Search results

1 – 10 of 684
Content available
Article
Publication date: 23 September 2019

Mahmood Hussain Shah, Paul Jones and Jyoti Choudrie

3289

Abstract

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Article
Publication date: 2 August 2023

Atika Ahmad Kemal and Mahmood Hussain Shah

While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited…

Abstract

Purpose

While the potential for digital innovation (DI) to transform organizational practices is widely acknowledged in the information systems (IS) literature, there is very limited understanding on the socio-political nature of institutional interactions that determine DI and affect organizational practices in social cash organizations. Drawing on the neo-institutionalist vision, the purpose of the study is to examine the unique set of institutional exchanges that influence the transition to digital social cash payments that give rise to new institutional arrangements in social cash organizations.

Design/methodology/approach

The paper draws on an in-depth case study of a government social cash organization in Pakistan. Qualitative data were collected using 30 semi-structured interviews from key organizational members and stakeholders.

Findings

The results suggest that DI is determined by the novel intersections between the coercive (techno-economic, regulatory), normative (socio-organizational), mimetic (international) and covert power (political) forces. Hence, DI is not a technologically deterministic output, but rather a complex socio-political process enacted through dialogue, negotiation and conflict between institutional actors. Technology is socially embedded through the process of institutionalization that is coupled by the deinstitutionalization of established organizational practices for progressive transformation.

Research limitations/implications

The research has implications for government social cash organizations especially in the Global South. Empirically, the authors gained rare access to, and support from a government-backed social cash organization in Pakistan (an understudied country in the Global South), which made the data and the consequent analyses even invaluable. This made the empirical contribution within this geographical setting even more worthy, since this case study has received little attention from indigenous scholars in the past. The empirical findings showcased a unique set of contextual factors that were subject to BISP and interpreted through an account of socio-cultural sensitivities.

Practical implications

The paper provides practical implications for policymakers and practitioners, emphasizing the need to address institutional challenges, including covert power, during the implementation of digitalization projects in the public sector. The paper has certain potential for inspiring future e-government related (or public sector focused) studies. The paper may guide both private and government policy-makers and practitioners in presenting how to overcome certain institutional challenges while planning and implementing large scale multi-stakeholder digitization projects in similar country contexts. So while there is scope of linking the digitization of public sector organizations to anti-corruption measures in other Global South countries, the paper may not be that straightforward with the private sector involvement.

Social implications

The paper offers rich social insights on the institutional interchanges that occur between the social actors for the innovation of technology. Especially, the paper highlights the social-embeddedness nature of technology that underpins the institutionalization of new organizational practices. These have implications on how DI is viewed as a socio-political process of change.

Originality/value

This study contributes to neo-institutional theory by theorizing covert power as a political force that complements the neo-institutional framework. This force is subtle but also resistive for some political actors as the force shifts the equilibrium of power between different institutional actors. Furthermore, the paper presents the social and practical implications that guide policymakers and practitioners by taking into consideration the unique institutional challenges, such as covert power, while implementing large scale digital projects in the social cash sector.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 May 2019

Mahmood Shah, Abdullah Maitlo, Paul Jones and Yahaya Yusuf

Lack of individual awareness of knowledge sharing practices to prevent identity theft is a significant issue for online retail organisations (OROs). Agile learning processes and…

1049

Abstract

Purpose

Lack of individual awareness of knowledge sharing practices to prevent identity theft is a significant issue for online retail organisations (OROs). Agile learning processes and sharing of knowledge is essential, but the lack of relevant training inhibits these processes within the online industry. This study aims to identify the inhibiting factors in agile learning and knowledge sharing process with recommendations for best practice for organisations and staff to effectively share knowledge on identity theft prevention.

Design/methodology/approach

Three qualitative case studies were undertaken in OROs in the UK. Data were collected using semi-structured interviews, internal documents and related external material. The data were analysed using a thematic analysis method.

Findings

The findings identified that individual staff members within OROs from the information security and fraud prevention departments often share their knowledge as a community. However, there is no formal knowledge sharing process or any related training facilitating this exchange. There is a need for agile learning environment in OROs of the UK.

