Search results
21 – 30 of 302This chapter maps existing patterns of broad-based worker ownership and control in contemporary advanced capitalism and considers future possibilities for expanding democracy…
Abstract
This chapter maps existing patterns of broad-based worker ownership and control in contemporary advanced capitalism and considers future possibilities for expanding democracy within firms. Section one discusses worker ownership and control arrangements in relation to different theories of the firm and shows how these arrangements map onto different national systems. Section two compares Germany, which is characterized by worker control without ownership, and the United States, which is marked by worker ownership without control. Section three explores three pathways through which broad-based worker ownership and control might be deepened and more strongly coupled in the future.
Details
Keywords
Rapid development of IT and communication technologies resulted in the “Smart” concept, which of late has become quite popular. The smart concept signifies the integration of…
Abstract
Rapid development of IT and communication technologies resulted in the “Smart” concept, which of late has become quite popular. The smart concept signifies the integration of organizational networks and smart features that enrich the ecosystem, facilitate daily activities for all stakeholders, and for automatization. Smart concept was discussed as a complicated technological infrastructure in urban areas intended to promote economic, social and environmental welfare. The latest technological developments gave rise to the concepts of smart planet, smart city and smart destination that have become important in recent years. Technological innovations have had a big influence on the development of the tourism industry. Smart concept is conceptualized as smart tourism for tourism sector. Smart Tourism generally has a positive effect on the rapid change of information and technology and on the tourism sector, tourism activities and increase in customer satisfaction. In this chapter, the concept of Smart and its smart technologies are explained and information about its reflections on the tourism sector and smart tourism destinations are discussed.
Details
Keywords
Claudia Colicchia, Alessandro Creazza and David A. Menachof
The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to…
Abstract
Purpose
The purpose of this paper is to explore how companies approach the management of cyber and information risks in their supply chain, what initiatives they adopt to this aim, and to what extent along the supply chain. In fact, the increasing level of connectivity is transforming supply chains, and it creates new opportunities but also new risks in the cyber space. Hence, cyber supply chain risk management (CSCRM) is emerging as a new management construct. The ultimate aim is to help organizations in understanding and improving the CSCRM process and cyber resilience in their supply chains.
Design/methodology/approach
This research relied on a qualitative approach based on a comparative case study analysis involving five large multinational companies with headquarters, or branches, in the UK.
Findings
Results highlight the importance for CSCRM to shift the viewpoint from the traditional focus on companies’ internal information technology (IT) infrastructure, able to “firewall themselves” only, to the whole supply chain with a cross-functional approach; initiatives for CSCRM are mainly adopted to “respond” and “recover” without a well-rounded approach to supply chain resilience for a long-term capacity to adapt to changes according to an evolutionary approach. Initiatives are adopted at a firm/dyadic level, and a network perspective is missing.
Research limitations/implications
This paper extends the current theory on cyber and information risks in supply chains, as a combination of supply chain risk management and resilience, and information risk management. It provides an analysis and classification of cyber and information risks, sources of risks and initiatives to managing them according to a supply chain perspective, along with an investigation of their adoption across the supply chain. It also studies how the concept of resilience has been deployed in the CSCRM process by companies. By laying the first empirical foundations of the subject, this study stimulates further research on the challenges and drivers of initiatives and coordination mechanisms for CSCRM at a supply chain network level.
Practical implications
Results invite companies to break the “silos” of their activities in CSCRM, embracing the whole supply chain network for better resilience. The adoption of IT security initiatives should be combined with organisational ones and extended beyond the dyad. Where applicable, initiatives should be bi-directional to involve supply chain partners, remove the typical isolation in the CSCRM process and leverage the value of information. Decisions on investments in CSCRM should involve also supply chain managers according to a holistic approach.
Originality/value
A supply chain perspective in the existing scientific contributions is missing in the management of cyber and information risk. This is one of the first empirical studies dealing with this interdisciplinary subject, focusing on risks that are now very high in the companies’ agenda, but still overlooked. It contributes to theory on information risk because it addresses cyber and information risks in massively connected supply chains through a holistic approach that includes technology, people and processes at an extended level that goes beyond the dyad.
