Search results

1 – 10 of over 1000
Article
Publication date: 5 September 2024

Omar Hasan Salah and Mohannad Moufeed Ayyash

A mobile wallet (m-wallet) is a part of financial technology products and is still in the infant stage in Palestine. The technology acceptance model (TAM) formed the basis of the…

Abstract

Purpose

A mobile wallet (m-wallet) is a part of financial technology products and is still in the infant stage in Palestine. The technology acceptance model (TAM) formed the basis of the model development, which was extended in the study to include an analysis of how knowledge sharing (KOS), perceived value (PEV), perceived privacy awareness and control (PRI) and perceived security (SEC) influenced the primary TAM components of perceived ease of use (PEU), perceived usefulness (PRU) and intention to use m-wallets among Palestinian users.

Design/methodology/approach

This study used questionnaires as its primary data collection method. The questionnaires were distributed via online media, and the data collection period spanned from January 10, 2023, to February 21, 2023. The study received 360 responses from participants. Smart PLS and SPSS v.23 software were used to perform a method test on the collected questionnaire data.

Findings

The study’s findings demonstrate the factors influencing Palestinian users’ adoption of m-wallets by extending the Technology Acceptance Model (TAM) to include knowledge sharing, perceived value, privacy awareness and control and security, in addition to the main TAM elements, perceived ease of use (PEU) and perceived usefulness (PU), offering new insights into technology adoption in developing regions and addressing gaps in the literature.

Research limitations/implications

This study has some limitations. First, it is limited because it looks at users’ intentions to use rather than their actual usage. The actual use of an m-wallet should be the topic of further research. Second, rather than focusing on Small and Medium Enterprises (SMEs), this study examined users’ intentions to use m-wallets. Thus, SMEs’ use of m-wallets may be studied in future research. Third, because the study users were from Palestine, the results may not be generalizable. Therefore, additional populations and cultures should be studied in future research. Fourth, the study used a convenience sample of 282 users. As a result, it is not easy to generalize to a sizable population. Future studies should use larger sample sizes or random samples. Finally, this study examined the direct relationship between independent and dependent variables. Future research may consider personal innovativeness and artificial intelligence as potential moderators.

Practical implications

User knowledge sharing can be an important factor driving user intention to use m-wallet. Users can raise awareness of m-wallets by sharing their knowledge and experiences with others about their uses, features and advantages. This is particularly useful in a country like Palestine, where m-wallets are not widely accepted or used. Therefore, m-wallets service providers should improve their services to motivate the users to share their knowledge with others to increase user intention to use. For instance, m-wallet service providers can provide user support programs that assist users in resolving issues, responding to inquiries and offering feedback on the service. Additionally, m-wallet service providers can enhance the user experience of their m-wallet by providing user-friendly interfaces, quick and dependable service and robust security features. By improving the user experience and providing users with a supportive and responsive environment, service providers can encourage users to share their positive experiences with others and increase user intention to use the m-wallet. User knowledge sharing can be an important factor driving user intention to use m-wallet. Users can raise awareness of m-wallets by sharing their knowledge and experiences with others about their uses, features and advantages. This is particularly useful in a country like Palestine, where m-wallets are not widely accepted or used. Therefore, m-wallets service providers should improve their services to motivate the users to share their knowledge with others to increase user intention to use. For instance, m-wallet service providers can provide user support programs that assist users in resolving issues, responding to inquiries and offering feedback on the service. Additionally, m-wallet service providers can enhance the user experience of their m-wallet by providing user-friendly interfaces, quick and dependable service and robust security features.

Social implications

The widespread adoption of m-wallets is an important area of research, as it has significant theoretical implications for technology adoption. M-wallets provide an easy and secure way to pay without cash or physical cards. Therefore, identifying the factors affecting users’ intention to use m-wallets can help Palestinian m-wallet service providers to develop their marketing strategies. Extending the TAM to include four important factors (knowledge sharing, perceived value, perceived privacy awareness and control and perceived security) has improved our understanding of technology adoption models. The study empirically examines the intentions of Palestinian users to use m-wallets and how this novel technology is used in this area of the Arab world. The results empirically support that these factors strongly affect users’ intentions to use m-wallets. Thus, this study fills the knowledge gap about the factors influencing the use of m-wallets in Palestine and adds to the literature on the user intentions to use new technologies. Finally, this study is one of the first to examine the relationship between knowledge sharing, perceived value, perceived privacy awareness and control, perceived security and technology acceptance models in general and the extended TAM with these factors in a specific m-wallet context.

