Search results

1 – 10 of 19
Open Access
Book part
Publication date: 9 May 2023

Volker Stocker, William Lehr and Georgios Smaragdakis

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…

Abstract

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Open Access
Article
Publication date: 4 September 2017

Friedner Wittman, Douglas Polcin and Dave Sheridan

Roughly half a million persons in the USA are homeless on any given night and over a third of those individuals have significant alcohol/other drug (AOD) problems. Many are…

4532

Abstract

Purpose

Roughly half a million persons in the USA are homeless on any given night and over a third of those individuals have significant alcohol/other drug (AOD) problems. Many are chronically homeless and in need of assistance for a variety of problems. However, the literature on housing services for this population has paid limited attention to comparative analyses contrasting different approaches. The paper aims to discuss these issues.

Design/methodology/approach

The authors examined the literature on housing models for homeless persons with AOD problems and critically analyzed how service settings and operations aligned with service goals.

Findings

The authors found two predominant housing models that reflect different service goals: sober living houses (SLHs) and housing first (HF). SLHs are communally based living arrangements that draw on the principles of Alcoholics Anonymous. They emphasize a living environment that promotes abstinence and peer support for recovery. HF is based on the premise that many homeless persons with substance abuse problems will reject abstinence as a goal. Therefore, the HF focus is providing subsidized or free housing and optional professional services for substance abuse, psychiatric disorders, and other problems.

Research limitations/implications

If homeless service providers are to develop comprehensive systems for homeless persons with AOD problems, they need to consider important contrasts in housing models, including definitions of “recovery,” roles of peer support, facility management, roles for professional service, and the architectural designs that support the mission of each type of housing.

Originality/value

This paper is the first to consider distinct consumer choices within homeless service systems and provide recommendations to improve each based upon architecture and community planning principles.

Details

Drugs and Alcohol Today, vol. 17 no. 3
Type: Research Article
ISSN: 1745-9265

Keywords

Open Access
Article
Publication date: 11 September 2017

Michel van Eeten

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…

5229

Abstract

Purpose

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.

Design/methodology/approach

This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.

Findings

While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.

Originality/value

This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 9 November 2022

Santhosh Srinivas and Huigang Liang

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is…

3479

Abstract

Purpose

While every firm is striving to embrace digital transformation (DT) to form new differentiating business capabilities, there are dark sides to such initiatives, and it is essential to acknowledge, identify and address them. The purpose of this paper is to identify and emperically demonstrate the impact of such darksides of DT. While a firm's DT effort may have many dark sides, the authors identify data breaches as the most critical one and focus on proving their impact since it can inflict significant damage to the firm.

Design/methodology/approach

Through the lens of paradox theory, the authors argue that the DT efforts of a firm will lead to increased risk and severity of data breaches. The authors developed a one-of-a-kind longitudinal data set by combining data from multiple sources, including 3604 brands over a 10-year period, and employed a DT performance scorecard to evaluate a firm's DT effort across four key digital selling touchpoints: site, mobile, digital marketing and social media.

Findings

The findings of this study show that a firm's DT efforts pertaining to its mobile and digital marketing platforms significantly increase the likelihood and severity of a data breach event indicating that these two channels are most vulnerable and need heightened attention from firms. Furthermore, the findings suggest that the negative repercussions of some DT initiatives may be minimized as the firm becomes more innovative. The findings can help firms re-strategize their DT efforts by promoting security and also encouraging a balanced communication strategy.

Originality/value

This research is one of the first to identify, recognize and empirically illustrate the downsides of a DT effort that is otherwise thought to provide only benefits.

Details

Journal of Electronic Business & Digital Economics, vol. 1 no. 1/2
Type: Research Article
ISSN: 2754-4214

Keywords

Open Access
Article
Publication date: 18 October 2019

Debora Jeske and Theresa Ruwe

The purpose of this paper is to provide an overview of co-working trends, drivers, and explore how the use of such workspaces may support employers wishing to increase the sense…

4196

Abstract

Purpose

The purpose of this paper is to provide an overview of co-working trends, drivers, and explore how the use of such workspaces may support employers wishing to increase the sense of belonging and acceptance of their mobile workers at work.

Design/methodology/approach

This conceptual paper reviews recent literature on co-working, relating this trend to changes in the nature of work, property management and the use of workplaces by employees. A particular focus concerns the social aspects of co-working which may be critical for supporting mobile workers’ sense of inclusion in a work community.

