Search results

1 – 10 of 505
Article
Publication date: 14 June 2023

Fatema Kawaf, Annaleis Montgomery and Marius Thuemmler

The paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its…

Abstract

Purpose

The paper addresses the privacy–personalisation paradox in the post-GDPR-2018 era. As the regulation came in a bid to regulate the collection and use of personal data, its implications remain underexplored. The research question is: How do consumers perceive the matter of personal data collection for the use of highly targeted and personalised ads post-GDPR-2018? The invasion of privacy vs the benefits of highly personalised digital marketing.

Design/methodology/approach

To address the research question, this qualitative study conducts semi-structured interviews with 14 individuals, consisting of average users and digital experts.

Findings

This paper reports on increasing consumer vulnerability post-GDPR-2018 due to increased awareness of personal data collection yet incessant lack of control, particularly regarding the repercussions of the digital footprint. The privacy paradox remains an issue except among experts, and personalisation remains necessary, yet critical challenges arise (e.g. filter bubbles and intrusion).

Practical implications

Policy implications include education, regulating consent platforms and encouraging consensual sharing of personal data.

Originality/value

While the privacy–personalisation paradox has been widely studied, the impact of GDPR-2018 has rarely been addressed in the literature. GDPR-2018 has seemingly had little impact on instilling a sense of security for consumers; if anything, this paper highlights greater concerns for privacy as users sign away their rights on consent forms to access websites, thus contributing novel insights to this area of research.

Details

Information Technology & People, vol. 37 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 16 April 2024

Satyendra Kr Sharma, Rajkumar Sharma and Anil Jindal

Supply chain vulnerability (SCV) analysis is vital for manufacturers globally because it creates a pathway for building resilient supply chains in uncertain environments. This…

Abstract

Purpose

Supply chain vulnerability (SCV) analysis is vital for manufacturers globally because it creates a pathway for building resilient supply chains in uncertain environments. This study aims to identify drivers of SCV in the Indian manufacturing sector.

Design/methodology/approach

Sixteen drivers were identified from the literature review and followed by expert interviews. Interpretive structural modeling was used to determine the hierarchical structural relationship among identified SCV factors.

Findings

It was found that risk is not a board room agenda. Misaligned performance measures with incentives and lack of risk dashboard are the causal factors of SCV. Supply chain security, centralized production and distribution and lack of trust in the supply chain were driven factors.

Originality/value

This provides new insights to assess and prioritize initiatives for supply chain sustainability in terms of continuing business operations. The structural model provides a systemic view of SCV and helps reduce vulnerability.

Details

Journal of Modelling in Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 26 April 2024

Onyinye Sofolahan, Emmanuel Chidiebere Eze, Ernest Effah Ameyaw and Jovita Nnametu

The purpose of this study is to investigate barriers to the adoption of digital technologies (DTs) in the circular economy (CE) transition in the construction industry. The aim is…

Abstract

Purpose

The purpose of this study is to investigate barriers to the adoption of digital technologies (DTs) in the circular economy (CE) transition in the construction industry. The aim is to quantitatively investigate what the barriers to DTs-driven CE are in the Nigerian construction industry.

Design/methodology/approach

A review of existing literature identified 32 barriers to DTs-led CE. A well-structured quantitative research questionnaire was developed and administered to construction experts using a convenient sampling technique via hand delivery and Google form. The gathered data were analysed using arrays of both descriptive and inferential statistical methods.

Findings

The study revealed that the awareness of the digitalisation of CE is high, but the adoption is low. Five themes of the leading 10 factors responsible for the low adoption of DTs in CE transition in the Nigerian construction industry are (1) finance and demand barrier, (2) data management and information vulnerability, (3) skills shortage and infrastructure challenge, (4) poor government and management support and (5) interoperability and resistance problems.

Practical implications

This study could be helpful to decision-makers and policy formulators, which would provide an avenue for higher adoption of DTs in CE transition in the construction industry, better performance and environmental protection. It also provides a foundation for further research efforts in Nigeria and other developing countries of Africa and beyond.

Originality/value

Studies on the barriers to DT adoption in CE transition are still growing, and this is even non-existent in the Nigerian construction context. This offers a unique insight and original findings by pioneering the identification and assessment of barriers to the digitalisation of CE transition in Nigeria’s construction industry.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 23 November 2023

Sayed Arash Hosseini Sabzevari, Haleh Mehdipour and Fereshteh Aslani

Golestan province in the northern part of Iran has been affected by devastating floods. There has been a significant change in the pattern of rainfall in Golestan province based…

Abstract

Purpose

Golestan province in the northern part of Iran has been affected by devastating floods. There has been a significant change in the pattern of rainfall in Golestan province based on an analysis of the seven heaviest rainfall events in recent decades. Climate change appears to be a significant contributing factor to destructive floods. Thus, this paper aims to assess the susceptibility of this area to flash floods in case of heavy downpours.