Originality/value

The preliminary empirical study investigates the factors affecting the use of m-wallets in Palestine by extending TAM with knowledge sharing, perceived value, perceived privacy awareness and control and perceived security as external variables to the model. The findings of this study help to fill a gap in the existing literature by identifying key variables that affect Palestinians’ intentions to use m-wallet. This study also contributes to the increase in knowledge in the area. To date, no studies have explored privacy in terms of awareness, control and knowledge sharing as essential factors that affect users’ intention to use m-wallets in Palestine.

Details

VINE Journal of Information and Knowledge Management Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 31 March 2023

Mohammad Reza Zahedi, Shayan Naghdi Khanachah and Shirin Papoli

The purpose of this study paper is to identify and prioritize the factors affecting the knowledge flow in high-tech industries.

Abstract

Purpose

The purpose of this study paper is to identify and prioritize the factors affecting the knowledge flow in high-tech industries.

Design/methodology/approach

This research is applied in terms of purpose and descriptive-survey in terms of data collection method. This research has been done in a qualitative–quantitative method. In the qualitative part, due to the nature of the data in this study, expert interviews have been used. The sample studied in this research includes 35 managers and expert professors with experience in the field of knowledge management working in universities and high-tech industries who have been selected by the method of snowball. In the quantitative part, the questionnaire tool and DANP multivariate decision-making method have been used.

Findings

In this study, a multicriteria decision-making technique using a combination of DEMATEL and ANP (DANP) was used to identify and prioritize the factors affecting the knowledge flow in high-tech industries. In this study, the factors affecting the knowledge flow, including 8 main factors and 31 subfactors, were selected. Human resources, organizational structure, organizational culture, knowledge communication, knowledge management tools, knowledge characteristics, laws, policies and regulations and financial resources were effective in improving knowledge flow, respectively.

Originality/value

By studying the research, it was found that the study area is limited, and the previous work has remained at the level of documentation and little practical use has been done. In previous research, the discussion of knowledge flow has not been very open, and doing incomplete work causes limited experiences and increases cost and time wastage, and parallel work may also occur. Therefore, to complete the knowledge management circle and fully achieve the research objectives, as well as to make available and transfer the experiences of people working in this field and also to save time and reduce costs, the contents and factors of previous models have been counted. It is designed for high-tech industries, a model for the flow of knowledge.

Details

Journal of Science and Technology Policy Management, vol. 15 no. 5
Type: Research Article
ISSN: 2053-4620

Keywords

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-83549-098-3

Article
Publication date: 12 September 2024

Ahmed Ali Otoom, Issa Atoum, Heba Al-Harahsheh, Mahmoud Aljawarneh, Mohammed N. Al Refai and Mahmoud Baklizi

The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity…

Abstract

Purpose

The purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity through collaborative efforts in the higher education sector. The EduCERT framework addresses this gap by enhancing cyber security and mitigating cybercrime through collaborative incident management, knowledge sharing and university awareness campaigns.

Design/methodology/approach

The authors propose an EduCERT framework following the design science methodology. The framework is developed based on literature and input from focus group experts. Moreover, it is grounded in the principles of the technology-organization-environment framework, organizational learning and diffusion of innovations theory.

Findings

The EduCERT has eight components: infrastructure, governance, knowledge development, awareness, incident management, evaluation and continuous improvement. The framework reinforces national cybersecurity through cooperation between universities and the National Computer Emergency Response Team. The framework has been implemented in Jordan to generate a cybersecurity foundation for higher education. Evaluating the EduCERT framework’s influence on national cybersecurity highlights the importance of adopting comprehensive cyber-security policies and controls. The framework application shows its relevance, effectiveness, adaptability and alignment with best practices.

Research limitations/implications

Despite the impact of applying the framework in the Jordanian context, it is essential to acknowledge that the proposed EduCERT framework’s practical implementation may encounter challenges specific to diverse international educational environment sectors. However, framework customization for global applicability could address varied educational institutions in other countries.

Practical implications

Furthermore, the proposed EduCERT framework is designed with universal applicability that extends beyond the specific country’s context. The principles and components presented in the framework can serve as valuable design advice for establishing collaborative and resilient cybersecurity frameworks in educational settings worldwide. Therefore, the research enhances the proposed framework’s practical utility and positions it as an invaluable contribution to the broader discourse on global cybersecurity in academia.

Originality/value

This paper enhances national cybersecurity in the higher education sector, addressing the need for a more integrated response mechanism. The EduCERT framework demonstrates its effectiveness, adaptability and alignment with best practices, offering valuable guidance for global educational institutions.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 25 June 2024

Michael Herburger, Andreas Wieland and Carina Hochstrasser

Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material…

1224

Abstract

Purpose

Disruptive events caused by cyber incidents, such as supply chain (SC) cyber incidents, can affect firms’ SC operations on a large scale, causing disruptions in material, information and financial flows and impacting the availability, integrity and confidentiality of SC assets. While SC resilience (SCRES) research has received much attention in recent years, the purpose of this study is to investigate specific capabilities for building SCRES to cyber risks. Based on a nuanced understanding of SC cyber risk characteristics, this study explores how to build SC cyber resilience (SCCR) using the perspective of dynamic capability (DC) theory.