Findings

Co-working spaces provide important sources of support, learning and networking opportunities (and hence inclusion), which may offset the lack of community and opportunities that mobile workers face when working outside the main offices of their employers. The authors outline the practical implications as well as recommendations for employers interested in selecting or organising their own co-working spaces. Several research gaps are also delineated for researchers interested in this area.

Practical implications

The use of independent and consultancy-type co-working spaces offer new working opportunities for mobile workers employed in private, public and community organisations. The creation of corporate co-working spaces also provides new learning opportunities for employers that want to create and promote flexible as well as inclusive working environments for their mobile workers.

Originality/value

The research on co-working is relatively limited to date. The current paper provides an important overview of drivers and several starting point for employers interested in learning more about co-working.

Details

Journal of Work-Applied Management, vol. 11 no. 2
Type: Research Article
ISSN: 2205-2062

Keywords

Open Access
Article
Publication date: 10 September 2020

Matteo Rossi, Giuseppe Festa, Armando Papa, Ashutosh Kolte and Rossana Piccolo

Institutional venture capitalists (IVCs) and corporate venture capitalists (CVCs) deploy analogous activities but adopt different approaches to financing innovation and value…

8072

Abstract

Purpose

Institutional venture capitalists (IVCs) and corporate venture capitalists (CVCs) deploy analogous activities but adopt different approaches to financing innovation and value creation for venture-backed firms. Thus, this paper aims to investigate their potential ambidexterity as a result of knowledge management (KM) strategies and processes.

Design/methodology/approach

After a focused literature review showing evidence of KM behaviors as a source of potential ambidexterity for IVCs and CVCs, descriptive, inferential and discriminant analyses on the 15 most active IVCs and CVCs in the world in 2019 are presented. Correlations between numbers of deals, prevailing entrepreneurial intensity and potential ambidexterity are investigated.

Findings

Specific differences are analyzed from a KM perspective, revealing that the number/percentage of operations per round can result as a misleading criterion of knowledge accumulation. Finally, a theoretical model for ambidexterity for venture capitalists is developed.

Originality/value

The study shows that IVCs act with greater investment capacity because of their organizational structure and purpose and focus on financial goals; moreover, they are ambidextrous, although their exploration may more frequently entail exploitation than “real” exploration. CVCs tend to invest in sectors related to their core business, coherent with their strategic purpose and more oriented with KM strategies for accumulating intellectual capital.

Details

Journal of Knowledge Management, vol. 24 no. 10
Type: Research Article
ISSN: 1367-3270

Keywords

Open Access
Article
Publication date: 1 June 2015

Denis Fischbacher-Smith

The purpose of this paper is to highlight the potential role that the so-called “toxic triangle” (Padilla et al., 2007) can play in undermining the processes around effectiveness…

3926

Abstract

Purpose

The purpose of this paper is to highlight the potential role that the so-called “toxic triangle” (Padilla et al., 2007) can play in undermining the processes around effectiveness. It is the interaction between leaders, organisational members, and the environmental context in which those interactions occur that has the potential to generate dysfunctional behaviours and processes. The paper seeks to set out a set of issues that would seem to be worthy of further consideration within the Journal and which deal with the relationships between organisational effectiveness and the threats from insiders.

Design/methodology/approach

The paper adopts a systems approach to the threats from insiders and the manner in which it impacts on organisation effectiveness. The ultimate goal of the paper is to stimulate further debate and discussion around the issues.

Findings

The paper adds to the discussions around effectiveness by highlighting how senior managers can create the conditions in which failure can occur through the erosion of controls, poor decision making, and the creation of a culture that has the potential to generate failure. Within this setting, insiders can serve to trigger a series of failures by their actions and for which the controls in place are either ineffective or have been by-passed as a result of insider knowledge.

Research limitations/implications

The issues raised in this paper need to be tested empirically as a means of providing a clear evidence base in support of their relationships with the generation of organisational ineffectiveness.

Practical implications

The paper aims to raise awareness and stimulate thinking by practising managers around the role that the “toxic triangle” of issues can play in creating the conditions by which organisations can incubate the potential for crisis.

Originality/value

The paper seeks to bring together a disparate body of published work within the context of “organisational effectiveness” and sets out a series of dark characteristics that organisations need to consider if they are to avoid failure. The paper argues the case that effectiveness can be a fragile construct and that the mechanisms that generate failure also need to be actively considered when discussing what effectiveness means in practice.

