Search results

1 – 10 of 32
Article
Publication date: 29 November 2022

Rajat Kumar Behera, Pradip Kumar Bala and Nripendra P. Rana

The new ways to complete financial transactions have been developed by setting up mobile payment (m-payment) platforms and such platforms to access banking in the financial…

1305

Abstract

Purpose

The new ways to complete financial transactions have been developed by setting up mobile payment (m-payment) platforms and such platforms to access banking in the financial mainstream can transact as never before. But, does m-payment have veiled consequences? To seek an answer, the research was undertaken to explore the dark sides of m-payment for consumers by extending the theory of innovation resistance (IR) and by measuring non-adoption intention (NAI).

Design/methodology/approach

Three hundred individuals using popular online m-payment apps such as Paytm, PhonePe, Amazon Pay and Google Pay were surveyed for the primary data. IBM AMOS based structural equation modelling (SEM) was used to analyse the data.

Findings

Each m-payment transaction leaves a digital record, making some vulnerable consumers concerned about privacy threats. Lack of global standards prevents consumers from participating in the m-payment system properly until common interfaces are established based on up-to-date standards. Self-compassion (SC) characteristics such as anxiety, efficacy, fatigue, wait-and-see tendencies and the excessive choice of technology effect contribute to the non-adoption of m-payment.

Originality/value

This study proposes a threat model and empirically explores the dark sides of m-payment. In addition, it also unveils the moderator's role of SC in building the structural relationship between IR and NAI.

Details

Information Technology & People, vol. 36 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

Content available
Book part
Publication date: 25 October 2023

Abstract

Details

Technology and Talent Strategies for Sustainable Smart Cities
Type: Book
ISBN: 978-1-83753-023-6

Article
Publication date: 11 September 2023

Balakrishnan Unny R., Samik Shome, Amit Shankar and Saroj Kumar Pani

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this…

Abstract

Purpose

This study aims to provide a systematic review of consumer privacy literature in the context of smartphones and undertake a comprehensive analysis of academic research on this evolving research area.

Design/methodology/approach

This review synthesises antecedents, consequences and mediators reported in consumer privacy literature and presents these factors in a conceptual framework to demonstrate the consumer privacy phenomenon.

Findings

Based on the synthesis of constructs reported in the existing literature, a conceptual framework is proposed highlighting antecedents, mediators and outcomes of experiential marketing efforts. Finally, this study deciphers overlooked areas of consumer privacy in the context of smartphone research and provides insightful directions to advance research in this domain in terms of theory development, context, characteristics and methodology.

Originality/value

This study significantly contributes to consumer behaviour literature, specifically consumer privacy literature.

Details

Journal of Consumer Marketing, vol. 41 no. 1
Type: Research Article
ISSN: 0736-3761

Keywords

Article
Publication date: 16 April 2024

Amir Schreiber and Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Abstract

Purpose

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues, including threats like deepfakes and unanticipated AI-induced risks. This study aims to address the insufficient exploration of AI cybersecurity awareness in the current literature.

Design/methodology/approach

Using in-depth surveys across varied sectors (N = 150), the authors analyzed the correlation between the absence of AI risk content in organizational cybersecurity awareness programs and its impact on employee awareness.

Findings

A significant AI-risk knowledge void was observed among users: despite frequent interaction with AI tools, a majority remain unaware of specialized AI threats. A pronounced knowledge difference existed between those that are trained in AI risks and those who are not, more apparent among non-technical personnel and sectors managing sensitive information.

Research limitations/implications

This study paves the way for thorough research, allowing for refinement of awareness initiatives tailored to distinct industries.

Practical implications

It is imperative for organizations to emphasize AI risk training, especially among non-technical staff. Industries handling sensitive data should be at the forefront.

Social implications

Ensuring employees are aware of AI-related threats can lead to a safer digital environment for both organizations and society at large, given the pervasive nature of AI in everyday life.

Originality/value

Unlike most of the papers about AI risks, the authors do not trust subjective data from second hand papers, but use objective authentic data from the authors’ own up-to-date anonymous survey.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 8 July 2022

Uzair Khan, Hikmat Ullah Khan, Saqib Iqbal and Hamza Munir

Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in…

Abstract

Purpose

Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in the research domains of object detection, Biomedical Imaging and Semantic segmentation. In this study, a bibliometric analysis of publications related to image processing in the Science Expanded Index Extended (SCI-Expanded) has been performed. Several parameters have been analyzed such as annual scientific production, citations per article, most cited documents, top 20 articles, most relevant authors, authors evaluation using y-index, top and most relevant sources (journals) and hot topics.

Design/methodology/approach

The Bibliographic data has been extracted from the Web of Science which is well known and the world's top database of bibliographic citations of multidisciplinary areas that covers the various journals of computer science, engineering, medical and social sciences.

