Search results

1 – 10 of over 43000
Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Article
Publication date: 12 May 2022

JoAnne Yong-Kwan Lim

Organizations worldwide use virtual teams to cope with the COVID-19 pandemic and capitalize on distributed members' unique expertise to accomplish essential tasks. A critical…

Abstract

Purpose

Organizations worldwide use virtual teams to cope with the COVID-19 pandemic and capitalize on distributed members' unique expertise to accomplish essential tasks. A critical reason that inhibits virtual team members from leveraging each other’s knowledge is a lack of psychological safety. Specifically, individuals are unwilling to speak out for fear of negative repercussions, such as embarrassment to one’s image and rejection from others in their teams. The purpose of this study is to advance the importance of distinct awareness (task knowledge and presence) enabled by information technologies in developing the psychological safety of men and women in virtual teams.

Design/methodology/approach

This study tested the hypotheses using a survey study of 94 participants from 19 graduate student virtual teams.

Findings

This study found that task knowledge awareness predicted psychological safety for men, whereas it was presence awareness for women. By demonstrating the role of awareness in promoting psychological safety for men and women in virtual teams, this study also sheds light on reducing online gender inequitable issues.

Practical implications

First, organizational managers need to incorporate gender when deciding the awareness type to promote psychological safety in virtual teams. For men, it is task knowledge awareness, whereas for women, it is presence awareness. Second, as there is a wide range of information technologies (ITs) available, managers need to identify if the provided ITs enable virtual team members to develop the specific type of knowledge awareness critical for psychological safety development. Third, managers can incorporate rewards and apply interventions at regular temporal periods to encourage team members to increase their online presence as well as question and share task-related content.

Originality/value

It is imperative to identify ways to encourage men and women working in virtual teams to speak up so that the expertise held by the members can be better leveraged. This study represents an important step in this direction.

Details

Team Performance Management: An International Journal, vol. 28 no. 5/6
Type: Research Article
ISSN: 1352-7592

Keywords

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

95588

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6867

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 February 1990

Gordon Wills, Sherril H. Kennedy, John Cheese and Angela Rushton

To achieve a full understanding of the role ofmarketing from plan to profit requires a knowledgeof the basic building blocks. This textbookintroduces the key concepts in the art…

16627

Abstract

To achieve a full understanding of the role of marketing from plan to profit requires a knowledge of the basic building blocks. This textbook introduces the key concepts in the art or science of marketing to practising managers. Understanding your customers and consumers, the 4 Ps (Product, Place, Price and Promotion) provides the basic tools for effective marketing. Deploying your resources and informing your managerial decision making is dealt with in Unit VII introducing marketing intelligence, competition, budgeting and organisational issues. The logical conclusion of this effort is achieving sales and the particular techniques involved are explored in the final section.

Details

Management Decision, vol. 28 no. 2
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 1 June 2012

Yu “Andy” Wu, Victor R. Prybutok, Chang E. Koh and Bartlomiej Hanus

Radio frequency identification (RFID) can bring a lot of benefits to supply chain management. However, privacy issues caused by RFID surface constantly and can impede widespread…

1382

Abstract

Purpose

Radio frequency identification (RFID) can bring a lot of benefits to supply chain management. However, privacy issues caused by RFID surface constantly and can impede widespread implementation of RFID. The purpose of this paper is to propose a theoretical model to explicate the construct of concern for information privacy (CFIP).

Design/methodology/approach

The authors review and synthesize the extant and pertinent literature on RFID and privacy issues. Starting with previous theorization of CFIP, its four constituent dimensions are examined – collection, unauthorized secondary use, improper access, and errors – within the context of RFID‐related privacy issues.

Findings

The authors situate CFIP within a nomological model, which advances that: awareness of the RFID technology itself, awareness of information security risks entailed by RFID use, and awareness of privacy protective measures are direct antecedent to CFIP; and CFIP directly influences a person's trust in the RFID technology.

Social implications

Users' concern about privacy is a major impediment to wide‐spread use of RFID. From a societal perspective, the business advantages of RFID technologies should not be gained at the expense of citizens' privacy. This research helps to determine the proper management of privacy issues involved in RFID implementations.

Originality/value

Although there has been some technical discussion of privacy protection measures related to RFID, academic theorization of privacy issues at the human‐societal level is lacking in comparison. With this paper, the authors contribute to remedying this insufficiency.

Details

Business Process Management Journal, vol. 18 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 30 March 2022

Rongjia Song, Weiping Cui, Jan Vanthienen, Lei Huang and Ying Wang

The purpose of this paper is to contribute to the extant literature about the co-evolvement of Business Process Management (BPM) and the Internet of Things (IoT) by proposing the…

Abstract

Purpose

The purpose of this paper is to contribute to the extant literature about the co-evolvement of Business Process Management (BPM) and the Internet of Things (IoT) by proposing the IoT-enabled Context-aware BPM (IoT-CaBPM) framework to bridge from the IoT infrastructure to context-aware business processes.

Design/methodology/approach

Motivated by the “Three Waves” of BPM research, IoT-enabled context-awareness is, therefore, expected to be achieved for enhancing the business process design, which pilots a new wave of BPR (Business Process Redesign/Reengineering) to enable the business process coevolve with IoT and analytics. This paper reports an illustrative case study of BPR in a Chinese bulk port, one of the hub seaports that widely adopted IoT technologies over the last few years.