Details

Journal of Organizational Effectiveness: People and Performance, vol. 2 no. 2
Type: Research Article
ISSN: 2051-6614

Keywords

Open Access
Article
Publication date: 11 March 2021

Luiz Guilherme Rodrigues Antunes, Cleber Carvalho de Castro and Andrea Ap da Costa Mineiro

The purpose of this paper is to analyze the performance of incubators in the stages of formation and development of incubated business networks, especially in bottom-up and…

1694

Abstract

Purpose

The purpose of this paper is to analyze the performance of incubators in the stages of formation and development of incubated business networks, especially in bottom-up and top-down network models.

Design/methodology/approach

The research is defined as qualitative and descriptive, with the application of multiple case studies, in which two networks of incubated businesses were investigated, one being top-down and the other bottom-up, which emerged within the incubation process of two business incubators (CIETEC and INCIT). To make the study operational, 11 semi-structured interviews were carried out and the thematic analysis of content was developed.

Findings

The results pointed out that in the top-down network the incubator performs a new assignment, the network orchestration, which corresponds to the actions of formation, coordination and governance of the group. In the bottom-up network, it was found that the role of the incubator was to expand the value offers usually practiced.

Research limitations/implications

As a limitation of the research, the very limitation of case studies is pointed out that is they do not allow for generalizations.

Practical implications

The research contributes to reflections on the effectiveness of the incubator and sheds light on the complementarity of networks in incubation processes, providing gains for incubators, incubated businesses and society.

Originality/value

The originality of this document is the new role of the incubator, which is orchestration, and its categorization. The results allow us to understand the effects of providing networks and relationships for incubated businesses. In addition, this study broadens the focus of traditional analyses of the incubator–incubated duo to consider the incubator–network–incubated trio.

Details

Innovation & Management Review, vol. 18 no. 1
Type: Research Article
ISSN: 2515-8961

Keywords

Open Access
Article
Publication date: 23 December 2022

W. Alec Cram and Rissaile Mouajou-Kenfack

The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications…

Abstract

Purpose

The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications varies widely, including differences in the level of detail, apportioning of blame, compensation and corrective action. This study seeks to identify patterns contained within cybersecurity incident notifications by constructing a typology of organizational responses.

Design/methodology/approach

Based on a detailed review of 1,073 global cybersecurity incidents occurring during 2020, the authors obtained and qualitatively analyzed 451 customer notifications.

Findings

The results reveal three distinct organizational response types associated with the level of detail contained within the notification (full transparency, guarded and opacity), as well as three response types associated with the benefitting party (customer interest, balanced interest and company interest).

Originality/value

This work extends past classifications of cybersecurity incident notifications and provides a template of possible notification approaches that could be adopted by organizations.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 10 September 2020

Ayda A. Yurekli, Patricia Kovacevic, Emil Sunley and Karthik Ranganathan

This paper aims to describe the various government measures that regulate the market for novel tobacco harm reduction products (THRPs), with an emphasis on e-cigarettes…

4570

Abstract

Purpose

This paper aims to describe the various government measures that regulate the market for novel tobacco harm reduction products (THRPs), with an emphasis on e-cigarettes [electronic nicotine delivery systems (“ENDS”)], and evaluates the public health impact of excise taxes levied on these products.

Design/methodology/approach

The paper reviews the economic research on the impact ENDS. Using cited evidence, the paper compares the tax treatment of ENDS and cigarettes and provides a simulation of potential lives that can be saved under alternative tax treatment of ENDS.

Findings

ENDS are considerably less harmful than cigarettes. Imposing the same tax burden on them (per unit of “harm”) as on cigarettes leads to poorer health outcomes. Differential tax treatment of ENDS will encourage more cigarette smokers to switch to ENDS and could save millions of lives worldwide.

Research limitations/implications

Country experiences with regulatory measures on ENDS are limited to those with high THRP penetration. The paper’s simulation analysis used evidence from a limited number of studies. Rigorous economic analysis is needed to understand how ENDS could save lives and could prevent expected one billion premature deaths by the end of this century.

Originality/value

The paper uses research evidence in its analysis of the impact that the differential taxation of cigarettes and ENDS would have. It also provides a rough estimate of the number of lives that could be saved if more smokers who are trying to quit can make the switch to ENDS.

1 – 10 of 19