Findings

The research work in image processing is meager in the past decade, however, from 2014 to 2019, it increases dramatically. Recently, the IEEE Access journal is the most relevant source with an average of 115 publications per year. The USA is most productive and its publications are highly cited while China comes in second place. Image Segmentation, Feature Extraction and Medical Image Processing are hot topics in recent years. The National Natural Science Foundation of China provides 8% of all funds for Image Processing. As Image Processing is now becoming one of the most critical fields, the research productivity has enhanced during the past five years and more work is done while the era of 2005–2013 was the area with the least amount of work in this area.

Originality/value

This research is novel in this regard that no previous research focuses on Bibliometric Analysis in the Image Processing domain, which is one of the hot research areas in computer science and engineering.

Open Access
Article
Publication date: 8 December 2022

Jacobus Gerhardus J. Nortje

The purpose of this paper is to critically analyse the extent of protection available for whistleblowers in South African criminal cases.

3410

Abstract

Purpose

The purpose of this paper is to critically analyse the extent of protection available for whistleblowers in South African criminal cases.

Design/methodology/approach

This paper first provides a brief background of crime in South Africa and argues that the concept of the whistleblower is just a buss word or collective noun. The methodology of this paper consists of a literature review of whistleblowers and relevant laws that can be used to protect whistleblowers in South African criminal cases.

Findings

This paper concludes that the existing law as primarily contained in the Criminal Procedure Act 51 of 1977 provides appropriate protection for whistleblowers in South African criminal cases.

Research limitations/implications

Whistleblowers provide information on criminal, civil and disciplinary wrongdoings. This study focuses on the protection of whistleblowers pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977.

Originality/value

The originality of this paper lies in the approach to the handling of whistleblowers in South African criminal cases. This is the first research done with the emphasis on the use of mainly the provisions of the Criminal Procedure Act 51 of 1977 to protect whistleblowers in South African criminal cases. The contribution of the study is that, by using this approach, it can provide protection and save lives, and it may enhance the willingness of whistleblowers to blow the whistle, which will be beneficial to the community of South Africa as a whole.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 11 January 2024

Susan Mathew K., Jovin K. Joy and Sheeja N.K.

This study aims to present recent trends in touchscreen research through scientometric analysis. Devices with touchscreen are powerful tools for performing specialized operations…

Abstract

Purpose

This study aims to present recent trends in touchscreen research through scientometric analysis. Devices with touchscreen are powerful tools for performing specialized operations. The touch screens of tablets, smartphones, laptops and television play an important role in teaching, learning and research.

Design/methodology/approach

The data was collected from Web of Science database from 2011 to 2021 and analysed using MS-Excel and VOSviewer software. After analysing 389 research papers, the authors identified the high impact journals, collaboration of countries, institutions, authors and growth trend of publications. Analysing the most used keywords, country-wise distribution of publications and research collaboration between institutions will help interpret the research trends in the selected time span.

Findings

The publications show an increase in number over the years from 2011 to 2021. Among the countries, USA has the highest number of 127 articles published, followed by England (61) and Canada (30). The results showed that the multiple authorship pattern in touchscreen publication is high when compared to single authors. The institutional analysis indicated that the organizations publishing more than five documents in the area were mostly from United Kingdom, Australia, USA and Korea. Timeline visualizations identified prominent keywords like touchscreen, performance, operant platform, Alzheimer’s disease, etc. in the subject. Interdisciplinary research is dominant in the subject, as seen from the most preferred journals and keywords.

Research limitations/implications

The analysis does not include a comprehensive coverage of the research output, as only Web of Science database from 2011 to 2021 in a 10-year period is included.

Practical implications

The study would benefit stakeholders, including manufacturers and researchers alike, to know the future of touchscreen research.

Social implications

This study is pertinent to socio-psychological fields because touchscreen technology encourages social connection among older persons and may help foster early literacy skills.

Originality/value

This paper will provide an understanding of the global developments in touchscreen research with recommendations for future research.

Details

Information Discovery and Delivery, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 2 January 2024

Stephan M. Wagner, M. Ramkumar, Gopal Kumar and Tobias Schoenherr

In the aftermath of disasters, humanitarian actors need to coordinate their activities based on accurate information about the disaster site, its surrounding environment, the…

Abstract

Purpose

In the aftermath of disasters, humanitarian actors need to coordinate their activities based on accurate information about the disaster site, its surrounding environment, the victims and survivors and the supply of and demand for relief supplies. In this study, the authors examine the characteristics of radio frequency identification (RFID) technology and those of disaster relief operations to achieve information visibility and actor coordination for effective and efficient humanitarian relief operations.

Design/methodology/approach

Building on the contingent resource-based view (CRBV), the authors present a model of task-technology fit (TTF) that explains how the use of RFID can improve visibility and coordination. Survey data were collected from humanitarian practitioners in India, and partial least squares (PLS) analysis was used to analyze the model.