Design/methodology/approach

This paper uses a variety of computational approaches. Following the collection of data, spatial analyses have been conducted and validated. The layers of information are then weighted, and a final risk map is created. Fuzzy analytical hierarchy process, geographic information system and frequency ratio have been used for data analysis. In the final step, a flood risk map is prepared and discussed.

Findings

Due to the complex interaction between thermal fluctuations and precipitation, the situation in the area is further complicated by climate change and the variations in its patterns and intensities. According to the study results, coastal areas of the Caspian Sea, the Gorganrood Basin and the southern regions of the province are predicted to experience flash floods in the future. The research criteria are generalizable and can be used for decision-making in areas exposed to flash flood risk.

Originality/value

The unique feature of this paper is that it evaluates flash flood risks and predicts flood-prone areas in the northern part of Iran. Furthermore, some interventions (e.g. remapping land use and urban zoning) are provided based on the socioeconomic characteristics of the region to reduce flood risk. Based on the generated risk map, a practical suggestion would be to install and operate an integrated rapid flood warning system in high-risk zones.

Details

International Journal of Disaster Resilience in the Built Environment, vol. 15 no. 3
Type: Research Article
ISSN: 1759-5908

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. 37 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 November 2023

Nirma Swaris, Rangika Umesh Halwatura and Dilanthi Amaratunga

Policy coherence is a complex and tough task for many developing nations because their capacity to examine and deliver evidence-based inputs to policymaking is limited, and policy…

Abstract

Purpose

Policy coherence is a complex and tough task for many developing nations because their capacity to examine and deliver evidence-based inputs to policymaking is limited, and policy dialogue platforms need to be effectively used. Resolving these difficulties is a critical requirement for policy consistency. As a result, the study focuses on the level of policy coherence for climate change adaptation (CCA), disaster risk reduction (DRR) and sustainable development goals (SDG) in Sri Lanka and suggests routes for policy coherence for Resilience. This study aims to investigate the coherent approach of CCA, DRR and SDG; to identify concerns in policy documents addressing the coherence of CCA, DRR and SDG in local context; and to propose policy coherence suggestions for resilience in Sri Lanka.

Design/methodology/approach

Methodology comprises a review and content analysis of 17 policy and legal documents in Sri Lanka and a qualitative study. The qualitative approach consists of semistructured interviews that obtained deep and broad expertise knowledge with ten government representatives and stakeholders. Both content analysis and interview data were analyzed by using NVivo.

Findings

It was discovered that there are several issues with the coherence of policies in Sri Lanka, including the fragmented approach, lack of integration, inadequate coordination, limited resources and lack of monitoring and evaluation. The policies are inspired by international frameworks, and local implementations are not focused, leading to inadequate implementation of policies. The lack of development cooperation for the use of innovative approaches, such as climate-resilient infrastructure and environmentally friendly solutions for CCA and DRR, further aggravates the situation. Another concern is the lack of land use management and responsibility for the development of physical infrastructure for DRR integration with CCA. It is found that there is a limited community involvement which is vital for the implementation of policies. Local implementations are encouraged to fill the gaps in existing policies/acts. The analytical framework of the study is based on a preliminary examination of policy documents, a review of the literature and discussions with practitioners. The framework reflects the current situation of policy integration which addresses strategic, conceptual, institutional, operational and financial coherence. The research suggests pathways for achieving policy coherence in CCA, DRR and SDG in Sri Lanka, such as enhancing the strategic coherence by improving goals to increase the coherence within CCA, DRR and SDG; improving the credibility of the unified approach for developing DRR and CCA risk assessments; intensifying institutional cooperation and stakeholder management; improving the common monitoring and evaluation; establishing implementation strategies; and increasing the community involvement.

Research limitations/implications

The study on policy coherence in Sri Lanka recommends increasing community and professional involvement, conducting more research, developing a national strategy, increasing capacity building, strengthening international collaboration and fostering multisectoral collaboration. These recommendations can help improve policy coherence between CCA, DRR and SDGs, align policies with national goals and priorities and improve implementation effectiveness. By implementing these recommendations, Sri Lanka can address the challenges of climate change and natural disasters and achieve SDGs.

Practical implications

The study on policy coherence for resilience in Sri Lanka has practical implications, including improved coordination and resource allocation, increased capacity building, improved reputation and sustainability. By integrating CCA, DRR and SDGs, this study can help Sri Lanka become more resilient to climate change and natural disasters, achieve SDGs and become a responsible actor in the international community. These implications can contribute to a more sustainable future and ensure that development goals are achieved in a way that is resilient to climate change and natural disasters.

Social implications

Increased community participation: the study emphasizes the importance of community involvement in the policy development process. This can help build trust between communities and government agencies, improve transparency and ensure that policies are developed in a way that is responsive to local needs and priorities.

Originality/value

Based on the identified existing loopholes in the policies and pathways to policy coherence, the issues in policymaking could be overcome. It could be used to establish strong linkages between policies based on CCA, DRR and SDGs to achieve long-term resilience.

