Search results

1 – 10 of 737
Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 6 October 2023

Renata Konrad, Solomiya Sorokotyaha and Daniel Walker

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute…

Abstract

Purpose

Conflict and violence are the main drivers of globally escalating humanitarian needs. Local grassroots initiatives are pivotal in distributing humanitarian supplies in the acute response phase until more established humanitarian aid organizations can enter. Nevertheless, scant research exists regarding the role of grassroots associations in providing humanitarian assistance during a military conflict. The purpose of this paper is to understand the role of grassroots associations and identify important themes for effective operations.

Design/methodology/approach

This paper adopts a case-study approach of three Ukrainian grassroots associations that began operating in the immediate days of the full-scale invasion of Ukraine. The findings are based on analyzing primary sources, including interviews with Ukrainian volunteers, and are supported by secondary sources.

Findings

Grassroots associations have local contacts and a contextual understanding of population needs and can respond more rapidly and effectively than large intergovernmental agencies. Four critical themes regarding the operations of grassroots associations emerged: information management, inventory management, coordination and performance measurement. Grassroots humanitarian response operations during conflict are challenged by personal security risks, the unpredictability of unsolicited supplies, emerging volunteer roles, dynamic transportation routes and shifting demands.

Originality/value

Grassroots responses are central to humanitarian responses during the acute phase of a military conflict. By examining the operations of grassroots associations in the early months of the 2022 war in Ukraine, the authors provide a unique perspective on humanitarian logistics. Nonetheless, more inclusive models of humanitarian responses are needed to harness the capacities and resilience of grassroots operations in practice.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 29 February 2024

Rosemarie Santa González, Marilène Cherkesly, Teodor Gabriel Crainic and Marie-Eve Rancourt

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and…

Abstract

Purpose

This study aims to deepen the understanding of the challenges and implications entailed by deploying mobile clinics in conflict zones to reach populations affected by violence and cut off from health-care services.

Design/methodology/approach

This research combines an integrated literature review and an instrumental case study. The literature review comprises two targeted reviews to provide insights: one on conflict zones and one on mobile clinics. The case study describes the process and challenges faced throughout a mobile clinic deployment during and after the Iraq War. The data was gathered using mixed methods over a two-year period (2017–2018).

Findings

Armed conflicts directly impact the populations’ health and access to health care. Mobile clinic deployments are often used and recommended to provide health-care access to vulnerable populations cut off from health-care services. However, there is a dearth of peer-reviewed literature documenting decision support tools for mobile clinic deployments.

Originality/value

This study highlights the gaps in the literature and provides direction for future research to support the development of valuable insights and decision support tools for practitioners.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 20 March 2023

Kudakwashe Chirambwi

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and…

Abstract

Purpose

This paper argues for the need to use multiple sources and methods that respond to research challenges presented by new forms of war. There are methodological constraints and contention on the superiority given to positivist and interpretivist research designs when doing fieldwork in war situations, hence there is a need to use integrated data generation techniques. The combined effect of severe limitations of movement for both the researcher and researched fragmented data because of polarized views about the causes of the war and unpredictable events that make information hard to come by militate against systematic, organised and robust data generation. The purpose of this paper, therefore, is to make fieldwork researchers understand significant research problems unique to war zones.

Design/methodology/approach

This research was guided by the postmodernist mode of thought which challenges standardised research traditions. Fieldwork experiences in Cabo suggest the need to use the composite strategies that rely on the theoretical foundation of integrative and creative collection of data when doing research in violent settings.

Findings

The fieldwork experiences showed that the standardised, conventional and valorised positivist and ethnographic research strategies may not sufficiently facilitate understanding of the dynamics of war. There should not be firm rules, guidelines or regulations governing the actions of the researcher in conflict. As such, doing research in violent settings require reflexivity, flexibility and creativity in research strategies that respond to rapid changes. Research experiences in Mozambique show the need to use blended methods that include even less structured methodologies.

Originality/value

Fieldwork experiences in Cabo challenges researchers who cling to standardised research traditions which often hamper awareness of new postmodernist mode of thought applicable to war settings. It is essential to study the nature of African armed conflicts by combining creativity and flexibility in the selection of research strategies.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 14 no. 2
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 19 April 2024

Júlia Palik

What kinds of support do interstate rivals provide to domestic actors in ongoing civil wars? And how do domestic actors utilize the support they receive? This chapter answers…

Abstract

What kinds of support do interstate rivals provide to domestic actors in ongoing civil wars? And how do domestic actors utilize the support they receive? This chapter answers these questions by comparing Iranian and Saudi military and non-military (mediation, foreign aid and religious soft-power promotion) support to the Houthis and to the Government of Yemen (GoY) during the Saada wars (2004–2010) and the internationalized civil war (2015–2018). It also focuses on the processes through which the GoY and the Houthis have utilized this support for their own strategic purposes. This chapter applies a structured, focused comparison methodology and relies on data from a review of both primary and secondary sources complemented by 14 interviews. This chapter finds that there were less external interventions in the conflict in Saada than in the internationalized civil war. During the latter, a broader set of intervention strategies enabled further instrumentalization by domestic actors, which in turn contributed to the protracted nature of the conflict. This chapter contributes to the literature on interstate rivalry and third-party intervention. The framework of analysis is applicable to civil wars that experience intervention by rivals, such as Syria or Libya.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

Open Access
Article
Publication date: 23 March 2020

Hedaia-t-Allah Nabil Abd Al Ghaffar

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

7113

Abstract

Purpose

The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.

