Search results

1 – 10 of over 1000
Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 12 March 2024

Elena Isabel Vazquez Melendez, Paul Bergey and Brett Smith

This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers…

155

Abstract

Purpose

This study aims to examine the blockchain landscape in supply chain management by drawing insights from academic and industry literature. It identifies the key drivers, categorizes the products involved and highlights the business values achieved by early adopters of blockchain technology within the supply chain domain. Additionally, it explores fingerprinting techniques to establish a robust connection between physical products and the blockchain ledger.

Design/methodology/approach

The authors combined the interpretive sensemaking systematic literature review to offer insights into how organizations interpreted their business challenges and adopted blockchain technology in their specific supply chain context; content analysis (using Leximancer automated text mining software) for concept mapping visualization, facilitating the identification of key themes, trends and relationships, and qualitative thematic analysis (NVivo) for data organization, coding and enhancing the depth and efficiency of analysis.

Findings

The findings highlight the transformative potential of blockchain technology and offer valuable insights into its implementation in optimizing supply chain operations. Furthermore, it emphasizes the importance of product provenance information to consumers, with blockchain technology offering certainty and increasing customer loyalty toward brands that prioritize transparency.

Research limitations/implications

This research has several limitations that should be acknowledged. First, there is a possibility that some relevant investigations may have been missed or omitted, which could impact the findings. In addition, the limited availability of literature on blockchain adoption in supply chains may restrict the scope of the conclusions. The evolving nature of blockchain adoption in supply chains also poses a limitation. As the technology is in its infancy, the authors expect that a rapidly emerging body of literature will provide more extensive evidence-based general conclusions in the future. Another limitation is the lack of information contrasting academic and industry research, which could have provided more balanced insights into the technology’s advancement. The authors attributed this limitation to the narrow collaborations between academia and industry in the field of blockchain for supply chain management.

Practical implications

Practitioners recognize the potential of blockchain in addressing industry-specific challenges, such as ensuring transparency and data provenance. Understanding the benefits achieved by early adopters can serve as a starting point for companies considering blockchain adoption. Blockchain technology can verify product origin, enable truthful certifications and comply with established standards, reinforcing trust among stakeholders and customers. Thus, implementing blockchain solutions can enhance brand reputation and consumer confidence by ensuring product authenticity and quality. Based on the results, companies can align their strategies and initiatives with their needs and expectations.

Social implications

In essence, the integration of blockchain technology within supply chain provenance initiatives not only influences economic aspects but also brings substantial social impacts by reinforcing consumer trust, encouraging sustainable and ethical practices, combating product counterfeiting, empowering stakeholders and contributing to a more responsible, transparent and progressive socioeconomic environment.

Originality/value

This study consolidates current knowledge on blockchain’s capacity and identifies the specific drivers and business values associated with early blockchain adoption in supply chain provenance. Furthermore, it underscores the critical role of product fingerprinting techniques in supporting blockchain for supply chain provenance, facilitating more robust and efficient supply chain operations.

Details

Supply Chain Management: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 20 March 2024

George Okello Candiya Bongomin, Charles Akol Malinga, Alain Manzi Amani and Rebecca Balinda

The main purpose of this study is to test for the interaction effect of digital literacy in the relationship between financial technologies (FinTechs) of biometrics and mobile…

Abstract

Purpose

The main purpose of this study is to test for the interaction effect of digital literacy in the relationship between financial technologies (FinTechs) of biometrics and mobile money and digital financial inclusion among the unbanked poor women, youth and persons with disabilities (PWDs) in rural Uganda.

Design/methodology/approach

Covariance-based structural equation modeling was used to construct the interaction effect using data collected from the unbanked poor women, youth and PWDs located in the four regions in Uganda as prescribed by Hair et al. (2022).

Findings

The findings from this study are threefold: first; the results revealed a positive interaction effect of digital literacy between FinTechs of biometrics and mobile money and digital financial inclusion. Second; the results also confirmed that biometrics identification positively promotes digital financial inclusion. Lastly; the results showed that mobile money positively promotes digital financial inclusion. A combination of FinTechs of biometrics and mobile money together with digital literacy explain 29% variation in digital financial inclusion among the unbanked poor women, youth and PWDs in rural Uganda.

Research limitations/implications

The data for this study were collected mainly from the unbanked poor women, youth and PWDs. Further studies may look at data from other sections of the vulnerable population in under developed financial markets. Additionally, the data for this study were collected only from Uganda as a developing country. Thus, more data may be obtained from other developing countries to draw conclusive and generalized empirical evidence. Besides, the current study used cross sectional design to collect the data. Therefore, future studies may adopt longitudinal research design to investigate the impact of FinTechs on digital financial inclusion in the presence of digital literacy across different time range.