Originality/value

The study offers both theoretical and practical contributions to the extant literature of agile learning of knowledge sharing to prevent identity theft in OROs. Existing learning opportunities are not being used to enhance the knowledge of individuals, and OROs need to increase the skills and trust of their staff to share knowledge efficiently. This study identifies the systemic weaknesses inherent in the process of knowledge sharing and existing training provision within OROs. It provides ORO managers with practical guidelines in facilitating trust between individuals and developing appropriate training systems to educate staff on sharing organisational knowledge. This study contributes by extending the knowledge sharing framework proposed by Chong et al. (2011) for enhanced individual knowledge sharing processes to prevent identity theft within OROs. It also identifies OROs’ weaknesses in knowledge sharing learning processes for theft prevention and offers prevention guidelines and recommendations for developing effective agile learning environments.

Details

Journal of Knowledge Management, vol. 23 no. 9
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 17 February 2021

Basharat Hussain, Abdullah Zafar Sheikh, Julie Repper, Theodore Stickley, Stephen Timmons and Mahmood Hussain Shah

This study aims to investigate how British Pakistani people talk about their social identity, in the context of mental health, and how this shapes their experiences and…

Abstract

Purpose

This study aims to investigate how British Pakistani people talk about their social identity, in the context of mental health, and how this shapes their experiences and perceptions of care delivered by the National Health Service, UK.

Design/methodology/approach

Eight narrative interviews were conducted among members of the Pakistani community living in a city in the UK. The data were analyzed using a narrative analysis approach using “social identity” as a theoretical lens.

Findings

Considering Pakistani service users as a single social entity, and responding with generic approaches in meeting their mental health needs, may not be helpful in achieving equitable treatment. Study participants reject a simple conceptualization of race and ethnicity and how a response based upon stereotypes is woefully inadequate. The study revealed that people from one ethnic or national background cannot be assumed to have a fixed social identity.

Originality/value

This study broadens understanding of how people from a single ethnic background may construct and view their social identities markedly different to others from the same ethnic group. This has implications for service providers in understanding how their clients’ social identity is treated and understood in practice.

Details

The Journal of Mental Health Training, Education and Practice, vol. 16 no. 3
Type: Research Article
ISSN: 1755-6228

Keywords

Article
Publication date: 11 January 2019

Zahoor Ahmed Soomro, Javed Ahmed, Mahmood Hussain Shah and Khalil Khoumbati

Identity fraud is a growing issue for online retail organisations. The literature on this issue is scattered, and none of the studies presents a holistic view of identity fraud…

1176

Abstract

Purpose

Identity fraud is a growing issue for online retail organisations. The literature on this issue is scattered, and none of the studies presents a holistic view of identity fraud management practices in the online retail context. Therefore, the purpose of this paper is to investigate the identity fraud management practices and present a comprehensive set of practices for e-tail sector.

Design/methodology/approach

A systematic literature review approach was adopted, and the articles were selected through pre-set inclusion criteria. The authors synthesised existing literature to investigate identity fraud management in e-tail sector.

Findings

The research finds that literature on practices for identity fraud management is scattered. The findings also reveal that firms assume identity fraud issues as a technological challenge, which is one of the major reasons for a gap in effective management of identity frauds. This research suggests e-tailers to deal this issue as a management challenge and counter strategies should be developed in technological, human and organisational aspects.

Research limitations/implications

This study is limited to the published sources of data. Studies, based on empirical data, will be helpful to support the argument of this study; additionally, future studies are recommended to include a wide number of databases.

Practical implications

This research will help e-tail organisations to understand the whole of identity fraud management and help them develop and implement a comprehensive set of practices at each stage, for effective management identity frauds.

Originality/value

This research makes unique contributions by synthesising existing literature at each stage of fraud management and encompasses social, organisational and technological aspects. It will also help academicians understanding a holistic view of available research and opens new lines for future research.