Design/methodology/approach

Based on 79 in-depth interviews, this qualitative study examines 28 firms representing 4 SCs in Central Europe. The researchers interpret data from semistructured interviews and secondary data using the DC perspective, which covers sensing, seizing and transforming.

Findings

The authors identify SCRES capabilities, in general, and SCCR-specific capabilities that form the basis for the realignment of DCs for addressing cyber risks in SCs. The authors argue that SCRES capabilities should, in general, be combined with specific capabilities for SCCR to deal with SC cyber risks. Based on these findings, 10 propositions for future research are provided.

Practical implications

Practitioners should collaborate specifically to address cyber threats and risks in SCs, integrate new SC partners and use new approaches. Furthermore, this study shows that cyber risks need to be treated differently from traditional SC risks.

Originality/value

This empirical study enriches the SC management literature by examining SCRES to cyber risks through the insightful lens of DCs. It identifies DCs for building SCCR, makes several managerial contributions and is among the few that apply the DC approach to address specific SC risks.

Details

Supply Chain Management: An International Journal, vol. 29 no. 7
Type: Research Article
ISSN: 1359-8546

Keywords

Open Access
Article
Publication date: 8 July 2024

Andrew Ebekozien, Clinton Ohis Aigbavboa, Mohamad Shaharudin Samsurijan, John Aliu and Angeline Ngozika Chibuike Nwaole

The paucity of artisans in some construction trades and the transitioning of the experience of the few for sustainability calls for concern. Mentorship programmes offer a…

Abstract

Purpose

The paucity of artisans in some construction trades and the transitioning of the experience of the few for sustainability calls for concern. Mentorship programmes offer a promising mechanism to support construction artisans through those transitions. Mentorship may enhance artisan decent work and economic growth, like increased income for artisans. This is part of Sustainable Development Goal 8 (Goal 8). Hence, this study aims to investigate issues hindering construction artisan skills growth and suggest measures to improve construction artisan skills through mentorship mechanisms to achieve Goal 8.

Design/methodology/approach

The study adopted a qualitative approach and collected data via oral interviews with knowledgeable participants. The participants were consultant experts in mentorship and Sustainable Development Goals (SDGs) matters, construction organisation management staffers and construction artisans in the Nigerian construction industry. The study covered Lagos and Abuja and achieved saturation at the 30th interviewee. Also, the research utilised a thematic method to analyse the collated data.

Findings

Enhanced knowledge sharing accelerates junior artisans’ learning skills quickly, improving artisans’ performance, ensuring sustainability of the skills learned (knowledge retention), encouraging collaboration, building the next generation of leaders and transitioning of experience to mentees emerged as mentorship’s role in developing construction artisans’ skills. Findings show that mentorship mechanisms to develop construction artisan skills face encumbrances. The perceived 32 encumbrances were re-clustered into mentee, mentor and government-related encumbrances. Also, achieving Goal 8 regarding construction artisans may be threatened if these issues are not checked. Thus, the study recommended measures improving construction artisan skills through mentorship mechanisms to achieve Goal 8.

Originality/value

Identifying the major encumbrances facing construction artisan skills improvement through mentorship would be useful to advocate measures to improve construction artisan’s skills to achieve Goal 8.

Details

Engineering, Construction and Architectural Management, vol. 31 no. 13
Type: Research Article
ISSN: 0969-9988

Keywords

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-83549-098-3

Article
Publication date: 13 September 2024

Ifeyinwa Juliet Orji and Chukwuebuka Martinjoe U-Dominic

Cybersecurity has received growing attention from academic researchers and industry practitioners as a strategy to accelerate performance gains and social sustainability…

28

Abstract

Purpose

Cybersecurity has received growing attention from academic researchers and industry practitioners as a strategy to accelerate performance gains and social sustainability. Meanwhile, firms are usually prone to cyber-risks that emanate from their supply chain partners especially third-party logistics providers (3PLs). Thus, it is crucial to implement cyber-risks management in 3PLs to achieve social sustainability in supply chains. However, these 3PLs are faced with critical difficulties which tend to hamper the consistent growth of cybersecurity. This paper aims to analyze these critical difficulties.

Design/methodology/approach

Data were sourced from 40 managers in Nigerian 3PLs with the aid of questionnaires. A novel quantitative methodology based on the synergetic combination of interval-valued neutrosophic analytic hierarchy process (IVN-AHP) and multi-objective optimization on the basis of a ratio analysis plus the full multiplicative form (MULTIMOORA) is applied. Sensitivity analysis and comparative analysis with other decision models were conducted.