Practical implications

The governments in developing countries like Uganda should support women, youth, PWDs and other equally vulnerable groups, especially in the rural communities to understand and use FinTechs. This can be achieved through digital literacy that can help them to embrace digital financial services and competently navigate and perform digital transactions over digital platforms like mobile money without making errors. Besides, governments in developing countries like Uganda can use this finding to advocate for the design of appropriate digital infrastructures to reach remote areas and ensure “last mile connectivity for digital financial services' users.” The use of off-line solutions can complement the absence or loss of on-line network connectivity for biometrics and mobile money to close the huge digital divide gap in rural areas. This can scale-up access to and use of financial services by the unbanked rural population.

Originality/value

This paper sheds more light on the importance of digital literacy in the ever complex and dynamic global FinTech ecosystem in the presence of rampant cyber risks. To the best of the authors' knowledge, limited studies currently exist that integrate digital literacy as a moderator in the relationship between FinTechs and digital financial inclusion, especially among vulnerable groups in under-developed digital financial markets in developing countries. This is the novelty of the paper with data obtained from the unbanked poor women, youth and PWDs in rural Uganda.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 14 February 2024

Batuhan Kocaoglu and Mehmet Kirmizi

This study aims to develop a modular and prescriptive digital transformation maturity model whose constituent elements have conceptual integrity as well as reveal the priority…

Abstract

Purpose

This study aims to develop a modular and prescriptive digital transformation maturity model whose constituent elements have conceptual integrity as well as reveal the priority weights of maturity model components.

Design/methodology/approach

A literature review with a concept-centric analysis enlightens the characteristics of constituent parts and reveals the gaps for each component. Therefore, the interdependency network among model dimensions and priority weights are identified using decision-making trial and evaluation laboratory (DEMATEL)-based analytic network process (ANP) method, including 19 industrial experts, and the results are robustly validated with three different analyses. Finally, the applicability of the developed maturity model and the constituent elements are validated in the context of the manufacturing industry with two case applications through a strict protocol.

Findings

Results obtained from DEMATEL-based ANP suggest that smart processes with a priority weight of 17.91% are the most important subdimension for reaching higher digital maturity. Customer integration and value, with a priority weight of 17.30%, is the second most important subdimension and talented employee, with 16.24%, is the third most important subdimension.

Research limitations/implications

The developed maturity model enables companies to make factual assessments with specially designed measurement instrument including incrementally evolved questions, prioritize action fields and investment strategies according to maturity index calculations and adapt to the dynamic change in the environment with spiral maturity level identification.

Originality/value

A novel spiral maturity level identification is proposed with conceptual consistency for evolutionary progress to adapt to dynamic change. A measurement instrument that is incrementally structured with 234 statements and a measurement method that is based on the priority weights and leads to calculating the maturity index are designed to assess digital maturity, create an improvement roadmap to reach higher maturity levels and prioritize actions and investments without any external support and assistance.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Book part
Publication date: 29 January 2024

Elizabeth Frieda Ndamono Shipena and Attlee M. Gamundani

Internet of things (IoT) involves the connection of various devices. IoT’s application ranges from wearables: Smart Home Application, Health Care, Smart Offices, Smart Cities…

Abstract

Internet of things (IoT) involves the connection of various devices. IoT’s application ranges from wearables: Smart Home Application, Health Care, Smart Offices, Smart Cities, Agriculture, and Industrial Automation. While the number of connected devices grows by the day, so does the number of security risks and vulnerabilities that these devices face. Billions of the connected devices collect and transmit huge volumes of data making Data Security one of the most pressing technical concerns in IoT. Smart Office is one of the increasing IoT applications and Data Security has become today one of the most challenging areas in its application. It is important to identify data security threats. This chapter therefore presents a review of IoT Smart Office Data Security Threats based on existing research done.

Details

Digital Technology and Changing Roles in Managerial and Financial Accounting: Theoretical Knowledge and Practical Application
Type: Book
ISBN: 978-1-80455-973-4

Keywords

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts, 2nd Edition
Type: Book
ISBN: 978-1-83753-438-8

Article
Publication date: 15 February 2024

Nagamani Subramanian and M. Suresh

This study aims to investigate the implementation of lean human resource management (HRM) practices in manufacturing small- and medium-sized enterprises (SMEs) and explore how…

Abstract

Purpose

This study aims to investigate the implementation of lean human resource management (HRM) practices in manufacturing small- and medium-sized enterprises (SMEs) and explore how various factors interact to influence their successful adoption. By exploring the interplay among these factors, the research seeks to identify key drivers affecting the adoption of lean HRM in manufacturing SMEs. Ultimately, the research intends to provide insights that can guide organisations, practitioners and policymakers in effectively implementing lean HRM practices to enhance operational efficiency, workforce engagement and competitiveness within the manufacturing SME sector.

