Search results
1 – 10 of 25Abdelmoneim Bahyeldin Mohamed Metwally and Ahmed Diab
In developing countries, how risk management technologies influence management accounting and control (MAC) practices is under-researched. By drawing on insights from…
Abstract
Purpose
In developing countries, how risk management technologies influence management accounting and control (MAC) practices is under-researched. By drawing on insights from institutional studies, this study aims to examine the multiple institutional pressures surrounding an entity and influencing its risk-based management control (RBC) system – that is, how RBC appears in an emerging market attributed to institutional multiplicity.
Design/methodology/approach
The authors used qualitative case study research methods to collect empirical evidence from a privately owned Egyptian insurance company.
Findings
The authors observed that in the transformation to risk-based controls, especially in socio-political settings such as Egypt, changes in MAC systems were consistent with the shifts in the institutional context. Along with changes in the institutional environment, the case company sought to configure its MAC system to be more risk-based to achieve its strategic goals effectively and maintain its sustainability.
Originality/value
This research provides a fuller view of risk-based management controls based on the social, professional and political perspectives central to the examined institutional environment. Moreover, unlike early studies that reported resistance to RBC, this case reveals the institutional dynamics contributing to the successful implementation of RBC in an emerging market.
Details
Keywords
Following the call for strengthening the third pillar of knowledge in entrepreneurship as well as work-applied management contexts constituted by pragmatic design principles, we…
Abstract
Purpose
Following the call for strengthening the third pillar of knowledge in entrepreneurship as well as work-applied management contexts constituted by pragmatic design principles, we present a case study on an insurtech for insurance firms specialized in smart contract insurance solutions such as flight delay or ski resort insurance.
Design/methodology/approach
Design science.
Findings
This not only serves as a pointer for how insurances may master their digital transformation while remaining competitive. But moreover, on the meta level, we find that the adoption of entrepreneurial design principles by the students, whose experiential project represents our case study, does not necessarily require continuous support or foundational knowledge to be delivered beforehand. However, for a deeper or more holistic assessment of the case sketched in their project, it makes sense to introduce them to newer developments such as the simple, practical framework of the Entrepreneur's Question Index.
Originality/value
Innovative teaching method on innovative topics.
Details
Keywords
Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to…
Abstract
Purpose
Data breaches are an increasing phenomenon in today's digital society. Despite the preparations an organization must take to prevent a data breach, it is still necessary to develop strategies in the event of a data breach. This paper explores the key recovery areas necessary for data breach recovery.
Design/methodology/approach
Stakeholder theory and three recovery areas (customer, employee and process recovery) are proposed as necessary theoretical lens to study data breach recovery. Three data breach cases (Anthem, Equifax, and Citrix) were presented to provide merit to the argument of the proposed theoretical foundations of stakeholder theory and recovery areas for data breach recovery research.
Findings
Insights from these cases reveal four areas of recovery are necessary for data breach recovery – customer recovery, employee recovery, process recovery and regulatory recovery.
Originality/value
These areas are presented in the data recovery areas model and are necessary for: (1) organizations to focus on these areas when resolving data breaches and (2) future data breach recovery researchers in developing their research in the field.
Details
Keywords
Claudio Miraldo, Sonia Francisca Monken, Lara Motta and Ana Freitas Ribeiro
To promote access to their services, health-care companies provide various communication channels to their customers (beneficiaries) to enable the receipt of requests, such as…
Abstract
Purpose
To promote access to their services, health-care companies provide various communication channels to their customers (beneficiaries) to enable the receipt of requests, such as authorization for examinations, procedures and hospitalizations. Under the approach of innovation studies, the management of customer relationship channels for health-care companies is characterized as a knowledge-intensive business service (KIBS). The purpose of this study is presenting innovation as a strategy to increase customer service productivity, as well as the monitoring of the quality of the service, the generation of health information for beneficiaries and compliance with the regulation set by the Brazilian National Health Agency (ANS).