Details

Journal of Enterprise Information Management, vol. 32 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 23 November 2020

Nisreen Ameen, Ali Tarhini, Mahmood Shah and Nnamdi O. Madichie

The transition from multichannel to omnichannel retailing requires a better conceptualisation, especially for customer experience in smart shopping malls. Therefore, this study…

3706

Abstract

Purpose

The transition from multichannel to omnichannel retailing requires a better conceptualisation, especially for customer experience in smart shopping malls. Therefore, this study aims to propose a theoretical model that captures customers’ omnichannel experiences in smart shopping malls in terms of personal interaction, physical environment and virtual environment encounters. It examines the mediating role of flow experience on the relationship between the three types of encounters and customers’ intention to revisit smart shopping malls.

Design/methodology/approach

The study draws on four key theories: the service encounter model, trust-commitment theory, flow theory and experiential value theory. A total of 553 completed questionnaires were collected from customers (millennials) in the United Kingdom (UK). The data was analysed using partial least squares-structural equation modelling.

Findings

The findings show that physical environment encounters and personal interaction encounters play a significant role in customers’ omnichannel experiences in smart malls. Also, of significance are the following aspects of virtual environment encounters: interface design, personalisation, trust, privacy, consumer–peer interaction and relationship commitment. The findings highlight the significant mediating role of flow on the relationships between these three types of encounters and intention, and the effect of flow on omnichannel service usage in smart shopping malls.

Originality/value

The research contributes to the existing literature by proposing a conceptual model: the smart shopping mall omnichannel customer experience (SSMCE) model. The findings offer practical guidance to shopping malls and retailers who wish to enhance the customer omnichannel experience.

Article
Publication date: 4 April 2018

Chioma Vivian Amasiatu and Mahmood Hussain Shah

First party fraud in which consumers commit fraud against retailers is a growing problem. Research in this area is very limited which means that there is almost no guidance…

1028

Abstract

Purpose

First party fraud in which consumers commit fraud against retailers is a growing problem. Research in this area is very limited which means that there is almost no guidance available to mitigate this problem. Existing fraud management frameworks focus on the management of other fraud, such as identity theft or employee instigated fraud. Due to the different nature of these frauds, these frameworks do not adequately address first party fraud. Therefore, the purpose of this paper is to propose an adapted version of the fraud management lifecycle framework which is specific to first party fraud management.

Design/methodology/approach

The authors conducted a systematic literature review and compared/contrasted a number of existing fraud management frameworks in related domains to see which one would be most suitable for first party fraud management.

Findings

The authors found Wilhelm’s fraud management framework the most promising for adaptation and application to the first party fraud context. By modifying an existing framework according to the contextual requirements, the authors make the framework much more relevant to first party fraud management.

Practical implications

The framework could help retail managers better understand and manage this growing business problem and open new streams for further research.

Originality/value

This research also makes an important contribution by proposing a framework and by helping bridge a glaring and problematic gap in existing literature and opening up new streams of research.

Details

International Journal of Retail & Distribution Management, vol. 46 no. 4
Type: Research Article
ISSN: 0959-0552

Keywords

Article
Publication date: 23 May 2019

Chioma Vivian Amasiatu and Mahmood Hussain Shah

First-party fraud in which retail consumers commit fraud against retailers is a growing problem. However, to date studies on retail crime have focused almost entirely on…

Abstract

Purpose

First-party fraud in which retail consumers commit fraud against retailers is a growing problem. However, to date studies on retail crime have focused almost entirely on fraudulent consumer behaviours in physical stores. With the growth of e-commerce, the losses to retailers from this fraud are growing so there is strong need to research this problem from multiple perspectives. The paper aims to discuss this issue.

Design/methodology/approach

The authors conducted three case studies and a total of 24 semi-structured interviews with retail managers, and evaluated their existing prevention-related documentation. Fraud management lifecycle theory was used to organise and discuss the findings.

Findings

The authors found that many retailers are treating this problem as just a cost of doing business online and have no detailed plans for dealing with this problem or any reporting to law enforcement agencies. However, they have begun working with delivery companies for delivery accuracy. Use of convenience stores as collection points is also showing early improvements.

Research limitations/implications

The small number of cases and interviews used is a limitation of this study. However, the authors believe that the findings are useful for advancing knowledge in this emerging research area.

