Search results

1 – 6 of 6
Article
Publication date: 9 April 2024

Derek L. Nazareth, Jae Choi and Thomas Ngo-Ye

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud…

Abstract

Purpose

This paper aims to examine the conditions under which small and medium enterprises (SMEs) invest in security services when they migrate their e-commerce applications to the cloud environment. Using a risk management perspective, the paper assesses the impact of security service pricing, security incident prevalence and virulence to estimate SME security spending at the market level and draw out implications for SMEs and security service providers.

Design/methodology/approach

Security risks are inherently characterized by uncertainty. This study uses a Monte Carlo approach to understand the role of uncertainty in the decision to adopt security services. A model relating key security constructs is assembled based on key constructs from the domain. By manipulating security service costs and security incident types, the model estimates the market-level adoption of services, security incidents and damages incurred, along with measures of their relative dispersion.

Findings

Three key findings emerge from this study. First, adoption of services and protection is higher when tiered security services are provided, indicating that SMEs prefer to choose their security services rather than accept uniformly priced products. Second, SMEs are considered price-sensitive, resulting in a maximum level of spending in the market. Third, results indicate that security incidents and damages can be much higher than the mean in some cases, and this should serve as a cautionary note to SMEs.

Originality/value

Security spending has been modeled at the firm level. Adopting a market-level perspective represents a novel contribution. Additionally, the Monte Carlo approach provides managers with tangible measures of uncertainty, affording additional information and insight when making security service adoption decisions.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 26 February 2024

Himanshu Joshi and Deepak Chawla

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in…

Abstract

Purpose

The study investigates the influence of perceived security (PS) on behavioral intention (BI) via the trust attitude process and explores the moderating effects of gender. PS in mobile wallets enhances user trust (TR), attitude (ATT) and intention (INT). Using a multiple and serial mediation model, both TR and ATT were found to mediate the relationship between PS and BI.

Design/methodology/approach

Drawing on the stimulus-organism-response (S-O-R) theory, the proposed conceptual model comprises PS, TR, ATT and BI. An online survey was conducted with a cross-sectional sample of 744 mobile wallet users in India. Partial least squares structural equation modeling (PLS-SEM) was used to analyze the hypothesized relationships and test the mediation effects.

Findings

Results show that the stimulus, PS, has a positive and significant influence on TR and ATT, which eventually has a positive influence on BI. The research model explains 64.4 percent of the variance in BI. Further, both TR and ATT independently and parallelly mediate the relationship PS and BI. Lastly, gender is found to moderate the relationship between TR and BI and ATT and BI.

Practical implications

The research showed the importance of PS, TR and ATT towards mobile wallet adoption INTs. Further, the findings support the idea that developing TR and ATT is essential for shaping INTs. This suggests that mobile wallet service providers should invest in methods that not just enhance user TR but also reinforce a positive ATT towards the platform. To demonstrate TR, mobile wallet providers must ensure the confidentiality and privacy of user data, keep customer interests in mind and fulfill commitments. Lastly, for strengthening customer TR, excellent customer support is extremely important.

Originality/value

While prior researchers have majorly used technology acceptance model (TAM) and unified theory of acceptance and use of technology (UTAUT) models to explain adoption INTs, this study examines the relationship between PS, TR, ATT and BI through the lens of the SOR framework.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Open Access
Article
Publication date: 25 May 2023

Suchismita Swain, Kamalakanta Muduli, Anil Kumar and Sunil Luthra

The goal of this research is to analyse the obstacles to the implementation of mobile health (mHealth) in India and to gain an understanding of the contextual inter-relationships…

Abstract

Purpose

The goal of this research is to analyse the obstacles to the implementation of mobile health (mHealth) in India and to gain an understanding of the contextual inter-relationships that exist amongst those obstacles.

Design/methodology/approach

Potential barriers and their interrelationships in their respective contexts have been uncovered. Using MICMAC analysis, the categorization of these barriers was done based on their degree of reliance and driving power (DP). Furthermore, an interpretive structural modeling (ISM) framework for the barriers to mHealth activities in India has been proposed.

Findings

The study explores a total of 15 factors that reduce the efficiency of mHealth adoption in India. The findings of the Matrix Cross-Reference Multiplication Applied to a Classification (MICMAC) investigation show that the economic situation of the government, concerns regarding the safety of intellectual technologies and privacy issues are the primary obstacles because of the significant driving power they have in mHealth applications.