Findings

The characteristics of both RFID technology and disaster relief operations significantly influence TTF, and TTF predicts RFID usage in disaster relief operations, providing visibility and coordination. TTF is also a mediator between the characteristics of RFID technology and disaster relief operations and between visibility and coordination.

Social implications

The many recent humanitarian disasters have demonstrated the critical importance of effective and efficient humanitarian supply chain and logistics strategies and operations in assisting disaster-affected populations. The active and appropriate use of technology, including RFID, can help make disaster response more effective and efficient.

Originality/value

Humanitarian actors value RFID technology because of its ability to improve the visibility and coordination of relief operations. This study brings a new perspective to the benefits of RFID technology and sheds light on its antecedents. The study thus expands the understanding of technology in humanitarian operations.

Details

The International Journal of Logistics Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 27 June 2023

Pranakusuma Sudhana, Noermijati Noermijati, Ananda Sabil Hussein and Nur Khusniyah Indrawati

This paper aims to explain the unsuccessful relationship between the awareness of prominent international education brands and enrollment intention.

Abstract

Purpose

This paper aims to explain the unsuccessful relationship between the awareness of prominent international education brands and enrollment intention.

Design/methodology/approach

A serial mediation model encompassing perceived congruity and brand attitude was developed and tested using the PLS-SEM technique, involving 132 respondents.

Findings

The results revealed that the awareness of international education brands, subsequently perceived as internally congruent with the prospective students’ self-image in terms of resource sufficiency, will yield enrollment intention by forming the desired brand attitude.

Research limitations/implications

This paper includes generalizability as its limitation, with suggestions to undertake the broader scope of studies. Future research could examine other variables to enhance the model.

Practical implications

This paper presents theoretical and managerial implications for higher education branding and marketing.

Originality/value

To the best of the authors’ knowledge, this study could be the first to discuss the international university landscape in Indonesia. In addition, the proposed model could be a plausible framework for explaining the intention to accept not only international education brands but also other brands of goods and services, thereby benefiting both educational and consumer research.

Article
Publication date: 15 November 2022

Shefali Saluja

The fraud landscape for FinTech industry has increased over the past few years, certainly during the time of COVID-19, FinTech market reported rapid growth in the fraud cases…

Abstract

Purpose

The fraud landscape for FinTech industry has increased over the past few years, certainly during the time of COVID-19, FinTech market reported rapid growth in the fraud cases (World Bank, 2020). Taking the consideration, the paper has qualitatively understood the loopholes of the FinTech industry and designed a conceptual model declaring “Identity Theft” as the major and the common fraud type in this industry. The paper is divided in two phases. The first phase discusses about the evolution of FinTech industry, the second phase discusses “Identity Theft” as the common fraud type in FinTech Industry and suggests solutions to prevent “Identity Theft” frauds. This study aims to serve as a guide for subsequent investigations into the FinTech sector and add to the body of knowledge regarding fraud detection and prevention. This study would also help organisations and regulators raise their professional standards in relation to the global fraud scene.

Design/methodology/approach

This paper revisits the literature to understand the evolution of FinTech Industry and the types of FinTech solutions. The authors argue that traditional models must be modernised to keep up with the current trends in the rapidly increasing number and severity of fraud incidents and however introduces the conceptual model of the common fraud type in FinTech Industry. The research also develops evidences based on theoretical underpinnings to enhance the comprehension of the key fraud-causing elements.

Findings

The authors have identified the most common fraud type in the FinTech Industry which is “Identity Theft” and supports the study with profusion of literature. “Identity theft” and various types of fraud continue to outbreak customers and industries similar in 2021, leaving several to wonder what could be the scenario in 2022 and coming years ahead (IBS Inteligence, 2022). “Identify theft” has been identified as one the common fraud schemes to defraud individuals as per the Association of Certified Fraud Examiners. There is a need for many of the FinTech organisations to create preventive measures to combat such fraud scheme. The authors suggest some preventive techniques to prevent corporate frauds in the FinTech industry.

Research limitations/implications

This study identifies the evolution of FinTech industry, major evidences of Identity Thefts and some preventive suggestions to combat identity theft frauds which requires practical approach in FinTech Industry. Further, this study is based out of qualitative data, the study can be modified with statistical data and can be measured with the quantitative results.

Practical implications

This study would also help organisations and regulators raise their professional standards in relation to the global fraud scene.

Social implications

This study will serve as a guide for subsequent investigations into the FinTech sector and add to the body of knowledge regarding fraud detection and prevention.

Originality/value

This study presents evidence for the most prevalent fraud scheme in the FinTech sector and proposes that it serve as a theoretical standard for all ensuing comparison.

Details

Journal of Financial Crime, vol. 31 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of 32