Search results
1 – 10 of over 1000Abstract
Purpose
Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.
Design/methodology/approach
The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).
Findings
The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.
Originality/value
This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.
Details
Keywords
Renata Konrad, Solomiya Sorokotyaha and Daniel Walker
Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute…
Abstract
Purpose
Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute response phase until more established humanitarian aid organizations can enter. Nevertheless, scant research exists regarding the role of grassroots associations in providing humanitarian assistance during a military conflict. The purpose of this paper is to understand the role of grassroots associations and identify important themes for effective operations.
Design/methodology/approach
This paper adopts a case-study approach of three Ukrainian grassroots associations that began operating in the immediate days of the full-scale invasion of Ukraine. The findings are based on analyzing primary sources, including interviews with Ukrainian volunteers, and are supported by secondary sources.
Findings
Grassroots associations have local contacts and a contextual understanding of population needs and can respond more rapidly and effectively than large intergovernmental agencies. Four critical themes regarding the operations of grassroots associations emerged: information management, inventory management, coordination and performance measurement. Grassroots humanitarian response operations during conflict are challenged by personal security risks, the unpredictability of unsolicited supplies, emerging volunteer roles, dynamic transportation routes and shifting demands.
Originality/value
Grassroots responses are central to humanitarian responses during the acute phase of a military conflict. By examining the operations of grassroots associations in the early months of the 2022 war in Ukraine, the authors provide a unique perspective on humanitarian logistics. Nonetheless, more inclusive models of humanitarian responses are needed to harness the capacities and resilience of grassroots operations in practice.
Details
Keywords
Călin Mihail Rangu, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait and Valentin Radu
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented…
Abstract
Purpose
In recent years, the frequency and severity of cybersecurity incidents have prompted customers to seek out specialized insurance products. However, this has also presented insurers with operational challenges and increased costs. The assessment of risks for health systems and cyber–physical systems (CPS) necessitates a heightened degree of attention. The significant values of potential damages and claims request a solid insurance system, part of cyber-resilience. This research paper focuses on the emerging cyber insurance market that is currently in the process of standardizing and improving its risk analysis concerning the potential insured entity.
Design/methodology/approach
The authors' approach involves a quantitative analysis utilizing a Likert-style questionnaire designed to survey cyber insurance professionals. The authors' aim is to identify the current methods used in gathering information from potential clients, as well as the manner in which this information is analyzed by the insurers. Additionally, the authors gather insights on potential improvements that could be made to this process.
Findings
The study the authors elaborated it has a particularly important cyber and risk components for insurance area, because it addresses a “niche” area not yet proper addressed in specialized literature – cyber insurance. Cyber risk management approaches are not uniform at the international level, nor at the insurer level. Also, not all insurers can perform solid assessments, especially since their companies should first prove that they are fully compliant with international cyber security standards.
Research limitations/implications
This research has concentrated on analyzing the current practices in terms of gathering information about the insured entity before issuing the cyber insurance policy, level of details concerning the cyber security posture of the insured entity and way such information should be analyzed in a standardized and useful manner. The novelty of this research resides in the analysis performed as detailed above and the proposals in terms of information gathered, depth of analysis and standardization of approach made. Future work on the topic can focus on the standardization process for analyzing cyber risk for insurance clients, to improve the proposal based also on historical elements and trends in the market. Thus, future research can further refine the standardization process to analyze in more depth the way this can be implemented and included in relevant legislation at the EU level.
Practical implications
Proposed improvements include proposals in terms of the level of detail and the usefulness of an independent centralized approach for information gathering and analysis, especially given the re-insurance and brokerage activities. The authors also propose a common practical procedural approach in risk management, with the involvement of insurance companies and certification institutions of cyber security auditors.
Originality/value
The study investigates the information gathered by insurers from potential clients of cyber insurance and the way this is analyzed and updated for issuance of the insurance policy.
Details
Keywords
Rosemarie Santa González, Marilène Cherkesly, Teodor Gabriel Crainic and Marie-Eve Rancourt
This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and…
Abstract
Purpose
This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and cut off from health-care services.
Design/methodology/approach
This research combines an integrated literature review and an instrumental case study. The literature review comprises two targeted reviews to provide insights: one on conflict zones and one on mobile clinics. The case study describes the process and challenges faced throughout a mobile clinic deployment during and after the Iraq War. The data was gathered using mixed methods over a two-year period (2017–2018).
