ agenda, but still overlooked. It contributes to theory on information risk because it addresses cyber and information risks in massively connected supply chains through a holistic approach that includes technology, people and processes at an extended level that goes beyond the dyad.

Details

Supply Chain Management: An International Journal, vol. 24 no. 2
Type: Research Article
ISSN: 1359-8546

Keywords

Book part
Publication date: 15 September 2022

Arda Toygar and Senem Nart

The unpredictable distribution of globalization has directed the world economy and revealed the need to establish cooperation in all business processes. This global structure also…

Abstract

The unpredictable distribution of globalization has directed the world economy and revealed the need to establish cooperation in all business processes. This global structure also highlights the necessity of designing an agile supply chain that is capable of continuous information sharing during end-to-end transportation for the purpose of creating sustainable connections. In this process, various strategies enhanced with contemporary information and communication technologies have been developed to create a fast and accurate data-sharing network between logistics service providers and supply chain parties. However, unlike the short-term interruptions experienced in the past, COVID-19 has caused unprecedented problems in the dynamics of most economies. In eliminating these problems, it has been seen that information communication technologies, which provide the advantage of digital visibility in normal operations, need to be redesigned with the technology of the autonomous age. To meet this requirement, Industry 4.0, a revolutionary conceptual trend that started roughly a decade ago but that has become considerably more widespread during COVID-19, has been integrated into business models as a key concept that governs intelligent transformation in the chain. This process, which is today considered a compulsory intelligent transformation rather than an alternative method, has however led to some conflicts, especially in adaptation, expertise, and security subjects. This chapter of the book evaluates, within the scope of cybersecurity and workforce in logistics services, the conflicts created by the digital solution methods that have been integrated into business models to reduce the negative effects of COVID-19.

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Keywords

Book part
Publication date: 9 June 2020

Mathias Sosnowski Krabbe

This chapter explores the role of student loan debt in the lives of American students and graduates in Wisconsin, US. The total amount of student loan debt in the United States is…

Abstract

This chapter explores the role of student loan debt in the lives of American students and graduates in Wisconsin, US. The total amount of student loan debt in the United States is now at a record high. While debt is considered an integral part of a “forced timeline” toward a greater good, namely the American Dream, it is at the same time a disciplinary mechanism binding individuals to their families in various ways. While most anthropological research on college students and debt has not focused explicitly on student loan debt, this chapter offers insight into a phenomenon currently affecting more than 44 million Americans.

Details

Anthropological Enquiries into Policy, Debt, Business, and Capitalism
Type: Book
ISBN: 978-1-83909-659-4

Keywords

Content available
Book part
Publication date: 14 October 2022

Päivi Rasi-Heikkinen

Abstract

Details

Older People in a Digitalized Society
Type: Book
ISBN: 978-1-80382-167-2

Article
Publication date: 9 September 2022

Zakaria Elkhwesky and Esraa Fayez Youssif Elkhwesky

Internet of Things (IoT) is a key enabler of big data and it is critical toward a new age of firm's architecture and proper decision-making for the industry. IoT adoption by the…

1864

Abstract

Purpose

Internet of Things (IoT) is a key enabler of big data and it is critical toward a new age of firm's architecture and proper decision-making for the industry. IoT adoption by the hospitality and tourism (H&T) industries is still rare and with contrasting evidence. The purpose of this study is to highlight the concept of IoT, its benefits, its challenges and its applications in the hospitality industry.

Design/methodology/approach

This study presents an in-depth and critical review of the 78 articles published on IoT in hospitality, spanning more than seven years (from 2015 to March 2022). The eligible 78 articles were collected from the “Web of Science database” and H&T Social Sciences Citation Index-listed journals.

Findings

This systematic review exhibits that IoT in hospitality has advanced in the past seven years. IoT has brought many advantages and challenges in hospitality. However, hospitality IoT research is scarce, necessitating a profound and more thorough investigation of many significant matters.

Practical implications

This systematic review provides significant implications and recommendations for hospitality sectors, IoT developers and manufacturers, governments and policymakers. This review ends with an in-depth research agenda with several research questions and a framework to achieve theoretical and empirical advances in future IoT research.

Originality/value

To the best of the authors’ knowledge, the current research is one of the first to systematically and critically review IoT with its concept, benefits, challenges and applications in a hospitality context. This major review provides a comprehensive idea of the focus of the past studies and what must be concentrated in future research.

Details

International Journal of Contemporary Hospitality Management, vol. 35 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 1 September 2004

Shih Dong‐Her, Chiang Hsiu‐Sen, Chan Chun‐Yuan and Binshan Lin

New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail…

2211

Abstract

New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail attachments. In this paper, Bayesian probabilistic network is examined to detect new malicious e‐mail viruses through anomaly detection. Experimental results show a better malicious e‐mail detection using Bayesian probabilistic networks. Managerial implications on how companies can protect their e‐mails and develop their own e‐mail security plan are addressed as well.

Details

Industrial Management & Data Systems, vol. 104 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 18 October 2018

Katherine Taken Smith, Amie Jones, Leigh Johnson and Lawrence Murphy Smith

Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology…

2272

Abstract

Purpose

Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of a sample of publicly traded companies.

Design/methodology/approach

Financial data were gathered on companies that were reported in news stories as victims of cybercrime. The market price of the company’s stock was recorded for several days before the news report and several days after. The percentage change in the stock price was compared to the change in the Dow Jones Industrial average to determine whether the stock price increased or decreased along with the rest of the market.

Findings

Stock prices were negatively affected in all time periods examined, significantly so in one period.

Practical implications

This paper describes cases concerning cybercrime, thereby bringing attention to the value of cybersecurity in protecting computers, identity and transactions. Cyber security is necessary to avoid becoming a victim of cybercrime. Specific security improvements and preventive measures are provided within the paper. Preventive measures are generally less costly than repairs after a cybercrime.

Originality/value

This is an original manuscript that adds to the literature regarding cybercrime and preventive measures.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

21 – 30 of 302