Details
Keywords
The unpredictable distribution of globalization has directed the world economy and revealed the need to establish cooperation in all business processes. This global structure also…
Abstract
The unpredictable distribution of globalization has directed the world economy and revealed the need to establish cooperation in all business processes. This global structure also highlights the necessity of designing an agile supply chain that is capable of continuous information sharing during end-to-end transportation for the purpose of creating sustainable connections. In this process, various strategies enhanced with contemporary information and communication technologies have been developed to create a fast and accurate data-sharing network between logistics service providers and supply chain parties. However, unlike the short-term interruptions experienced in the past, COVID-19 has caused unprecedented problems in the dynamics of most economies. In eliminating these problems, it has been seen that information communication technologies, which provide the advantage of digital visibility in normal operations, need to be redesigned with the technology of the autonomous age. To meet this requirement, Industry 4.0, a revolutionary conceptual trend that started roughly a decade ago but that has become considerably more widespread during COVID-19, has been integrated into business models as a key concept that governs intelligent transformation in the chain. This process, which is today considered a compulsory intelligent transformation rather than an alternative method, has however led to some conflicts, especially in adaptation, expertise, and security subjects. This chapter of the book evaluates, within the scope of cybersecurity and workforce in logistics services, the conflicts created by the digital solution methods that have been integrated into business models to reduce the negative effects of COVID-19.
Details
Keywords
This chapter explores the role of student loan debt in the lives of American students and graduates in Wisconsin, US. The total amount of student loan debt in the United States is…
Abstract
This chapter explores the role of student loan debt in the lives of American students and graduates in Wisconsin, US. The total amount of student loan debt in the United States is now at a record high. While debt is considered an integral part of a “forced timeline” toward a greater good, namely the American Dream, it is at the same time a disciplinary mechanism binding individuals to their families in various ways. While most anthropological research on college students and debt has not focused explicitly on student loan debt, this chapter offers insight into a phenomenon currently affecting more than 44 million Americans.
Details
Keywords
Zakaria Elkhwesky and Esraa Fayez Youssif Elkhwesky
Internet of Things (IoT) is a key enabler of big data and it is critical toward a new age of firm's architecture and proper decision-making for the industry. IoT adoption by the…
Abstract
Purpose
Internet of Things (IoT) is a key enabler of big data and it is critical toward a new age of firm's architecture and proper decision-making for the industry. IoT adoption by the hospitality and tourism (H&T) industries is still rare and with contrasting evidence. The purpose of this study is to highlight the concept of IoT, its benefits, its challenges and its applications in the hospitality industry.
Design/methodology/approach
This study presents an in-depth and critical review of the 78 articles published on IoT in hospitality, spanning more than seven years (from 2015 to March 2022). The eligible 78 articles were collected from the “Web of Science database” and H&T Social Sciences Citation Index-listed journals.
Findings
This systematic review exhibits that IoT in hospitality has advanced in the past seven years. IoT has brought many advantages and challenges in hospitality. However, hospitality IoT research is scarce, necessitating a profound and more thorough investigation of many significant matters.
Practical implications
This systematic review provides significant implications and recommendations for hospitality sectors, IoT developers and manufacturers, governments and policymakers. This review ends with an in-depth research agenda with several research questions and a framework to achieve theoretical and empirical advances in future IoT research.
Originality/value
To the best of the authors’ knowledge, the current research is one of the first to systematically and critically review IoT with its concept, benefits, challenges and applications in a hospitality context. This major review provides a comprehensive idea of the focus of the past studies and what must be concentrated in future research.
Details
Keywords
Shih Dong‐Her, Chiang Hsiu‐Sen, Chan Chun‐Yuan and Binshan Lin
New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail…
Abstract
New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail attachments. In this paper, Bayesian probabilistic network is examined to detect new malicious e‐mail viruses through anomaly detection. Experimental results show a better malicious e‐mail detection using Bayesian probabilistic networks. Managerial implications on how companies can protect their e‐mails and develop their own e‐mail security plan are addressed as well.
Details
Keywords
Katherine Taken Smith, Amie Jones, Leigh Johnson and Lawrence Murphy Smith
Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology…
Abstract
Purpose
Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of a sample of publicly traded companies.
Design/methodology/approach
Financial data were gathered on companies that were reported in news stories as victims of cybercrime. The market price of the company’s stock was recorded for several days before the news report and several days after. The percentage change in the stock price was compared to the change in the Dow Jones Industrial average to determine whether the stock price increased or decreased along with the rest of the market.
Findings
Stock prices were negatively affected in all time periods examined, significantly so in one period.
Practical implications
This paper describes cases concerning cybercrime, thereby bringing attention to the value of cybersecurity in protecting computers, identity and transactions. Cyber security is necessary to avoid becoming a victim of cybercrime. Specific security improvements and preventive measures are provided within the paper. Preventive measures are generally less costly than repairs after a cybercrime.
Originality/value
This is an original manuscript that adds to the literature regarding cybercrime and preventive measures.
Details