Design/methodology/approach
The study is characterized as an applied research, as it proposes solutions to problems faced by supplemental health-care companies using the strategy of action research, i.e. an independent, social research with an empirical basis.
Findings
The result of this study shows that a computerized health-care system can increase productivity by 21.96%, and it presents an innovative solution for health-care companies to guarantee the process of meeting the demands and requests of their beneficiaries, ensuring the compliance with ANS regulations.
Practical implications
These results can be replicated to other healthcare companies and contribute to those seeking innovation, increased productivity and quality improvements in their services.
Originality/value
This work was also motivated by the lack of lstudies in the areas of health-care companies in Brazil.
Details
Keywords
W. Alec Cram and Rissaile Mouajou-Kenfack
The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications…
Abstract
Purpose
The growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these notifications varies widely, including differences in the level of detail, apportioning of blame, compensation and corrective action. This study seeks to identify patterns contained within cybersecurity incident notifications by constructing a typology of organizational responses.
Design/methodology/approach
Based on a detailed review of 1,073 global cybersecurity incidents occurring during 2020, the authors obtained and qualitatively analyzed 451 customer notifications.
Findings
The results reveal three distinct organizational response types associated with the level of detail contained within the notification (full transparency, guarded and opacity), as well as three response types associated with the benefitting party (customer interest, balanced interest and company interest).
Originality/value
This work extends past classifications of cybersecurity incident notifications and provides a template of possible notification approaches that could be adopted by organizations.
Details
Keywords
Marcelo José Carrer, Rodrigo Lanna Franco da Silveira, Marcela de Mello Brandão Vinholis and Hildo Meirelles De Souza Filho
The purpose of this study is to investigate the determinants of agricultural insurance adoption by farmers of the state of São Paulo, Brazil.
Abstract
Purpose
The purpose of this study is to investigate the determinants of agricultural insurance adoption by farmers of the state of São Paulo, Brazil.
Design/methodology/approach
Primary data from the 2015/2016 crop season was collected from a sample of 175 farmers. Logit econometric models were applied to identify the variables that affect the probability of agricultural insurance adoption.
Findings
The empirical results show that the education level, access to technical assistance, use of management tools and farm size positively affect the probability of adopting agricultural insurance. In addition, farmers who produce soybean and/or corn are more likely to use insurance. On the other hand, the higher the farmers’ propensity to take risk the lower the likelihood of using insurance.
Research limitations/implications
The empirical analysis is based on cross-sectional data of a sample of 175 farmers of the state of São Paulo. The use of panel data with a larger sample of farmers, considering a period of years, could provide additional information.
Originality/value
To the best of the knowledge, this is the first empirical analysis about determinants of agricultural insurance adoption by Brazilian farmers, considering behavioral factors. The findings provide useful insights for policymakers in formulating risk management programs in the Brazilian agricultural markets. A better understanding about the determinants of insurance adoption is also relevant for private companies that sell insurance to farmers. Therefore, the paper may contribute with the diffusion of rural insurance as risk management tool in Brazilian agriculture.
Details
Keywords
Noel Murray, Ajay K. Manrai and Lalita Ajay Manrai
This paper aims to present an analysis of the role of financial incentives, moral hazard and conflicts of interests leading up to the 2008 financial crisis.
Abstract
Purpose
This paper aims to present an analysis of the role of financial incentives, moral hazard and conflicts of interests leading up to the 2008 financial crisis.
Design/methodology/approach
The study’s analysis has identified common structural flaws throughout the securitization food chain. These structural flaws include inappropriate incentives, the absence of punishment, moral hazard and conflicts of interest. This research sees the full impact of these structural flaws when considering their co-occurrence throughout the financial system. The authors address systemic defects in the securitization food chain and examine the inter-relationships among homeowners, mortgage originators, investment banks and investors. The authors also address the role of exogenous factors, including the SEC, AIG, the credit rating agencies, Congress, business academia and the business media.