Design/methodology/approach

The study combined total interpretive structural modelling (TISM) and Matrice d'Impacts Croisés Multiplication Appliquée à un Classement (MICMAC) analysis. TISM helped in understanding the hierarchical relationship among different factors influencing lean HRM implementation, whereas MICMAC analysis provided insights into the level of influence and dependence of each factor on others.

Findings

The research revealed that “top management support” emerged as the most independent factor, indicating that strong support from top management is crucial for initiating and sustaining lean HRM practices in manufacturing SMEs. On the other hand, “employee involvement and empowerment” was identified as the most dependent factor, suggesting that fostering a culture of employee engagement and empowerment greatly relies on the successful implementation of lean HRM practices.

Research limitations/implications

While the study provided valuable insights, it has certain limitations. The research was conducted within the specific context of manufacturing SMEs, which might limit the generalizability of the findings to other industries. Expert opinions introduce subjectivity in data collection. Additionally, the study may not cover all critical factors, allowing room for further exploration in future research.

Practical implications

The findings have practical implications for manufacturing SMEs aiming to implement lean HRM practices. Recognising the pivotal role of top management support, organisations should invest in cultivating a strong leadership commitment to lean HRM initiatives. Furthermore, enhancing employee involvement and empowerment can lead to better adoption of lean HRM practices, resulting in improved operational efficiency and overall competitiveness.

Originality/value

This research contributes to the field by offering a comprehensive exploration of the interplay among factors influencing lean HRM implementation. The use of TISM and MICMAC analysis provides a unique perspective on the relationship dynamics between these factors, allowing for a nuanced understanding of their roles in the adoption of lean HRM practices in manufacturing SMEs. The identification of “top management support” as the most independent and “employee involvement and empowerment” as the most dependent factors adds original insights to the existing literature.

Details

International Journal of Organizational Analysis, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1934-8835

Keywords

Case study
Publication date: 27 February 2024

Xiangfeng Chen, Chuanjun Liu and Zhaolong Yang

In China, supply chain finance (SCF) has gradually emerged as a new service for the retail industry. This case systematically discusses how JD conducts product design and risk…

Abstract

In China, supply chain finance (SCF) has gradually emerged as a new service for the retail industry. This case systematically discusses how JD conducts product design and risk control of supply chain finance and related financial services, and analyze the impact of supply chain finance on JD's retail operations. The case also analyzes the relationship between JD supply chain finance and traditional financial institutions, and explore the future development of retail supply chain finance.

Details

FUDAN, vol. no.
Type: Case Study
ISSN: 2632-7635

Article
Publication date: 11 January 2023

Dimitrios Kafetzopoulos, Spiridoula Margariti, Chrysostomos Stylios, Eleni Arvaniti and Panagiotis Kafetzopoulos

The objective of this study is to improve the food supply chain performance taking into consideration the fundamental concepts of traceability by combining the current frameworks…

Abstract

Purpose

The objective of this study is to improve the food supply chain performance taking into consideration the fundamental concepts of traceability by combining the current frameworks, its principles, its implications and the emerging technologies.

Design/methodology/approach

A narrative literature review of already existing empirical research on traceability systems was conducted resulting in 862 relevant papers. Following a step-by-step sampling process, the authors ended up with 46 final samples for the literature review.

Findings

The main findings of this study include the various descriptions of the architecture of traceability systems, the different sources enabling this practice, the common desirable attributes, and the enabling technologies for the deployment and implementation of traceability systems. Moreover, several technological solutions are presented, which are currently available for traceability systems, and finally, opportunities for future research are provided.

Practical implications

It provides an insight, which could affect the implementation process of traceability in the food supply chain and consequently the effective management of a food traceability system (FTS). Managers will be able to create a traceability system, which meets users' requirements, thus enhancing the value of products and food companies.

Originality/value

This study contributes to the food supply chain and the traceability systems literature by creating a holistic picture of where something has been and where it should go. It is a starting point for each food company to design and manage its traceability system more effectively.

Details

International Journal of Productivity and Performance Management, vol. 73 no. 2
Type: Research Article
ISSN: 1741-0401

Keywords

1 – 10 of over 1000