Practical implications

This study provides insight into existing management practices in this domain, and makes recommendations on how to improve the management of first-party fraud. The study also makes a case for increased managerial interest and involvement in reducing first-party fraud. The study also helps bridge a glaring gap in existing literature and provides useful leads for further research.

Originality/value

To the authors’ knowledge, this is the first study to evaluate the existing practices employed to manage first-party fraud in e-retail.

Details

International Journal of Retail & Distribution Management, vol. 47 no. 4
Type: Research Article
ISSN: 0959-0552

Keywords

Article
Publication date: 26 February 2019

Abdullah Maitlo, Nisreen Ameen, Hamid Reza Peikari and Mahmood Shah

Knowledge-sharing (KS) for preventing identity theft has become a major challenge for organisations. The purpose of this paper is to fill a gap in the literature by investigating…

2305

Abstract

Purpose

Knowledge-sharing (KS) for preventing identity theft has become a major challenge for organisations. The purpose of this paper is to fill a gap in the literature by investigating barriers to effective KS in preventing identity theft in online retail organisations.

Design/methodology/approach

A framework was proposed based on a reconceptualisation and extension of the KS enablers framework (Chong et al., 2011). A qualitative case study research method was used for the data collection. In total, 34 semi-structured interviews were conducted in three online retail organisations in the UK.

Findings

The findings suggest that the major barriers to effective KS for preventing identify theft in online retail organisations are: lack of leadership support; lack of employee willingness to share knowledge; lack of employee awareness of KS; inadequate learning opportunities; lack of trust in colleagues; insufficient information-sourcing opportunities and information and communications technology infrastructure; a weak KS culture; lack of feedback on performance; and lack of job rotation.

Practical implications

The research provides solutions for removing existing barriers to KS in preventing identity theft. This is important to reduce the number of cases of identity theft in the UK.

Originality/value

This research extends knowledge of KS in a new context: preventing identity theft in online retail organisations. The proposed framework extends the KS enablers framework by identifying major barriers to KS in the context of preventing identity theft.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 February 2023

Saeed Awadh Bin-Nashwan, Mahmood Hussain Shah, Hijattulah Abdul-Jabbar and Lutfi Hassen Ali Al-Ttaffi

Despite the significant growth in Islamic economies and the increasing number of Muslim youths inclining digital services, empirical-based research addressing the adoption of…

Abstract

Purpose

Despite the significant growth in Islamic economies and the increasing number of Muslim youths inclining digital services, empirical-based research addressing the adoption of digital Islamic services is still scarce. Particularly, as a new term in the Islamic finance industry, ZakaTech has recently emerged as a modern term describing novel technologies adopted by zakat (compulsory levy on all believing and practicing high-net-worth Muslims) institutions; yet, it has largely been neglected in the literature. Therefore, this paper aims to propose an integrated model that scrutinizes the factors of unified model of acceptance and use of technology (UTAUT) of ZakaTech, combined with social cognitive theory (SCT), especially in a time of COVID-19 social distancing.

Design/methodology/approach

The UTAUT–SCT model was validated via SmartPLS structural equation modeling by using a valid sample of 510 users (individual zakat payers) from Saudi Arabia.

Findings

The results demonstrated the suitability of the integrated UTAUT–SCT model in predicting zakat payers’ intention to use ZakaTech services. This proposed model has 70% explanatory power to explain variance in intention. All UTAUT constructs are statistically significant, except for effort expectancy. Social isolation caused by the pandemic and trust in e-zakat system exerted a significant influence on the inclination to uptake ZakaTech services.

Originality/value

To the best of the authors’ knowledge, this research is among the first research that studies Muslims’ adoption of ZakaTech during COVID-19. Particularly, this study could add value to FinTech acceptance literature by empirically examining an integrated framework of UTAUT–SCT in a context as modern and unique as ZakaTech.

Details

Journal of Islamic Accounting and Business Research, vol. 14 no. 8
Type: Research Article
ISSN: 1759-0817

Keywords

1 – 10 of 684