Findings
Armed conflicts directly impact the populations’ health and access to health care. Mobile clinic deployments are often used and recommended to provide health-care access to vulnerable populations cut off from health-care services. However, there is a dearth of peer-reviewed literature documenting decision support tools for mobile clinic deployments.
Originality/value
This study highlights the gaps in the literature and provides direction for future research to support the development of valuable insights and decision support tools for practitioners.
Details
Keywords
This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and…
Abstract
Purpose
This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and contention on the superiority given to positivist and interpretivist research designs when doing fieldwork in war situations, hence there is a need to use integrated data generation techniques. The combined effect of severe limitations of movement for both the researcher and researched fragmented data because of polarized views about the causes of the war and unpredictable events that make information hard to come by militate against systematic, organised and robust data generation. The purpose of this paper, therefore, is to make fieldwork researchers understand significant research problems unique to war zones.
Design/methodology/approach
This research was guided by the postmodernist mode of thought which challenges standardised research traditions. Fieldwork experiences in Cabo suggest the need to use the composite strategies that rely on the theoretical foundation of integrative and creative collection of data when doing research in violent settings.
Findings
The fieldwork experiences showed that the standardised, conventional and valorised positivist and ethnographic research strategies may not sufficiently facilitate understanding of the dynamics of war. There should not be firm rules, guidelines or regulations governing the actions of the researcher in conflict. As such, doing research in violent settings require reflexivity, flexibility and creativity in research strategies that respond to rapid changes. Research experiences in Mozambique show the need to use blended methods that include even less structured methodologies.
Originality/value
Fieldwork experiences in Cabo challenges researchers who cling to standardised research traditions which often hamper awareness of new postmodernist mode of thought applicable to war settings. It is essential to study the nature of African armed conflicts by combining creativity and flexibility in the selection of research strategies.
Details
Keywords
The purpose of this paper is to advance our understanding of international crisis mediation by introducing and examining the nested insider-partial mediator (NIPM) concept, a…
Abstract
Purpose
The purpose of this paper is to advance our understanding of international crisis mediation by introducing and examining the nested insider-partial mediator (NIPM) concept, a nuanced perspective on IPM behavior. This study challenges the traditional view of effective mediators as external, unbiased entities by delving into the behavior and contribution of mediators who are deeply embedded in the conflict environment, such as South Korea’s unique position in navigating the US–DPRK crisis in 2017–2018. By analyzing South Korea’s dual role as mediator and negotiator and its employment of both nondirective and directive mediation strategies, the paper demonstrates the potential effectiveness of NIPMs in managing complex biases and contributing to de-escalation in intense crisis scenarios.
Design/methodology/approach
This paper uses a focused single-case study approach to analyze South Korea’s role as an NIPM. Using a process-tracing methodology, it examines how contextual factors such as relationships, interests and inherent biases influenced South Korea’s mediation strategies in this complex geopolitical scenario. Empirical evidence was retrieved from public sources, including official statements and press interviews, providing an empirical foundation for understanding NIPM behavior. This approach facilitates a detailed study of South Korea’s unique mediation role within the intricate dynamics of the Korean Peninsula conflict.
Findings
The study’s findings illustrate the pivotal role NIPMs can play in complex international conflicts, underlining the significant potential of NIPMs in crisis prevention. The findings highlight South Korea’s adept navigation through intricate geopolitical dynamics, leveraging its unique insider position and established relationships with both the USA and North Korea. This behavior was instrumental in mitigating a potentially explosive situation, steering the crisis toward negotiation and de-escalation. The research underscores the effectiveness of the NIPM framework in understanding the nuanced behavior of mediators who are deeply integrated into multi-level conflicts, influenced by their connections, interests and inherent biases.
Originality/value
This research not only broadens the theoretical framework of insider-partial mediation by introducing the concept of NIPM, but also has practical implications for policymakers and practitioners in leveraging regional mediation strategies for international crisis mitigation. The study underscores the importance of mediators’ deep-rooted connections, biases and vested interests in influencing their mediation tactics, thus offering a comprehensive understanding of the multifaceted nature of international mediation in complex geopolitical conflicts.