Details

International Journal of Disaster Resilience in the Built Environment, vol. 15 no. 3
Type: Research Article
ISSN: 1759-5908

Keywords

Article
Publication date: 12 March 2024

Utkarsh Shrivastava, Bernard Han, Ying Zhou and Muhammad Razi

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR…

Abstract

Purpose

Sharing patient health information (PHI) among hospitals has been much slower than the adoption of health record systems. This paper aims to investigate if privacy regulation (PR) or security measures (SMs) influence hospitals’ use of health information exchange (HIE) to share PHI with other providers (e.g. physicians, labs, hospitals). The study specifically focuses on how multiple PRs can impede and a strong national security infrastructure (NSI) can support HIE.

Design/methodology/approach

The study uses secondary data from a multi-national and multi-hospital survey administered by the European Union. The multi-level structure of the cross-sectional panel data is used to test the influence of both hospital-level (e.g. PR) and national-level variables (e.g. NSI) on HIE. A total of nine types of HIE, three types of PRs, nine SMs and other relevant control variables are considered. This study uses a two-level random intercept generalized linear model to test the hypothesis proposed in the study.

Findings

The study finds that national-level PRs (NLPR) have the strongest positive influence on HIE in comparison to regional (RLPR) and hospital-level (HLPR) PRs. Moreover, the study finds evidence that the presence of RLPR and HLPR, on average, decreases the positive impact of NLPR by 264%. The SMs also have a significant and positive impact on HIE. Adoption of an additional SM can increase the odds of engaging in a certain type of HIE between 21% and 61%. On the other hand, a strong NSI can also amplify the positive impact of SM on certain types of HIE.

Originality/value

This study extends prior research on the role of PRs in enabling HIE by considering the complexities brought up by adopting multiple PRs. NLPRs have the strongest impact on HIE in comparison to RLPRs or HLPRs. Moreover, public infrastructure initiatives such as those related to secure communications can also complement SMs adopted by the providers by encouraging HIE.

Details

Digital Policy, Regulation and Governance, vol. 26 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 2 May 2024

Dewan Mehrab Ashrafi, Selim Ahmed and Tazrian Shainam Shahid

This study aims to present a comprehensive investigation into users’ behavioural intentions to use e-pharmacies through the lens of the privacy calculus model. The present study…

Abstract

Purpose

This study aims to present a comprehensive investigation into users’ behavioural intentions to use e-pharmacies through the lens of the privacy calculus model. The present study also investigates the effects of perceived benefit, perceived privacy risk, timeliness and perceived app quality on e-pharmacy usage through the mediating role of trustworthiness.

Design/methodology/approach

The study used a deductive approach and collected data from 338 respondents using the purposive sampling technique. partial least squares structural equation modelling was applied to analyse the data.

Findings

The findings of the study indicate that perceived benefit, perceived privacy risk, timeliness and perceived app quality do not directly impact users’ behavioural intentions towards e-pharmacy adoption. Instead, it demonstrated that perceived benefit, perceived privacy risk, timeliness and perceived app quality influenced behavioural intention indirectly through the mediating role of trustworthiness

Originality/value

This study offers valuable insights to entrepreneurs, marketers and policymakers, enabling them to develop regulations, guidelines and policies that cultivate trust, safeguard privacy, ensure prompt services and create an enabling environment for the adoption of e-pharmacies. The present study also contributes to the existing literature by extending the privacy calculus model with the integration of timeliness and perceived app quality to explain users’ adoption behaviour towards e-pharmacy.

Details

Journal of Science and Technology Policy Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2053-4620

Keywords

Open Access
Article
Publication date: 1 February 2024

Meenakshi Handa, Ronika Bhalla and Parul Ahuja

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems…

Abstract

Purpose

Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. However, there seems to be limited research on exploring the impact of specific privacy concerns on users’ intention to engage in various privacy protection behaviors. This study aims to examine the role of social privacy concerns, institutional privacy concerns and privacy self-efficacy as antecedents of privacy protection–related control activities intention among young adults active on SNS.

Design/methodology/approach

Data collected from 284 young adults active on SNS was analyzed through partial least squares structural equation modeling using Smart PLS.

Findings

The results indicate that institutional privacy concerns, social privacy concerns and privacy self-efficacy positively influence the control activities intention of SNS users. The extent of privacy self-efficacy and privacy protection-related control activities intention differs among users based on gender.

Research limitations/implications

This study is limited to a population of young adults in the age group of 18–25 years.

Practical implications

The findings of this study form the basis for specific recommendations addressing the different types of privacy concerns experienced by social media users, promoting responsible privacy control behaviors on online platforms and discouraging the possible misuse of information by third parties.

Originality/value

This study validates a theoretical framework that can contribute to future investigations concerning the use of SNS. The study findings form the basis for a set of practical recommendations for policymakers, SNS platforms and users.

Details

Vilakshan - XIMB Journal of Management, vol. 21 no. 1
Type: Research Article
ISSN: 0973-1954

Keywords

1 – 10 of 505