Findings

Barriers were identified from published literature, finalized using experts’ inputs and classified under organizational, institutional and human (cultural values) dimensions. The results highlight the most critical dimension as human followed by organizational and institutional. Also, the results pinpointed indigenous beliefs (e.g. cyber-crime spiritualism), poor humane orientation, unavailable specific tools for managing cyber-risks and skilled workforce shortage as the most critical barriers that show the highest potential to elicit other barriers.

Research limitations/implications

By illustrating the most significant barriers, this study will assist policy makers and industry practitioners in developing strategies in a coordinated and sequential manner to overcome these barriers and thus, achieve socially sustainable supply chains.

Originality/value

This research pioneers the use of IVN-AHP-MULTIMOORA to analyze cyber-risks management barriers in 3PLs for supply chain social sustainability in a developing nation.

Details

Journal of Enterprise Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 22 August 2024

Jianhua Zhang, Umair Zia, Muhammad Usman Shehzad and Sherani

Nowadays, it is hard to retain a knowledge monopoly since tacit knowledge has become essential for innovation and organizational effectiveness (ORP). This study analyzed the role…

44

Abstract

Purpose

Nowadays, it is hard to retain a knowledge monopoly since tacit knowledge has become essential for innovation and organizational effectiveness (ORP). This study analyzed the role of product innovation as a mediator in the relationship between the tacit knowledge management process (TKMP) and organizational performance. In addition, two moderating variables were examined: (1) Affective trust (AFT) between the tacit knowledge management process and product innovation relationship and (2) Task efficiency in product innovation and organizational performance (ORP) relationship.

Design/methodology/approach

Around 344 questionnaires were collected from various Chinese regions between February and April 2023 to conduct this study. The regression, mediation and moderation analyses on lower and higher-order data were evaluated using the SmartPLS approach.

Findings

The results validate that product innovation mediates the connection between managing tacit knowledge and the organization’s performance. Affective trust also plays a positive moderating role between tacit knowledge and product innovation. These results provide valuable theoretical and practical insights, substantiating various direct, indirect, mediate, and moderated effects hypotheses.

Research limitations/implications

The scope of the study was restricted to manufacturing companies; however, further research may broaden the model’s scope to include other industries. Furthermore, future research should continue to explore the role of task efficiency in the innovation process and identify strategies for enhancing task efficiency in organizations.

Practical implications

The study establishes the significance of effectively managing tacit knowledge for fostering product innovation. Company managers and leaders can promote employee trust, enhancing innovation capabilities and overall organizational effectiveness.

Originality/value

This study, involving dual moderation, explores the connections between processes of managing tacit knowledge, product innovation and organizational performance. It addresses research gaps, enriching the understanding of managing tacit knowledge, leading to organizational innovation and performance improvements. The study also highlights how affective trust is vital in strengthening the connection between TKMP and product innovation.

Details

Business Process Management Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 11 September 2024

Chen Yang, Yuzhuo Wang and Chengzhi Zhang

This study aims to analyze the distribution of novelty among scholarly papers in the field of library and information science (LIS) in China. Specifically, this study explores the…

Abstract

Purpose

This study aims to analyze the distribution of novelty among scholarly papers in the field of library and information science (LIS) in China. Specifically, this study explores the distribution of novelty of papers in various journals, research topics and different periods. It is possible to understand the characteristics of LIS research in China and what factors have influenced it.

Design/methodology/approach

This paper collects articles published in Chinese library science journals indexed by the Chinese Social Sciences Citation Index from 2000 to 2022. The BERTopic model is used based on abstracts of the papers and to obtain the topic of each paper. Based on the combination innovation theory of reference pairs cited by focal papers, novelty scores of all papers are calculated. Next, this paper analyzes the novelty of papers under different topics. Finally, this paper analyzes the differences in author collaboration patterns across various topics, aiming to explain how these differences relate to the novelty of papers from a collaborative perspective.

Findings

This study shows that archival research topics have lower novelty than papers on journal evaluation and patent technology in Chinese LIS. Research papers in this field are gradually becoming more novel over time. Papers on different topics and with varying degrees of novelty exhibit distinct author collaboration patterns, with low-novelty topics more frequently featuring solo authorship, while high-novelty topics tend to involve a higher percentage of inter-institutional collaboration.

Originality/value

This study investigates the novelty characteristics of research papers on different topics in the field of LIS in China. The authors’ contribution includes visualizing research hotspots and trends in the field and analyzing authors’ collaboration patterns at the level of research topics, thereby providing new perspectives on the factors affecting the novelty of these papers.

Details

The Electronic Library , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0264-0473

Keywords

1 – 10 of over 1000