Practical implications

Promoters of mHealth practices may be able to make better plans if they understand the social barriers and how they affect each other; this leads to easier adoption of these practices. The findings of this study might be helpful for governments of developing nations to produce standards relating to the deployment of mHealth; this will increase the efficiency with which it is adopted.

Originality/value

At this time, there is no comprehensive analysis of the factors that influence the adoption of mobile health care with social cognitive theory in developing nations like India. In addition, there is a lack of research in investigating how each of these elements affects the success of mHealth activities and how the others interact with them. Because developed nations learnt the value of mHealth practices during the recent pandemic, this study, by investigating the obstacles to the adoption of mHealth and their inter-relationships, makes an important addition to both theory and practice.

Details

International Journal of Industrial Engineering and Operations Management, vol. 6 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 4 March 2024

Janet Chang, Klaudia Jaskula, Eleni Papadonikolaki, Dimitrios Rovas and Ajith Kumar Parlikad

This research investigates the distinct characteristics of blockchain technology to safeguard against the deterioration of handover information quality in the post-construction…

Abstract

Purpose

This research investigates the distinct characteristics of blockchain technology to safeguard against the deterioration of handover information quality in the post-construction phase. The significance of effective management of handover information is highlighted by global building failures, such as the Grenfell Tower fire in London, UK. Despite existing technological interventions, there remains a paucity of understanding regarding the factors contributing to the decline in the quality of handover information during the post-construction phase.

Design/methodology/approach

This study employed a multi-case studies approach across five higher education institutions. It involved conducting semi-structured interviews with 52 asset management professionals, uncovering the underlying reasons for the decline in handover information quality. Building on these insights, the study performed a mapping exercise to align these identified factors with blockchain technology features and information quality dimensions, aiming to evaluate blockchain’s potential in managing quality handover information.

Findings

The study findings suggest that blockchain technology offers advantages but has limitations in addressing all the identified quality issues of managing handover information. Due to the lack of an automated process and file-based information exchange, updating handover information still requires an error-prone manual process, leading to potential information loss. Additionally, no solutions are available for encoding drawings for updates and validation.

Originality/value

This study proposes a framework integrating blockchain to enhance the information management process and improve handover information quality.

Details

Built Environment Project and Asset Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2044-124X

Keywords

Article
Publication date: 9 May 2023

Mahdieh Ahmad Amouei, Changiz Valmohammadi and Kiamars Fathi

In the digital age, emerging technologies have affected every industry. Information and communications technology and digital technologies have transformed traditional supply…

Abstract

Purpose

In the digital age, emerging technologies have affected every industry. Information and communications technology and digital technologies have transformed traditional supply chains into smart and more resilient ones, enabling effective management of challenges. Given the importance of the two topics, namely sustainable supply chain management and Industry 4.0 in supply chain management, on the one hand, and the dearth of theoretical research performed in this area on the other, this study aims to propose a conceptual model on a sustainable digital supply chain management in manufacturing companies.

Design/methodology/approach

This study utilized a qualitative approach. First, an in-depth review of the relevant literature was done. Then, following a multi-grounded theory methodology, relevant data were gathered by reviewing 92 papers and conducting nine semi-structured interviews with industry experts. These data were analyzed using the MAXQDA software.

Findings

A total of 41 concepts, ten sub-components and three main components (dimensions) were extracted, and the proposed conceptual model was presented. Finally, based on this conceptual model, three propositions were suggested.

Research limitations/implications

Considering that the present study was performed in the context of Iranian manufacturing companies, caution should be exercised in relation to the generalizability of the obtained results. Also, due to the problems in the digital technology infrastructure and the limited use of these technologies by manufacturing companies (emphasized by the interviewees), this study focused on the theoretical dimension of using digital technologies by these companies.

Practical implications

The proposed comprehensive model can help academicians as well as practitioners to focus better and explore the variables and constructs of the model, paving the way toward successful implementation of digital technologies in the manufacturing supply chain.

Originality/value

To the best knowledge of the authors, this study is among the first of its kind which presents a holistic and comprehensive digital supply chain model aimed at guiding companies to consider sustainability from all the main dimensions and their relevant indicators.

1 – 6 of 6