Details
Keywords
Conventional wisdom tells us that mediation without ripeness is a fool’s errand (Zartman and Touval, 1985). What, then, is Türkiye’s motivation for mediating the war in Ukraine in…
Abstract
Purpose
Conventional wisdom tells us that mediation without ripeness is a fool’s errand (Zartman and Touval, 1985). What, then, is Türkiye’s motivation for mediating the war in Ukraine in lieu of ripeness – and what can its behavior as a mediator tell us about that motivation? In pursuit of this question, this paper inductively analyzes Turkish mediation in the Ukraine war to unpack the relationship between a contextual (ripeness) and actor-level (motivation) variable. Of particular interest is the decision-making and behavior of third parties (like Türkiye in Ukraine) who elect to mediate highly complex conflicts in which ripeness is indiscernible. The purpose of this research is not to propose or test a causal relationship between obscured ripeness and mediation, but rather to examine mediation behavior in situations where ripeness is obscured.
Design/methodology/approach
The impact of weaponized information on ripeness and third-party mediation is evaluated through an original, systematic and inductive case study analysis of Turkish mediation in the Russia–Ukraine war. As an intense theater of operations for information warfare for well over a decade, the war in Ukraine serves as an especially apt choice for an analysis of “obscured ripeness.” Likewise, Türkiye’s anomalous position as the only substantive source of mediation in the conflict lends significance to an empirical examination of its motivation and behavior as a mediator.
Findings
This research reveals that the pervasive use of weaponized information in the Russia–Ukraine war has distorted and disordered the information environment, thereby obscuring the ability of third parties to determine if the conflict is or could be ripe for mediation. However, the condition of obscured ripeness that prevails in the conflict has not proven a deterrent for mediation by Türkiye, which, as the only mediator in the conflict, has used a transactional approach to mediation motivated by self-regarding interests and animated by a manipulative mediation strategy. In sum, this inductive analysis of Turkish mediation in Ukraine reveals that the use of weaponized information in a conflict indirectly selects on transactional mediation (and mediators). The significance of this finding is magnified by the widespread use of weaponized information in contemporary conflicts as well as the declining frequency of third-party mediation.
Originality/value
There have been few, if any, systematic assessments in Turkish mediation of the Russia–Ukraine war, and none specifically concerned with the effects of weaponized information. Additionally, the paper proposes a typology of mediator motivation that is used to structure that assessment, while also introducing a new concept (“obscured ripeness”) and linking that concept both to the existing literature on ripeness and to the use of weaponized information in contemporary armed conflicts. As such, this manuscript represents an important contribution both to the empirical and theoretical landscape with respect to the study of mediation and international conflict management.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Alisha Tuladhar, Michael Rogerson, Juliette Engelhart, Glenn C. Parry and Birgit Altrichter
Firms are increasingly pressured to comply with mandatory supply chain transparency (SCT) regulations. Drawing on information processing theory (IPT), this study aims to show how…
Abstract
Purpose
Firms are increasingly pressured to comply with mandatory supply chain transparency (SCT) regulations. Drawing on information processing theory (IPT), this study aims to show how blockchain technology can address information uncertainty and equivocality in assuring regulatory compliance in an interorganizational network (ION).
Design/methodology/approach
IPT is applied in a single case study of an ION in the mining industry that aimed to implement blockchain to address mandatory SCT regulations. The authors build on a rich proprietary data set consisting of interviews and substantial secondary material from actors along the supply chain.
Findings
The case shows that blockchain creates equality between actors, enables compliance and enhances efficiency in an ION, reducing information uncertainty and equivocality arising from conflict minerals regulation. The system promotes engagement and data sharing between parties while protecting commercial sensitive information. The lack of central authority prevents larger partners from taking control. The system provides mineral provenance and a regulation-compliant record. System cost analysis shows that the system is efficient as it is inexpensive relative to volumes and values of metals transacted. Issues were identified related to collecting richer human rights data for assurance and compliance with due diligence regulations.
Originality/value
The authors provide some of the first evidence in the operations and supply chain management literature of the specific architecture, costs and limitations of using blockchain for SCT. Using an IPT lens in an ION setting, the authors demonstrate how blockchain-based systems can address two key IPT challenges: environmental uncertainty and equivocality.
Details