Findings

The IoT implementation and data analytics has increased the efficiency and improve the monitoring effectively. The proposed IoT-CaBPM framework availably helps to identify and match nodes of IoT devices, business decisions and analytic models in order to redesign a business process towards context-aware variability. As IoT is rapidly becoming the new dominant IT paradigm is moving towards mature implementation in various industries, the corresponding BPR must be planned and executed strategically for achieving better benefits.

Originality/value

Despite some research extend BPM standard by integrating IoT devices as a sort of resources or report generically that the ports operations are affected by IoT, there is still a lack of layers from the IoT infrastructure to context-aware business processes. An industrial BPR case with business models in detail is also a lack for presenting the specific implications and effectiveness of the adoption of such technologies. This paper fills in this gap.

Details

Business Process Management Journal, vol. 28 no. 3
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 27 August 2024

Jailos Mrisho Nzumile

Quality has always been a competitive advantage for every organisation that strives for customer satisfaction when offering services or products. Technological advancements during…

Abstract

Purpose

Quality has always been a competitive advantage for every organisation that strives for customer satisfaction when offering services or products. Technological advancements during the industrial revolutions have enabled organisations to grub improvement and transition opportunities into a new paradigm in operating business processes. In light of the fourth industrial revolution (FIR), in which Quality 4.0 (Q4.0) leveraged its technologies, this study establishes the need for service organisations to transition to Q4.0. It unveils the awareness level within the organisation, the existing challenges and the benefits of transitioning to Q4.0.

Design/methodology/approach

The data for this study was acquired through a survey methodology; it involved qualitative and quantitative methodologies and a mix of primary and secondary sources. The challenges and benefits regarding Q4.0 adoption were obtained from the relevant literature and used as a base of assessment in the selected service organisations. Minitab version 20 and SPSS 21.0 software packages analysed the gathered data.

Findings

The study found a high level of awareness regarding Q4.0 among the selected service organisations. Despite the high level of awareness, it was revealed that neither of the Q4.0-related technologies have been implemented nor in the process within the selected service industries. This is due to numerous challenges, including inadequate high-speed internet, a high cost of investment, inadequate skilled personnel and inadequate scepticalness to the implementation outcomes. Despite these challenges, leveraged technologies, potential benefits and Q4.0 awareness all demonstrate the need for Q4.0.

Research limitations/implications

The study introduces the advent of the FIR and the disruptive nature of the associated technologies. It also unveils the potential of the contemporary technologies of the FIR that could elevate quality service provision to increase their competitiveness. Moreover, it also assists service organisations in planning and properly allocating their resources to ensure all the challenges are addressed in the Q4.0 adoption process. The study is limited in that it merely considers service organisations in Tanzania without categorising what type of service organisations were considered, i.e. banking, telecommunications, health, etc. thus generalising the findings.

Originality/value

Much has been discussed in the literature regarding Q4.0 in manufacturing organisations, focusing less on service organisations. This study uniquely assessed the need to transition to Q4.0 for service organisations, which has yet to be covered in the literature.

Details

The TQM Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-2731

Keywords

Article
Publication date: 13 November 2017

Harrison Stewart and Jan Jürjens

The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be…

6251

Abstract

Purpose

The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable asset.

Design/methodology/approach

Before developing the instrument for the survey, first, effective measurement built upon existing literature review was identified and developed and the survey questionnaires were set according to past studies and the findings based on qualitative analyses. Data were collected by using cross-sectional questionnaire and a Likert scale, whereby each question was related to an item as in the work of Witherspoon et al. (2013). Data analysis was done using the SPSS.3B.

Findings

Based on the results from three surveys and findings, a principle of information security compliance practices was proposed based on the authors’ proposed nine-five-circle (NFC) principle that enhances information security management by identifying human conduct and IT security-related issues regarding the aspect of information security management. Furthermore, the authors’ principle has enabled closing the gap between technology and humans in this study by proving that the factors in the present study’s finding are interrelated and work together, rather than on their own.

Research limitations/implications

The main objective of this study was to address the lack of research evidence on what mobilizes and influences information security management development and implementation. This objective has been fulfilled by surveying, collecting and analyzing data and by giving an account of the attributes that hinder information security management. Accordingly, a major practical contribution of the present research is the empirical data it provides that enable obtaining a bigger picture and precise information about the real issues that cause information security management shortcomings.

Practical implications

In this sense, despite the fact that this study has limitations concerning the development of a diagnostic tool, it is obviously the main procedure for the measurements of a framework to assess information security compliance policies in the organizations surveyed.

Social implications

The present study’s discoveries recommend in actuality that using flexible tools that can be scoped to meet individual organizational needs have positive effects on the implementation of information security management policies within an organization. Accordingly, the research proposes that organizations should forsake the oversimplified generalized guidelines that neglect the verification of the difference in information security requirements in various organizations. Instead, they should focus on the issue of how to sustain and enhance their organization’s compliance through a dynamic compliance process that involves awareness of the compliance regulation, controlling integration and closing gaps.

Originality/value

The rapid growth of information technology (IT) has created numerous business opportunities. At the same time, this growth has increased information security risk. IT security risk is an important issue in industrial sectors, and in organizations that are innovating owing to globalization or changes in organizational culture. Previously, technology-associated risk assessments focused on various technology factors, but as of the early twenty-first century, the most important issue identified in technology risk studies is the human factor.

Details

Information & Computer Security, vol. 25 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 43000