Findings
The study argues that the lack of criminal prosecutions of key financial executives has been a key factor in creating moral hazard. Eight years after the Great Recession ended in the USA, the financial services industry continues to suffer from a crisis of trust with society.
Practical implications
An overwhelming majority of Americans, 89 per cent, believe that the federal government does a poor job of regulating the financial services industry (Puzzanghera, 2014). A study argues that the current corporate lobbying framework undermines societal expectations of political equality and consent (Alzola, 2013). The authors believe the Singapore model may be a useful starting point to restructure regulatory agencies so that they are more responsive to societal concerns and less responsive to special interests. Finally, the widespread perception is that the financial services sector, in particular, is ethically challenged (Ferguson, 2012); perhaps there would be some benefit from the implementation of ethical climate monitoring in firms that have been subject to deferred prosecution agreements for serious ethical violations (Arnaud, 2010).
Originality/value
The authors believe the paper makes a truly original contribution. They provide new insights via their analysis of the role of financial incentives, moral hazard and conflicts of interests leading up to the 2008 financial crisis.
Details
Keywords
Kay Rogage, Adrian Clear, Zaid Alwan, Tom Lawrence and Graham Kelly
Buildings and their use is a complex process from design to occupation. Buildings produce huge volumes of data such as building information modelling (BIM), sensor (e.g. from…
Abstract
Purpose
Buildings and their use is a complex process from design to occupation. Buildings produce huge volumes of data such as building information modelling (BIM), sensor (e.g. from building management systems), occupant and building maintenance data. These data can be spread across multiple disconnected systems in numerous formats, making their combined analysis difficult. The purpose of this paper is to bring these sources of data together, to provide a more complete account of a building and, consequently, a more comprehensive basis for understanding and managing its performance.
Design/methodology/approach
Building data from a sample of newly constructed housing units were analysed, several properties were identified for the study and sensors deployed. A sensor agnostic platform for visualising real-time building performance data was developed.
Findings
Data sources from both sensor data and qualitative questionnaire were analysed and a matrix of elements affecting building performance in areas such as energy use, comfort use, integration with technology was presented. In addition, a prototype sensor visualisation platform was designed to connect in-use performance data to BIM.
Originality/value
This work presents initial findings from a post occupancy evaluation utilising sensor data. The work attempts to address the issues of BIM in-use scenarios for housing sector. A prototype was developed which can be fully developed and replicated to wider housing projects. The findings can better address how indoor thermal comfort parameters can be used to improve housing stock and even address elements such as machine learning for better buildings.
Details
Keywords
In Korea and abroad, this paper investigates the use of blockchains in the financial sector. This study aims to examine how blockchains are applied to the financial sector and how…
Abstract
Purpose
In Korea and abroad, this paper investigates the use of blockchains in the financial sector. This study aims to examine how blockchains are applied to the financial sector and how to respond to the Korean conditions.
Design/methodology/approach
This paper investigates the movements of the financial sector and related services using the blockchain in the current market.
Findings
First, as a result of examining domestic and foreign cases, it can be seen that the areas where blockchains are most actively applied in the financial sector are expanding into settlement, remittance, securities and smart contracts. Also, in Korea, many of the authentication procedures based on the equipment possessed by the consumers are used so that introduction of the blockchain in the authentication part is prominent. Second, the move to introduce a closed (private) distributed ledger that does not go through the central bank is accelerating in payments between banks. Third, domestic financial institutions also need joint action by financial institutions through a blockchain consortium to apply blockchain technology to the financial sector. Fourth, consumer needs and technological developments are changing. At the same time, as the opportunity to infringe on the information held by individuals has expanded, the need for blockchain technology is strongly emerging because of the efforts of the organizations to defend it.
Originality/value
This paper contributes to understanding the changes in the financial sector using the blockchain.
Details
Keywords
The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…
Abstract
Purpose
The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.
Design/methodology/approach
This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.
Findings
While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.
Originality/value
This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.
Details