Design/methodology/approach

The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.

Findings

The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.

Practical implications

Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.

Originality/value

The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.

Details

Review of Economics and Political Science, vol. 9 no. 2
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 11 December 2023

Eoin Whelan and Ofir Turel

Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The…

2842

Abstract

Purpose

Prior research has extensively examined how bringing technology from work into the non-work life domain creates conflict, yet the reverse pathway has rarely been studied. The purpose of this study is to bridge this gap and examine how the non-work use of smartphones in the workplace affects work–life conflict.

Design/methodology/approach

Drawing from three literature streams: technostress, work–life conflict and role boundary theory, the authors theorise on how limiting employees' ability to integrate the personal life domain into work, by means of technology use policy, contributes to stress and work–life conflict. To test this model, the authors employ a natural experiment in a company that changed its policy from fully restricting to open smartphone access for non-work purposes in the workplace. The insights gained from the experiment were explored further through qualitative interviews.

Findings

Work–life conflict declines when a ban on using smartphones for non-work purposes in the workplace is revoked. This study's results show that the relationship between smartphone use in the workplace and work–life conflict is mediated by sensed stress. Additionally, a post-hoc analysis reveals that work performance was unchanged when the smartphone ban was revoked.

Originality/value

First, this study advances the authors' understanding of how smartphone use policies in the workplace spill over to affect non-work life. Second, this work contributes to the technostress literature by revealing how, in specific situations, engagement with ICT can reduce distress and strain.

Details

Internet Research, vol. 34 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

Open Access
Article
Publication date: 26 March 2024

Guilherme de Araujo Grigoli, Maurilio Ferreira Da Silva Júnior and Diego Pereira Pedra

This study aims to identify the main challenges to achieving humanitarian logistics in the context of United Nations peace missions in sub-Saharan Africa and to present…

Abstract

Purpose

This study aims to identify the main challenges to achieving humanitarian logistics in the context of United Nations peace missions in sub-Saharan Africa and to present suggestions for overcoming the logistical gaps encountered.

Design/methodology/approach

The methodological approach of the work focuses on the comparative case study of the United Nations Mission in South Sudan, the United Nations Multidimensional Integrated Stabilisation Mission in the Central African Republic and The United Nations Organisation Stabilisation Mission in the Democratic Republic of Congo from 2014 to 2021. The approach combined a systematic literature review with the authors’ empirical experience as participant observers in each mission, combining theory and practice.

Findings

As a result, six common challenges were identified for carrying out humanitarian logistics in the three peace missions. Each challenge revealed a logistical gap for which an appropriate solution was suggested based on the best practices found in the case study of each mission.

Research limitations/implications

This paper presents limitations when addressing the logistical analysis based on only three countries under the UN mission as a case study, as well as conceiving that certain flaws in the system, in the observed period, are already in the process of correction with the adoption of the 2016–2021 strategy by the UN Global Logistic Cluster. The authors suggest that further studies can be carried out by expanding the number of cases or using countries where other bodies (AU, NATO or EU) work.

Originality/value

To the best of the authors’ knowledge, this study is the first comparative case study of humanitarian logistics on the three principal missions of the UN conducted by academics and practitioners.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2042-6747

Keywords

Open Access
Article
Publication date: 23 February 2024

Sarah Mueller-Saegebrecht

Managers must make numerous strategic decisions in order to initiate and implement a business model innovation (BMI). This paper examines how managers perceive the management team…

738

Abstract

Purpose

Managers must make numerous strategic decisions in order to initiate and implement a business model innovation (BMI). This paper examines how managers perceive the management team interacts when making BMI decisions. The paper also investigates how group biases and board members’ risk willingness affect this process.

Design/methodology/approach

Empirical data were collected through 26 in-depth interviews with German managing directors from 13 companies in four industries (mobility, manufacturing, healthcare and energy) to explore three research questions: (1) What group effects are prevalent in BMI group decision-making? (2) What are the key characteristics of BMI group decisions? And (3) what are the potential relationships between BMI group decision-making and managers' risk willingness? A thematic analysis based on Gioia's guidelines was conducted to identify themes in the comprehensive dataset.

Findings

First, the results show four typical group biases in BMI group decisions: Groupthink, social influence, hidden profile and group polarization. Findings show that the hidden profile paradigm and groupthink theory are essential in the context of BMI decisions. Second, we developed a BMI decision matrix, including the following key characteristics of BMI group decision-making managerial cohesion, conflict readiness and information- and emotion-based decision behavior. Third, in contrast to previous literature, we found that individual risk aversion can improve the quality of BMI decisions.

Practical implications

This paper provides managers with an opportunity to become aware of group biases that may impede their strategic BMI decisions. Specifically, it points out that managers should consider the key cognitive constraints due to their interactions when making BMI decisions. This work also highlights the importance of risk-averse decision-makers on boards.

Originality/value

This qualitative study contributes to the literature on decision-making by revealing key cognitive group biases in strategic decision-making. This study also enriches the behavioral science research stream of the BMI literature by attributing a critical influence on the quality of BMI decisions to managers' group interactions. In addition, this article provides new perspectives on managers' risk aversion in strategic decision-making.

Details

Management Decision, vol. 62 no. 13
Type: Research Article
ISSN: 0025-1747

Keywords

1 – 10 of 737